Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | July 30, 2021, 10:24 a.m. | July 30, 2021, 10:45 a.m. |
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\downloaddocument.do.dll,StartW
2096-
wermgr.exe C:\Windows\system32\wermgr.exe
2304
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\downloaddocument.do.dll,
2204
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
138.34.28.219 | Active | Moloch |
154.58.23.192 | Active | Moloch |
164.124.101.2 | Active | Moloch |
185.56.76.108 | Active | Moloch |
185.56.76.28 | Active | Moloch |
185.56.76.94 | Active | Moloch |
217.115.240.248 | Active | Moloch |
24.162.214.166 | Active | Moloch |
38.110.100.142 | Active | Moloch |
38.110.103.18 | Active | Moloch |
45.36.99.184 | Active | Moloch |
60.51.47.65 | Active | Moloch |
68.69.26.182 | Active | Moloch |
97.83.40.67 | Active | Moloch |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49164 60.51.47.65:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | 50:fd:fd:4e:2c:57:ea:f7:c9:cd:3f:61:4a:a2:40:01:1b:b8:df:02 |
TLSv1 192.168.56.102:49169 38.110.103.18:443 |
C=US, ST=CA, L=San Jose, O=Ubiquiti Networks Inc., OU=Technical Support, CN=UBNT-B4:FB:E4:B8:30:7E/emailAddress=support@ubnt.com | C=US, ST=CA, L=San Jose, O=Ubiquiti Networks Inc., OU=Technical Support, CN=UBNT-B4:FB:E4:B8:30:7E/emailAddress=support@ubnt.com | 2e:0f:ca:9b:3e:95:2e:8f:f6:42:a6:1e:7a:21:66:83:0d:31:cb:c1 |
TLSv1 192.168.56.102:49168 38.110.100.142:443 |
C=US, ST=NY, L=New York, O=Ubiquiti Inc., OU=Technical Support, CN=UBNT-18:E8:29:1F:F2:01/emailAddress=support@ui.com | C=US, ST=NY, L=New York, O=Ubiquiti Inc., OU=Technical Support, CN=UBNT-18:E8:29:1F:F2:01/emailAddress=support@ui.com | f1:bf:98:64:45:62:e6:de:5f:a4:b5:d9:2a:11:e4:6f:21:99:7b:61 |
TLSv1 192.168.56.102:49166 97.83.40.67:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.102:49175 45.36.99.184:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.102:49172 24.162.214.166:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.102:49174 217.115.240.248:443 |
C=US, ST=GA, L=Canton, O=LigoWave LLC, OU=R&D, CN=LigoWave SSL CA | C=US, ST=GA, L=Canton, O=LigoWave LLC, OU=R&D, CN=LigoWave SSL CA | d3:39:ab:71:76:bb:9c:d2:1c:3e:b1:17:92:c7:3f:25:1f:25:f8:88 |
TLSv1 192.168.56.102:49177 138.34.28.219:443 |
C=US, ST=CA, L=San Jose, O=Ubiquiti Networks Inc., OU=Technical Support, CN=UBNT-F4:92:BF:D6:1C:49/emailAddress=support@ubnt.com | C=US, ST=CA, L=San Jose, O=Ubiquiti Networks Inc., OU=Technical Support, CN=UBNT-F4:92:BF:D6:1C:49/emailAddress=support@ubnt.com | 0f:6c:9c:c8:a9:10:1e:c8:98:3f:01:df:32:ad:f1:7f:5d:d0:4c:54 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
packer | Armadillo v1.xx - v2.xx |
resource name | None |
suspicious_features | Connection to IP address | suspicious_request | GET https://60.51.47.65/rob116/TEST22-PC_W617601.8B538ABB9337784DFF0195FB9533B201/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://97.83.40.67/rob116/TEST22-PC_W617601.8B538ABB9337784DFF0195FB9533B201/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://38.110.100.142/rob116/TEST22-PC_W617601.8B538ABB9337784DFF0195FB9533B201/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://38.110.100.142/cookiechecker?uri=/rob116/TEST22-PC_W617601.8B538ABB9337784DFF0195FB9533B201/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://38.110.100.142/index.html | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://38.110.103.18/rob116/TEST22-PC_W617601.8B538ABB9337784DFF0195FB9533B201/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://24.162.214.166/rob116/TEST22-PC_W617601.8B538ABB9337784DFF0195FB9533B201/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://217.115.240.248/rob116/TEST22-PC_W617601.8B538ABB9337784DFF0195FB9533B201/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://45.36.99.184/rob116/TEST22-PC_W617601.8B538ABB9337784DFF0195FB9533B201/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://138.34.28.219/rob116/TEST22-PC_W617601.8B538ABB9337784DFF0195FB9533B201/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://138.34.28.219/cookiechecker?uri=/rob116/TEST22-PC_W617601.8B538ABB9337784DFF0195FB9533B201/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://138.34.28.219/index.html | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://138.34.28.219/login.cgi?uri=/index.html |
request | GET https://60.51.47.65/rob116/TEST22-PC_W617601.8B538ABB9337784DFF0195FB9533B201/5/file/ |
request | GET https://97.83.40.67/rob116/TEST22-PC_W617601.8B538ABB9337784DFF0195FB9533B201/5/file/ |
request | GET https://38.110.100.142/rob116/TEST22-PC_W617601.8B538ABB9337784DFF0195FB9533B201/5/file/ |
request | GET https://38.110.100.142/cookiechecker?uri=/rob116/TEST22-PC_W617601.8B538ABB9337784DFF0195FB9533B201/5/file/ |
request | GET https://38.110.100.142/index.html |
request | GET https://38.110.103.18/rob116/TEST22-PC_W617601.8B538ABB9337784DFF0195FB9533B201/5/file/ |
request | GET https://24.162.214.166/rob116/TEST22-PC_W617601.8B538ABB9337784DFF0195FB9533B201/5/file/ |
request | GET https://217.115.240.248/rob116/TEST22-PC_W617601.8B538ABB9337784DFF0195FB9533B201/5/file/ |
request | GET https://45.36.99.184/rob116/TEST22-PC_W617601.8B538ABB9337784DFF0195FB9533B201/5/file/ |
request | GET https://138.34.28.219/rob116/TEST22-PC_W617601.8B538ABB9337784DFF0195FB9533B201/5/file/ |
request | GET https://138.34.28.219/cookiechecker?uri=/rob116/TEST22-PC_W617601.8B538ABB9337784DFF0195FB9533B201/5/file/ |
request | GET https://138.34.28.219/index.html |
request | GET https://138.34.28.219/login.cgi?uri=/index.html |
description | wermgr.exe tried to sleep 148 seconds, actually delayed analysis time by 148 seconds |
cmdline | C:\Windows\system32\cmd.exe |
section | {u'size_of_data': u'0x0003e000', u'virtual_address': u'0x00055000', u'entropy': 7.841039572691421, u'name': u'.rsrc', u'virtual_size': u'0x0003d798'} | entropy | 7.84103957269 | description | A section with a high entropy has been found | |||||||||
entropy | 0.41610738255 | description | Overall entropy of this PE file is high |
host | 138.34.28.219 | |||
host | 154.58.23.192 | |||
host | 185.56.76.108 | |||
host | 185.56.76.28 | |||
host | 185.56.76.94 | |||
host | 217.115.240.248 | |||
host | 24.162.214.166 | |||
host | 38.110.100.142 | |||
host | 38.110.103.18 | |||
host | 45.36.99.184 | |||
host | 60.51.47.65 | |||
host | 68.69.26.182 | |||
host | 97.83.40.67 |
Bkav | W32.AIDetect.malware1 |
Lionic | Trojan.Win32.Malicious.4!c |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
McAfee | Artemis!8DCC2D557EDC |
CrowdStrike | win/malicious_confidence_90% (W) |
K7GW | Trojan ( 00579dbe1 ) |
K7AntiVirus | Trojan ( 00579dbe1 ) |
Symantec | ML.Attribute.HighConfidence |
Paloalto | generic.ml |
Kaspersky | UDS:Trojan.Win32.Trickpak.gen |
McAfee-GW-Edition | BehavesLike.Win32.Ramnit.jc |
FireEye | Generic.mg.8dcc2d557edcd14a |
Sophos | ML/PE-A |
APEX | Malicious |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
SentinelOne | Static AI - Malicious PE |
dead_host | 185.56.76.28:443 |
dead_host | 192.168.56.102:49167 |
dead_host | 192.168.56.102:49176 |
dead_host | 192.168.56.102:49165 |
dead_host | 185.56.76.108:443 |
dead_host | 192.168.56.102:49171 |
dead_host | 68.69.26.182:443 |
dead_host | 185.56.76.94:443 |