Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Aug. 5, 2021, 9:41 a.m. | Aug. 5, 2021, 9:51 a.m. |
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\ggi8w3183a1077e104d07a84291d0d5dcc1de.dll,
2108 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\ggi8w3183a1077e104d07a84291d0d5dcc1de.dll,StartW
828-
-
svchost.exe C:\Windows\system32\svchost.exe
2824 -
svchost.exe C:\Windows\system32\svchost.exe
3000 -
svchost.exe C:\Windows\system32\svchost.exe
2212
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
150.134.208.175.b.barracudacentral.org | 127.0.0.2 | |
150.134.208.175.zen.spamhaus.org | ||
api.ipify.org | 23.21.224.49 | |
150.134.208.175.cbl.abuseat.org |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49168 105.27.205.34:443 |
C=US, ST=IL, L=Chicago, O=Internet Widgits Pty Ltd | C=US, ST=IL, L=Chicago, O=Internet Widgits Pty Ltd | 30:21:9a:cd:06:f2:ba:20:f6:0b:3c:54:ec:08:35:d0:9d:4b:e8:50 |
TLSv1 192.168.56.102:49167 46.99.175.217:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.102:49165 46.99.175.217:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.102:49178 105.27.205.34:443 |
C=US, ST=IL, L=Chicago, O=Internet Widgits Pty Ltd | C=US, ST=IL, L=Chicago, O=Internet Widgits Pty Ltd | 30:21:9a:cd:06:f2:ba:20:f6:0b:3c:54:ec:08:35:d0:9d:4b:e8:50 |
TLSv1 192.168.56.102:49164 179.189.229.254:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.102:49173 105.27.205.34:443 |
C=US, ST=IL, L=Chicago, O=Internet Widgits Pty Ltd | C=US, ST=IL, L=Chicago, O=Internet Widgits Pty Ltd | 30:21:9a:cd:06:f2:ba:20:f6:0b:3c:54:ec:08:35:d0:9d:4b:e8:50 |
TLSv1 192.168.56.102:49176 65.152.201.203:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | 50:fd:fd:4e:2c:57:ea:f7:c9:cd:3f:61:4a:a2:40:01:1b:b8:df:02 |
TLSv1 192.168.56.102:49182 128.201.76.252:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.102:49184 184.74.99.214:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.102:49171 128.201.76.252:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.102:49172 128.201.76.252:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.102:49177 65.152.201.203:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | 50:fd:fd:4e:2c:57:ea:f7:c9:cd:3f:61:4a:a2:40:01:1b:b8:df:02 |
TLSv1 192.168.56.102:49183 184.74.99.214:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.102:49181 128.201.76.252:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
packer | Armadillo v1.xx - v2.xx |
suspicious_features | Connection to IP address | suspicious_request | GET https://179.189.229.254/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.217/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.217/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/5tIdKd9BQcw97tDkWQXFcV8GHmRSS/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.217/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/exc/E:%200xc0000005%20A:%200x0000000076F99A5A/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.217/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/user/test22/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.217/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/path/C:%5CUsers%5Ctest22%5CAppData%5CRoaming%5Cwise-toolsPXDT3N%5Cpzggi8w3183a1077e104d07a84291d0d5dcc1dexl.grf/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.217/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/NAT%20status/client%20is%20behind%20NAT/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://105.27.205.34/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/5/pwgrabb64/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/etAeSjeTCe4jkQuDOjlUTHW/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/exc/E:%200xc0000005%20A:%200x0000000076F99A5A/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/user/test22/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/NAT%20status/client%20is%20behind%20NAT/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/10/62/OJLELJAKUDUGHFR/7/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://105.27.205.34/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/5/pwgrabc64/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://65.152.201.203/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://65.152.201.203/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/DerGZwL4ua1lDPww283xhhhGVTl48hJ/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://65.152.201.203/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/exc/E:%200xc0000005%20A:%200x0000000076F99A5A/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://65.152.201.203/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/user/test22/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://65.152.201.203/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/NAT%20status/client%20is%20behind%20NAT/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/MDFwQcZzmEtnaC9hhuhJDWmvxuDF/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/10/62/TFOWOHKHTBS/7/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/10/62/KBIJKZGVIOLLRWL/7/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/23/100019/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/DNSBL/listed/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://184.74.99.214/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://184.74.99.214/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/NpdHNRhrX33vnXV5x9jz/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://184.74.99.214/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/exc/E:%200xc0000005%20A:%200x0000000076F99A5A/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://184.74.99.214/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/user/test22/0/ |
request | GET http://api.ipify.org/?format=text |
request | GET https://179.189.229.254/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/5/file/ |
request | GET https://46.99.175.217/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/5/file/ |
request | GET https://46.99.175.217/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/5tIdKd9BQcw97tDkWQXFcV8GHmRSS/ |
request | GET https://46.99.175.217/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/exc/E:%200xc0000005%20A:%200x0000000076F99A5A/0/ |
request | GET https://46.99.175.217/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/user/test22/0/ |
request | GET https://46.99.175.217/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/path/C:%5CUsers%5Ctest22%5CAppData%5CRoaming%5Cwise-toolsPXDT3N%5Cpzggi8w3183a1077e104d07a84291d0d5dcc1dexl.grf/0/ |
request | GET https://46.99.175.217/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/NAT%20status/client%20is%20behind%20NAT/0/ |
request | GET https://105.27.205.34/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/5/pwgrabb64/ |
request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/5/file/ |
request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/etAeSjeTCe4jkQuDOjlUTHW/ |
request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/exc/E:%200xc0000005%20A:%200x0000000076F99A5A/0/ |
request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/user/test22/0/ |
request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/NAT%20status/client%20is%20behind%20NAT/0/ |
request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/10/62/OJLELJAKUDUGHFR/7/ |
request | GET https://105.27.205.34/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/5/pwgrabc64/ |
request | GET https://65.152.201.203/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/5/file/ |
request | GET https://65.152.201.203/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/DerGZwL4ua1lDPww283xhhhGVTl48hJ/ |
request | GET https://65.152.201.203/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/exc/E:%200xc0000005%20A:%200x0000000076F99A5A/0/ |
request | GET https://65.152.201.203/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/user/test22/0/ |
request | GET https://65.152.201.203/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/NAT%20status/client%20is%20behind%20NAT/0/ |
request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/MDFwQcZzmEtnaC9hhuhJDWmvxuDF/ |
request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/10/62/TFOWOHKHTBS/7/ |
request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/10/62/KBIJKZGVIOLLRWL/7/ |
request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/23/100019/ |
request | GET https://128.201.76.252/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/DNSBL/listed/0/ |
request | GET https://184.74.99.214/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/5/file/ |
request | GET https://184.74.99.214/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/NpdHNRhrX33vnXV5x9jz/ |
request | GET https://184.74.99.214/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/exc/E:%200xc0000005%20A:%200x0000000076F99A5A/0/ |
request | GET https://184.74.99.214/rob120/TEST22-PC_W617601.F05D79F977FC6337D28BBA9BDB7DAFB2/14/user/test22/0/ |
domain | api.ipify.org |
cmdline | C:\Windows\system32\cmd.exe |
cmdline | C:\Windows\system32\svchost.exe |
section | {u'size_of_data': u'0x0004e000', u'virtual_address': u'0x0005d000', u'entropy': 7.012284815479608, u'name': u'.rsrc', u'virtual_size': u'0x0004d080'} | entropy | 7.01228481548 | description | A section with a high entropy has been found | |||||||||
entropy | 0.458823529412 | description | Overall entropy of this PE file is high |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
host | 105.27.205.34 | |||
host | 128.201.76.252 | |||
host | 179.189.229.254 | |||
host | 184.74.99.214 | |||
host | 46.99.175.217 | |||
host | 65.152.201.203 |
Bkav | W32.AIDetect.malware2 |
CrowdStrike | win/malicious_confidence_90% (W) |
Kaspersky | UDS:Trojan.Win32.Trickpak.gen |
APEX | Malicious |
McAfee-GW-Edition | Artemis |
FireEye | Generic.mg.2ab4cc984ec0b93b |
Sophos | Mal/Generic-R |
Ikarus | Trojan-Spy.TrickBot |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
Microsoft | Trojan:Win32/TrickBot.Z!ibt |
Cynet | Malicious (score: 100) |
McAfee | Artemis!2AB4CC984EC0 |