Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 11, 2021, 9:22 a.m. | Aug. 11, 2021, 9:29 a.m. |
-
-
wermgr.exe C:\Windows\system32\wermgr.exe
1772
-
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49202 46.99.175.149:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.101:49205 128.201.76.252:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.101:49206 216.166.148.187:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.101:49203 45.36.99.184:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.101:49204 185.56.175.122:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | 50:fd:fd:4e:2c:57:ea:f7:c9:cd:3f:61:4a:a2:40:01:1b:b8:df:02 |
packer | Armadillo v1.71 |
resource name | None |
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.149/top111/TEST22-PC_W617601.511F739DF11CD53BB8613D8ECFB9F3D1/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://45.36.99.184/top111/TEST22-PC_W617601.511F739DF11CD53BB8613D8ECFB9F3D1/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://185.56.175.122/top111/TEST22-PC_W617601.511F739DF11CD53BB8613D8ECFB9F3D1/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://128.201.76.252/top111/TEST22-PC_W617601.511F739DF11CD53BB8613D8ECFB9F3D1/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://216.166.148.187/top111/TEST22-PC_W617601.511F739DF11CD53BB8613D8ECFB9F3D1/5/file/ |
request | GET https://46.99.175.149/top111/TEST22-PC_W617601.511F739DF11CD53BB8613D8ECFB9F3D1/5/file/ |
request | GET https://45.36.99.184/top111/TEST22-PC_W617601.511F739DF11CD53BB8613D8ECFB9F3D1/5/file/ |
request | GET https://185.56.175.122/top111/TEST22-PC_W617601.511F739DF11CD53BB8613D8ECFB9F3D1/5/file/ |
request | GET https://128.201.76.252/top111/TEST22-PC_W617601.511F739DF11CD53BB8613D8ECFB9F3D1/5/file/ |
request | GET https://216.166.148.187/top111/TEST22-PC_W617601.511F739DF11CD53BB8613D8ECFB9F3D1/5/file/ |
cmdline | C:\Windows\system32\cmd.exe |
section | {u'size_of_data': u'0x00057000', u'virtual_address': u'0x00035000', u'entropy': 6.9989532286978555, u'name': u'.rsrc', u'virtual_size': u'0x00056fd0'} | entropy | 6.9989532287 | description | A section with a high entropy has been found | |||||||||
entropy | 0.644444444444 | description | Overall entropy of this PE file is high |
host | 128.201.76.252 | |||
host | 185.56.175.122 | |||
host | 216.166.148.187 | |||
host | 45.36.99.184 | |||
host | 46.99.175.149 |