Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 20, 2021, 9:35 a.m. | Aug. 20, 2021, 10 a.m. |
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\photo.png.dll,Sajd548zfDsaj
2332 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\photo.png.dll,hgjdfggvdsgg
2260 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\photo.png.dll,hitmk
2256-
-
svchost.exe C:\Windows\system32\svchost.exe
2312 -
svchost.exe C:\Windows\system32\svchost.exe
2288 -
svchost.exe C:\Windows\system32\svchost.exe
2824 -
svchost.exe C:\Windows\system32\svchost.exe
656 -
svchost.exe C:\Windows\system32\svchost.exe
260
-
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\photo.png.dll,sfe5384tsfrfw4dhd
2664 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\photo.png.dll,
2564
Name | Response | Post-Analysis Lookup |
---|---|---|
150.134.208.175.b.barracudacentral.org | 127.0.0.2 | |
150.134.208.175.zen.spamhaus.org | ||
ipecho.net | 34.117.59.81 | |
150.134.208.175.cbl.abuseat.org |
IP Address | Status | Action |
---|---|---|
105.27.205.34 | Active | Moloch |
164.124.101.2 | Active | Moloch |
185.56.175.122 | Active | Moloch |
194.146.249.137 | Active | Moloch |
216.166.148.187 | Active | Moloch |
221.147.172.5 | Active | Moloch |
34.117.59.81 | Active | Moloch |
45.36.99.184 | Active | Moloch |
46.99.175.149 | Active | Moloch |
46.99.175.217 | Active | Moloch |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49206 46.99.175.149:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.101:49209 221.147.172.5:443 |
C=US, ST=IL, L=Chicago, O=Internet Widgits Pty Ltd | C=US, ST=IL, L=Chicago, O=Internet Widgits Pty Ltd | 30:21:9a:cd:06:f2:ba:20:f6:0b:3c:54:ec:08:35:d0:9d:4b:e8:50 |
TLSv1 192.168.56.101:49212 46.99.175.217:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.101:49216 185.56.175.122:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | 50:fd:fd:4e:2c:57:ea:f7:c9:cd:3f:61:4a:a2:40:01:1b:b8:df:02 |
TLSv1 192.168.56.101:49219 105.27.205.34:443 |
C=US, ST=IL, L=Chicago, O=Internet Widgits Pty Ltd | C=US, ST=IL, L=Chicago, O=Internet Widgits Pty Ltd | 30:21:9a:cd:06:f2:ba:20:f6:0b:3c:54:ec:08:35:d0:9d:4b:e8:50 |
TLSv1 192.168.56.101:49222 45.36.99.184:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.149/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.149/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/OI3LyOOUmuYHFL26IAylrWkdSWcs/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.149/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/exc/E:%200xc0000005%20A:%200x00000000771D9A5A/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.149/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/user/test22/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.149/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/path/C:%5CUsers%5Ctest22%5CAppData%5CRoaming%5CArh-CatT0VKPD%5Cscphotorg.dmo/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.149/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/NAT%20status/client%20is%20behind%20NAT/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://221.147.172.5/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/5/pwgrabb64/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/t4t3CS0jQMS9UI5SNoHrkbjtx6cei9l/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/exc/E:%200xc0000005%20A:%200x00000000771D9A5A/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/user/test22/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/NAT%20status/client%20is%20behind%20NAT/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/10/62/MLVBSVIBGGSLCETYA/7/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://221.147.172.5/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/5/pwgrabc64/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://185.56.175.122/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://185.56.175.122/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/ldtPZdTFpdDVL1rN/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://185.56.175.122/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/exc/E:%200xc0000005%20A:%200x00000000771D9A5A/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://185.56.175.122/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/user/test22/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://185.56.175.122/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/NAT%20status/client%20is%20behind%20NAT/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/1ovoQnL1dPUqTI9l/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/10/62/ZFNFZNFXBVRTP/7/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/10/62/FMVZUWJFLMMODQWN/7/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/23/100019/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/DNSBL/listed/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/1/nX5MSl1KKv9sNLfeSGF6AS1KHeuzdV/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://105.27.205.34/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/5/networkDll64/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://45.36.99.184/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://45.36.99.184/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/9h1FTJ3vRTD3jjtJPF91V1nNR3XHLTHR/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://45.36.99.184/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/exc/E:%200xc0000005%20A:%200x00000000771D9A5A/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://45.36.99.184/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/user/test22/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://45.36.99.184/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/1/9g3K3Gh8vChwthBQuAfCr6lURUHfovZ/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://45.36.99.184/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/10/62/289684/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://45.36.99.184/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/pwgrabc/sTart%20Run%20D%20failed/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://45.36.99.184/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/networkDll64/reload1/0/ |
request | GET http://ipecho.net/plain |
request | GET https://46.99.175.149/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/5/file/ |
request | GET https://46.99.175.149/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/OI3LyOOUmuYHFL26IAylrWkdSWcs/ |
request | GET https://46.99.175.149/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/exc/E:%200xc0000005%20A:%200x00000000771D9A5A/0/ |
request | GET https://46.99.175.149/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/user/test22/0/ |
request | GET https://46.99.175.149/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/path/C:%5CUsers%5Ctest22%5CAppData%5CRoaming%5CArh-CatT0VKPD%5Cscphotorg.dmo/0/ |
request | GET https://46.99.175.149/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/NAT%20status/client%20is%20behind%20NAT/0/ |
request | GET https://221.147.172.5/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/5/pwgrabb64/ |
request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/5/file/ |
request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/t4t3CS0jQMS9UI5SNoHrkbjtx6cei9l/ |
request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/exc/E:%200xc0000005%20A:%200x00000000771D9A5A/0/ |
request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/user/test22/0/ |
request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/NAT%20status/client%20is%20behind%20NAT/0/ |
request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/10/62/MLVBSVIBGGSLCETYA/7/ |
request | GET https://221.147.172.5/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/5/pwgrabc64/ |
request | GET https://185.56.175.122/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/5/file/ |
request | GET https://185.56.175.122/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/ldtPZdTFpdDVL1rN/ |
request | GET https://185.56.175.122/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/exc/E:%200xc0000005%20A:%200x00000000771D9A5A/0/ |
request | GET https://185.56.175.122/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/user/test22/0/ |
request | GET https://185.56.175.122/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/NAT%20status/client%20is%20behind%20NAT/0/ |
request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/1ovoQnL1dPUqTI9l/ |
request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/10/62/ZFNFZNFXBVRTP/7/ |
request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/10/62/FMVZUWJFLMMODQWN/7/ |
request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/23/100019/ |
request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/DNSBL/listed/0/ |
request | GET https://46.99.175.217/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/1/nX5MSl1KKv9sNLfeSGF6AS1KHeuzdV/ |
request | GET https://105.27.205.34/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/5/networkDll64/ |
request | GET https://45.36.99.184/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/5/file/ |
request | GET https://45.36.99.184/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/9h1FTJ3vRTD3jjtJPF91V1nNR3XHLTHR/ |
request | GET https://45.36.99.184/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/exc/E:%200xc0000005%20A:%200x00000000771D9A5A/0/ |
request | GET https://45.36.99.184/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/user/test22/0/ |
request | GET https://45.36.99.184/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/1/9g3K3Gh8vChwthBQuAfCr6lURUHfovZ/ |
request | GET https://45.36.99.184/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/10/62/289684/0/ |
request | GET https://45.36.99.184/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/pwgrabc/sTart%20Run%20D%20failed/0/ |
request | GET https://45.36.99.184/rob124/TEST22-PC_W617601.33A5997458BBAA6F33F33FF551B198D3/14/networkDll64/reload1/0/ |
domain | ipecho.net |
cmdline | C:\Windows\system32\cmd.exe |
cmdline | C:\Windows\system32\svchost.exe |
section | {u'size_of_data': u'0x0003c000', u'virtual_address': u'0x0002f000', u'entropy': 7.900267926943486, u'name': u'.rsrc', u'virtual_size': u'0x0003be88'} | entropy | 7.90026792694 | description | A section with a high entropy has been found | |||||||||
entropy | 0.550458715596 | description | Overall entropy of this PE file is high |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
host | 105.27.205.34 | |||
host | 185.56.175.122 | |||
host | 194.146.249.137 | |||
host | 216.166.148.187 | |||
host | 221.147.172.5 | |||
host | 45.36.99.184 | |||
host | 46.99.175.149 | |||
host | 46.99.175.217 |
Elastic | malicious (high confidence) |
CrowdStrike | win/malicious_confidence_100% (W) |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:Trojan-Banker.Win32.Trickster.gen |
Sophos | ML/PE-A |
SentinelOne | Static AI - Malicious PE |
MaxSecure | Trojan.Malware.121218.susgen |
Kingsoft | Win32.Troj.Banker.(kcloud) |
Microsoft | Trojan:Win32/Cloxer |
Cynet | Malicious (score: 100) |
Webroot | W32.Infostealer.Gen |
dead_host | 216.166.148.187:443 |
dead_host | 194.146.249.137:443 |