Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Aug. 23, 2021, 11:52 a.m. | Aug. 23, 2021, 12:10 p.m. |
-
credit.exe "C:\Users\test22\AppData\Local\Temp\credit.exe"
2204
Name | Response | Post-Analysis Lookup |
---|---|---|
login.live.com |
CNAME
login.msa.msidentity.com
CNAME
prda.aadg.msidentity.com
|
40.126.35.129 |
onedrive.live.com |
CNAME
l-0004.l-msedge.net
|
13.107.42.13 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49164 -> 13.107.42.13:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.102:49166 -> 40.126.52.1:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.102:49165 -> 40.126.52.1:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49164 13.107.42.13:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 02 | CN=onedrive.com | 24:8a:fb:ed:16:0d:11:c8:2f:65:3a:66:ca:f1:6f:60:ad:4c:cc:de |
TLSv1 192.168.56.102:49166 40.126.52.1:443 |
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA | C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=graph.windows.net | 8d:57:81:3d:a5:f9:5a:59:21:fc:ae:40:ba:24:63:b8:aa:6a:cd:d0 |
TLSv1 192.168.56.102:49165 40.126.52.1:443 |
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA | C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=graph.windows.net | 8d:57:81:3d:a5:f9:5a:59:21:fc:ae:40:ba:24:63:b8:aa:6a:cd:d0 |
section | CODE |
section | DATA |
section | BSS |
packer | BobSoft Mini Delphi -> BoB / BobSoft |
request | GET https://onedrive.live.com/download?cid=D6676A9A61E841F3&resid=D6676A9A61E841F3%21129&authkey=ALgOfs5uX8ML6NU |
request | GET https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=13&ct=1629687681&rver=7.3.6962.0&wp=MBI_SSL_SHARED&wreply=https:%2F%2Fonedrive.live.com%2Fdownload%3Fcid%3DD6676A9A61E841F3%26resid%3DD6676A9A61E841F3%2521129%26authkey%3DALgOfs5uX8ML6NU&lc=1033&id=250206&cbcxt=sky&cbcxt=sky |
process | credit.exe | useragent | zipo | ||||||
process | credit.exe | useragent | aswe |
Lionic | Trojan.Win32.Malicious.4!c |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
Cylance | Unsafe |
Sangfor | Riskware.Win32.Agent.ky |
Alibaba | Trojan:Win32/Fareit.0af09ff6 |
CrowdStrike | win/malicious_confidence_60% (W) |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/GenKryptik.FJHZ |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Trojan.GenericKD.46838012 |
MicroWorld-eScan | Trojan.GenericKD.46838012 |
Avast | Win32:Malware-gen |
Ad-Aware | Trojan.GenericKD.46838012 |
Sophos | Mal/Generic-S |
DrWeb | Trojan.DownLoader41.4140 |
McAfee-GW-Edition | Fareit-FCVN!4338ACA68FBA |
FireEye | Generic.mg.4338aca68fbaab84 |
Emsisoft | Trojan.GenericKD.46838012 (B) |
Ikarus | Trojan.Inject |
GData | Trojan.GenericKD.46838012 |
Webroot | W32.Trojan.Gen |
Kingsoft | Win32.Troj.Generic_a.a.(kcloud) |
Gridinsoft | Trojan.Win32.Agent.oa!s1 |
Microsoft | Trojan:Script/Phonzy.C!ml |
McAfee | Fareit-FCVN!4338ACA68FBA |
TrendMicro-HouseCall | TROJ_GEN.R002H06HK21 |
SentinelOne | Static AI - Suspicious PE |
eGambit | Unsafe.AI_Score_71% |
Fortinet | W32/GenKryptik.FIVH!tr |
BitDefenderTheta | Gen:NN.ZelphiCO.34088.4GX@a0xg3Kpi |
AVG | Win32:Malware-gen |