Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Sept. 22, 2021, 9:44 a.m. | Sept. 22, 2021, 10:12 a.m. |
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\ntcm.dll,DllGetClassObject
2648-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\ntcm.dll,DllGetClassObject
1296
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\ntcm.dll,DllRegisterServer
2428-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\ntcm.dll,DllRegisterServer
3056
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\ntcm.dll,PluginInit
2624-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\ntcm.dll,PluginInit
2944
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\ntcm.dll,
2672
Name | Response | Post-Analysis Lookup |
---|---|---|
gigamerolini.top | ||
aws.amazon.com | 99.86.203.74 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49205 -> 54.230.166.71:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
UDP 192.168.56.101:54056 -> 164.124.101.2:53 | 2023883 | ET DNS Query to a *.top domain - Likely Hostile | Potentially Bad Traffic |
TCP 192.168.56.101:49207 -> 54.230.166.71:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.101:49208 -> 54.230.166.71:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49205 54.230.166.71:443 |
C=US, O=Amazon, OU=Server CA 1B, CN=Amazon | CN=aws.amazon.com | 78:64:7a:bc:b1:44:57:70:a0:58:3a:5d:4f:e2:c4:f7:1f:83:d5:22 |
TLSv1 192.168.56.101:49207 54.230.166.71:443 |
C=US, O=Amazon, OU=Server CA 1B, CN=Amazon | CN=aws.amazon.com | 78:64:7a:bc:b1:44:57:70:a0:58:3a:5d:4f:e2:c4:f7:1f:83:d5:22 |
TLSv1 192.168.56.101:49208 54.230.166.71:443 |
C=US, O=Amazon, OU=Server CA 1B, CN=Amazon | CN=aws.amazon.com | 78:64:7a:bc:b1:44:57:70:a0:58:3a:5d:4f:e2:c4:f7:1f:83:d5:22 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
section | .ndata |
suspicious_features | GET method with no useragent header | suspicious_request | GET https://aws.amazon.com/ |
request | GET https://aws.amazon.com/ |
domain | gigamerolini.top | description | Generic top level domain TLD |
description | rundll32.exe tried to sleep 534 seconds, actually delayed analysis time by 534 seconds |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob |
Lionic | Trojan.Multi.Generic.4!c |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 99) |
ALYac | Trojan.GenericKD.46982868 |
Malwarebytes | Trojan.IcedID |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Trojan.GenericKD.46982868 |
K7GW | Trojan-Downloader ( 00580ce61 ) |
K7AntiVirus | Trojan-Downloader ( 00580ce61 ) |
Arcabit | Trojan.Generic.D2CCE6D4 |
Symantec | Trojan.Gen.2 |
ESET-NOD32 | Win64/TrojanDownloader.IcedId.F |
Paloalto | generic.ml |
Kaspersky | Trojan-Banker.Win32.IcedID.txva |
Alibaba | TrojanBanker:Win32/IcedID.7aa65050 |
MicroWorld-eScan | Trojan.GenericKD.46982868 |
Avast | Win64:BankerX-gen [Trj] |
Ad-Aware | Trojan.GenericKD.46982868 |
McAfee-GW-Edition | BehavesLike.Win64.Drixed.bh |
FireEye | Generic.mg.9f3d6ad1891e088e |
Emsisoft | Trojan.GenericKD.46982868 (B) |
Ikarus | Trojan.SuspectCRC |
Avira | TR/AD.Bazar.kuqsp |
MAX | malware (ai score=89) |
Kingsoft | Win32.Troj.Banker.(kcloud) |
Microsoft | Trojan:Win32/Tnega!ml |
ZoneAlarm | Trojan-Banker.Win32.IcedID.txva |
GData | Win32.Trojan-Downloader.IcedID.6JCWMN |
McAfee | Artemis!9F3D6AD1891E |
Cylance | Unsafe |
SentinelOne | Static AI - Malicious PE |
Fortinet | Malicious_Behavior.SB |
AVG | Win64:BankerX-gen [Trj] |
Panda | Trj/CI.A |