Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Oct. 1, 2021, 9:24 a.m. | Oct. 1, 2021, 9:41 a.m. |
-
-
wermgr.exe C:\Windows\system32\wermgr.exe
2492
-
Name | Response | Post-Analysis Lookup |
---|---|---|
api.ip.sb | 172.67.75.172 |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49169 104.26.13.31:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 7d:9f:08:6e:96:fc:4c:1d:eb:94:53:45:8a:6c:7e:e7:c1:69:47:e9 |
TLSv1 192.168.56.102:49171 171.103.187.218:449 |
ST=none | ST=none | f7:5a:a2:97:54:74:9a:70:68:70:a3:3f:94:72:bd:3d:aa:8e:4b:45 |
TLSv1 192.168.56.102:49168 171.103.189.118:449 |
ST=none | ST=none | 1c:37:26:a3:ac:d1:cc:49:a5:e4:71:2e:c3:fc:96:d3:bd:f5:05:72 |
TLSv1 192.168.56.102:49170 171.103.187.218:449 |
ST=none | ST=none | f7:5a:a2:97:54:74:9a:70:68:70:a3:3f:94:72:bd:3d:aa:8e:4b:45 |
TLSv1 192.168.56.102:49174 186.4.193.75:443 |
C=NE, ST=none, L=Comman, O=Beurret, CN=badan.ch/emailAddress=mccoybrianna@jackson-hodges.com | C=NE, ST=none, L=Comman, O=Beurret, CN=badan.ch/emailAddress=mccoybrianna@jackson-hodges.com | 7d:cf:67:bf:06:62:f0:33:33:e5:7f:67:7d:85:dd:59:6c:92:1c:b5 |
TLSv1 192.168.56.102:49175 186.4.193.75:443 |
C=NE, ST=none, L=Comman, O=Beurret, CN=badan.ch/emailAddress=mccoybrianna@jackson-hodges.com | C=NE, ST=none, L=Comman, O=Beurret, CN=badan.ch/emailAddress=mccoybrianna@jackson-hodges.com | 7d:cf:67:bf:06:62:f0:33:33:e5:7f:67:7d:85:dd:59:6c:92:1c:b5 |
TLSv1 192.168.56.102:49176 171.103.187.218:449 |
ST=none | ST=none | f7:5a:a2:97:54:74:9a:70:68:70:a3:3f:94:72:bd:3d:aa:8e:4b:45 |
TLSv1 192.168.56.102:49177 171.103.187.218:449 |
ST=none | ST=none | f7:5a:a2:97:54:74:9a:70:68:70:a3:3f:94:72:bd:3d:aa:8e:4b:45 |
TLSv1 192.168.56.102:49178 171.103.187.218:449 |
ST=none | ST=none | f7:5a:a2:97:54:74:9a:70:68:70:a3:3f:94:72:bd:3d:aa:8e:4b:45 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
packer | Armadillo v1.71 |
suspicious_features | Connection to IP address | suspicious_request | GET https://186.4.193.75/lib153/TEST22-PC_W617601.7BB1C71156833FBAB1DE0E33B1C9331D/5/kps/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://186.4.193.75/lib153/TEST22-PC_W617601.7BB1C71156833FBAB1DE0E33B1C9331D/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/RJPBpVX7jvvD7VvtdNZdpR3lrFpX/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://186.4.193.75/lib153/TEST22-PC_W617601.7BB1C71156833FBAB1DE0E33B1C9331D/14/exc/E:%200xc0000005%20A:%200x0000000077919A5A/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://186.4.193.75/lib153/TEST22-PC_W617601.7BB1C71156833FBAB1DE0E33B1C9331D/14/user/test22/0/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://186.4.193.75/lib153/TEST22-PC_W617601.7BB1C71156833FBAB1DE0E33B1C9331D/14/NAT%20status/client%20is%20behind%20NAT/0/ |
request | GET https://api.ip.sb/ip |
request | GET https://186.4.193.75/lib153/TEST22-PC_W617601.7BB1C71156833FBAB1DE0E33B1C9331D/5/kps/ |
request | GET https://186.4.193.75/lib153/TEST22-PC_W617601.7BB1C71156833FBAB1DE0E33B1C9331D/0/Windows%207%20x64%20SP1/1107/175.208.134.150/727F639DF1E9560A2743CB69221BB85D3D1D1CBDEE638318DB0A9F2C35331CAD/RJPBpVX7jvvD7VvtdNZdpR3lrFpX/ |
request | GET https://186.4.193.75/lib153/TEST22-PC_W617601.7BB1C71156833FBAB1DE0E33B1C9331D/14/exc/E:%200xc0000005%20A:%200x0000000077919A5A/0/ |
request | GET https://186.4.193.75/lib153/TEST22-PC_W617601.7BB1C71156833FBAB1DE0E33B1C9331D/14/user/test22/0/ |
request | GET https://186.4.193.75/lib153/TEST22-PC_W617601.7BB1C71156833FBAB1DE0E33B1C9331D/14/NAT%20status/client%20is%20behind%20NAT/0/ |
cmdline | C:\Windows\system32\cmd.exe |
host | 103.56.207.230 | |||
host | 171.103.187.218 | |||
host | 171.103.189.118 | |||
host | 186.4.193.75 |
dead_host | 103.56.207.230:443 |
Lionic | Trojan.Win32.Trickpak.4!c |
Elastic | malicious (high confidence) |
DrWeb | Trojan.KillProc2.16674 |
MicroWorld-eScan | Trojan.Generic.30234540 |
FireEye | Generic.mg.4668a8be8db5bc23 |
ALYac | Trojan.Generic.30234540 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Trojan ( 005880a91 ) |
K7GW | Trojan ( 005880a91 ) |
Cyren | W32/Trickbot.GV.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | Win32/TrickBot.CR |
APEX | Malicious |
Paloalto | generic.ml |
ClamAV | Win.Trojan.Crypterx-9896740-0 |
Kaspersky | HEUR:Trojan.Win32.Trickpak.gen |
BitDefender | Trojan.Generic.30234540 |
Avast | Win32:CrypterX-gen [Trj] |
Tencent | Malware.Win32.Gencirc.10cf417d |
Ad-Aware | Trojan.Generic.30234540 |
Sophos | Troj/Trickb-BU |
Zillya | Trojan.TrickBot.Win32.2530 |
McAfee-GW-Edition | Trojan-FTJC!4668A8BE8DB5 |
Emsisoft | Trojan.Generic.30234540 (B) |
Ikarus | Trojan.Win32.Trickbot |
Jiangmin | Trojan.Trickpak.jy |
Avira | TR/TrickBot.frzgf |
Kingsoft | Win32.Troj.Undef.(kcloud) |
Gridinsoft | Trojan.Win32.Gen.vl!n |
Microsoft | Trojan:Win32/TrickBotCrypt.FO!MTB |
GData | Trojan.Generic.30234540 |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Trojan/Win.Trickbot.R442752 |
McAfee | Trojan-FTJC!4668A8BE8DB5 |
MAX | malware (ai score=88) |
VBA32 | Trojan.Trickpak |
Malwarebytes | Trojan.TrickBot |
Yandex | Trojan.Trickpak!PptIaCGl6uA |
SentinelOne | Static AI - Suspicious PE |
Fortinet | W32/TrickBot.DC!tr |
AVG | Win32:CrypterX-gen [Trj] |
CrowdStrike | win/malicious_confidence_100% (W) |