Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 6, 2021, 1:30 p.m. | Oct. 6, 2021, 1:43 p.m. |
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\zadyx10.dll,DllRegisterServer
2216-
wermgr.exe C:\Windows\system32\wermgr.exe
1456
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\zadyx10.dll,
2228
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49206 139.255.65.170:443 |
ST=none | ST=none | 4b:a1:31:ba:f6:c3:4d:30:82:b5:b1:2f:02:e6:f4:15:b1:93:15:aa |
TLSv1 192.168.56.101:49205 202.65.119.162:443 |
ST=none | ST=none | 79:8d:be:e6:74:09:12:d6:a9:b1:03:9f:dd:70:b2:3e:be:89:56:b5 |
TLSv1 192.168.56.101:49204 36.95.23.89:443 |
C=TT, ST=Sjælland, L=Odense, O=Avila, Schmidt and Perez, CN=perkins.com/emailAddress=cspears@middleton-miles.net | C=TT, ST=Sjælland, L=Odense, O=Avila, Schmidt and Perez, CN=perkins.com/emailAddress=cspears@middleton-miles.net | aa:be:5c:4b:00:f1:7b:31:6d:25:f1:5b:1e:83:10:f5:ee:62:7a:01 |
TLSv1 192.168.56.101:49203 36.89.228.201:443 |
ST=none | ST=none | 65:1d:f5:97:af:51:d0:f6:bc:79:16:12:e2:30:08:d7:6d:1a:81:38 |
TLSv1 192.168.56.101:49207 36.91.117.231:443 |
ST=none | ST=none | 51:f6:96:68:b9:85:de:2e:cb:f1:2d:04:93:c2:c2:e9:5b:d8:87:93 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
suspicious_features | Connection to IP address | suspicious_request | GET https://36.89.228.201/zvs1/TEST22-PC_W617601.3BB3E6D3D09A7F894B3B78BB35F5FEE7/5/kps/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://36.95.23.89/zvs1/TEST22-PC_W617601.3BB3E6D3D09A7F894B3B78BB35F5FEE7/5/kps/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://202.65.119.162/zvs1/TEST22-PC_W617601.3BB3E6D3D09A7F894B3B78BB35F5FEE7/5/kps/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://139.255.65.170/zvs1/TEST22-PC_W617601.3BB3E6D3D09A7F894B3B78BB35F5FEE7/5/kps/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://36.91.117.231/zvs1/TEST22-PC_W617601.3BB3E6D3D09A7F894B3B78BB35F5FEE7/5/kps/ |
request | GET https://36.89.228.201/zvs1/TEST22-PC_W617601.3BB3E6D3D09A7F894B3B78BB35F5FEE7/5/kps/ |
request | GET https://36.95.23.89/zvs1/TEST22-PC_W617601.3BB3E6D3D09A7F894B3B78BB35F5FEE7/5/kps/ |
request | GET https://202.65.119.162/zvs1/TEST22-PC_W617601.3BB3E6D3D09A7F894B3B78BB35F5FEE7/5/kps/ |
request | GET https://139.255.65.170/zvs1/TEST22-PC_W617601.3BB3E6D3D09A7F894B3B78BB35F5FEE7/5/kps/ |
request | GET https://36.91.117.231/zvs1/TEST22-PC_W617601.3BB3E6D3D09A7F894B3B78BB35F5FEE7/5/kps/ |
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00037324 | size | 0x00000128 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00037324 | size | 0x00000128 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00039004 | size | 0x00000022 | ||||||||||||||||||
name | RT_HTML | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0003933c | size | 0x00038333 |
section | {u'size_of_data': u'0x0003d000', u'virtual_address': u'0x00035000', u'entropy': 7.904513834501354, u'name': u'.rsrc', u'virtual_size': u'0x0003c6c8'} | entropy | 7.9045138345 | description | A section with a high entropy has been found | |||||||||
entropy | 0.516949152542 | description | Overall entropy of this PE file is high |
host | 139.255.65.170 | |||
host | 202.65.119.162 | |||
host | 36.89.228.201 | |||
host | 36.91.117.231 | |||
host | 36.95.23.89 |