Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Oct. 6, 2021, 2:33 p.m. | Oct. 6, 2021, 2:36 p.m. |
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\microsoftExcelEarth.jpg.dll,DllRegisterServer
672-
wermgr.exe C:\Windows\system32\wermgr.exe
808
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\microsoftExcelEarth.jpg.dll,
2816
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49167 103.123.86.104:443 |
ST=none | ST=none | 7a:99:62:6e:ec:59:b7:81:d8:a8:35:64:4d:39:f9:bb:da:7d:36:c0 |
TLSv1 192.168.56.102:49166 45.115.172.105:443 |
ST=none | ST=none | 09:e0:4e:0d:e5:b3:03:8e:9e:48:ab:04:6f:44:80:92:2a:de:4e:fb |
TLSv1 192.168.56.102:49168 36.95.23.89:443 |
C=TT, ST=Sjælland, L=Odense, O=Avila, Schmidt and Perez, CN=perkins.com/emailAddress=cspears@middleton-miles.net | C=TT, ST=Sjælland, L=Odense, O=Avila, Schmidt and Perez, CN=perkins.com/emailAddress=cspears@middleton-miles.net | aa:be:5c:4b:00:f1:7b:31:6d:25:f1:5b:1e:83:10:f5:ee:62:7a:01 |
TLSv1 192.168.56.102:49169 103.9.188.78:443 |
ST=none | ST=none | 9b:8e:8d:b8:7d:61:ca:51:4a:48:d8:ef:3b:fd:4d:fb:d5:b0:5c:d6 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
suspicious_features | Connection to IP address | suspicious_request | GET https://45.115.172.105/zvs1/TEST22-PC_W617601.583AB3B7CD51FEABBEE773B10BBFC63F/5/kps/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://103.123.86.104/zvs1/TEST22-PC_W617601.583AB3B7CD51FEABBEE773B10BBFC63F/5/kps/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://36.95.23.89/zvs1/TEST22-PC_W617601.583AB3B7CD51FEABBEE773B10BBFC63F/5/kps/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://103.9.188.78/zvs1/TEST22-PC_W617601.583AB3B7CD51FEABBEE773B10BBFC63F/5/kps/ |
request | GET https://45.115.172.105/zvs1/TEST22-PC_W617601.583AB3B7CD51FEABBEE773B10BBFC63F/5/kps/ |
request | GET https://103.123.86.104/zvs1/TEST22-PC_W617601.583AB3B7CD51FEABBEE773B10BBFC63F/5/kps/ |
request | GET https://36.95.23.89/zvs1/TEST22-PC_W617601.583AB3B7CD51FEABBEE773B10BBFC63F/5/kps/ |
request | GET https://103.9.188.78/zvs1/TEST22-PC_W617601.583AB3B7CD51FEABBEE773B10BBFC63F/5/kps/ |
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00037324 | size | 0x00000128 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00037324 | size | 0x00000128 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00039004 | size | 0x00000022 | ||||||||||||||||||
name | RT_HTML | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0003933c | size | 0x00038333 |
Elastic | malicious (high confidence) |
CrowdStrike | win/malicious_confidence_80% (D) |
APEX | Malicious |
Cynet | Malicious (score: 100) |
FireEye | Generic.mg.b724179ecfdd640b |
Sophos | ML/PE-A |
Cylance | Unsafe |
SentinelOne | Static AI - Suspicious PE |
section | {u'size_of_data': u'0x0003d000', u'virtual_address': u'0x00035000', u'entropy': 7.904513834501354, u'name': u'.rsrc', u'virtual_size': u'0x0003c6c8'} | entropy | 7.9045138345 | description | A section with a high entropy has been found | |||||||||
entropy | 0.516949152542 | description | Overall entropy of this PE file is high |
host | 103.123.86.104 | |||
host | 103.9.188.78 | |||
host | 36.95.23.89 | |||
host | 45.115.172.105 |