Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Oct. 7, 2021, 5:34 p.m. | Oct. 7, 2021, 5:39 p.m. |
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\1.dll,DllRegisterServer
1016-
wermgr.exe C:\Windows\system32\wermgr.exe
2876
-
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\1.dll,
1756
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49203 181.129.167.82:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.101:49205 46.99.175.217:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.101:49206 24.162.214.166:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | b5:21:a8:16:d5:97:b1:67:f6:60:a5:cb:20:27:76:ec:3c:9d:3b:02 |
TLSv1 192.168.56.101:49208 185.56.175.122:443 |
C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | C=AU, ST=Some-State, O=Internet Widgits Pty Ltd | 50:fd:fd:4e:2c:57:ea:f7:c9:cd:3f:61:4a:a2:40:01:1b:b8:df:02 |
suspicious_features | Connection to IP address | suspicious_request | GET https://181.129.167.82/soc1/TEST22-PC_W617601.2A8BB47119C5EF3D19B55F83BB0AF91C/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://46.99.175.217/soc1/TEST22-PC_W617601.2A8BB47119C5EF3D19B55F83BB0AF91C/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://24.162.214.166/soc1/TEST22-PC_W617601.2A8BB47119C5EF3D19B55F83BB0AF91C/5/file/ | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET https://185.56.175.122/soc1/TEST22-PC_W617601.2A8BB47119C5EF3D19B55F83BB0AF91C/5/file/ |
request | GET https://181.129.167.82/soc1/TEST22-PC_W617601.2A8BB47119C5EF3D19B55F83BB0AF91C/5/file/ |
request | GET https://46.99.175.217/soc1/TEST22-PC_W617601.2A8BB47119C5EF3D19B55F83BB0AF91C/5/file/ |
request | GET https://24.162.214.166/soc1/TEST22-PC_W617601.2A8BB47119C5EF3D19B55F83BB0AF91C/5/file/ |
request | GET https://185.56.175.122/soc1/TEST22-PC_W617601.2A8BB47119C5EF3D19B55F83BB0AF91C/5/file/ |
cmdline | C:\Windows\system32\cmd.exe |
host | 181.129.167.82 | |||
host | 185.56.175.122 | |||
host | 216.166.148.187 | |||
host | 24.162.214.166 | |||
host | 46.99.175.217 | |||
host | 65.152.201.203 |
Elastic | malicious (high confidence) |
Sangfor | Trojan.Win32.Save.a |
ESET-NOD32 | a variant of Generik.DIFKOLS |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | Trojan.Win32.Trickpak.jc |
Avast | FileRepMalware |
McAfee-GW-Edition | BehavesLike.Win32.Generic.bm |
FireEye | Generic.mg.55ee6dca51e918bd |
GData | Win32.Trojan-Spy.TrickBot.Z0B6HZ |
Kingsoft | Win32.Troj.Trickpak.jc.(kcloud) |
ZoneAlarm | Trojan.Win32.Trickpak.jc |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
McAfee | RDN/Generic.dx |
BitDefenderTheta | Gen:NN.ZedlaF.34170.Uq4@a8RMxYj |
AVG | FileRepMalware |
dead_host | 65.152.201.203:443 |
dead_host | 216.166.148.187:443 |