Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Oct. 29, 2021, 6:28 p.m. | Oct. 29, 2021, 6:30 p.m. |
-
test.exe "C:\Users\test22\AppData\Local\Temp\test.exe"
1752
Name | Response | Post-Analysis Lookup |
---|---|---|
updata.microsoft-api.workers.dev | 172.67.159.138 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49176 -> 172.67.159.138:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.102:49175 -> 172.67.159.138:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.102:49177 -> 172.67.159.138:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49176 172.67.159.138:443 |
None | None | None |
TLSv1 192.168.56.102:49175 172.67.159.138:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | dd:8f:b2:73:61:e0:5d:5d:f2:9b:06:75:7c:ee:cd:a3:37:1f:14:ae |
TLSv1 192.168.56.102:49177 172.67.159.138:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | dd:8f:b2:73:61:e0:5d:5d:f2:9b:06:75:7c:ee:cd:a3:37:1f:14:ae |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
request | GET https://updata.microsoft-api.workers.dev/be.css |
description | test.exe tried to sleep 194 seconds, actually delayed analysis time by 194 seconds |
section | {u'size_of_data': u'0x00042600', u'virtual_address': u'0x00004000', u'entropy': 7.1952516660407895, u'name': u'.data', u'virtual_size': u'0x00042490'} | entropy | 7.19525166604 | description | A section with a high entropy has been found | |||||||||
entropy | 0.946524064171 | description | Overall entropy of this PE file is high |
Lionic | Trojan.Win64.CobaltStrike.4!c |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Trojan.CobaltStr.S17675256 |
ALYac | Gen:Variant.Ursu.350187 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.CobaltStrike |
Alibaba | Trojan:Win32/CozyDuke.1012 |
K7GW | Trojan ( 00580b4c1 ) |
CrowdStrike | win/malicious_confidence_100% (W) |
Arcabit | Trojan.Ursu.D557EB |
Cyren | W64/Cobalt.A.gen!Eldorado |
Symantec | Backdoor.Cobalt!gen1 |
ESET-NOD32 | a variant of Win64/CobaltStrike.Artifact.A |
APEX | Malicious |
Avast | Win64:HacktoolX-gen [Trj] |
ClamAV | Win.Trojan.CobaltStrike-9044898-1 |
Kaspersky | HEUR:Trojan.Win64.CobaltStrike.gen |
BitDefender | Gen:Variant.Ursu.350187 |
ViRobot | Trojan.Win32.Z.Cobaltstrike.288256.OH |
MicroWorld-eScan | Gen:Variant.Ursu.350187 |
Tencent | Hacktool.Win32.CobaltStrike.zb |
Ad-Aware | Gen:Variant.Ursu.350187 |
Sophos | ML/PE-A + ATK/Cobalt-CC |
DrWeb | BackDoor.Meterpreter.157 |
TrendMicro | Backdoor.Win64.COBEACON.SMA |
McAfee-GW-Edition | Trojan-FSXF!5DFE5AEE3F22 |
FireEye | Generic.mg.5dfe5aee3f22321f |
Emsisoft | Gen:Variant.Ursu.350187 (B) |
Ikarus | Trojan.Win64.Cobaltstrike |
Jiangmin | Trojan.Generic.fsici |
Avira | HEUR/AGEN.1137815 |
Antiy-AVL | Trojan/Generic.ASMalwS.30B56F3 |
Gridinsoft | Trojan.Win64.Agent.oa!s1 |
Microsoft | Trojan:Win32/Cobaltstrike.MK!MTB |
ZoneAlarm | HEUR:Trojan.Win64.CobaltStrike.gen |
GData | Gen:Variant.Ursu.350187 |
TACHYON | Trojan/W64.CobaltStrike.288256 |
AhnLab-V3 | Trojan/Win64.CobaltStrike.R356638 |
McAfee | Trojan-FSXF!5DFE5AEE3F22 |
MAX | malware (ai score=81) |
Malwarebytes | Trojan.CobaltStrike |
TrendMicro-HouseCall | Backdoor.Win64.COBEACON.SMA |
Rising | Backdoor.CobaltStrike/x64!1.D04A (CLASSIC) |
SentinelOne | Static AI - Malicious PE |
eGambit | Unsafe.AI_Score_87% |
Fortinet | W64/Agent.CY!tr |
AVG | Win64:HacktoolX-gen [Trj] |
Cybereason | malicious.e3f223 |
Paloalto | generic.ml |