Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Nov. 5, 2021, 9:11 a.m. | Nov. 5, 2021, 9:38 a.m. |
-
vbc.exe "C:\Users\test22\AppData\Local\Temp\vbc.exe"
2780
Name | Response | Post-Analysis Lookup |
---|---|---|
login.live.com |
CNAME
login.msa.msidentity.com
CNAME
prda.aadg.msidentity.com
|
40.126.35.128 |
onedrive.live.com |
CNAME
l-0004.l-msedge.net
|
13.107.42.13 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49163 -> 13.107.42.13:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.101:49166 -> 20.190.163.21:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.101:49164 -> 20.190.163.21:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.101:49165 -> 13.107.42.13:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49163 13.107.42.13:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 01 | CN=onedrive.com | 50:2f:33:10:92:ac:27:7b:17:be:82:68:3b:e2:29:ad:97:41:b7:bb |
TLSv1 192.168.56.101:49164 20.190.163.21:443 |
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA | C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=graph.windows.net | b7:2c:02:a2:bb:df:8d:60:0d:c5:98:1a:c8:13:1f:31:26:4a:9d:83 |
TLSv1 192.168.56.101:49166 20.190.163.21:443 |
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA | C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=graph.windows.net | b7:2c:02:a2:bb:df:8d:60:0d:c5:98:1a:c8:13:1f:31:26:4a:9d:83 |
TLSv1 192.168.56.101:49165 13.107.42.13:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 01 | CN=onedrive.com | 50:2f:33:10:92:ac:27:7b:17:be:82:68:3b:e2:29:ad:97:41:b7:bb |
section | CODE |
section | DATA |
section | BSS |
request | GET https://onedrive.live.com/download?cid=92B2EF722ED2FA89&resid=92B2EF722ED2FA89%21117&authkey=AL8-gdX92sl2g5g |
request | GET https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=13&ct=1636072606&rver=7.3.6962.0&wp=MBI_SSL_SHARED&wreply=https:%2F%2Fonedrive.live.com%2Fdownload%3Fcid%3D92B2EF722ED2FA89%26resid%3D92B2EF722ED2FA89%2521117%26authkey%3DAL8-gdX92sl2g5g&lc=1033&id=250206&cbcxt=sky&cbcxt=sky |
request | GET https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=13&ct=1636072608&rver=7.3.6962.0&wp=MBI_SSL_SHARED&wreply=https:%2F%2Fonedrive.live.com%2Fdownload%3Fcid%3D92B2EF722ED2FA89%26resid%3D92B2EF722ED2FA89%2521117%26authkey%3DAL8-gdX92sl2g5g&lc=1033&id=250206&cbcxt=sky&cbcxt=sky |
section | {u'size_of_data': u'0x00064c00', u'virtual_address': u'0x000a8000', u'entropy': 6.92283744654433, u'name': u'.rsrc', u'virtual_size': u'0x00064c00'} | entropy | 6.92283744654 | description | A section with a high entropy has been found | |||||||||
entropy | 0.381809568925 | description | Overall entropy of this PE file is high |
Cyren | W32/Delf.AABX-3115 |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Avast | FileRepMalware |
Sophos | Mal/Generic-S |
Comodo | TrojWare.Win32.Agent.orqex@0 |
MaxSecure | Trojan.Malware.300983.susgen |
Microsoft | Trojan:Script/Phonzy.C!ml |
McAfee | Artemis!AB47F89CF986 |
VBA32 | BScope.TrojanSpy.Noon |
SentinelOne | Static AI - Suspicious PE |
Fortinet | W32/Injector.EPWN!tr |
AVG | FileRepMalware |
process | vbc.exe | useragent | lVali | ||||||
process | vbc.exe | useragent | aswe |