Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | March 29, 2023, 5:32 p.m. | March 29, 2023, 5:48 p.m. |
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cubalibre2.dll,DllMain
1488 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cubalibre2.dll,DllRegisterServer
2132 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cubalibre2.dll,DllGetClassObject
1508 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cubalibre2.dll,DllUnregisterServer
2224 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cubalibre2.dll,StartW
2344 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\cubalibre2.dll,
2460
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
212.193.30.14 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
description | rundll32.exe tried to sleep 150 seconds, actually delayed analysis time by 150 seconds |
host | 212.193.30.14 |
Lionic | Trojan.Win32.CobaltStrike.4!c |
Elastic | Windows.Trojan.CobaltStrike |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Backdoor.Cobaltstrike |
McAfee | Injector-FEY.c!54A5F1BF56BB |
Cylance | unsafe |
Sangfor | Trojan.Win32.CobaltStrike |
K7AntiVirus | Riskware ( 00584baa1 ) |
Alibaba | Trojan:Win32/Rozena.4c0 |
K7GW | Riskware ( 00584baa1 ) |
CrowdStrike | win/malicious_confidence_100% (W) |
Cyren | W32/ABRisk.SAJV-1141 |
Symantec | Backdoor.Cobalt |
ESET-NOD32 | a variant of Win32/CobaltStrike.Artifact.A |
APEX | Malicious |
Paloalto | generic.ml |
ClamAV | Win.Countermeasure.LoaderWinGeneric-9804845-2 |
Kaspersky | HEUR:Trojan.Win32.CobaltStrike.gen |
BitDefender | Gen:Variant.FochiBlz.7924 |
NANO-Antivirus | Trojan.Win32.CobaltStrike.jsnzvk |
ViRobot | Trojan.Win.Z.Cobaltstrike.291328.C |
MicroWorld-eScan | Gen:Variant.FochiBlz.7924 |
Avast | Win32:Malware-gen |
Rising | Backdoor.CobaltStrike!8.11F7B (CLOUD) |
Emsisoft | Gen:Variant.FochiBlz.7924 (B) |
VIPRE | Gen:Variant.FochiBlz.7924 |
TrendMicro | Ransom.Win32.HIVE.SMYXBJR.hp |
McAfee-GW-Edition | Injector-FEY.c!54A5F1BF56BB |
FireEye | Generic.mg.54a5f1bf56bb033f |
Sophos | ATK/Cobalt-W |
Ikarus | PUA.RiskWare.Cobaltstrike |
GData | Gen:Variant.FochiBlz.7924 |
Jiangmin | Trojan.Cometer.cse |
Avira | HEUR/AGEN.1362273 |
MAX | malware (ai score=83) |
Antiy-AVL | RiskWare/Win32.Artifact |
Arcabit | Trojan.FochiBlz.D1EF4 |
ZoneAlarm | HEUR:Trojan.Win32.CobaltStrike.gen |
Microsoft | Backdoor:Win64/CobaltStrike.NP!dha |
Detected | |
AhnLab-V3 | Trojan/Win.FEY.R512891 |
Acronis | suspicious |
BitDefenderTheta | Gen:NN.ZedlaF.36344.rK4@aug8n!d |
ALYac | Gen:Variant.FochiBlz.7924 |
TACHYON | Trojan/W64.Cobalt.291328 |
VBA32 | BScope.Trojan.Swrort |
TrendMicro-HouseCall | Trojan.Win32.COBALT.SM |
Tencent | Malware.Win32.Gencirc.10bda54b |
SentinelOne | Static AI - Suspicious PE |
Fortinet | Riskware/CobaltStrike_Artifact |