Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | June 7, 2023, 7:37 a.m. | June 7, 2023, 7:39 a.m. |
-
Installer.exe "C:\Users\test22\AppData\Local\Temp\Installer.exe"
940
IP Address | Status | Action |
---|---|---|
121.254.136.27 | Active | Moloch |
142.250.204.142 | Active | Moloch |
142.250.204.36 | Active | Moloch |
142.251.220.67 | Active | Moloch |
142.251.222.195 | Active | Moloch |
164.124.101.2 | Active | Moloch |
172.217.25.10 | Active | Moloch |
216.58.200.237 | Active | Moloch |
34.104.35.123 | Active | Moloch |
34.120.48.173 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.3 192.168.56.103:49162 216.58.200.237:443 |
None | None | None |
TLS 1.3 192.168.56.103:49164 34.120.48.173:443 |
None | None | None |
TLS 1.3 192.168.56.103:49163 216.58.200.237:443 |
None | None | None |
TLS 1.3 192.168.56.103:49175 142.251.222.195:443 |
None | None | None |
TLS 1.3 192.168.56.103:49173 142.251.220.67:443 |
None | None | None |
TLS 1.3 192.168.56.103:49166 142.250.204.36:443 |
None | None | None |
TLS 1.3 192.168.56.103:49165 142.250.204.36:443 |
None | None | None |
TLS 1.3 192.168.56.103:49167 142.250.204.36:443 |
None | None | None |
TLS 1.3 192.168.56.103:49178 172.217.24.227:443 |
None | None | None |
TLS 1.3 192.168.56.103:49171 172.217.25.10:443 |
None | None | None |
TLS 1.3 192.168.56.103:49170 142.251.220.67:443 |
None | None | None |
TLS 1.3 192.168.56.103:49172 142.251.220.67:443 |
None | None | None |
TLS 1.3 192.168.56.103:49176 142.250.204.142:443 |
None | None | None |
request | GET http://apps.identrust.com/roots/dstrootcax3.p7c |
request | GET http://clients2.google.com/time/1/current?cup2key=4:3591542034&cup2hreq=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
request | GET http://www.gstatic.com/generate_204 |
request | HEAD http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/n3xmszuzmcp4pxq3qhmant63nm_9.45.0/gcmjkmgdlgnkkcocmoeiminaijmmjnii_9.45.0_all_ecp3yewcq3fuvht5wyi7t7s37y.crx3 |
request | GET http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/n3xmszuzmcp4pxq3qhmant63nm_9.45.0/gcmjkmgdlgnkkcocmoeiminaijmmjnii_9.45.0_all_ecp3yewcq3fuvht5wyi7t7s37y.crx3 |
section | {u'size_of_data': u'0x00024c00', u'virtual_address': u'0x00321000', u'entropy': 6.846808649692998, u'name': u'.reloc', u'virtual_size': u'0x00024ad4'} | entropy | 6.84680864969 | description | A section with a high entropy has been found |
Lionic | Trojan.Win32.Generic.4!c |
Cynet | Malicious (score: 100) |
McAfee | Artemis!38B258C567B3 |
Malwarebytes | Trojan.Crypt |
Cyren | W32/ABTrojan.NOOJ-8444 |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (moderate confidence) |
ESET-NOD32 | a variant of Generik.GBPWGOK |
APEX | Malicious |
Kaspersky | Trojan.Win32.Sharik.yuy |
BitDefender | Trojan.GenericKD.67404249 |
Emsisoft | Trojan.GenericKD.67404249 (B) |
F-Secure | Trojan.TR/Crypt.XPACK.Gen |
McAfee-GW-Edition | Artemis!Trojan |
FireEye | Generic.mg.38b258c567b37805 |
Sophos | Mal/Generic-S |
Ikarus | Trojan.Win32.Crypt |
GData | Win32.Trojan.Agent.2JINIY |
Webroot | W32.Trojan.FL |
Avira | TR/Crypt.XPACK.Gen |
Antiy-AVL | Trojan/Win32.Sabsik |
Gridinsoft | Ransom.Win32.Sabsik.cl |
ZoneAlarm | Trojan.Win32.Sharik.yuy |
Microsoft | Trojan:Win32/Casdet!rfn |
Detected | |
Cylance | unsafe |
Panda | Trj/Chgt.AD |
Rising | Trojan.Sharik!8.179B (CLOUD) |
Fortinet | W32/PossibleThreat |
BitDefenderTheta | Gen:NN.ZexaF.36250.rx2@aSHzUKhi |
DeepInstinct | MALICIOUS |
CrowdStrike | win/malicious_confidence_70% (W) |