Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | June 17, 2023, 6:06 p.m. | June 17, 2023, 6:12 p.m. |
-
steamrepairnet.exe "C:\Users\test22\AppData\Local\Temp\steamrepairnet.exe"
932
Name | Response | Post-Analysis Lookup |
---|---|---|
cdn.wmpvp.com |
CNAME
cdn.wmpvp.com.wsglb0.com
|
14.0.113.205 |
new-service.biliapi.net | 122.189.171.106 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49165 -> 113.207.69.188:443 | 906200022 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.103:49169 -> 14.0.113.205:443 | 906200022 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.103:49165 113.207.69.188:443 |
C=BE, O=GlobalSign nv-sa, CN=GlobalSign GCC R3 DV TLS CA 2020 | CN=*.biliapi.net | ce:3f:f7:0a:8d:37:1c:cb:b4:10:53:29:c8:51:cd:3b:7e:4e:5a:ed |
TLS 1.2 192.168.56.103:49169 14.0.113.205:443 |
C=US, O=DigiCert, Inc., CN=RapidSSL Global TLS RSA4096 SHA256 2022 CA1 | CN=*.wmpvp.com | 7a:33:5f:6b:95:b3:9f:fa:cc:e0:8f:ee:6e:f9:c8:b9:1a:7e:1b:ac |
section | _RDATA |
suspicious_features | GET method with no useragent header | suspicious_request | GET https://new-service.biliapi.net/picture/chatres/update/version.txt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://cdn.wmpvp.com/steamWeb/F24DCA1346594DF3B954684015A7C50F-1686833838173.pdf |
request | GET https://new-service.biliapi.net/picture/chatres/update/version.txt |
request | GET https://cdn.wmpvp.com/steamWeb/F24DCA1346594DF3B954684015A7C50F-1686833838173.pdf |
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000fffc8 | size | 0x000010a8 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000fffc8 | size | 0x000010a8 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000fffc8 | size | 0x000010a8 | ||||||||||||||||||
name | RT_RCDATA | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x00101070 | size | 0x0000db6b | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0010ebdc | size | 0x00000030 | ||||||||||||||||||
name | RT_VERSION | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x0010ec0c | size | 0x0000027c |
file | C:\hid.dll |
CrowdStrike | win/grayware_confidence_60% (D) |
APEX | Malicious |
McAfee-GW-Edition | BehavesLike.Win64.Generic.th |
DeepInstinct | MALICIOUS |
section | {u'size_of_data': u'0x00010200', u'virtual_address': u'0x000ff000', u'entropy': 7.867571231363807, u'name': u'.rsrc', u'virtual_size': u'0x00010165'} | entropy | 7.86757123136 | description | A section with a high entropy has been found |