Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | July 13, 2023, 9:01 a.m. | July 13, 2023, 9:04 a.m. |
-
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,BindImage
3048 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,CheckSumMappedFile
2160 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,BindImageEx
2196 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,EnumerateLoadedModules
2404 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,EnumerateLoadedModules64
1588 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,EnumerateLoadedModulesEx
1844 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,EnumerateLoadedModulesExW
2120 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,EnumerateLoadedModulesW64
2488 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,FindDebugInfoFile
2848 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,FindDebugInfoFileEx
3020 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,FindExecutableImage
1776 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,FindExecutableImageEx
2772 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,FindFileInPath
1596 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,FindFileInSearchPath
1220 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,GetImageConfigInformation
1600 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,GetImageUnusedHeaderBytes
1628 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,GetTimestampForLoadedLibrary
2568 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,ImageAddCertificate
1624 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,ImageDirectoryEntryToData
2236 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,ImageDirectoryEntryToDataEx
2476 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,ImageEnumerateCertificates
240 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,ImageGetCertificateData
180 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,ImageGetCertificateHeader
2428 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,ImageGetDigestStream
3016 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,ImageLoad
2104 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,ImageNtHeader
1848 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,ImageRemoveCertificate
732 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,ImageRvaToSection
376 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,ImageRvaToVa
1508 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,ImageUnload
596 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,ImagehlpApiVersion
1136 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,ImagehlpApiVersionEx
2800 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,MakeSureDirectoryPathExists
1604 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,MapAndLoad
2436 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,MapDebugInformation
2248 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,MapFileAndCheckSumA
3080 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,MapFileAndCheckSumW
3204 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,ReBaseImage
3324 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,ReBaseQHddvKE4
3432 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,RemovePrivateCvSymbolic
3524 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,RemovePrivateCvSymbolicEx
3620 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,RemoveRelocations
3720 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,SearchTreeForFile
3812 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,SetImageConfigInformation
3908 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,SplitSymbols
4016 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,StackWalk
3104 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,StackWalk64
3256 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,SymCleanup
3340 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,SymEnumSym
3516 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,SymEnumSymbols
2500 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,SymEnumSymbolsForAddr
3576 -
rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\test22\AppData\Local\Temp\imgengine.dll,SymEnumTypes
3948
Name | Response | Post-Analysis Lookup |
---|---|---|
apps.identrust.com |
CNAME
a1952.dscq.akamai.net
CNAME
identrust.edgesuite.net
|
23.43.165.105 |
esp-78-56-65-23.esp.artforcemusic.de | 185.8.51.230 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49194 -> 185.8.51.230:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49194 185.8.51.230:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=esp-78-56-65-23.esp.artforcemusic.de | 2d:34:f5:b9:7a:59:08:9b:a2:0d:94:62:34:3c:61:33:ff:41:b6:c7 |
section | .itext |
section | .didata |
section | .global0 |
section | .global1 |
section | .global2 |
request | GET http://apps.identrust.com/roots/dstrootcax3.p7c |
section | {u'size_of_data': u'0x00eb9200', u'virtual_address': u'0x00d1b000', u'entropy': 7.972022290304701, u'name': u'.global2', u'virtual_size': u'0x00eb90a0'} | entropy | 7.9720222903 | description | A section with a high entropy has been found | |||||||||
entropy | 0.999602187966 | description | Overall entropy of this PE file is high |
wmi | SELECT * FROM AntiVirusProduct |
wmi | SELECT Caption FROM Win32_OperatingSystem |
Elastic | malicious (high confidence) |
FireEye | Generic.mg.511f56b74826a4e0 |
K7AntiVirus | Spyware ( 0057e9881 ) |
K7GW | Spyware ( 0057e9881 ) |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win32/Spy.Mekotio.CN |
Cynet | Malicious (score: 100) |
APEX | Malicious |
F-Secure | Heuristic.HEUR/AGEN.1338326 |
SentinelOne | Static AI - Malicious PE |
Avira | HEUR/AGEN.1338326 |
Gridinsoft | Trojan.Heur!.02212020 |
AhnLab-V3 | Trojan/Win.Generic.R568749 |
Rising | Spyware.Mekotio!8.F5DF (TFE:5:hylQq4PvDCH) |
DeepInstinct | MALICIOUS |