Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Aug. 7, 2023, 8:30 a.m. | Aug. 7, 2023, 8:38 a.m. |
-
demosyscalls.exe "C:\Users\test22\AppData\Local\Temp\demosyscalls.exe"
1684
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
157.245.47.66 | Active | Moloch |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 157.245.47.66:443 -> 192.168.56.103:49162 | 2037599 | ET ATTACK_RESPONSE Havoc/Sliver Framework TLS Certificate Observed | A Network Trojan was detected |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49162 157.245.47.66:443 |
C=US, ST=Washington, L=Seattle, unknown=, unknown=6274, O=DEBUG, CN=157.245.47.66 | C=US, ST=Washington, L=Seattle, unknown=, unknown=6274, O=DEBUG, CN=157.245.47.66 | 85:61:c7:e7:c5:c0:ad:d8:64:79:ba:64:b7:b5:78:8d:6d:13:88:3d |
suspicious_features | POST method with no referer header, Connection to IP address | suspicious_request | POST https://157.245.47.66/funny_cat.gif | ||||||
suspicious_features | POST method with no referer header, Connection to IP address | suspicious_request | POST https://157.245.47.66/test.txt |
request | POST https://157.245.47.66/funny_cat.gif |
request | POST https://157.245.47.66/test.txt |
request | POST https://157.245.47.66/funny_cat.gif |
request | POST https://157.245.47.66/test.txt |
host | 157.245.47.66 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F81F111D0E5AB58D396F7BF525577FD30FDC95AA\Blob |
Bkav | W32.Common.A5AE1530 |
Lionic | Trojan.Win32.Havoc.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.GenericKD.68260049 |
FireEye | Trojan.GenericKD.68260049 |
McAfee | RDN/Generic BackDoor |
Cylance | unsafe |
Sangfor | Backdoor.Win64.Havoc.Vndr |
K7AntiVirus | Trojan ( 005a69471 ) |
Alibaba | Backdoor:Win64/Havoc.9598b1c7 |
K7GW | Trojan ( 005a69471 ) |
Cybereason | malicious.0cff22 |
Arcabit | Trojan.Generic.D41190D1 |
Cyren | W64/ABRisk.HXJN-5827 |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Win64/Havoc.D |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Kaspersky | Backdoor.Win64.Havoc.aex |
BitDefender | Trojan.GenericKD.68260049 |
Avast | Win64:Evo-gen [Trj] |
Tencent | Malware.Win32.Gencirc.13d08e11 |
Sophos | Mal/Generic-S |
VIPRE | Trojan.GenericKD.68260049 |
TrendMicro | TROJ_GEN.R023C0XFE23 |
McAfee-GW-Edition | BehavesLike.Win64.Backdoor.mm |
Emsisoft | Trojan.GenericKD.68260049 (B) |
Antiy-AVL | Trojan/Win64.Havoc |
Microsoft | Trojan:Win32/Wacatac.B!ml |
ZoneAlarm | Backdoor.Win64.Havoc.aex |
GData | Trojan.GenericKD.68260049 |
Detected | |
MAX | malware (ai score=88) |
Malwarebytes | Malware.AI.1694180533 |
Panda | Trj/Chgt.AD |
TrendMicro-HouseCall | TROJ_GEN.R023C0XFE23 |
Rising | Backdoor.Havoc!8.970A (TFE:3:5kYgA61wTIM) |
Ikarus | Trojan.Win64.Havoc |
MaxSecure | Trojan.Malware.209914176.susgen |
Fortinet | W64/Havoc.D!tr |
AVG | Win64:Evo-gen [Trj] |
DeepInstinct | MALICIOUS |
CrowdStrike | win/malicious_confidence_100% (W) |