Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | June 15, 2024, 8:16 a.m. | June 15, 2024, 8:18 a.m. |
-
-
whoami.exe whoami
2096
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
94.177.131.249 | Active | Moloch |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:50052 -> 192.168.56.103:445 | 2024217 | ET EXPLOIT Possible ETERNALBLUE MS17-010 Heap Spray | A Network Trojan was detected |
TCP 192.168.56.103:445 -> 192.168.56.101:50052 | 2024218 | ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response | A Network Trojan was detected |
TCP 192.168.56.101:50378 -> 192.168.56.103:135 | 2001581 | ET SCAN Behavioral Unusual Port 135 traffic Potential Scan or Infection | Misc activity |
Suricata TLS
No Suricata TLS
section | {u'size_of_data': u'0x005aa000', u'virtual_address': u'0x00a79000', u'entropy': 7.891962403947425, u'name': u'UPX1', u'virtual_size': u'0x005aa000'} | entropy | 7.89196240395 | description | A section with a high entropy has been found | |||||||||
entropy | 0.999913800534 | description | Overall entropy of this PE file is high |
section | UPX0 | description | Section name indicates UPX | ||||||
section | UPX1 | description | Section name indicates UPX | ||||||
section | UPX2 | description | Section name indicates UPX |
cmdline | whoami |
host | 94.177.131.249 |
dead_host | 192.168.56.103:19490 |
dead_host | 192.168.56.101:49291 |
dead_host | 192.168.56.101:50004 |