Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x3201 | May 27, 2021, 9:24 a.m. | May 27, 2021, 9:38 a.m. |
-
EXCEL.EXE "C:\Program Files\Microsoft Office\Office12\EXCEL.EXE" "C:\Users\ADMINI~1\AppData\Local\Temp\Document 70259454.xls"
3916
IP Address | Status | Action |
---|---|---|
107.180.58.44 | Active | Moloch |
108.167.181.248 | Active | Moloch |
148.66.138.194 | Active | Moloch |
164.124.101.2 | Active | Moloch |
173.230.252.50 | Active | Moloch |
192.185.16.122 | Active | Moloch |
192.185.32.234 | Active | Moloch |
192.185.79.55 | Active | Moloch |
208.91.198.106 | Active | Moloch |
209.188.15.214 | Active | Moloch |
23.212.13.232 | Active | Moloch |
23.40.44.112 | Active | Moloch |
35.155.6.125 | Active | Moloch |
83.150.213.154 | Active | Moloch |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49591 35.155.6.125:443 |
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA | C=US, ST=California, L=Mountain View, O=Mozilla Corporation, OU=Cloud Services, CN=*.telemetry.mozilla.org | 6d:3c:6a:a4:5f:46:eb:8b:b6:fb:8f:08:44:02:01:61:a0:25:c3:c8 |
TLSv1 192.168.56.103:49594 23.40.44.112:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 02 | C=US, ST=WA, L=Redmond, O=Microsoft Corporation, OU=Microsoft Corporation, CN=download.microsoft.com | e7:01:d1:e2:a1:0e:a1:84:0b:d0:c6:2e:a2:42:7a:f4:7b:40:91:c5 |
TLSv1 192.168.56.103:49593 23.212.13.232:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 01 | C=US, ST=WA, L=Redmond, O=Microsoft Corporation, OU=Microsoft Corporation, CN=www.microsoft.com | 9b:2b:8a:e6:51:69:aa:47:7c:57:83:d6:48:0f:29:6e:f4:8c:f1:4d |
request | GET http://go.microsoft.com/fwlink/?LinkID=121721&clcid=0x409&arch=x86&eng=0.0.0.0&asdelta=0.0.0.0&prod=925A3ACA-C353-458A-AC8D-A7E5EB378092 |
com_class | Wscript.Shell | May attempt to create new processes |
Elastic | malicious (high confidence) |
ALYac | VBA.Heur2.ObfDldr.10.E2ADC501.Gen |
Arcabit | HEUR.VBA.Trojan.d |
Avast | VBS:Dropper-QF [Trj] |
BitDefender | VBA.Heur2.ObfDldr.10.E2ADC501.Gen |
MicroWorld-eScan | VBA.Heur2.ObfDldr.10.E2ADC501.Gen |
Ad-Aware | VBA.Heur2.ObfDldr.10.E2ADC501.Gen |
VIPRE | LooksLike.Macro.Malware.gen!x1 (v) |
TrendMicro | HEUR_VBA.OE |
McAfee-GW-Edition | BehavesLike.OLE2.Downloader.jb |
FireEye | VBA.Heur2.ObfDldr.10.E2ADC501.Gen |
Emsisoft | VBA.Heur2.ObfDldr.10.E2ADC501.Gen (B) |
Jiangmin | Virus/MSWord.Hunter |
Microsoft | Trojan:Win32/Dridex!ml |
GData | VBA.Heur2.ObfDldr.10.E2ADC501.Gen |
MAX | malware (ai score=81) |
Zoner | Probably Heur.W97Obfuscated |
Rising | Malware.ObfusVBA@ML.97 (VBA) |
SentinelOne | Static AI - Malicious OLE |
AVG | VBS:Dropper-QF [Trj] |
payload_url | https://vitiligomatch.com/wpvitiligomatch/wp-includes/css/dist/block-directory/QaLUIUkxomX.php |