Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | June 11, 2021, 4:14 p.m. | June 11, 2021, 4:17 p.m. |
-
iexplore.exe "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\test22\AppData\Local\Temp\index2.html
2076-
iexplore.exe "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2076 CREDAT:145409
2276
-
Name | Response | Post-Analysis Lookup |
---|---|---|
tootirrruahapowsadassa.com | 104.21.94.22 | |
login.live.com |
CNAME
login.msa.msidentity.com
CNAME
prda.aadg.msidentity.com
|
40.126.37.6 |
www2.bing.com |
CNAME
dual-a-0001.a-msedge.net
|
13.107.21.200 |
login.microsoftonline.com |
CNAME
prda.aadg.msidentity.com
|
40.126.52.148 |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49204 104.21.94.22:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 7c:d3:63:d6:73:77:09:13:7a:43:c3:09:90:c4:66:17:64:41:3d:7e |
TLSv1 192.168.56.101:49203 104.21.94.22:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | 7c:d3:63:d6:73:77:09:13:7a:43:c3:09:90:c4:66:17:64:41:3d:7e |
TLSv1 192.168.56.101:49207 204.79.197.200:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 01 | CN=www.bing.com | 29:b4:ed:e7:1f:1c:1b:12:99:6c:9b:1e:27:75:ac:01:25:15:77:1f |
TLSv1 192.168.56.101:49215 204.79.197.200:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 01 | CN=www.bing.com | 29:b4:ed:e7:1f:1c:1b:12:99:6c:9b:1e:27:75:ac:01:25:15:77:1f |
TLSv1 192.168.56.101:49206 204.79.197.200:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 01 | CN=www.bing.com | 29:b4:ed:e7:1f:1c:1b:12:99:6c:9b:1e:27:75:ac:01:25:15:77:1f |
TLSv1 192.168.56.101:49210 204.79.197.200:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 01 | CN=www.bing.com | 29:b4:ed:e7:1f:1c:1b:12:99:6c:9b:1e:27:75:ac:01:25:15:77:1f |
TLSv1 192.168.56.101:49209 204.79.197.200:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 01 | CN=www.bing.com | 29:b4:ed:e7:1f:1c:1b:12:99:6c:9b:1e:27:75:ac:01:25:15:77:1f |
TLSv1 192.168.56.101:49216 40.126.52.3:443 |
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA | C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=stamp2.login.microsoftonline.com | de:dd:3b:3d:85:a0:f1:06:e2:75:76:3c:8d:12:93:4c:ef:32:50:22 |
TLSv1 192.168.56.101:49218 204.79.197.200:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 01 | CN=www.bing.com | 29:b4:ed:e7:1f:1c:1b:12:99:6c:9b:1e:27:75:ac:01:25:15:77:1f |
TLSv1 192.168.56.101:49219 204.79.197.200:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 01 | CN=www.bing.com | 29:b4:ed:e7:1f:1c:1b:12:99:6c:9b:1e:27:75:ac:01:25:15:77:1f |
TLSv1 192.168.56.101:49221 20.190.163.18:443 |
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA | C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=graph.windows.net | 3a:72:af:8b:75:8e:65:e6:76:63:b2:c8:42:cd:8b:1b:fd:2e:02:51 |
TLSv1 192.168.56.101:49214 204.79.197.200:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 01 | CN=www.bing.com | 29:b4:ed:e7:1f:1c:1b:12:99:6c:9b:1e:27:75:ac:01:25:15:77:1f |
TLSv1 192.168.56.101:49213 204.79.197.200:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 01 | CN=www.bing.com | 29:b4:ed:e7:1f:1c:1b:12:99:6c:9b:1e:27:75:ac:01:25:15:77:1f |
TLSv1 192.168.56.101:49217 40.126.52.3:443 |
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA | C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=stamp2.login.microsoftonline.com | de:dd:3b:3d:85:a0:f1:06:e2:75:76:3c:8d:12:93:4c:ef:32:50:22 |
TLSv1 192.168.56.101:49220 20.190.163.18:443 |
C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA | C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, CN=graph.windows.net | 3a:72:af:8b:75:8e:65:e6:76:63:b2:c8:42:cd:8b:1b:fd:2e:02:51 |
request | GET http://ie9cvlist.ie.microsoft.com/IE9CompatViewList.xml |
request | GET https://tootirrruahapowsadassa.com/ |
request | GET https://www.bing.com/ |
request | GET https://www.bing.com/rp/MDr1f9aJs4rBVf1F5DAtlALvweY.gz.js |
request | GET https://www.bing.com/rp/hceflue5sqxkKta9dP3R-IFtPuY.gz.js |
request | GET https://www.bing.com/rp/svI82uPNFRD54V4bMLaeahXQXBI.gz.js |
request | GET https://www.bing.com/rp/a282eRIAnHsW_URoyogdzsukm_o.gz.js |
request | GET https://www.bing.com/th?id=OHR.GlenEtive_ROW5856952083_1920x1080.jpg&rf=LaDigue_1920x1080.jpg&pid=hp |
request | GET https://www.bing.com/rp/B0oC6BX98v6fWz1fuvaeRm9bOak.png |
request | GET https://www.bing.com/sa/simg/favicon-2x.ico |
request | GET https://www.bing.com/fd/ls/l?IG=9D12532635294F00A7B04ABD98369983&CID=026EA38DE0CA69A22623B3DEE159681C&Type=Event.CPT&DATA={"pp":{"S":"L","FC":-1,"BC":-1,"SE":-1,"TC":-1,"H":846,"BP":1164,"CT":1233,"IL":1},"ad":[-1,-1,1365,899,1365,899,0]}&P=SERP&DA=HKGE01 |
request | POST https://www.bing.com/fd/ls/lsp.aspx? |
request | GET https://www.bing.com/rp/nD3Dxxt3XsvojhRsXFq3RJI2wTE.gz.js |
request | GET https://www.bing.com/rp/2ajnlX1juJQ_Nu80sW46BDUL1-A.gz.js |
request | GET https://www.bing.com/rp/swyt_VnIjJDWZW5KEq7a8l_1AEw.gz.js |
request | GET https://www.bing.com/rp/Dta1_Or8JEDr20O5LJEJy7sv1z0.gz.js |
request | GET https://www.bing.com/rp/P3LN8DHh0udC9Pbh8UHnw5FJ8R8.gz.js |
request | GET https://www.bing.com/rp/eaMqCdNxIXjLc0ATep7tsFkfmSA.gz.js |
request | GET https://www.bing.com/rp/RXZtj0lYpFm5XDPMpuGSsNG8i9I.gz.js |
request | GET https://www.bing.com/rp/ozS3T0fsBUPZy4zlY0UX_e0TUwY.gz.js |
request | GET https://www.bing.com/rp/MstqcgNaYngCBavkktAoSE0--po.gz.js |
request | GET https://www.bing.com/rp/Xp-HPHGHOZznHBwdn7OWdva404Y.gz.js |
request | GET https://www.bing.com/rp/n8-O_KIRNSMPFWQWrGjn0BRH6SM.gz.js |
request | GET https://www.bing.com/rp/6sxhavkE4_SZHA_K4rwWmg67vF0.gz.js |
request | GET https://www.bing.com/rp/FvkosEDIbuCPhD1mwLAN-LJ7Coc.gz.js |
request | GET https://www.bing.com/rp/_ofc7e4WqqkT9lPqQJykFP4vxq4.gz.js |
request | GET https://login.microsoftonline.com/common/oauth2/authorize?client_id=9ea1ad79-fdb6-4f9a-8bc3-2b70f96e34c7&response_type=id_token+code&nonce=6b267c39-7342-4a85-89ec-b4cb1cb52718&redirect_uri=https%3a%2f%2fwww.bing.com%2forgid%2fidtoken%2fconditional&scope=openid&response_mode=form_post&msafed=0&prompt=none&state=%7b%22ig%22%3a%229D12532635294F00A7B04ABD98369983%22%7d |
request | GET https://www.bing.com/rp/pCNhfy2VQinsKZ9KIqxtGogwDv0.gz.js |
request | GET https://www.bing.com/ipv6test/test?FORM=MONITR |
request | GET https://www2.bing.com/ipv6test/test |
request | POST https://www.bing.com/orgid/idtoken/conditional |
request | GET https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1623395708&rver=6.0.5286.0&wp=MBI_SSL&wreply=https:%2F%2fwww.bing.com%2Fsecure%2FPassport.aspx%3Fpopup%3D1%26ssl%3D1&lc=1042&id=264960&checkda=1 |
request | GET https://www.bing.com/secure/Passport.aspx?popup=1&ssl=1 |
request | GET https://www.bing.com/fd/ls/l?IG=9D12532635294F00A7B04ABD98369983&CID=026EA38DE0CA69A22623B3DEE159681C&TYPE=Event.ClientInst&DATA=%5B%7B%22T%22%3A%22CI.Init%22%2C%22TS%22%3A1623395698471%2C%22Name%22%3A%22Base%22%2C%22FID%22%3A%22CI%22%7D%2C%7B%22width%22%3A%221365%22%2C%22T%22%3A%22CI.Info%22%2C%22TS%22%3A1623395698472%2C%22Name%22%3A%22W%22%2C%22FID%22%3A%22BRW%22%7D%2C%7B%22height%22%3A%22899%22%2C%22T%22%3A%22CI.Info%22%2C%22TS%22%3A1623395698472%2C%22Name%22%3A%22M%22%2C%22FID%22%3A%22BRH%22%7D%2C%7B%22T%22%3A%22CI.Info%22%2C%22TS%22%3A1623395698472%2C%22Name%22%3A%221%22%2C%22FID%22%3A%22Mutation%22%7D%2C%7B%22T%22%3A%22CI.Info%22%2C%22TS%22%3A1623395698472%2C%22Name%22%3A%224%22%2C%22FID%22%3A%22DM%22%7D%2C%7B%22RTT%22%3A%221623395694987%22%2C%22T%22%3A%22CI.Init%22%2C%22TS%22%3A1623395698826%2C%22Name%22%3A%22ClientPerf%22%2C%22FID%22%3A%22HP%22%7D%2C%7B%22w%22%3A%221365%22%2C%22h%22%3A%221024%22%2C%22dpr%22%3A%220%22%2C%22T%22%3A%22CI.Init%22%2C%22TS%22%3A1623395698826%2C%22Name%22%3A%22ClientScreen%22%2C%22FID%22%3A%22HP%22%7D%2C%7B%22Time%22%3A3877%2C%22T%22%3A%22CI.Latency%22%2C%22TS%22%3A1623395698864%2C%22Name%22%3A%22sBoxTime%22%2C%22FID%22%3A%22HP%22%7D%2C%7B%22T%22%3A%22CI.ClientInst%22%2C%22TS%22%3A1623395699131%2C%22Name%22%3A%22OrgId%22%2C%22FID%22%3A%22NoSignInAttempt%22%7D%5D |
request | POST https://www.bing.com/fd/ls/lsp.aspx |
request | POST https://www.bing.com/fd/ls/lsp.aspx? |
request | POST https://www.bing.com/orgid/idtoken/conditional |
request | POST https://www.bing.com/fd/ls/lsp.aspx |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\Xp-HPHGHOZznHBwdn7OWdva404Y.gz[1].js |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\n8-O_KIRNSMPFWQWrGjn0BRH6SM.gz[1].js |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\nD3Dxxt3XsvojhRsXFq3RJI2wTE.gz[1].js |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\ozS3T0fsBUPZy4zlY0UX_e0TUwY.gz[1].js |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\Dta1_Or8JEDr20O5LJEJy7sv1z0.gz[1].js |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\swyt_VnIjJDWZW5KEq7a8l_1AEw.gz[1].js |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\P3LN8DHh0udC9Pbh8UHnw5FJ8R8.gz[1].js |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\RXZtj0lYpFm5XDPMpuGSsNG8i9I.gz[1].js |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\pCNhfy2VQinsKZ9KIqxtGogwDv0.gz[1].js |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\a282eRIAnHsW_URoyogdzsukm_o.gz[1].js |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\MDr1f9aJs4rBVf1F5DAtlALvweY.gz[1].js |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\_ofc7e4WqqkT9lPqQJykFP4vxq4.gz[1].js |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\svI82uPNFRD54V4bMLaeahXQXBI.gz[1].js |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTY94C7J\MstqcgNaYngCBavkktAoSE0--po.gz[1].js |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\hceflue5sqxkKta9dP3R-IFtPuY.gz[1].js |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\2ajnlX1juJQ_Nu80sW46BDUL1-A.gz[1].js |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYECVYBT\eaMqCdNxIXjLc0ATep7tsFkfmSA.gz[1].js |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\FvkosEDIbuCPhD1mwLAN-LJ7Coc.gz[1].js |
file | C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZTDTA402\6sxhavkE4_SZHA_K4rwWmg67vF0.gz[1].js |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2076 CREDAT:145409 |
host | 117.18.232.200 |
Arcabit | VBS.Heur.Worm.Dunihi.2.F8AC86B2.Gen |
ESET-NOD32 | VBS/Kryptik.AP |
Baidu | VBS.Worm.Agent.rd |
Avast | VBS:Downloader-PI [Trj] |
Kaspersky | HEUR:Worm.Script.Generic |
BitDefender | VBS.Heur.Worm.Dunihi.2.F8AC86B2.Gen |
NANO-Antivirus | Trojan.Script.Agent.dmmmng |
MicroWorld-eScan | VBS.Heur.Worm.Dunihi.2.F8AC86B2.Gen |
Ad-Aware | VBS.Heur.Worm.Dunihi.2.F8AC86B2.Gen |
Emsisoft | VBS.Heur.Worm.Dunihi.2.F8AC86B2.Gen (B) |
McAfee-GW-Edition | BehavesLike.HTML.Dropper.qq |
FireEye | VBS.Heur.Worm.Dunihi.2.F8AC86B2.Gen |
GData | VBS.Heur.Worm.Dunihi.2.F8AC86B2.Gen |
ALYac | VBS.Heur.Worm.Dunihi.2.F8AC86B2.Gen |
MAX | malware (ai score=88) |
Fortinet | WM/Moat.33F95FF6!tr |
AVG | VBS:Downloader-PI [Trj] |