Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Sept. 14, 2021, 9:27 a.m. | Sept. 14, 2021, 9:29 a.m. |
-
WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Office15\WINWORD.EXE" "C:\Users\test22\AppData\Local\Temp\RVSD PO 2021090120.docx"
1336
Name | Response | Post-Analysis Lookup |
---|---|---|
checkvim.com | 164.132.216.38 | |
cml.lol | 52.138.218.121 |
Suricata Alerts
Suricata TLS
No Suricata TLS
suspicious_features | Connection to IP address | suspicious_request | HEAD http://103.155.80.150/receipt/recp_21000989.wbk | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://103.155.80.150/receipt/recp_21000989.wbk | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://103.155.80.150/ssl/vbc.exe | ||||||
suspicious_features | POST method with no referer header, HTTP version 1.0 used | suspicious_request | POST http://checkvim.com/fd4/fre.php |
request | OPTIONS http://cml.lol/ |
request | HEAD http://cml.lol/0a6wdc |
request | HEAD http://103.155.80.150/receipt/recp_21000989.wbk |
request | GET http://cml.lol/0a6wdc |
request | GET http://103.155.80.150/receipt/recp_21000989.wbk |
request | GET http://103.155.80.150/ssl/vbc.exe |
request | POST http://checkvim.com/fd4/fre.php |
request | POST http://checkvim.com/fd4/fre.php |
file | C:\Users\test22\AppData\Local\Temp\~$SD PO 2021090120.docx |
host | 103.155.80.150 |
Lionic | Trojan.MSWord.Generic.4!c |
Arcabit | Trojan.Groooboor.Gen.31 |
ESET-NOD32 | DOC/TrojanDownloader.Agent.AWB |
BitDefender | Trojan.Groooboor.Gen.31 |
NANO-Antivirus | Exploit.Xml.CVE-2017-0199.equmby |
MicroWorld-eScan | Trojan.Groooboor.Gen.31 |
DrWeb | W97M.DownLoader.2692 |
McAfee-GW-Edition | Artemis!Trojan |
FireEye | Trojan.Groooboor.Gen.31 |
Emsisoft | Trojan.Groooboor.Gen.31 (B) |
Ikarus | Win32.SuspectCrc |
GData | Trojan.Groooboor.Gen.31 |
Microsoft | Exploit:O97M/CVE-2017-0199.BKMS!MTB |
Zoner | Probably Heur.W97OleLink |
Fortinet | MSOffice/Agent.BD77!tr.dldr |