Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 21, 2021, 8:29 a.m. | Oct. 21, 2021, 8:31 a.m. |
-
WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Office15\WINWORD.EXE" C:\Users\test22\AppData\Local\Temp\inv_0098788000.wbk
2508
IP Address | Status | Action |
---|---|---|
104.233.181.170 | Active | Moloch |
107.186.149.170 | Active | Moloch |
108.186.180.79 | Active | Moloch |
15.197.142.173 | Active | Moloch |
156.234.138.23 | Active | Moloch |
164.124.101.2 | Active | Moloch |
172.104.153.244 | Active | Moloch |
192.227.228.38 | Active | Moloch |
192.249.80.207 | Active | Moloch |
192.254.189.87 | Active | Moloch |
3.223.115.185 | Active | Moloch |
34.102.136.180 | Active | Moloch |
5.9.250.2 | Active | Moloch |
52.58.78.16 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
suspicious_features | Connection to IP address | suspicious_request | GET http://192.227.228.38/0080008/vbc.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.desongli.com/mxnu/?uZfX=hZ80obWBB1Dtx9mJDJ/B6KhSbXm9N4IXZ9kDZpitpQpTEQWdqR+8a/o3g7qjE+O8VqYt5r7Y&Vnw0_=-Z1l72l0kFHhurC | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.029atk.xyz/mxnu/?uZfX=6sRgvWVFBb3Q/xwRSmzppKeefWZYMhtu8mXrbS5z1U4Jv8b+WQjv+VljYqCaCxejjINp6HL4&Vnw0_=-Z1l72l0kFHhurC | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.gatescres.com/mxnu/?uZfX=/h7P8W3KCMqF8sHgbHgxGw3KDEtccpvlr5o0RXreZvWALZ7/fG1Fr8cUEgi4cFDVX1k6R9aW&Vnw0_=-Z1l72l0kFHhurC | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.funkidsroomdecor.com/mxnu/?uZfX=iFpbfMx0kR1NhQJhtaFPfzg8Nsy3dm+jXQd2Fi3YicbHa3sz/htfiB2IN3yla1aALZWfkU50&Vnw0_=-Z1l72l0kFHhurC | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.hanjyu.com/mxnu/?uZfX=e1Tv98kFs0Gi2+72/XvHySgQIb+R11LQEZu1blwPIgW3VgOqIrXEf8kBKhEPSuWOnZ0Oxl1j&Vnw0_=-Z1l72l0kFHhurC | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.naplesconciergerealty.com/mxnu/?uZfX=hecv2sMFcvsyFIpzJOhZbtwMh1SG6St5/U1aPglBFWownzq2qPNpvMi/ho6Sg43JWpVw027R&Vnw0_=-Z1l72l0kFHhurC | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.closetu.com/mxnu/?uZfX=rJ249TMVQMCwGwXS7eMNhvOWH4SbGXiKs4Vq1JHmstm/5V4DyV8c/XoA/4BgaERVtEbRuzyC&Vnw0_=-Z1l72l0kFHhurC | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.digisor.com/mxnu/?uZfX=UVMBiiaCgBTVCfU1vNNEq08V9m7XAvZZglUNdI143I2X7Zl4GMtYquItbp7SrE/Ljcqvb/Ed&Vnw0_=-Z1l72l0kFHhurC | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.whitebot.xyz/mxnu/?uZfX=mJKlLoR4AxZK/RYIFKAo0UiVtoPyzBJ6SQAFXLfvSOBYEGo1cqGoAX7CRK1QxANrckFntybM&Vnw0_=-Z1l72l0kFHhurC | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.265411.com/mxnu/?uZfX=25s1ERxOA1FsQEL58dsMzLXIm6T2LEHWrovGfnVbwWX5qUTqFcrkTCI5ju9rUaWf+2K12S96&Vnw0_=-Z1l72l0kFHhurC | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.revgeek.com/mxnu/?uZfX=LFHT7yJDHTG5j2x991585jkXyYBkZkjzIUaPFc8bTKfmXG7pnxx1T4PiHIQyjDj8X+wed1XV&Vnw0_=-Z1l72l0kFHhurC | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.epilasyonmerkeziankara.com/mxnu/?uZfX=bngcEK+xZs1ednOYrpus6XFKnrxKN2uCCnQcEZtwxddq7ZQQDv/23m99KJW03q/XcaqcaNGj&Vnw0_=-Z1l72l0kFHhurC |
request | GET http://192.227.228.38/0080008/vbc.exe |
request | GET http://www.desongli.com/mxnu/?uZfX=hZ80obWBB1Dtx9mJDJ/B6KhSbXm9N4IXZ9kDZpitpQpTEQWdqR+8a/o3g7qjE+O8VqYt5r7Y&Vnw0_=-Z1l72l0kFHhurC |
request | GET http://www.029atk.xyz/mxnu/?uZfX=6sRgvWVFBb3Q/xwRSmzppKeefWZYMhtu8mXrbS5z1U4Jv8b+WQjv+VljYqCaCxejjINp6HL4&Vnw0_=-Z1l72l0kFHhurC |
request | GET http://www.gatescres.com/mxnu/?uZfX=/h7P8W3KCMqF8sHgbHgxGw3KDEtccpvlr5o0RXreZvWALZ7/fG1Fr8cUEgi4cFDVX1k6R9aW&Vnw0_=-Z1l72l0kFHhurC |
request | GET http://www.funkidsroomdecor.com/mxnu/?uZfX=iFpbfMx0kR1NhQJhtaFPfzg8Nsy3dm+jXQd2Fi3YicbHa3sz/htfiB2IN3yla1aALZWfkU50&Vnw0_=-Z1l72l0kFHhurC |
request | GET http://www.hanjyu.com/mxnu/?uZfX=e1Tv98kFs0Gi2+72/XvHySgQIb+R11LQEZu1blwPIgW3VgOqIrXEf8kBKhEPSuWOnZ0Oxl1j&Vnw0_=-Z1l72l0kFHhurC |
request | GET http://www.naplesconciergerealty.com/mxnu/?uZfX=hecv2sMFcvsyFIpzJOhZbtwMh1SG6St5/U1aPglBFWownzq2qPNpvMi/ho6Sg43JWpVw027R&Vnw0_=-Z1l72l0kFHhurC |
request | GET http://www.closetu.com/mxnu/?uZfX=rJ249TMVQMCwGwXS7eMNhvOWH4SbGXiKs4Vq1JHmstm/5V4DyV8c/XoA/4BgaERVtEbRuzyC&Vnw0_=-Z1l72l0kFHhurC |
request | GET http://www.digisor.com/mxnu/?uZfX=UVMBiiaCgBTVCfU1vNNEq08V9m7XAvZZglUNdI143I2X7Zl4GMtYquItbp7SrE/Ljcqvb/Ed&Vnw0_=-Z1l72l0kFHhurC |
request | GET http://www.whitebot.xyz/mxnu/?uZfX=mJKlLoR4AxZK/RYIFKAo0UiVtoPyzBJ6SQAFXLfvSOBYEGo1cqGoAX7CRK1QxANrckFntybM&Vnw0_=-Z1l72l0kFHhurC |
request | GET http://www.265411.com/mxnu/?uZfX=25s1ERxOA1FsQEL58dsMzLXIm6T2LEHWrovGfnVbwWX5qUTqFcrkTCI5ju9rUaWf+2K12S96&Vnw0_=-Z1l72l0kFHhurC |
request | GET http://www.revgeek.com/mxnu/?uZfX=LFHT7yJDHTG5j2x991585jkXyYBkZkjzIUaPFc8bTKfmXG7pnxx1T4PiHIQyjDj8X+wed1XV&Vnw0_=-Z1l72l0kFHhurC |
request | GET http://www.epilasyonmerkeziankara.com/mxnu/?uZfX=bngcEK+xZs1ednOYrpus6XFKnrxKN2uCCnQcEZtwxddq7ZQQDv/23m99KJW03q/XcaqcaNGj&Vnw0_=-Z1l72l0kFHhurC |
filetype_details | Rich Text Format data, unknown version | filename | inv_0098788000.wbk |
host | 192.227.228.38 |
Lionic | Trojan.Multi.Generic.4!c |
DrWeb | Exploit.Rtf.Obfuscated.32 |
MicroWorld-eScan | Exploit.RTF-ObfsStrm.Gen |
FireEye | Exploit.RTF-ObfsStrm.Gen |
Sangfor | Malware.Generic-RTF.Save.c5a892ae |
K7AntiVirus | Trojan ( 0057b3a91 ) |
K7GW | Trojan ( 0057b3a91 ) |
Cyren | RTF/CVE-2017-11882.R.gen!Camelot |
Symantec | Bloodhound.RTF.20 |
ESET-NOD32 | multiple detections |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Exploit.RTF-ObfsStrm.Gen |
NANO-Antivirus | Exploit.Rtf.Heuristic-rtf.dinbqn |
Tencent | Office.Exploit.Generic.Hwdb |
Ad-Aware | Exploit.RTF-ObfsStrm.Gen |
Sophos | Troj/RtfExp-EQ |
TrendMicro | HEUR_RTFMALFORM |
McAfee-GW-Edition | Exploit-CVE2017-11882.yx |
Emsisoft | Exploit.RTF-ObfsStrm.Gen (B) |
Ikarus | Exploit.CVE-2017-11882 |
Avira | HEUR/Rtf.Malformed |
Antiy-AVL | Trojan/Generic.ASDOH.22A |
GData | Exploit.RTF-ObfsStrm.Gen |
Cynet | Malicious (score: 99) |
AhnLab-V3 | RTF/Malform-A.Gen |
McAfee | RTFObfustream.e!9AAF28738869 |
TACHYON | Trojan-Exploit/RTF.CVE-2017-11882 |
Zoner | Probably Heur.RTFBadVersion |
MAX | malware (ai score=86) |
Fortinet | RTF/GenericKD.47107450!tr |