Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 29, 2021, 7:33 a.m. | Oct. 29, 2021, 7:35 a.m. |
-
WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Office15\WINWORD.EXE" C:\Users\test22\AppData\Local\Temp\invc_0070032233.wbk
1940
Name | Response | Post-Analysis Lookup |
---|---|---|
pkc5hq.by.files.1drv.com |
CNAME
by-files.fe.1drv.com
CNAME
l-0003.l-msedge.net
|
13.107.42.12 |
sheilabeltagy4m.hopto.org | 23.105.131.236 | |
johnie3m.hopto.org | 23.105.131.236 | |
onedrive.live.com |
CNAME
l-0004.l-msedge.net
|
13.107.42.13 |
sugarcane.hopto.org | ||
micheal3m.hopto.org | 23.105.131.236 |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49173 13.107.42.13:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 01 | CN=onedrive.com | 50:2f:33:10:92:ac:27:7b:17:be:82:68:3b:e2:29:ad:97:41:b7:bb |
TLSv1 192.168.56.103:49174 13.107.42.12:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 01 | C=US, ST=WA, L=Redmond, O=Microsoft Corporation, OU=Microsoft Corporation, CN=storage.live.com | ec:e5:02:98:e6:c9:9a:12:fc:c0:4d:19:cd:2b:0c:ae:d0:c0:37:8e |
TLSv1 192.168.56.103:49175 13.107.42.12:443 |
C=US, O=Microsoft Corporation, CN=Microsoft RSA TLS CA 01 | C=US, ST=WA, L=Redmond, O=Microsoft Corporation, OU=Microsoft Corporation, CN=storage.live.com | ec:e5:02:98:e6:c9:9a:12:fc:c0:4d:19:cd:2b:0c:ae:d0:c0:37:8e |
suspicious_features | Connection to IP address | suspicious_request | GET http://23.106.223.27/vbc.exe |
domain | micheal3m.hopto.org |
domain | johnie3m.hopto.org |
domain | sugarcane.hopto.org |
domain | sheilabeltagy4m.hopto.org |
request | GET http://23.106.223.27/vbc.exe |
request | GET https://onedrive.live.com/download?cid=4DFB187F341EBACF&resid=4DFB187F341EBACF%21164&authkey=AB6vf_RpiS-BZkA |
request | GET https://pkc5hq.by.files.1drv.com/y4mXHvA4annmU58YyoOm5IbUsOjHQkt8q8czhufn7SvhH_9ENeZ-hZCEVtU8HfJcyZqybwtJhT99lOdljmUKIJV6mEDjvRJN7qaSuTHjHe0P1Uks0H3eThDcBWxr_GDuW5ssjF1L07fN6gOidautQhhbxAbZRDoxBKxbzH3LFBtezqfaA5PtN-orcz2O8r_j7cZsCvccczTmxYMdT99EAN2XQ/Wavmshxufsmxmzgeagkcmionbjxpadt?download&psid=1 |
request | GET https://pkc5hq.by.files.1drv.com/y4mbAoLripoDP3gbIunXf6AhB9wxgfIIoSbjKMJfKMtjRD33rmLjnaP5rsqgnEP1T6_Bdb2MUO_hsDTIM1sHFVa3ef8ahu_e_3RkXt2wnnhpDIEFjkcRXiurYGt-QnwFtyGNWMEdG4wfsEmrYjQkmSI7A3RWRn5ab-Q2d9vhvXn9hv63QOUhRmJ_nqqZ6NNjqH_lhDWSLFYs9j6TXFBQCTb8w/Wavmshxufsmxmzgeagkcmionbjxpadt?download&psid=1 |
filetype_details | Rich Text Format data, unknown version | filename | invc_0070032233.wbk |
host | 23.106.223.27 |
DrWeb | Exploit.Rtf.Obfuscated.32 |
MicroWorld-eScan | Exploit.RTF-ObfsStrm.Gen |
Sangfor | Malware.Generic-RTF.Save.c5a892ae |
K7AntiVirus | Trojan ( 0057b3a91 ) |
K7GW | Trojan ( 0057b3a91 ) |
Arcabit | Exploit.RTF-ObfsStrm.Gen |
Cyren | RTF/CVE-2017-11882.R.gen!Camelot |
Symantec | Bloodhound.RTF.20 |
ESET-NOD32 | multiple detections |
Kaspersky | HEUR:Exploit.MSOffice.Generic |
BitDefender | Exploit.RTF-ObfsStrm.Gen |
NANO-Antivirus | Exploit.Rtf.Heuristic-rtf.dinbqn |
Ad-Aware | Exploit.RTF-ObfsStrm.Gen |
Emsisoft | Exploit.RTF-ObfsStrm.Gen (B) |
TrendMicro | HEUR_RTFMALFORM |
McAfee-GW-Edition | Exploit-CVE2017-11882.z |
FireEye | Exploit.RTF-ObfsStrm.Gen |
Sophos | Troj/RtfExp-EQ |
Avira | HEUR/Rtf.Malformed |
MAX | malware (ai score=88) |
Antiy-AVL | Trojan/Generic.ASDOH.22A |
GData | Exploit.RTF-ObfsStrm.Gen |
AhnLab-V3 | RTF/Malform-A.Gen |
McAfee | Exploit-CVE2017-11882.z |
Zoner | Probably Heur.RTFBadVersion |
Ikarus | Exploit.CVE-2017-11882 |
Fortinet | RTF/GenericKD.47107450!tr |
dead_host | 192.168.56.103:49193 |
dead_host | 23.105.131.236:2406 |
dead_host | 192.168.56.103:49181 |
dead_host | 192.168.56.103:49190 |
dead_host | 192.168.56.103:49212 |
dead_host | 192.168.56.103:49217 |
dead_host | 192.168.56.103:49205 |
dead_host | 192.168.56.103:49177 |
dead_host | 192.168.56.103:49186 |
dead_host | 192.168.56.103:49208 |
dead_host | 192.168.56.103:49201 |
dead_host | 192.168.56.103:49198 |
dead_host | 192.168.56.103:49191 |
dead_host | 192.168.56.103:49213 |
dead_host | 192.168.56.103:49194 |
dead_host | 192.168.56.103:49182 |
dead_host | 192.168.56.103:49187 |
dead_host | 192.168.56.103:49209 |
dead_host | 192.168.56.103:49218 |
dead_host | 192.168.56.103:49206 |
dead_host | 192.168.56.103:49178 |
dead_host | 192.168.56.103:49199 |
dead_host | 192.168.56.103:49188 |
dead_host | 192.168.56.103:49202 |
dead_host | 192.168.56.103:49195 |
dead_host | 192.168.56.103:49183 |
dead_host | 192.168.56.103:49184 |
dead_host | 192.168.56.103:49214 |
dead_host | 192.168.56.103:49219 |
dead_host | 192.168.56.103:49179 |
dead_host | 192.168.56.103:49196 |
dead_host | 192.168.56.103:49210 |
dead_host | 192.168.56.103:49189 |
dead_host | 192.168.56.103:49203 |
dead_host | 192.168.56.103:49220 |
dead_host | 192.168.56.103:49192 |
dead_host | 192.168.56.103:49180 |
dead_host | 192.168.56.103:49185 |
dead_host | 192.168.56.103:49215 |
dead_host | 192.168.56.103:49216 |
dead_host | 192.168.56.103:49204 |
dead_host | 192.168.56.103:49176 |
dead_host | 192.168.56.103:49197 |
dead_host | 192.168.56.103:49211 |
dead_host | 192.168.56.103:49207 |
dead_host | 192.168.56.103:49200 |