Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Jan. 26, 2023, 10:44 a.m. | Jan. 26, 2023, 11:07 a.m. |
-
WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Office15\WINWORD.EXE" C:\Users\test22\AppData\Local\Temp\document26.doc
1508
Name | Response | Post-Analysis Lookup |
---|---|---|
raw.githubusercontent.com | 185.199.108.133 | |
ipinfo.io | 34.117.59.81 |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLS 1.2 192.168.56.103:49168 185.199.108.133:443 |
C=US, O=DigiCert Inc, CN=DigiCert TLS RSA SHA256 2020 CA1 | C=US, ST=California, L=San Francisco, O=GitHub, Inc., CN=*.github.io | 8f:0e:79:24:71:c5:a7:d2:a7:46:76:30:c1:3c:b7:2a:13:b0:01:b2 |
suspicious_features | Connection to IP address | suspicious_request | GET http://104.223.76.152/126/vbc.exe | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://ipinfo.io/ip | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://raw.githubusercontent.com/GodOfWareFare/TheGoodKidPhotos/main/rt.jpg |
request | GET http://104.223.76.152/126/vbc.exe |
request | GET http://ipinfo.io/ip |
request | GET https://raw.githubusercontent.com/GodOfWareFare/TheGoodKidPhotos/main/rt.jpg |
domain | ipinfo.io |
file | C:\Users\test22\AppData\Local\Temp\~$cument26.doc |
host | 104.223.76.152 | |||
host | 46.183.223.109 | |||
host | 194.5.212.164 |
DrWeb | Exploit.ShellCode.69 |
FireEye | Exploit.RTF-ObfsStrm.Gen |
CAT-QuickHeal | Exp.RTF.Obfus.Gen |
VIPRE | Exploit.RTF-ObfsStrm.Gen |
Arcabit | Exploit.RTF-ObfsStrm.Gen |
Cyren | RTF/CVE-2017-11882.T.gen!Camelot |
Symantec | Bloodhound.RTF.20 |
ESET-NOD32 | multiple detections |
Cynet | Malicious (score: 99) |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Exploit.RTF-ObfsStrm.Gen |
NANO-Antivirus | Exploit.Rtf.Heuristic-rtf.dinbqn |
MicroWorld-eScan | Exploit.RTF-ObfsStrm.Gen |
Tencent | Exp.Ole.CVE-2017-11882.a |
Emsisoft | Exploit.RTF-ObfsStrm.Gen (B) |
TrendMicro | HEUR_RTFMALFORM |
Sophos | Troj/RtfExp-EQ |
Avira | HEUR/Rtf.Malformed |
MAX | malware (ai score=89) |
Antiy-AVL | Trojan[Exploit]/OLE.CVE-2017-11882 |
Microsoft | Trojan:Script/Wacatac.B!ml |
GData | Exploit.RTF-ObfsStrm.Gen |
Detected | |
AhnLab-V3 | RTF/Malform-A.Gen |
McAfee | RTFObfustream.c!75DD58E07228 |
TACHYON | Trojan-Exploit/RTF.CVE-2017-11882 |
Zoner | Probably Heur.RTFBadHeader |
Ikarus | Exploit.CVE-2017-11882 |
Fortinet | MSOffice/CVE_2017_11882.B!exploit |