Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | July 19, 2023, 9:09 a.m. | July 19, 2023, 9:11 a.m. |
-
wscript.exe "C:\Windows\System32\wscript.exe" C:\Users\test22\AppData\Local\Temp\Document_of_file_newshipment_pdf.js
2560
Name | Response | Post-Analysis Lookup |
---|---|---|
apps.identrust.com |
CNAME
a1952.dscq.akamai.net
CNAME
identrust.edgesuite.net
|
23.67.53.18 |
wtools.io | 172.67.135.130 | |
pastebin.com | 172.67.34.170 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49161 -> 104.20.68.143:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
UDP 192.168.56.101:54148 -> 164.124.101.2:53 | 2034938 | ET POLICY Observed DNS Query to Pastebin-style Service (wtools .io) | Potential Corporate Privacy Violation |
TCP 192.168.56.101:49163 -> 104.21.6.247:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49161 104.20.68.143:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | c7:af:cc:81:4d:27:d1:4c:7c:f4:bf:5d:55:9d:80:50:3b:6f:6c:cd |
TLSv1 192.168.56.101:49163 104.21.6.247:443 |
C=US, O=Let's Encrypt, CN=E1 | CN=wtools.io | 9c:25:6b:44:0d:fa:8c:18:14:80:59:26:63:42:4c:cd:97:e8:59:2b |
request | GET http://apps.identrust.com/roots/dstrootcax3.p7c |
request | GET https://pastebin.com/raw/NVAgzFRR |
FireEye | JS:Trojan.Cryxos.12968 |
VirIT | Trojan.JS.Remcos.DSI |
ESET-NOD32 | JS/TrojanDownloader.Agent.ZYN |
Avast | Script:SNH-gen [Drp] |
Kaspersky | HEUR:Trojan.Script.Generic |
BitDefender | JS:Trojan.Cryxos.12968 |
NANO-Antivirus | Trojan.Script.Heuristic-js.iacgm |
MicroWorld-eScan | JS:Trojan.Cryxos.12968 |
Emsisoft | JS:Trojan.Cryxos.12968 (B) |
DrWeb | JS.DownLoader.6233 |
VIPRE | JS:Trojan.Cryxos.12968 |
MAX | malware (ai score=89) |
Arcabit | JS:Trojan.Cryxos.D32A8 |
ZoneAlarm | HEUR:Trojan.Script.Generic |
GData | JS:Trojan.Cryxos.12968 |
Detected | |
ALYac | JS:Trojan.Cryxos.12968 |
Ikarus | Trojan-Downloader.PowerShell.Agent |
Fortinet | JS/Agent.ZYN!tr |
AVG | Script:SNH-gen [Drp] |