Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Sept. 24, 2023, 11:17 a.m. | Sept. 24, 2023, 11:21 a.m. |
-
-
AppLaunch.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
2676
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
5.42.92.211 | Active | Moloch |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49164 -> 5.42.92.211:80 | 2047625 | ET MALWARE [ANY.RUN] Win32/Stealc Checkin (POST) | A Network Trojan was detected |
TCP 192.168.56.101:49164 -> 5.42.92.211:80 | 2018358 | ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
section | .syhua |
suspicious_features | POST method with no referer header, Connection to IP address | suspicious_request | POST http://5.42.92.211/loghub/master |
request | POST http://5.42.92.211/loghub/master |
request | POST http://5.42.92.211/loghub/master |
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | task schedule | rule | schtasks_Zero | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
host | 5.42.92.211 |