Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 25, 2023, 12:17 p.m. | Oct. 25, 2023, 12:19 p.m. |
-
wscript.exe "C:\Windows\System32\wscript.exe" C:\Users\test22\AppData\Local\Temp\Comprobante_transfer.pdf.js
2004
Name | Response | Post-Analysis Lookup |
---|---|---|
apps.identrust.com |
CNAME
a1952.dscq.akamai.net
CNAME
identrust.edgesuite.net
|
23.67.53.17 |
wtools.io | 104.21.6.247 | |
pastebin.com | 104.20.68.143 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49161 -> 172.67.34.170:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.103:49163 -> 172.67.135.130:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
UDP 192.168.56.103:50800 -> 164.124.101.2:53 | 2034938 | ET POLICY Observed DNS Query to Pastebin-style Service (wtools .io) | Potential Corporate Privacy Violation |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49161 172.67.34.170:443 |
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc RSA CA-2 | C=US, ST=California, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com | c7:af:cc:81:4d:27:d1:4c:7c:f4:bf:5d:55:9d:80:50:3b:6f:6c:cd |
TLSv1 192.168.56.103:49163 172.67.135.130:443 |
C=US, O=Let's Encrypt, CN=E1 | CN=wtools.io | 3a:58:36:cd:4b:ef:eb:18:c3:bf:78:bd:93:e9:a1:d0:70:e3:b8:13 |
request | GET http://apps.identrust.com/roots/dstrootcax3.p7c |
request | GET https://pastebin.com/raw/NVAgzFRR |
FireEye | JS:Trojan.Cryxos.12968 |
ALYac | JS:Trojan.Cryxos.12968 |
VIPRE | JS:Trojan.Cryxos.12968 |
Avast | JS:Obfuscated-IA [Cryp] |
Kaspersky | HEUR:Trojan.Script.Generic |
BitDefender | JS:Trojan.Cryxos.12968 |
NANO-Antivirus | Trojan.Script.Heuristic-js.iacgm |
MicroWorld-eScan | JS:Trojan.Cryxos.12968 |
Emsisoft | JS:Trojan.Cryxos.12968 (B) |
GData | JS:Trojan.Cryxos.12968 |
MAX | malware (ai score=84) |
Arcabit | JS:Trojan.Cryxos.D32A8 |
Detected | |
Ikarus | Trojan-Downloader.JS.Agent |
AVG | JS:Obfuscated-IA [Cryp] |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F81F111D0E5AB58D396F7BF525577FD30FDC95AA\Blob |