Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | June 26, 2024, 10:09 a.m. | June 26, 2024, 10:12 a.m. |
-
WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Office12\WINWORD.EXE" C:\Users\test22\AppData\Local\Temp\nelb.doc
2640
Name | Response | Post-Analysis Lookup |
---|---|---|
www.h7wlvwr4afx.top | ||
www.xmentorgroup.com |
CNAME
xmentorgroup.com
|
3.33.130.190 |
www.home-repair-contractors-kfm.xyz | 199.59.243.226 | |
www.liposuctionclinics2.today | 104.21.89.233 | |
universalmovies.top | 172.67.162.95 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.101:53004 -> 164.124.101.2:53 | 2023883 | ET DNS Query to a *.top domain - Likely Hostile | Potentially Bad Traffic |
UDP 192.168.56.101:61950 -> 164.124.101.2:53 | 2023883 | ET DNS Query to a *.top domain - Likely Hostile | Potentially Bad Traffic |
TCP 192.168.56.101:49163 -> 104.21.74.191:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
TCP 192.168.56.101:49170 -> 172.67.148.235:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49172 -> 3.33.130.190:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49171 -> 199.59.243.226:80 | 2031412 | ET MALWARE FormBook CnC Checkin (GET) | Malware Command and Control Activity Detected |
TCP 192.168.56.101:49171 -> 199.59.243.226:80 | 2031088 | ET HUNTING Request to .XYZ Domain with Minimal Headers | Potentially Bad Traffic |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49163 104.21.74.191:443 |
C=US, O=Google Trust Services LLC, CN=GTS CA 1P5 | CN=universalmovies.top | 67:bc:42:10:14:49:13:d3:52:bc:a7:fb:fc:bd:0e:1c:24:be:f9:a6 |
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.liposuctionclinics2.today/btrd/?FrJX9P9=g2Awi9gzMhKdCQNLs5BlCrpPGRTrEfCXfESYZTVa1wMirmNXITW5sw9ZqEJh6Ao16UcXSiJC&Vnt4_=-Z1l70lHPdrDeba | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.home-repair-contractors-kfm.xyz/btrd/?FrJX9P9=eVMlJIJ59eHiVvLGCrdtG7xbZNorDbW6x7q4JZ9YU9WFmkuuB+jImPCwzZVcR1MIE594ENWI&Vnt4_=-Z1l70lHPdrDeba | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.xmentorgroup.com/btrd/?FrJX9P9=UYDnSobXWpXBVkfD89bcJt5KVoSCT9YF2HTPLZC4vkf0xFVelZyjEGpv0zxgTtsO2BXFiI/y&Vnt4_=-Z1l70lHPdrDeba |
request | GET http://www.liposuctionclinics2.today/btrd/?FrJX9P9=g2Awi9gzMhKdCQNLs5BlCrpPGRTrEfCXfESYZTVa1wMirmNXITW5sw9ZqEJh6Ao16UcXSiJC&Vnt4_=-Z1l70lHPdrDeba |
request | GET http://www.home-repair-contractors-kfm.xyz/btrd/?FrJX9P9=eVMlJIJ59eHiVvLGCrdtG7xbZNorDbW6x7q4JZ9YU9WFmkuuB+jImPCwzZVcR1MIE594ENWI&Vnt4_=-Z1l70lHPdrDeba |
request | GET http://www.xmentorgroup.com/btrd/?FrJX9P9=UYDnSobXWpXBVkfD89bcJt5KVoSCT9YF2HTPLZC4vkf0xFVelZyjEGpv0zxgTtsO2BXFiI/y&Vnt4_=-Z1l70lHPdrDeba |
request | GET https://universalmovies.top/nelb.scr |
domain | universalmovies.top | description | Generic top level domain TLD | ||||||
domain | www.h7wlvwr4afx.top | description | Generic top level domain TLD |
file | C:\Users\test22\AppData\Local\Temp\~$nelb.doc |
filetype_details | Rich Text Format data, version 1, unknown character set | filename | nelb.doc |
Lionic | Trojan.MSOffice.ObfsObjDat.3!c |
Cynet | Malicious (score: 99) |
CAT-QuickHeal | Exp.RTF.Obfus.Gen |
Skyhigh | BehavesLike.Trojan.hx |
ALYac | Exploit.RTF-ObfsObjDat.Gen |
VIPRE | Exploit.RTF-ObfsObjDat.Gen |
Arcabit | Exploit.RTF-ObfsObjDat.Gen |
Symantec | Exp.CVE-2017-11882!g6 |
TrendMicro-HouseCall | Trojan.W97M.REMCOS.YXEFYZ |
McAfee | RTFObfustream.c!6B9167056AF4 |
Avast | OLE:CVE-2018-0798 [Expl] |
Kaspersky | HEUR:Exploit.MSOffice.CVE-2018-0802.gen |
BitDefender | Exploit.RTF-ObfsObjDat.Gen |
MicroWorld-eScan | Exploit.RTF-ObfsObjDat.Gen |
Rising | Exploit.Generic!1.EB5C (CLASSIC) |
Emsisoft | Exploit.RTF-ObfsObjDat.Gen (B) |
DrWeb | Exploit.CVE-2018-0798.4 |
TrendMicro | Trojan.W97M.REMCOS.YXEFYZ |
FireEye | Exploit.RTF-ObfsObjDat.Gen |
Ikarus | Exploit.RTF.Doc |
Detected | |
Avira | EXP/AVF.CVE.rulse |
Kingsoft | Win32.Infected.AutoInfector.a |
Gridinsoft | Trojan.U.FormBook.tr |
Microsoft | Exploit:O97M/CVE-2017-11882.A!MTB |
ZoneAlarm | HEUR:Exploit.MSOffice.CVE-2018-0802.gen |
GData | Exploit.RTF-ObfsObjDat.Gen |
Varist | CVE1711882 |
AhnLab-V3 | OLE/Cve-2018-0798.Gen |
Zoner | Probably Heur.RTFObfuscation |
MAX | malware (ai score=82) |
Fortinet | MSOffice/CVE_2018_0798.BOR!exploit |
AVG | OLE:CVE-2018-0798 [Expl] |