NetWork | ZeroBOX

Network Analysis

IP Address Status Action
152.195.38.76 Active Moloch
164.124.101.2 Active Moloch
173.222.248.74 Active Moloch
185.25.60.13 Active Moloch
195.130.214.155 Active Moloch
23.40.45.184 Active Moloch
52.109.124.190 Active Moloch
52.111.227.14 Active Moloch
52.113.194.132 Active Moloch
GET 200 http://185.25.60.13:8080/distr/components/deploy-mso.ver
REQUEST
RESPONSE
GET 200 http://185.25.60.13:8080/distr/components/deploy-mso.ver
REQUEST
RESPONSE
GET 200 http://185.25.60.13:8080/distr/components/deploy-mso.dst
REQUEST
RESPONSE
GET 200 http://185.25.60.13:8080/distr/components/deploy-mso.dst
REQUEST
RESPONSE
GET 200 http://cacerts.digicert.com/DigiCertGlobalRootG2.crt
REQUEST
RESPONSE
HEAD 200 http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v64.cab
REQUEST
RESPONSE
HEAD 200 http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v64.cab
REQUEST
RESPONSE
GET 206 http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v64.cab
REQUEST
RESPONSE
HEAD 200 http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v64.cab
REQUEST
RESPONSE
GET 200 http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v64.cab
REQUEST
RESPONSE
GET 200 http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
REQUEST
RESPONSE
GET 200 http://crl.microsoft.com/pki/crl/products/MicCodSigPCA_2010-07-06.crl
REQUEST
RESPONSE
GET 200 http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
REQUEST
RESPONSE
GET 200 http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl
REQUEST
RESPONSE
HEAD 200 http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v64_16.0.14332.20791.cab
REQUEST
RESPONSE
HEAD 200 http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v64_16.0.14332.20303.cab
REQUEST
RESPONSE
HEAD 200 http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v64_16.0.14332.20303.cab
REQUEST
RESPONSE
GET 206 http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v64_16.0.14332.20303.cab
REQUEST
RESPONSE
HEAD 200 http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v64_16.0.14332.20303.cab
REQUEST
RESPONSE
GET 200 http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v64_16.0.14332.20303.cab
REQUEST
RESPONSE
HEAD 200 http://officecdn.microsoft.com/pr/5030841d-c919-4594-8d2d-84ae4f96e58e/Office/Data/v32.cab
REQUEST
RESPONSE
GET 200 http://195.130.214.155:8080/logUserActivity.php?u=3FE1525F8E2065C102140EB6C463BC5D&t=1729181842&m=common&a=run_Component:%20deploy-mso%20(pid%20=%201603)
REQUEST
RESPONSE

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49163 -> 185.25.60.13:8080 2008350 ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile Potential Corporate Privacy Violation
TCP 192.168.56.103:49165 -> 185.25.60.13:8080 2008350 ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile Potential Corporate Privacy Violation
TCP 192.168.56.103:49163 -> 185.25.60.13:8080 2008350 ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile Potential Corporate Privacy Violation
TCP 192.168.56.103:49163 -> 185.25.60.13:8080 2008350 ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile Potential Corporate Privacy Violation
TCP 185.25.60.13:8080 -> 192.168.56.103:49165 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.25.60.13:8080 -> 192.168.56.103:49165 2008438 ET MALWARE Possible Windows executable sent when remote host claims to send a Text File A Network Trojan was detected
TCP 185.25.60.13:8080 -> 192.168.56.103:49165 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 192.168.56.103:49171 -> 52.111.227.14:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49179 -> 52.109.124.190:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49180 -> 52.109.124.190:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49178 -> 52.109.124.190:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49172 -> 52.113.194.132:443 906200022 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49192 -> 195.130.214.155:8080 2008350 ET POLICY Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile Potential Corporate Privacy Violation
TCP 185.25.60.13:8080 -> 192.168.56.103:49163 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 185.25.60.13:8080 -> 192.168.56.103:49163 2008438 ET MALWARE Possible Windows executable sent when remote host claims to send a Text File A Network Trojan was detected
TCP 185.25.60.13:8080 -> 192.168.56.103:49163 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.103:49171
52.111.227.14:443
C=US, O=Microsoft Corporation, CN=Microsoft Azure RSA TLS Issuing CA 08 C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=nexusrules.officeapps.live.com 77:cd:ad:85:c4:22:05:fc:29:52:25:2e:5f:93:84:61:cd:0f:2b:26
TLS 1.2
192.168.56.103:49179
52.109.124.190:443
C=US, O=Microsoft Corporation, CN=Microsoft Azure RSA TLS Issuing CA 03 C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=mrodevicemgr.officeapps.live.com 6b:a3:4c:fa:eb:6a:87:c6:1b:da:fc:77:c8:2c:29:8c:66:17:14:96
TLS 1.2
192.168.56.103:49180
52.109.124.190:443
C=US, O=Microsoft Corporation, CN=Microsoft Azure RSA TLS Issuing CA 03 C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=mrodevicemgr.officeapps.live.com 6b:a3:4c:fa:eb:6a:87:c6:1b:da:fc:77:c8:2c:29:8c:66:17:14:96
TLS 1.2
192.168.56.103:49178
52.109.124.190:443
C=US, O=Microsoft Corporation, CN=Microsoft Azure RSA TLS Issuing CA 03 C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=mrodevicemgr.officeapps.live.com 6b:a3:4c:fa:eb:6a:87:c6:1b:da:fc:77:c8:2c:29:8c:66:17:14:96
TLS 1.2
192.168.56.103:49172
52.113.194.132:443
C=US, O=Microsoft Corporation, CN=Microsoft Azure RSA TLS Issuing CA 03 C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=ecs.office.com e6:c0:ff:d8:a6:41:8f:1f:de:e2:1b:3b:90:b8:4e:4b:7b:e9:08:0d

Snort Alerts

No Snort Alerts