Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | March 8, 2025, noon | March 8, 2025, 12:04 p.m. |
-
3158e964-6e73-4443-84f8-ddb304d57b87.exe "C:\Users\test22\AppData\Local\Temp\3158e964-6e73-4443-84f8-ddb304d57b87.exe"
872
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 91.240.118.49:443 -> 192.168.56.103:49166 | 2400011 | ET DROP Spamhaus DROP Listed Traffic Inbound group 12 | Misc Attack |
TCP 192.168.56.103:49162 -> 104.168.28.10:80 | 2022550 | ET MALWARE Possible Malicious Macro DL EXE Feb 2016 | A Network Trojan was detected |
TCP 192.168.56.103:49162 -> 104.168.28.10:80 | 2016141 | ET INFO Executable Download from dotted-quad Host | Potentially Bad Traffic |
TCP 91.240.118.49:443 -> 192.168.56.103:49165 | 2029340 | ET INFO TLS Handshake Failure | Potentially Bad Traffic |
TCP 104.168.28.10:80 -> 192.168.56.103:49162 | 2018959 | ET POLICY PE EXE or DLL Windows file download HTTP | Potential Corporate Privacy Violation |
TCP 104.168.28.10:80 -> 192.168.56.103:49162 | 2021076 | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
section | "\x16 YR\x16 |
section | b.b bb |
section | b\x08b\x00S |
resource name | None |
suspicious_features | Connection to IP address | suspicious_request | GET http://104.168.28.10/001.exe |
request | GET http://104.168.28.10/001.exe |
file | C:\Users\test22\AppData\Local\Temp\GuardFox\d80e7f8c-43af-449d-82b5-03e6fe6216a2.exe |
file | C:\Users\test22\AppData\Local\Temp\GuardFox\071576b5-62b3-15bd-8b9d-019573fc18cc.exe |