Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | April 3, 2025, 9:57 a.m. | April 3, 2025, 9:59 a.m. |
-
wscript.exe "C:\Windows\System32\wscript.exe" C:\Users\test22\AppData\Local\Temp\Adobe.vbs
2556
Name | Response | Post-Analysis Lookup |
---|---|---|
dat-voip-sit-cio.trycloudflare.com | 104.16.231.132 |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.101:59002 -> 164.124.101.2:53 | 2034552 | ET POLICY Observed DNS Query to Commonly Abused Cloudflare Domain (trycloudflare .com) | Potentially Bad Traffic |
TCP 192.168.56.101:49161 -> 104.16.230.132:443 | 2058175 | ET HUNTING TryCloudFlare Domain in TLS SNI | Misc activity |
TCP 192.168.56.101:49161 -> 104.16.230.132:443 | 2060250 | ET INFO Observed trycloudflare .com Domain in TLS SNI | Misc activity |
TCP 192.168.56.101:49161 -> 104.16.230.132:443 | 906200054 | SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) | undefined |
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.101:49161 104.16.230.132:443 |
C=US, O=Google Trust Services, CN=WR1 | CN=trycloudflare.com | c1:f5:d9:f4:2e:e4:62:4a:93:1f:06:f7:a0:22:d4:38:59:bf:bd:94 |
request | GET https://dat-voip-sit-cio.trycloudflare.com/shell.ps1 |
Skyhigh | BehavesLike.VBS.Dropper.zp |
Sangfor | Malware.Generic-Script.Save.d1d20a66 |
ESET-NOD32 | VBS/TrojanDownloader.Agent.ABVR |
Kaspersky | HEUR:Trojan.VBS.Alien.gen |
Rising | Downloader.Agent/VBS!8.10EA5 (TOPIS:E0:dnjkLnnaHyD) |
Ikarus | Win32.Outbreak |
Microsoft | Trojan:VBS/Obfuse.ZDO!MTB |