34.131.9.88
Open in
urlscan Pro
34.131.9.88
Public Scan
URL:
http://34.131.9.88/other/conti-ransomware/general.html
Submission: On February 21 via manual from ES — Scanned from ES
Submission: On February 21 via manual from ES — Scanned from ES
Form analysis
0 forms found in the DOMText Content
OVERVIEW GENERAL General Details Reputation Details ENTRY POINT Summary Complete REMEDIATION BUSINESS IMPACT SUSPICIOUS ACTIVITY Mitre ATT&CK™ Matrix Suspicious Events Network Events INCIDENT DETAILS Tree Tree Timeline Script/Shortcut Content ATTACK INFORMATION RANSOMWARE-TEST: 7ac15031-536d-4e2c-99e1-411b3bc9c005 backdoor bot ransomware trojan Malware Family: GENERAL DETAILS RANSOMWARE-TEST: 7ac15031-536d-4e2c-99e1-411b3bc9c005 Incident ID: 7ac15031-536d-4e2c-99e1-411b3bc9c005 Analysis Time: 8/30/2022, 8:12:20 PM Client Version: 86.60.0185 PC Name: RANSOMWARE-TEST Machine Type: Server OS: Windows Server 2016 Machine Roles: Microsoft-Windows-Server-Core-Package-DisplayName, .NET Framework 4.8 Features, .NET Framework 4.8, WCF Services, TCP Port Sharing, Windows PowerShell, Windows PowerShell, Key Distribution Service PowerShell Cmdlets, Trusted Platform Module Service PowerShell Cmdlets, Windows PowerShell 2.0 Engine, TLS Session Ticket Key Commands, Microsoft Windows ServerCore Foundational PowerShell Cmdlets, Microsoft Windows ServerCore WOW64, Windows Server Print Client, Windows Server Print Client Management UI, Media Features, Windows Media Player, Microsoft XPS Document Writer, SMB Direct, Microsoft Defender Antivirus, Microsoft Print to PDF, XPS Viewer, Windows Server Backup SnapIn, Server Drivers, Server Printer Drivers, Microsoft-Windows-Server-Shell-Package-DisplayName, Internet Explorer 11, Microsoft-Windows-Server-Gui-Mgmt-Package-DisplayName, Root node for feature RSAT tools, Windows Search, Server Core non-critical fonts - (Fonts-MinConsoleFonts)., Server Core non-critical fonts - (Fonts-BitmapFonts)., Server Core non-critical fonts - (Font-TrueTypeFonts)., Server Core non-critical fonts - (Fonts-UAPFonts)., Server Core non-critical fonts components - (Fonts-Support)., Server Core Drivers, Server Core WOW64 Drivers, System Data Archiver Domain: Forensics Version: 8.68.66.48 IP Address: 10.160.0.10 User Name: RANSOMWARE-TEST\ransomware User SID: S-1-5-21-1769506388-3596128238-2562460177-1000 Logon Time: 12/31/1969, 11:59:59 PM Logon Type: Local Remote PC: N/A Remote IP: N/A DETECTION DETAILS RANSOMWARE-TEST: 7ac15031-536d-4e2c-99e1-411b3bc9c005 Description: Dummypots files have been modified, that indicate ransomware activity Protection Name: ransomware.win.honey Trigger Matched: c:\users\ransomware\downloads\b14cde376a8a7a9d7ad34cdfd07108c132ad8be7f60c5c0a0f17b6b63eb28b49.exe Trigger Time: 8/30/2022, 8:10:10 PM Trigger Actual: PID: 2200, Creation Time: 1661886385501 Trigger Type: Process Trigger Process: c:\users\ransomware\downloads\b14cde376a8a7a9d7ad34cdfd07108c132ad8be7f60c5c0a0f17b6b63eb28b49.exe Trigger PID: 2200 Trigger Args: Trigger App: Endpoint Anti-Ransomware Trigger Rep: Malicious Trigger MD5: 1acdaba338e67c748e56aa81a27a9831 Mode: Prevent Confidence: High Severity: High EMAIL DETAILS RANSOMWARE-TEST: 7ac15031-536d-4e2c-99e1-411b3bc9c005 Attachment: N/A - Could not be traced back to an email Subject: Email ID: From: To: ATTACK STATS RANSOMWARE-TEST: 7ac15031-536d-4e2c-99e1-411b3bc9c005 0 remote (RDP) logons 0 malicious connections 0 suspicious connections 1 unclassified connections 1 malicious processes 0 suspicious processes 0 unclassified processes 1 unsigned processes 0 script processes 5 windows os processes 1 malicious files 0 suspicious files