""ET TROJAN Possible Malicious Macro DL EXE Feb 2016 (WinHTTPRequest)""
SID: 2022658
Revision: 5
Class Type: trojan-activity
Metadata: created_at 2016_03_24, updated_at 2022_05_03, reviewed_at 2024_04_16
Reference:
Protocol: tcp
Source Network: $HOME_NET
Source Port: any
Destination Network: $EXTERNAL_NET
Destination Port: $HTTP_PORTS
Flow: established,to_server
Contents:
-
Value: "GET"
-
Value: ".exe"
-
Value: "WinHttp.WinHttpRequest."
-
Value: !"download.nai.com|0d 0a|"
Within:
PCRE: "/(?:\/(?:(?:p(?:lugins\/content\/vote\/.ssl\/[a-z0-9]|a(?:nel\/includes\/[^\x2f]+|tric)|osts?\/[a-z0-9]+|rogcicicic)|s(?:ystem\/(?:logs|engine)\/[^\x2f]+?|e(?:rv(?:au|er)|ct)|gau\/.?|alam|ucks|can|ke)|(?=[a-z][0-9])(?=[0-9][a-z])(?!setup\d+.exe$)[a-z0-9]{5,10}|a(?:d(?:min\/images\/\w+|obe)|salam|live|us)|m(?:edia\/files\/\w+|a(?:cros?|rch)|soffice)|d(?:o(?:c(?:\/[a-z0-9]+)?|ne)|bust)|(?:~.+?\/.[^\x2f]+|.css)\/.+?|in(?:voice\/[^\x2f]+|fos?)|c(?:onfig|hris|alc)|u(?:swinz\w+|pdate)|xml\/load\/[^\x2f]+|(?:[Dd]ocumen|ve)t|Ozonecrytedserver|w(?:or[dk]|insys)|t(?:mp\/.+?|est)|fa(?:cture|soo)|n(?:otepad|ach)|k(?:be|ey|is)|ArfBtxz|office|yhaooo|[a-z]|etna|link|\d+).exe$|(?:(?=[a-z0-9]?[3456789][a-z0-9]?[3456789])(?=[a-z0-9]?[h-z])[a-z0-9]{3,31}+|PasswordRecovery|RemoveWAT|Dejdisc|Host\d+|Msword).exe)|(?:^\/(?:image\/.+?\/[^\x2f]+|x\/setup)|keem).exe$)/Ui"
Special Options:
-
http_method
-
http_uri
-
nocase
-
http_header
-
http_header