Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | April 2, 2021, 10:34 a.m. | April 2, 2021, 10:50 a.m. |
-
cmd.exe "C:\Windows\System32\cmd.exe" /c start /wait "DmyyiNE" C:\Users\test22\AppData\Local\Temp\last.sct
3804-
notepad.exe "C:\Windows\system32\NOTEPAD.EXE" "C:\Users\test22\AppData\Local\Temp\last.sct"
3872
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
172.217.25.14 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
description | Take screenshot | rule | screenshot | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect system token | rule | win_token | ||||||
description | Affect private profile | rule | win_files_operation | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
host | 172.217.25.14 |
DrWeb | Trojan.MulDrop16.37703 |
ESET-NOD32 | JS/TrojanDropper.Agent.OFU |
ClamAV | Xml.Malware.Squiblydoo-6728833-0 |
Kaspersky | HEUR:Trojan.Script.Generic |
NANO-Antivirus | Trojan.Script.Heuristic-js.iacgm |
F-Secure | Malware.HTML/Crypted.Gen |
Baidu | VBS.Trojan-Dropper.Agent.ap |
McAfee-GW-Edition | BehavesLike.HTML.Dropper.dr |
Avira | HTML/Crypted.Gen |
Microsoft | Exploit:Win32/ShellCode!ml |
ZoneAlarm | HEUR:Trojan.Script.Generic |
Cynet | Malicious (score: 85) |
Rising | Dropper.Agent/JS!1.D49D (CLASSIC) |