Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | April 2, 2021, 4:13 p.m. | April 2, 2021, 4:15 p.m. |
-
cmd.exe "C:\Windows\System32\cmd.exe" /c start /wait "xwrnZovaBGfrxEn" C:\Users\test22\AppData\Local\Temp\czech.sct
2388-
notepad.exe "C:\Windows\system32\NOTEPAD.EXE" "C:\Users\test22\AppData\Local\Temp\czech.sct"
2244
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
Baidu | VBS.Trojan-Dropper.Agent.ap |
ESET-NOD32 | JS/TrojanDropper.Agent.OFU |
ClamAV | Xml.Malware.Squiblydoo-6728833-0 |
Kaspersky | HEUR:Trojan.Script.Generic |
NANO-Antivirus | Trojan.Script.Heuristic-js.iacgm |
Avira | HTML/Crypted.Gen |
Microsoft | Exploit:Win32/ShellCode!ml |
Cynet | Malicious (score: 85) |
Rising | Dropper.Agent/JS!1.D49D (CLASSIC) |
description | Take screenshot | rule | screenshot | ||||||
description | Affect system registries | rule | win_registry | ||||||
description | Affect system token | rule | win_token | ||||||
description | Affect private profile | rule | win_files_operation | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |