Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | April 28, 2021, 7:39 a.m. | April 28, 2021, 7:42 a.m. |
-
-
cmd.exe cmd.exe /c echo NGAtoDgLpvgJwPLEPFdj>"C:\Users\test22\AppData\Local\Temp\DEMFE9C.tmp"&exit
232
-
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
suspicious_features | POST method with no referer header | suspicious_request | POST http://dimentos.com/btn_bg |
request | GET http://dimentos.com/bg |
request | POST http://dimentos.com/btn_bg |
request | POST http://dimentos.com/btn_bg |
description | 195145.exe tried to sleep 209 seconds, actually delayed analysis time by 209 seconds |
cmdline | cmd.exe /c echo NGAtoDgLpvgJwPLEPFdj>"C:\Users\test22\AppData\Local\Temp\DEMFE9C.tmp"&exit |
host | 172.217.25.14 | |||
host | 192.99.178.145 |
file | C:\Users\test22\AppData\Local\Temp\DEMFE9C.tmp |
Elastic | malicious (high confidence) |
FireEye | Generic.mg.5b5a730628dc9eba |
Cylance | Unsafe |
Symantec | Trojan.Gen.2 |
Paloalto | generic.ml |
Kaspersky | HEUR:Trojan.Win32.Cobalt.vho |
TrendMicro | Trojan.Win64.SMOKELOADER.SM |
Webroot | W32.Malware.Gen |
TrendMicro-HouseCall | Trojan.Win64.SMOKELOADER.SM |
Rising | Trojan.Cobalt!8.C4EF (CLOUD) |