Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | July 13, 2021, 1:17 p.m. | July 13, 2021, 1:20 p.m. |
-
WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" "C:\Users\test22\AppData\Local\Temp\FBR Circular.docx"
2552
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
file | C:\Users\test22\AppData\Local\Temp\~$R Circular.docx |
DrWeb | Trojan.DownLoader40.31702 |
ALYac | Trojan.Downloader.DOC.Gen |
Alibaba | TrojanDownloader:Office/Generic.9fe1849e |
Arcabit | Exploit.OLE.Gen.1 |
Cyren | Trojan.OPRY-5 |
Symantec | Trojan.Gen.NPE |
ESET-NOD32 | DOC/TrojanDropper.Agent.VF |
TrendMicro-HouseCall | TROJ_FRS.VSNW0BG21 |
Avast | Other:Malware-gen [Trj] |
Cynet | Malicious (score: 99) |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Exploit.OLE.Gen.1 |
NANO-Antivirus | Trojan.Script.Vbs-heuristic.druvzi |
ViRobot | DOC.Z.Agent.659241 |
MicroWorld-eScan | Exploit.OLE.Gen.1 |
Ad-Aware | Exploit.OLE.Gen.1 |
Emsisoft | Exploit.OLE.Gen.1 (B) |
TrendMicro | TROJ_FRS.VSNW0BG21 |
McAfee-GW-Edition | RDN/Generic Downloader.x |
FireEye | Exploit.OLE.Gen.1 |
GData | Exploit.OLE.Gen.1 |
Avira | TR/Dldr.Script.fhdip |
MAX | malware (ai score=84) |
Microsoft | Trojan:Script/Wacatac.B!ml |
McAfee | RDN/Generic Downloader.x |
Rising | Downloader.Agent/VBS!1.A537 (CLASSIC) |
Ikarus | Exploit.OLE |
Fortinet | VBS/Agent.VRO!tr.dldr |
AVG | Other:Malware-gen [Trj] |
Panda | JS/Psyme.gen |
Qihoo-360 | virus.vbs.down.d |