Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | July 23, 2021, 9:20 a.m. | July 23, 2021, 9:31 a.m. |
-
EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" C:\Users\test22\AppData\Local\Temp\0722_7087881301.xls
2084
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook |
Elastic | malicious (high confidence) |
MicroWorld-eScan | VB:Trojan.Valyria.5086 |
K7AntiVirus | Trojan ( 00563a341 ) |
K7GW | Trojan ( 00563a341 ) |
Kaspersky | HEUR:Trojan-Dropper.Script.Generic |
BitDefender | VB:Trojan.Valyria.5086 |
NANO-Antivirus | Trojan.Ole2.Vbs-heuristic.druvzi |
Ad-Aware | VB:Trojan.Valyria.5086 |
TACHYON | Suspicious/W97.NS.Gen |
TrendMicro | HEUR_VBA.DE |
FireEye | VB:Trojan.Valyria.5086 |
Emsisoft | VB:Trojan.Valyria.5086 (B) |
GData | VB:Trojan.Valyria.5086 |
Antiy-AVL | Trojan/Generic.ASDOH.5A |
ZoneAlarm | HEUR:Trojan-Dropper.Script.Generic |
Microsoft | Trojan:Script/Wacatac.B!ml |
MAX | malware (ai score=89) |
Fortinet | VBA/Agent.1371!tr |
parent_process | excel.exe | martian_process | "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /Embedding |