Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Aug. 4, 2021, 5:11 p.m. | Aug. 4, 2021, 5:14 p.m. |
-
-
._cache_virus.exe "C:\Users\test22\AppData\Local\Temp\._cache_virus.exe"
1040
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | CODE |
section | DATA |
section | BSS |
packer | BobSoft Mini Delphi -> BoB / BobSoft |
name | RT_ICON | language | LANG_TURKISH | filetype | dBase IV DBT of @.DBF, block length 8192, next free block index 40 | sublanguage | SUBLANG_DEFAULT | offset | 0x000b39f8 | size | 0x000010a8 | ||||||||||||||||||
name | RT_ICON | language | LANG_TURKISH | filetype | dBase IV DBT of @.DBF, block length 8192, next free block index 40 | sublanguage | SUBLANG_DEFAULT | offset | 0x000b39f8 | size | 0x000010a8 | ||||||||||||||||||
name | RT_RCDATA | language | LANG_TURKISH | filetype | Microsoft Excel 2007+ | sublanguage | SUBLANG_DEFAULT | offset | 0x000e2bb8 | size | 0x000047d3 | ||||||||||||||||||
name | RT_RCDATA | language | LANG_TURKISH | filetype | Microsoft Excel 2007+ | sublanguage | SUBLANG_DEFAULT | offset | 0x000e2bb8 | size | 0x000047d3 | ||||||||||||||||||
name | RT_RCDATA | language | LANG_TURKISH | filetype | Microsoft Excel 2007+ | sublanguage | SUBLANG_DEFAULT | offset | 0x000e2bb8 | size | 0x000047d3 | ||||||||||||||||||
name | RT_RCDATA | language | LANG_TURKISH | filetype | Microsoft Excel 2007+ | sublanguage | SUBLANG_DEFAULT | offset | 0x000e2bb8 | size | 0x000047d3 | ||||||||||||||||||
name | RT_RCDATA | language | LANG_TURKISH | filetype | Microsoft Excel 2007+ | sublanguage | SUBLANG_DEFAULT | offset | 0x000e2bb8 | size | 0x000047d3 | ||||||||||||||||||
name | RT_RCDATA | language | LANG_TURKISH | filetype | Microsoft Excel 2007+ | sublanguage | SUBLANG_DEFAULT | offset | 0x000e2bb8 | size | 0x000047d3 | ||||||||||||||||||
name | RT_RCDATA | language | LANG_TURKISH | filetype | Microsoft Excel 2007+ | sublanguage | SUBLANG_DEFAULT | offset | 0x000e2bb8 | size | 0x000047d3 | ||||||||||||||||||
name | RT_RCDATA | language | LANG_TURKISH | filetype | Microsoft Excel 2007+ | sublanguage | SUBLANG_DEFAULT | offset | 0x000e2bb8 | size | 0x000047d3 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_TURKISH | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x000e7418 | size | 0x00000014 | ||||||||||||||||||
name | RT_VERSION | language | LANG_TURKISH | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x000e742c | size | 0x00000304 |
file | C:\Users\test22\AppData\Local\Temp\._cache_virus.exe |
cmdline | schtasks.exe /Create /TN wininit /ru SYSTEM /SC ONSTART /TR "C:\Users\test22\AppData\Local\Temp\._cache_virus.exe" |
cmdline | schtasks.exe /Create /TN wininit /ru SYSTEM /SC ONSTART /TR "C:\Users\test22\AppData\Local\Temp\._cache_virus.exe" |
reg_key | HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver | reg_value | C:\ProgramData\Synaptics\Synaptics.exe | ||||||
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\wininit | reg_value | C:\Users\test22\AppData\Local\Temp\._cache_virus.exe | ||||||
cmdline | schtasks.exe /Create /TN wininit /ru SYSTEM /SC ONSTART /TR "C:\Users\test22\AppData\Local\Temp\._cache_virus.exe" |
cmdline | schtasks.exe /Create /TN wininit /ru SYSTEM /SC ONSTART /TR "C:\Users\test22\AppData\Local\Temp\._cache_virus.exe" |
Bkav | W32.FamVT.GaionLTK.Trojan |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Dropped:Application.Agent.JUC |
CAT-QuickHeal | Sus.Nocivo.E0011 |
Qihoo-360 | HEUR/QVM41.1.06A5.Malware.Gen |
McAfee | GenericRXOW-IL!ACA0004A4766 |
Cylance | Unsafe |
Zillya | Trojan.Delf.Win32.76144 |
Sangfor | Win.Malware.Delf-6899401-0 |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Dropped:Application.Agent.JUC |
K7GW | Trojan ( 000112511 ) |
K7AntiVirus | Trojan ( 000112511 ) |
Arcabit | HEUR.VBA.Trojan.d |
Cyren | W32/Backdoor.OAZM-5661 |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | Win32/Delf.NBX |
APEX | Malicious |
ClamAV | Win.Malware.Delf-6899401-0 |
Kaspersky | Backdoor.Win32.DarkKomet.hqxy |
NANO-Antivirus | Trojan.Win32.DarkKomet.fazbwq |
ViRobot | Win32.Zorex.A |
Avast | Win32:Trojan-gen |
Tencent | Virus.Win32.DarkKomet.a |
Ad-Aware | Dropped:Application.Agent.JUC |
Emsisoft | Dropped:Application.Agent.JUC (B) |
Comodo | Virus.Win32.Agent.DE@74b38h |
F-Secure | Trojan:W97M/MaliciousMacro.GEN |
DrWeb | Trojan.DownLoader22.9658 |
VIPRE | BehavesLike.Win32.Malware.eah (mx-v) |
TrendMicro | Virus.Win32.NAPWHICH.B |
McAfee-GW-Edition | BehavesLike.Win32.Generic.dh |
FireEye | Generic.mg.aca0004a4766b519 |
Sophos | Troj/DocDl-JJH |
Ikarus | Trojan-Downloader.VBA.Agent |
Jiangmin | Win32/Synaptics.Gen |
Webroot | W32.Malware.gen |
Avira | DR/Delphi.Gen |
MAX | malware (ai score=77) |
Antiy-AVL | Trojan/Generic.ASMalwS.301B962 |
Gridinsoft | Malware.Win32.Gen.sm!s1 |
Microsoft | Worm:Win32/AutoRun!atmn |
SUPERAntiSpyware | Adware.FileTour/Variant |
ZoneAlarm | Backdoor.Win32.DarkKomet.hqxy |
GData | Win32.Backdoor.Agent.AXS |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Win32/Zorex.X1799 |
Acronis | suspicious |
VBA32 | TScope.Trojan.Delf |
ALYac | Dropped:Application.Agent.JUC |