Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Sept. 2, 2021, 6:18 p.m. | Sept. 2, 2021, 6:20 p.m. |
-
WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Office15\WINWORD.EXE" C:\Users\test22\AppData\Local\Temp\who_template.doc
2324
Name | Response | Post-Analysis Lookup |
---|---|---|
appmedicine.whoint.cf |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
UDP 192.168.56.103:53893 -> 164.124.101.2:53 | 2025107 | ET INFO DNS Query for Suspicious .cf Domain | Potentially Bad Traffic |
Suricata TLS
No Suricata TLS
file | C:\Users\test22\AppData\Local\Temp\~$o_template.doc |
Lionic | Trojan.Script.Generic.a!c |
Elastic | malicious (high confidence) |
ALYac | Trojan.Downloader.DOC.Gen |
Symantec | Trojan.Gen.NPE |
ESET-NOD32 | a variant of VBA/TrojanDownloader.Agent.WER |
Avast | SNH:Script [Dropper] |
Kaspersky | UDS:DangerousObject.Multi.Generic |
NANO-Antivirus | Trojan.Ole2.Vbs-heuristic.druvzi |
ViRobot | DOC.Z.Agent.355328.A |
Tencent | Heur.MSWord.Downloader.d |
DrWeb | W97M.DownLoader.2988 |
VIPRE | LooksLike.Macro.Malware.gen!d1 (v) |
McAfee-GW-Edition | BehavesLike.OLE2.Downloader.fb |
ZoneAlarm | HEUR:Trojan-Downloader.Script.Generic |
Microsoft | Trojan:O97M/Sadoca.C!ml |
TACHYON | Suspicious/W97M.Downloader.Gen |
Rising | Heur.Macro.Downloader.f (CLASSIC) |
SentinelOne | Static AI - Malicious OLE |
Fortinet | VBA/Agent.0CB3!tr |
AVG | SNH:Script [Dropper] |