Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Sept. 8, 2021, 9:57 a.m. | Sept. 8, 2021, 10:03 a.m. |
-
-
schtasks.exe /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\test22\AppData\Roaming\Microsoft\Network\sihost.exe"
1304
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | |
section | .imports |
section | .themida |
section | .boot |
section | {u'size_of_data': u'0x000007fa', u'virtual_address': u'0x00001000', u'entropy': 7.8866421692714015, u'name': u' ', u'virtual_size': u'0x00001114'} | entropy | 7.88664216927 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00000628', u'virtual_address': u'0x00003000', u'entropy': 7.832459288642404, u'name': u' ', u'virtual_size': u'0x00000c7e'} | entropy | 7.83245928864 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x00000243', u'virtual_address': u'0x00005000', u'entropy': 7.245576003242629, u'name': u' ', u'virtual_size': u'0x00000244'} | entropy | 7.24557600324 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x004ea345', u'virtual_address': u'0x007e2000', u'entropy': 7.952489186035007, u'name': u'.boot', u'virtual_size': u'0x004ea400'} | entropy | 7.95248918604 | description | A section with a high entropy has been found | |||||||||
entropy | 0.991828160617 | description | Overall entropy of this PE file is high |
cmdline | /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\test22\AppData\Roaming\Microsoft\Network\sihost.exe" |
registry | HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion |
registry | HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion |
registry | HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ |
Bkav | W32.AIDetect.malware2 |
Lionic | Trojan.Win32.Razy.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Razy.639372 |
ALYac | Gen:Variant.Razy.639372 |
Cylance | Unsafe |
CrowdStrike | win/malicious_confidence_100% (W) |
K7GW | Trojan ( 00581f971 ) |
K7AntiVirus | Trojan ( 00581f971 ) |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of Generik.GVKCOWR |
APEX | Malicious |
Paloalto | generic.ml |
Kaspersky | Trojan.Win32.Tasker.aqzs |
BitDefender | Gen:Variant.Razy.639372 |
Avast | Win32:Trojan-gen |
Ad-Aware | Gen:Variant.Razy.639372 |
Emsisoft | Gen:Variant.Razy.639372 (B) |
Comodo | TrojWare.Win32.UMal.fxeug@0 |
McAfee-GW-Edition | BehavesLike.Win32.Trojan.rc |
FireEye | Generic.mg.1a077c94c3eb2f09 |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Malicious PE |
GData | Gen:Variant.Razy.639372 |
Webroot | W32.Trojan.Gen |
Gridinsoft | Trojan.Win32.Generic.oa |
Arcabit | Trojan.Razy.D9C18C |
ZoneAlarm | Trojan.Win32.Tasker.aqzs |
Microsoft | Trojan:Script/Phonzy.C!ml |
Cynet | Malicious (score: 100) |
McAfee | Artemis!1A077C94C3EB |
MAX | malware (ai score=84) |
Malwarebytes | Trojan.Clipper |
Rising | Trojan.Generic@ML.100 (RDMK:Q6kAMZAztWZ5fcvkAXm9Rg) |
Ikarus | Trojan.SuspectCRC |
eGambit | Unsafe.AI_Score_99% |
Fortinet | W32/PossibleThreat |
BitDefenderTheta | AI:Packer.9E4C6E451F |
AVG | Win32:Trojan-gen |
Panda | Trj/CI.A |