Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Sept. 9, 2021, 8:51 a.m. | Sept. 9, 2021, 8:53 a.m. |
-
WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Office15\WINWORD.EXE" C:\Users\test22\AppData\Local\Temp\taSPcCva.rtf
2340
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
Arcabit | VB:Trojan.Valyria.D13CF |
Kaspersky | HEUR:Trojan-Downloader.Script.Generic |
BitDefender | VB:Trojan.Valyria.5071 |
NANO-Antivirus | Trojan.Script.Vbs-heuristic.druvzi |
MicroWorld-eScan | VB:Trojan.Valyria.5071 |
Ad-Aware | VB:Trojan.Valyria.5071 |
Emsisoft | VB:Trojan.Valyria.5071 (B) |
McAfee-GW-Edition | BehavesLike.HTML.Dropper.lq |
FireEye | VB:Trojan.Valyria.5071 |
MAX | malware (ai score=86) |
GData | VB:Trojan.Valyria.5071 |
ALYac | VB:Trojan.Valyria.5071 |
Yandex | HTML.Psyme.Gen |
Ikarus | Trojan.VB.Valyria |
Fortinet | VBS/Agent.CF7B!tr |