Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Nov. 3, 2021, 9:26 a.m. | Nov. 3, 2021, 9:49 a.m. |
-
9313_1635861230_7991.exe "C:\Users\test22\AppData\Local\Temp\9313_1635861230_7991.exe"
2312
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\wafatasu76 zecawuroyunuw\hayokesurey\kidocoza.pdb |
section | .xobolaw |
resource name | AFX_DIALOG_LAYOUT |
resource name | None |
name | RT_ICON | language | LANG_LATVIAN | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x000a11e0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_LATVIAN | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x000a11e0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_LATVIAN | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x000a11e0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_LATVIAN | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x000a11e0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_LATVIAN | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x000a11e0 | size | 0x00000468 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_LATVIAN | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x000a1648 | size | 0x0000004c |
section | {u'size_of_data': u'0x00089a00', u'virtual_address': u'0x00001000', u'entropy': 7.971108533072988, u'name': u'.text', u'virtual_size': u'0x00089880'} | entropy | 7.97110853307 | description | A section with a high entropy has been found | |||||||||
entropy | 0.906172839506 | description | Overall entropy of this PE file is high |
Bkav | W32.AIDetect.malware1 |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Jaik.49038 |
FireEye | Generic.mg.faa81ed90ab9f9d0 |
McAfee | Artemis!FAA81ED90AB9 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
K7GW | Hacktool ( 700007861 ) |
Cybereason | malicious.98b372 |
BitDefenderTheta | Gen:NN.ZexaF.34236.Mu0@aWA6TFiI |
Cyren | W32/Kryptik.FOQ.gen!Eldorado |
Symantec | Trojan.Gen.2 |
ESET-NOD32 | a variant of Win32/Kryptik.HNEC |
APEX | Malicious |
Kaspersky | UDS:Trojan.Win32.Chapak.gen |
BitDefender | Gen:Variant.Jaik.49038 |
Avast | Win32:TrojanX-gen [Trj] |
Rising | Malware.Heuristic!ET#98% (RDMK:cmRtazqAsyg6+Eesyu+638mtAZJI) |
Ad-Aware | Gen:Variant.Jaik.49038 |
Emsisoft | Trojan.Crypt (A) |
McAfee-GW-Edition | BehavesLike.Win32.Drixed.jc |
Sophos | Mal/Generic-R + Troj/Krypt-BO |
SentinelOne | Static AI - Malicious PE |
MaxSecure | Trojan.Malware.300983.susgen |
MAX | malware (ai score=85) |
Microsoft | Trojan:Win32/Racealer.HA!MTB |
GData | Win32.Trojan-Stealer.PSWSteal.UDJOUL |
Cynet | Malicious (score: 100) |
Acronis | suspicious |
VBA32 | Malware-Cryptor.2LA.gen |
Malwarebytes | Trojan.MalPack.GS |
Ikarus | Trojan.Win32.Crypt |
eGambit | Unsafe.AI_Score_99% |
Fortinet | PossibleThreat.PALLASNET.H |
AVG | Win32:TrojanX-gen [Trj] |
Panda | Trj/Genetic.gen |
CrowdStrike | win/malicious_confidence_100% (D) |