Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Nov. 5, 2021, 10:56 a.m. | Nov. 5, 2021, 11 a.m. |
-
autosubplayer.exe "C:\Users\test22\AppData\Local\Temp\autosubplayer.exe"
2776
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | .ndata |
file | C:\Users\test22\AppData\Local\Temp\nsuE198.tmp\System.dll |
file | C:\Users\test22\AppData\Local\Temp\nsuE198.tmp\nsDialogs.dll |
file | C:\Users\test22\AppData\Local\Temp\nsuE198.tmp\System.dll |
file | C:\Users\test22\AppData\Local\Temp\nsuE198.tmp\nsDialogs.dll |
section | {u'size_of_data': u'0x00006a00', u'virtual_address': u'0x0000b000', u'entropy': 7.299408808107717, u'name': u'.rdata', u'virtual_size': u'0x000069d8'} | entropy | 7.29940880811 | description | A section with a high entropy has been found |
Elastic | malicious (high confidence) |
FireEye | Application.Bundler.CSZ |
McAfee | Artemis!7AD11140CB49 |
Cyren | W32/NSIS_Bitser.A.gen!Eldorado |
ESET-NOD32 | NSIS/TrojanDownloader.Agent.NZP |
Kaspersky | HEUR:Trojan-Downloader.Win32.Bitser.gen |
BitDefender | Application.Bundler.CSZ |
Rising | Trojan.PSRunner/NSIS!1.D5F9 (CLASSIC) |
DrWeb | Trojan.Wdfload.508 |
McAfee-GW-Edition | BehavesLike.Win32.Dropper.rc |
Emsisoft | Application.Bundler.CSZ (B) |
Jiangmin | Trojan.MSIL.aguec |
Avira | HEUR/AGEN.1138824 |
Microsoft | Trojan:Win32/Sabsik.FL.B!ml |
GData | Application.Bundler.CSZ |
VBA32 | Trojan.MSIL.Crypt |
ALYac | Application.Bundler.CSZ |
MAX | malware (ai score=86) |
Malwarebytes | Trojan.Dropper.NSIS |
TrendMicro-HouseCall | TROJ_GEN.R002H07ER21 |
SentinelOne | Static AI - Malicious PE |
Fortinet | NSIS/Bitser.BD3!tr |
AVG | NSIS:DropperX-gen [Drp] |
Avast | NSIS:DropperX-gen [Drp] |