Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Jan. 18, 2022, 4:43 p.m. | Jan. 18, 2022, 4:47 p.m. |
-
invoice.exe "C:\Users\test22\AppData\Local\Temp\invoice.exe"
2316
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\bahorexomutisa\mocehuhewad\zelomece-xivu.pdb |
section | .hazuve |
resource name | AFX_DIALOG_LAYOUT |
resource name | VESURAGOSAG |
resource name | VIDIWAYAPENIGU |
resource name | YONAMIKORUFENI |
resource name | None |
name | VESURAGOSAG | language | LANG_CHINESE | filetype | ASCII text, with very long lines, with no line terminators | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x002125b8 | size | 0x000006f0 | ||||||||||||||||||
name | VIDIWAYAPENIGU | language | LANG_CHINESE | filetype | ASCII text, with very long lines, with no line terminators | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x00213b90 | size | 0x000002fa | ||||||||||||||||||
name | YONAMIKORUFENI | language | LANG_CHINESE | filetype | ASCII text, with very long lines, with no line terminators | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x00212ca8 | size | 0x00000ee8 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x002120f0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x002120f0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x002120f0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x002120f0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x002120f0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x002120f0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x002120f0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x002120f0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x002120f0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x002120f0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_CHINESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x002120f0 | size | 0x00000468 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x00212558 | size | 0x0000005a | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_HONGKONG | offset | 0x00212558 | size | 0x0000005a |
section | {u'size_of_data': u'0x00050400', u'virtual_address': u'0x00035000', u'entropy': 7.985237487365609, u'name': u'.data', u'virtual_size': u'0x001d5648'} | entropy | 7.98523748737 | description | A section with a high entropy has been found | |||||||||
entropy | 0.552020636285 | description | Overall entropy of this PE file is high |
Bkav | W32.AIDetect.malware1 |
Lionic | Trojan.Win32.Convagent.m!c |
Elastic | malicious (high confidence) |
DrWeb | Trojan.PWS.Siggen3.10610 |
ClamAV | Win.Dropper.Mikey-9917324-0 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
Cybereason | malicious.457435 |
Cyren | W32/Kryptik.GAL.gen!Eldorado |
ESET-NOD32 | a variant of Win32/Kryptik.HNZX |
APEX | Malicious |
Avast | FileRepMalware |
Cynet | Malicious (score: 100) |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Rising | Trojan.Generic@AI.90 (RDML:ByFA/TKkxB1wobZgEFSaDw) |
Sophos | Mal/Generic-S |
Baidu | Win32.Trojan.Kryptik.jm |
McAfee-GW-Edition | BehavesLike.Win32.Generic.hc |
FireEye | Generic.mg.9fca8332a98b2475 |
Ikarus | Win32.Outbreak |
Kingsoft | Win32.Troj.Generic_a.a.(kcloud) |
Microsoft | Trojan:Script/Phonzy.B!ml |
McAfee | Artemis!9FCA8332A98B |
Malwarebytes | Trojan.MalPack.GS |
TrendMicro-HouseCall | TROJ_GEN.R002H0DAI22 |
SentinelOne | Static AI - Malicious PE |
MaxSecure | Trojan.Malware.300983.susgen |
AVG | FileRepMalware |
Paloalto | generic.ml |
CrowdStrike | win/malicious_confidence_100% (W) |