Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | March 29, 2022, 7:59 a.m. | March 29, 2022, 8:02 a.m. |
-
EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" C:\Users\test22\AppData\Local\Temp\8697717473027069.xls
2204
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
description | Take ScreenShot | rule | ScreenShot | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook |
Sangfor | Malware.Generic-XLM.Save.ma29 |
Cyren | XF/Emotet.C.gen!Eldorado |
Avast | VBS:Malware-gen |
Kaspersky | HEUR:Trojan.MSOffice.Generic |
Rising | Downloader.Agent/XLS!1.DCEE (CLASSIC) |
Sophos | Mal/DocDl-M |
Microsoft | Trojan:Win32/Emotet!ml |
Zoner | Probably Heur.W97ShellB |
Tencent | Trojan.MsOffice.Macro40.11019224 |
Ikarus | Trojan-Downloader.XLM.Agent |
Fortinet | XF/CoinMiner.Z!tr |
AVG | VBS:Malware-gen |
parent_process | excel.exe | martian_process | "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /Embedding |