Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | May 23, 2022, 7:38 a.m. | May 23, 2022, 8:10 a.m. |
-
-
timeout.exe timeout 2
2576
-
-
MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
2620
Name | Response | Post-Analysis Lookup |
---|---|---|
www.seementor.com | 38.26.152.100 | |
www.euromarketinfinity.com | 217.160.0.127 | |
www.knowan.space | ||
darley.ml | 192.185.174.178 |
Suricata Alerts
Suricata TLS
No Suricata TLS
suspicious_features | GET method with no useragent header | suspicious_request | GET http://darley.ml/h/Zzrfmn_Kyaogqlh.bmp | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.seementor.com/sn12/?9rJtvBQ=RtVC6loscM06usO/YI21fDXq59XBLcz9umfGdy2oQXWdI6QalDB8sFa/aIWAp2MtXDbGM+xQ&2d54=eT8xe2NpddJ86tL | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.euromarketinfinity.com/sn12/?9rJtvBQ=/wE2iff+KL+/ERRZNsMlaCyYzWgq8VOttP75WoZBJ+TwHPTujVyF9hPb5PrQrqya+LxTGX7m&2d54=eT8xe2NpddJ86tL |
request | GET http://darley.ml/h/Zzrfmn_Kyaogqlh.bmp |
request | GET http://www.seementor.com/sn12/?9rJtvBQ=RtVC6loscM06usO/YI21fDXq59XBLcz9umfGdy2oQXWdI6QalDB8sFa/aIWAp2MtXDbGM+xQ&2d54=eT8xe2NpddJ86tL |
request | GET http://www.euromarketinfinity.com/sn12/?9rJtvBQ=/wE2iff+KL+/ERRZNsMlaCyYzWgq8VOttP75WoZBJ+TwHPTujVyF9hPb5PrQrqya+LxTGX7m&2d54=eT8xe2NpddJ86tL |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
Bkav | W32.AIDetectNet.01 |
Lionic | Trojan.Multi.Generic.4!c |
Elastic | malicious (high confidence) |
DrWeb | Trojan.Siggen17.54626 |
MicroWorld-eScan | Trojan.GenericKD.50316481 |
ALYac | Trojan.GenericKD.50316481 |
Cylance | Unsafe |
CrowdStrike | win/malicious_confidence_100% (W) |
Alibaba | Trojan:MSIL/Keylogger.36fc5a1a |
K7GW | Trojan-Downloader ( 005931bb1 ) |
K7AntiVirus | Trojan-Downloader ( 005931bb1 ) |
Arcabit | Trojan.Generic.D2FFC4C1 |
Cyren | W32/MSIL_Kryptik.HHG.gen!Eldorado |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | a variant of MSIL/TrojanDownloader.Agent.LWL |
TrendMicro-HouseCall | TROJ_GEN.R002H0DEK22 |
Paloalto | generic.ml |
Kaspersky | HEUR:Trojan-PSW.MSIL.Agensla.gen |
BitDefender | Trojan.GenericKD.50316481 |
Avast | Win32:DropperX-gen [Drp] |
Tencent | Msil.Trojan-downloader.Agent.Wozw |
Ad-Aware | Trojan.GenericKD.50316481 |
Emsisoft | Trojan.GenericKD.50316481 (B) |
McAfee-GW-Edition | RDN/Formbook |
FireEye | Generic.mg.61d8380734dab62a |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Suspicious PE |
Avira | HEUR/AGEN.1249297 |
Kingsoft | Win32.Troj.Generic_a.a.(kcloud) |
Gridinsoft | Ransom.Win32.Wacatac.sa |
Microsoft | Trojan:Win32/Wacatac.B!ml |
GData | Win32.Trojan.Agent.GQY2F0 |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Dropper/Win.DropperX-gen.C5137801 |
McAfee | RDN/Formbook |
MAX | malware (ai score=85) |
Malwarebytes | Spyware.FormBook |
APEX | Malicious |
Ikarus | Trojan-Spy.Keylogger.AgentTesla |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | MSIL/Agent.LWL!tr.dldr |
AVG | Win32:DropperX-gen [Drp] |
Cybereason | malicious.e277e2 |