Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Dec. 7, 2022, 9:23 a.m. | Dec. 7, 2022, 9:25 a.m. |
-
EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" C:\Users\test22\AppData\Local\Temp\6_IT08171506083_31_06122022_058000.xls
3028
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
description | Take ScreenShot | rule | ScreenShot | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook |
Elastic | malicious (high confidence) |
CAT-QuickHeal | X97M.Dropper.CB |
Cyren | X97M/Agent.BLC.gen!Eldorado |
Kaspersky | VHO:Trojan.MSOffice.Alien.gen |
NANO-Antivirus | Trojan.Ole2.Vbs-heuristic.druvzi |
McAfee-GW-Edition | BehavesLike.OLE2.GenDownloader.ll |
SentinelOne | Static AI - Malicious OLE |
Detected | |
Antiy-AVL | Trojan[Downloader]/MSOffice.Agent.base |
ZoneAlarm | VHO:Trojan.MSOffice.Alien.gen |
parent_process | excel.exe | martian_process | "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /Embedding |