Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Dec. 7, 2022, 4:10 p.m. | Dec. 7, 2022, 4:13 p.m. |
-
WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Office15\WINWORD.EXE" "C:\Users\test22\AppData\Local\Temp\Juzgado 09 civil del circuito de Bogotá D. C. Col..docx"
2080
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
file | C:\Users\test22\AppData\Local\Temp\~$zgado 09 civil del circuito de Bogotá D. C. Col..docx |
McAfee | RDN/Generic Downloader.x |
VIPRE | Exploit.OLE-JS.Gen.2 |
Sangfor | Trojan.Generic-Script.Save.ed51193b |
Alibaba | TrojanDownloader:Script/Generic.2fa3c4ec |
Cyren | ABRisk.PUKL-3 |
Symantec | Trojan.Gen.NPE |
ESET-NOD32 | VBS/TrojanDownloader.Agent.WWV |
Avast | Other:Malware-gen [Trj] |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Exploit.OLE-JS.Gen.2 |
MicroWorld-eScan | Exploit.OLE-JS.Gen.2 |
Tencent | Vbs.Trojan-Downloader.Der.Kmnw |
Ad-Aware | Exploit.OLE-JS.Gen.2 |
Emsisoft | Exploit.OLE-JS.Gen.2 (B) |
McAfee-GW-Edition | RDN/Generic Downloader.x |
FireEye | Exploit.OLE-JS.Gen.2 |
GData | Exploit.OLE-JS.Gen.2 |
Avira | VBS/Dldr.Agent.dacvy |
Microsoft | Trojan:Script/Wacatac.B!ml |
Arcabit | Exploit.OLE-JS.Gen.2 |
ViRobot | DOC.Z.Agent.229376.U |
Detected | |
ALYac | Trojan.Downloader.DOC.Gen |
MAX | malware (ai score=83) |
Fortinet | VBS/Agent.WWV!tr |
AVG | Other:Malware-gen [Trj] |