Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Dec. 12, 2022, 11:21 a.m. | Dec. 12, 2022, 11:23 a.m. |
-
-
reg.exe "C:\Windows\System32\reg.exe" ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "My App" /t REG_SZ /F /D "C:\Users\test22\AppData\Roaming\dllhost.exe"
2176 -
dllhost.exe "C:\Users\test22\AppData\Roaming\dllhost.exe"
2228
-
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49163 -> 45.89.255.250:50505 | 2014600 | ET MALWARE Win32/Nitol.A Checkin | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
section | .itext |
section | {u'size_of_data': u'0x0000e200', u'virtual_address': u'0x00014000', u'entropy': 7.960008451272168, u'name': u'.data', u'virtual_size': u'0x0000e010'} | entropy | 7.96000845127 | description | A section with a high entropy has been found |
cmdline | reg.exe ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "My App" /t REG_SZ /F /D "C:\Users\test22\AppData\Roaming\dllhost.exe" |
cmdline | "C:\Windows\System32\reg.exe" ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "My App" /t REG_SZ /F /D "C:\Users\test22\AppData\Roaming\dllhost.exe" |
host | 45.89.255.250 |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\My App | reg_value | C:\Users\test22\AppData\Roaming\dllhost.exe |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.Generic.32461068 |
McAfee | RDN/Generic.dx |
Sangfor | Riskware.Win32.Crampes.V06t |
K7AntiVirus | Riskware ( 0052f7bd1 ) |
Alibaba | Trojan:Win32/Crampes.46653f6f |
K7GW | Riskware ( 0052f7bd1 ) |
Cybereason | malicious.bed03f |
Cyren | W32/ABRisk.FKUV-3613 |
Symantec | ML.Attribute.HighConfidence |
tehtris | Generic.Malware |
ESET-NOD32 | Win32/RiskWare.PEMalform.J |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Kaspersky | HEUR:Trojan.Win32.Crampes.a |
BitDefender | Trojan.Generic.32461068 |
Avast | Win32:Evo-gen [Trj] |
Rising | Trojan.Swrort!8.296 (TFE:2:CCuO7nvtECH) |
Ad-Aware | Trojan.Generic.32461068 |
Emsisoft | Trojan.Generic.32461068 (B) |
VIPRE | Trojan.Generic.32461068 |
McAfee-GW-Edition | RDN/Generic.dx |
Trapmine | malicious.high.ml.score |
FireEye | Generic.mg.0c9df67f152a727b |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Suspicious PE |
GData | Trojan.Generic.32461068 |
Jiangmin | Trojan.Crampes.ds |
MAX | malware (ai score=88) |
Antiy-AVL | Trojan/Win32.Dynamer |
Gridinsoft | Trojan.Win32.Agent.cl |
Arcabit | Trojan.Generic.D1EF510C |
ZoneAlarm | HEUR:Trojan.Win32.Crampes.a |
Microsoft | Behavior:Win32/Nitol.gen!A |
Detected | |
AhnLab-V3 | Trojan/Win.Generic.R539958 |
Cylance | Unsafe |
TrendMicro-HouseCall | TROJ_GEN.R002H07LA22 |
Tencent | Win32.Trojan.FalseSign.Ltgl |
Fortinet | MalwThreat!E1E6IV |
BitDefenderTheta | Gen:NN.ZexaCO.36106.xC1@aOz3kuFi |
AVG | Win32:Evo-gen [Trj] |
Panda | Trj/CI.A |