Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Dec. 12, 2022, 11:21 a.m. | Dec. 12, 2022, 11:25 a.m. |
-
-
cmd.exe "C:\Windows\system32\cmd.exe" /c del C:\Users\test22\AppData\Local\Temp\explorer.exe > nul
2196
-
-
explorer.exe C:\Windows\Explorer.EXE
1236
Name | Response | Post-Analysis Lookup |
---|---|---|
gy9.gyddos.com |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.103:49166 -> 45.89.255.250:40404 | 2025135 | ET MALWARE [PTsecurity] Botnet Nitol.B Checkin | Malware Command and Control Activity Detected |
Suricata TLS
No Suricata TLS
section | .itext |
cmdline | C:\Windows\System32\cmd.exe /c del C:\Users\test22\AppData\Local\Temp\explorer.exe > nul |
cmdline | "C:\Windows\system32\cmd.exe" /c del C:\Users\test22\AppData\Local\Temp\explorer.exe > nul |
file | C:\Users\test22\AppData\Local\Temp\explorer.exe |
section | {u'size_of_data': u'0x00009600', u'virtual_address': u'0x0000c000', u'entropy': 7.9087798973133, u'name': u'.data', u'virtual_size': u'0x00009410'} | entropy | 7.90877989731 | description | A section with a high entropy has been found |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | C:\Windows\System32\cmd.exe /c del C:\Users\test22\AppData\Local\Temp\explorer.exe > nul |
cmdline | "C:\Windows\system32\cmd.exe" /c del C:\Users\test22\AppData\Local\Temp\explorer.exe > nul |
host | 45.89.255.250 |
service_name | Ghijkl Nopqrstu Wxy | service_path | C:\Windows\mquoeo.exe |
file | C:\Users\test22\AppData\Local\Temp\explorer.exe |
Bkav | W32.AIDetect.malware2 |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Trojan.Generic.32461213 |
McAfee | Artemis!E79B48EEFA43 |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Riskware ( 0052f7bd1 ) |
Alibaba | Trojan:Win32/Crampes.15e7df72 |
K7GW | Riskware ( 0052f7bd1 ) |
Cybereason | malicious.483e8f |
Cyren | W32/ABRisk.SEGO-6842 |
Symantec | ML.Attribute.HighConfidence |
tehtris | Generic.Malware |
ESET-NOD32 | Win32/RiskWare.PEMalform.J |
Cynet | Malicious (score: 100) |
APEX | Malicious |
Kaspersky | HEUR:Trojan.Win32.Crampes.a |
BitDefender | Trojan.Generic.32461213 |
Avast | Win32:Evo-gen [Trj] |
Tencent | Win32.Trojan.FalseSign.Vwhl |
Ad-Aware | Trojan.Generic.32461213 |
Emsisoft | Trojan.Generic.32461213 (B) |
VIPRE | Trojan.Generic.32461213 |
McAfee-GW-Edition | Artemis!Trojan |
Trapmine | malicious.high.ml.score |
FireEye | Generic.mg.e79b48eefa43aa34 |
SentinelOne | Static AI - Suspicious PE |
GData | Trojan.Generic.32461213 |
Jiangmin | Trojan.Crampes.dw |
Antiy-AVL | Trojan/Win32.Dynamer |
Gridinsoft | Trojan.Win32.AI.cl |
Arcabit | Trojan.Generic.D1EF519D |
ZoneAlarm | HEUR:Trojan.Win32.Crampes.a |
Microsoft | DDoS:Win32/Nitol.L |
Detected | |
AhnLab-V3 | Trojan/Win.Generic.R539958 |
MAX | malware (ai score=87) |
Rising | Trojan.Swrort!8.296 (TFE:2:CCuO7nvtECH) |
Fortinet | MalwThreat!E1E6IV |
BitDefenderTheta | Gen:NN.ZexaF.36106.nD3@a8Kxhshi |
AVG | Win32:Evo-gen [Trj] |
Panda | Trj/CI.A |