Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | July 3, 2023, 6:20 p.m. | July 3, 2023, 6:22 p.m. |
-
cmd.exe "C:\Windows\System32\cmd.exe" /c start /wait "dbJswKNztXJngwy" C:\Users\test22\AppData\Local\Temp\imagd.jpg
1460
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
MicroWorld-eScan | Exploit.Jpegdrop.2 |
Arcabit | Exploit.Jpegdrop.2 |
BitDefender | Exploit.Jpegdrop.2 |
Emsisoft | Exploit.Jpegdrop.2 (B) |
VIPRE | Exploit.Jpegdrop.2 |
FireEye | Exploit.Jpegdrop.2 |
MAX | malware (ai score=81) |
GData | Exploit.Jpegdrop.2 |
ALYac | Exploit.Jpegdrop.2 |