Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | July 12, 2023, 7:45 a.m. | July 12, 2023, 7:48 a.m. |
-
cmd.exe "C:\Windows\System32\cmd.exe" /c start /wait "zQBcaqxBrBs" C:\Users\test22\AppData\Local\Temp\setup.jpg
2632
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
ClamAV | Win.Trojan.Bulz-9863763-0 |
ALYac | Generic.Exploit.VBScript.A.BF3AA4DD |
Zillya | Trojan.VMProtect.Win32.48329 |
Sangfor | Suspicious.Win32.Save.a |
Cyren | W32/Trojan.IHU.gen!Eldorado |
Symantec | Trojan Horse |
ESET-NOD32 | multiple detections |
Avast | Win32:Trojan-gen |
Kaspersky | UDS:Rootkit.Win64.PurpleFox.ffr |
BitDefender | Gen:Variant.Doina.21448 |
Rising | Trojan.PurpleFox/MSI!1.D10D (CLASSIC) |
Emsisoft | Gen:Variant.Doina.21448 (B) |
F-Secure | Trojan.TR/Crypt.XPACK.Gen |
DrWeb | Trojan.Packed2.43111 |
VIPRE | Gen:Variant.Doina.21448 |
TrendMicro | Trojan.VBS.FUPORFLEX.SMYEBDR |
McAfee-GW-Edition | GenericRXOX-RA!982364763429 |
FireEye | Gen:Variant.Doina.21448 |
Sophos | Mal/VMProtBad-A |
Ikarus | Trojan.Win32.VMProtect |
Antiy-AVL | Trojan[Packed]/Win32.VMProtect |
Microsoft | Trojan:Script/Phonzy.A!ml |
Arcabit | Trojan.Doina.D53C8 [many] |
ZoneAlarm | HEUR:Trojan.Script.Generic |
GData | Generic.Exploit.VBScript.A.D68697A5 |
Detected | |
McAfee | GenericRXOX-RA!982364763429 |
MAX | malware (ai score=89) |
VBA32 | BScope.Trojan.Agentb |
MaxSecure | Trojan.Malware.121218.susgen |
Fortinet | W32/VMProtect.ABO!tr |
BitDefenderTheta | Gen:NN.ZedlaF.36302.@J7@auIQWXd |
AVG | Win32:Trojan-gen |