Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Aug. 2, 2023, 4:57 p.m. | Aug. 2, 2023, 4:59 p.m. |
-
cmd.exe "C:\Windows\System32\cmd.exe" /c start /wait "XlKIYwIkHLD" C:\Users\test22\AppData\Local\Temp\Invoice_RVSJKAM02GH_pdf.lnk
3044
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.102:49163 -> 192.155.91.72:5000 | 2027260 | ET INFO Dotted Quad Host VBS Request | Potentially Bad Traffic |
TCP 192.168.56.102:49163 -> 192.155.91.72:5000 | 2027260 | ET INFO Dotted Quad Host VBS Request | Potentially Bad Traffic |
TCP 192.168.56.102:49163 -> 192.155.91.72:5000 | 2019158 | ET MALWARE Possible Malicious Invoice EXE | A Network Trojan was detected |
Suricata TLS
No Suricata TLS
file | C:\Users\test22\AppData\Local\Temp\Invoice_RVSJKAM02GH_pdf.lnk |
FireEye | Trojan.GenericKD.68469944 |
BitDefender | Trojan.GenericKD.68469944 |
MicroWorld-eScan | Trojan.GenericKD.68469944 |
MAX | malware (ai score=80) |
host | 192.155.91.72 |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Clients\Mail\Mozilla Thunderbird\Capabilities\Hidden |