Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Aug. 30, 2023, 7:48 a.m. | Aug. 30, 2023, 7:50 a.m. |
-
-
icacls.exe icacls "C:\Users\test22\AppData\Local\3597f98d-1c0e-40d3-90b2-ca1942d842b6" /deny *S-1-1-0:(OI)(CI)(DE,DC)
2540
-
Name | Response | Post-Analysis Lookup |
---|---|---|
api.2ip.ua | 162.0.217.254 |
Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | C:\suve\bimum.pdb |
resource name | AFX_DIALOG_LAYOUT |
section | {u'size_of_data': u'0x000ad000', u'virtual_address': u'0x00001000', u'entropy': 7.926004792219778, u'name': u'.text', u'virtual_size': u'0x000aceb6'} | entropy | 7.92600479222 | description | A section with a high entropy has been found | |||||||||
entropy | 0.824791418355 | description | Overall entropy of this PE file is high |
url | http://www.openssl.org/support/faq.html |
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Communication using DGA | rule | Network_DGA | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
reg_key | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper | reg_value | "C:\Users\test22\AppData\Local\3597f98d-1c0e-40d3-90b2-ca1942d842b6\test10.exe" --AutoStart |
cmdline | icacls "C:\Users\test22\AppData\Local\3597f98d-1c0e-40d3-90b2-ca1942d842b6" /deny *S-1-1-0:(OI)(CI)(DE,DC) |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Stop.13!c |
tehtris | Generic.Malware |
MicroWorld-eScan | Gen:Heur.Mint.Titirez.0q0@M16p3Vk |
FireEye | Generic.mg.e35f56f0085e9bc8 |
CAT-QuickHeal | Ransom.Stop.P5 |
Malwarebytes | MachineLearning/Anomalous.96% |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Trojan ( 0056f9be1 ) |
K7GW | Trojan ( 0056f9be1 ) |
Cybereason | malicious.eedc51 |
Arcabit | Trojan.Mint.Titirez.EAC8A9 |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Kryptik.HUMC |
Cynet | Malicious (score: 100) |
TrendMicro-HouseCall | TROJ_GEN.R002H07HT23 |
ClamAV | Win.Packer.pkr_ce1a-9980177-0 |
Kaspersky | UDS:Trojan.Win32.Chapak.gen |
BitDefender | Gen:Heur.Mint.Titirez.0q0@M16p3Vk |
Avast | Win32:BootkitX-gen [Rtk] |
Tencent | Trojan.Win32.Obfuscated.gen |
Emsisoft | Gen:Heur.Mint.Titirez.0q0@M16p3Vk (B) |
McAfee-GW-Edition | BehavesLike.Win32.Lockbit.cc |
Trapmine | malicious.moderate.ml.score |
Sophos | Troj/Krypt-VK |
SentinelOne | Static AI - Malicious PE |
Gridinsoft | Ransom.Win32.STOP.bot |
Microsoft | Trojan:Win32/Amadey.RPQ!MTB |
ZoneAlarm | UDS:Trojan.Win32.Chapak.gen |
GData | Gen:Heur.Mint.Titirez.0q0@M16p3Vk |
Detected | |
Cylance | unsafe |
APEX | Malicious |
Rising | Trojan.Kryptik!1.B663 (CLASSIC) |
MAX | malware (ai score=81) |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/Kryptik.HFSR!tr |
AVG | Win32:BootkitX-gen [Rtk] |
DeepInstinct | MALICIOUS |
CrowdStrike | win/malicious_confidence_100% (W) |