Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Sept. 21, 2023, 10:16 a.m. | Sept. 21, 2023, 10:19 a.m. |
-
-
-
shutdown.exe shutdown -s -t 0
2316
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | .vmp0 |
section | .vmp1 |
section | .vmp2 |
resource name | TYPELIB |
resource name | None |
cmdline | "C:\Windows\System32\cmd.exe" /k shutdown -s -t 0 |
section | {u'size_of_data': u'0x00638e00', u'virtual_address': u'0x00382000', u'entropy': 7.969804323554949, u'name': u'.vmp2', u'virtual_size': u'0x00638c90'} | entropy | 7.96980432355 | description | A section with a high entropy has been found | |||||||||
entropy | 0.898343320409 | description | Overall entropy of this PE file is high |
cmdline | "C:\Windows\System32\cmd.exe" /k shutdown -s -t 0 |
cmdline | cmd /k shutdown -s -t 0 |
cmdline | shutdown -s -t 0 |
section | .vmp0 | description | Section name indicates VMProtect | ||||||
section | .vmp1 | description | Section name indicates VMProtect | ||||||
section | .vmp2 | description | Section name indicates VMProtect |
Bkav | W32.AIDetectMalware |
Malwarebytes | Malware.Heuristic.1003 |
Sangfor | Trojan.Win32.Agent.V354 |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefenderTheta | Gen:NN.ZexaF.36662.@J0@a4h0yuni |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/TrojanDownloader.Amadey.A |
APEX | Malicious |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Rising | Stealer.Agent!8.C2 (TFE:5:ARQLZM72JmD) |
McAfee-GW-Edition | BehavesLike.Win32.Dropper.vc |
Trapmine | malicious.high.ml.score |
FireEye | Generic.mg.56c197e493f74f92 |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Malicious PE |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
VBA32 | BScope.TrojanPSW.Coins |
Cylance | unsafe |
TrendMicro-HouseCall | TROJ_GEN.R002H0DIK23 |
Cybereason | malicious.fd5d88 |
DeepInstinct | MALICIOUS |