Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Dec. 11, 2023, 7:16 p.m. | Dec. 11, 2023, 7:22 p.m. |
-
tbbhts.exe "C:\Users\test22\AppData\Local\Temp\tbbhts.exe"
184
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | .nsp0 |
section | .nsp1 |
section | .nsp2 |
packer | NsPacK V3.7 -> LiuXingPing |
name | RT_CURSOR | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000c83d8 | size | 0x000000b4 | ||||||||||||||||||
name | RT_CURSOR | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000c83d8 | size | 0x000000b4 | ||||||||||||||||||
name | RT_CURSOR | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000c83d8 | size | 0x000000b4 | ||||||||||||||||||
name | RT_CURSOR | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000c83d8 | size | 0x000000b4 | ||||||||||||||||||
name | RT_MENU | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000c8498 | size | 0x00000284 | ||||||||||||||||||
name | RT_MENU | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000c8498 | size | 0x00000284 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000c8fd8 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000c8fd8 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000c8fd8 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000c8fd8 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000c8fd8 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000c8fd8 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000c8fd8 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000c8fd8 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000c8fd8 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000c8fd8 | size | 0x00000024 | ||||||||||||||||||
name | RT_STRING | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000c8fd8 | size | 0x00000024 | ||||||||||||||||||
name | RT_GROUP_CURSOR | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000c9024 | size | 0x00000022 | ||||||||||||||||||
name | RT_GROUP_CURSOR | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000c9024 | size | 0x00000022 | ||||||||||||||||||
name | RT_GROUP_CURSOR | language | LANG_CHINESE | filetype | empty | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000c9024 | size | 0x00000022 | ||||||||||||||||||
name | RT_VERSION | language | LANG_CHINESE | filetype | data | sublanguage | SUBLANG_CHINESE_SIMPLIFIED | offset | 0x000ca5c0 | size | 0x000001fc |
section | {u'size_of_data': u'0x0004e499', u'virtual_address': u'0x000ca000', u'entropy': 7.923745002697559, u'name': u'.nsp1', u'virtual_size': u'0x0004f000'} | entropy | 7.9237450027 | description | A section with a high entropy has been found | |||||||||
entropy | 1.0 | description | Overall entropy of this PE file is high |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.FlyStudio.4!c |
tehtris | Generic.Malware |
MicroWorld-eScan | Trojan.GenericKD.70703934 |
FireEye | Generic.mg.e1095986637973f7 |
Skyhigh | BehavesLike.Win32.Generic.fc |
Malwarebytes | Trojan.MalPack.NSPack |
VIPRE | Trojan.GenericKD.70703934 |
Sangfor | Suspicious.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
Alibaba | Malware:Win32/km_2833d1.None |
K7GW | Trojan ( 005257651 ) |
K7AntiVirus | Trojan ( 005257651 ) |
Symantec | ML.Attribute.HighConfidence |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/TrojanDownloader.FlyStudio.ED |
APEX | Malicious |
Kaspersky | UDS:DangerousObject.Multi.Generic |
BitDefender | Trojan.GenericKD.70703934 |
Avast | Win32:Malware-gen |
Emsisoft | Trojan.GenericKD.70703934 (B) |
Trapmine | malicious.high.ml.score |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Malicious PE |
MAX | malware (ai score=87) |
Webroot | W32.Backdoor.Hupigon |
Detected | |
Varist | W32/Downloader.AT.gen!Eldorado |
Antiy-AVL | Trojan/Win32.FlyStudio.a |
Kingsoft | Win32.Troj.Unknown.a |
Microsoft | Trojan:Win32/Znyonm |
Gridinsoft | Malware.Win32.Gen.bot!se22135 |
Xcitium | TrojWare.Win32.Trojan.NSPM.~gen@20n73t |
Arcabit | Trojan.Generic.D436DB3E |
ViRobot | Trojan.Win.Z.Flystudio.321689 |
ZoneAlarm | UDS:DangerousObject.Multi.Generic |
GData | Trojan.GenericKD.70703934 |
Cynet | Malicious (score: 100) |
AhnLab-V3 | Trojan/Win.Generic.R626697 |
BitDefenderTheta | Gen:NN.ZexaF.36608.tmKdaSXoJilb |
ALYac | Trojan.GenericKD.70703934 |
VBA32 | BScope.Trojan.Emotet |
Cylance | unsafe |
Panda | Trj/Chgt.AD |
Zoner | Probably Heur.ExeHeaderP |
TrendMicro-HouseCall | TROJ_GEN.R002H0CL723 |
Rising | Downloader.FlyStudio!8.5E9 (CLOUD) |
Yandex | Trojan.GenAsa!TQopmUoUkJU |
MaxSecure | Trojan.Malware.1728101.susgen |
Fortinet | W32/IRCBot.DU!tr |