Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Dec. 23, 2023, 6:16 p.m. | Dec. 23, 2023, 6:22 p.m. |
-
WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Office15\WINWORD.EXE" C:\Users\test22\AppData\Local\Temp\Testing.dot
2060
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
Lionic | Trojan.MSWord.Generic.4!c |
Elastic | malicious (high confidence) |
Skyhigh | BehavesLike.OLE2.Downloader.nx |
Varist | W97M/Agent.AGM.gen!Eldorado |
Avast | VBA:Downloader-GHD [Trj] |
ClamAV | Doc.Downloader.Generic-10015045-0 |
NANO-Antivirus | Trojan.Script.MLW.dnxmzd |
Tencent | Heur.MSWord.Downloader.d |
Baidu | VBA.Trojan-Downloader.Agent.dvv |
F-Secure | Heuristic.HEUR/Macro.Downloader.QU.Gen |
SentinelOne | Static AI - Malicious OLE |
Jiangmin | Trojan.MSOffice.SAgent.ar |
Detected | |
Avira | W97M/YAV.Minerva.irpye |
Kingsoft | Win32.Troj.Undef.a |
Microsoft | TrojanDownloader:O97M/Powdow.RVCE!MTB |
ViRobot | DOC.Z.Agent.35840.BHD |
Cynet | Malicious (score: 99) |
Acronis | suspicious |
Rising | Heur.Macro.Downloader.g (CLASSIC) |
Fortinet | WM/Agent.DKE!tr |
AVG | VBA:Downloader-GHD [Trj] |