Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Jan. 16, 2024, 7:55 a.m. | Jan. 16, 2024, 7:59 a.m. |
-
rty29.exe "C:\Users\test22\AppData\Local\Temp\rty29.exe"
1208
Name | Response | Post-Analysis Lookup |
---|---|---|
apps.identrust.com |
CNAME
a1952.dscq.akamai.net
CNAME
identrust.edgesuite.net
|
23.67.53.17 |
i.alie3ksgaa.com | 154.92.15.189 |
Suricata Alerts
Suricata TLS
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid |
pdb_path | shrpubw.pdb |
resource name | MUI |
request | GET http://apps.identrust.com/roots/dstrootcax3.p7c |
registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F81F111D0E5AB58D396F7BF525577FD30FDC95AA\Blob |
Bkav | W64.AIDetectMalware |
Lionic | Trojan.Win32.Fabookie.4!c |
Elastic | malicious (high confidence) |
Skyhigh | BehavesLike.Win64.Dropper.fm |
Cylance | unsafe |
Symantec | ML.Attribute.HighConfidence |
APEX | Malicious |
McAfee | Artemis!484970B905D2 |
Avast | FileRepMalware [Misc] |
Kaspersky | UDS:Trojan.Win32.Fabookie.bwk |
Rising | Trojan.Fabookie!8.11C3D (CLOUD) |
DrWeb | Trojan.DownLoader46.47727 |
Sophos | Mal/Generic-S |
Webroot | W32.Fabookie |
Kingsoft | Win32.Trojan.Fabookie.bwk |
Gridinsoft | Trojan.Win64.Gen.tr |
Microsoft | Trojan:Win32/Casdet!rfn |
ZoneAlarm | UDS:Trojan.Win32.Fabookie.bwk |
DeepInstinct | MALICIOUS |
AVG | FileRepMalware [Misc] |
CrowdStrike | win/malicious_confidence_60% (W) |