Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | June 19, 2024, 2:17 p.m. | June 19, 2024, 2:19 p.m. |
-
-
cmd.exe cmd /c ""C:\Users\test22\AppData\Local\Temp\i6.bat" "
2660
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
packer | Armadillo v1.71 |
file | C:\Users\test22\AppData\Local\Temp\i6.bat |
file | C:\Users\test22\AppData\Local\Temp\i6.bat |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
file | C:\Users\test22\AppData\Local\Temp\echo:1 |
file | C:\Users\test22\AppData\Local\Temp\invoice.exe |
Bkav | W32.AIDetectMalware |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
Skyhigh | BehavesLike.Win32.Dropper.dh |
Cylance | Unsafe |
APEX | Malicious |
NANO-Antivirus | Trojan.Win32.Mlw.kcakpf |
Rising | Trojan.Generic@AI.100 (RDML:rHXKkKuGL6dt4T681JXXLA) |
F-Secure | Trojan.TR/Dropper.Gen |
Zillya | Trojan.Generic.Win32.1806322 |
McAfeeD | Real Protect-LS!DFC21ED56AAF |
Trapmine | malicious.high.ml.score |
FireEye | Generic.mg.dfc21ed56aafad10 |
Ikarus | Trojan.Dropper |
Detected | |
Avira | TR/Dropper.Gen |
Antiy-AVL | Trojan/Win32.Wacatac |
Kingsoft | malware.kb.a.985 |
Gridinsoft | Ransom.Win32.Wacatac.oa!s1 |
BitDefenderTheta | Gen:NN.ZexaF.36806.nq3@aerCP3e |
Tencent | Malware.Win32.Gencirc.10befa4d |
SentinelOne | Static AI - Suspicious PE |
MaxSecure | Win.MxResIcn.Heur.Gen |
CrowdStrike | win/malicious_confidence_90% (D) |