Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | July 11, 2024, 9:16 a.m. | July 11, 2024, 9:21 a.m. |
-
1.exe "C:\Users\test22\AppData\Local\Temp\1.exe"
1684
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
name | RT_ICON | language | LANG_JAPANESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0242ceb0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_JAPANESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0242ceb0 | size | 0x00000468 | ||||||||||||||||||
name | RT_ICON | language | LANG_JAPANESE | filetype | GLS_BINARY_LSB_FIRST | sublanguage | SUBLANG_DEFAULT | offset | 0x0242ceb0 | size | 0x00000468 | ||||||||||||||||||
name | RT_STRING | language | LANG_JAPANESE | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x0242dd00 | size | 0x00000322 | ||||||||||||||||||
name | RT_STRING | language | LANG_JAPANESE | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x0242dd00 | size | 0x00000322 | ||||||||||||||||||
name | RT_STRING | language | LANG_JAPANESE | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x0242dd00 | size | 0x00000322 | ||||||||||||||||||
name | RT_GROUP_ICON | language | LANG_JAPANESE | filetype | data | sublanguage | SUBLANG_DEFAULT | offset | 0x0242d318 | size | 0x00000030 |
section | {u'size_of_data': u'0x0001be00', u'virtual_address': u'0x00001000', u'entropy': 7.76784043659179, u'name': u'.text', u'virtual_size': u'0x0001bc5e'} | entropy | 7.76784043659 | description | A section with a high entropy has been found | |||||||||
entropy | 0.38986013986 | description | Overall entropy of this PE file is high |
Bkav | W32.AIDetectMalware |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
Skyhigh | BehavesLike.Win32.Lockbit.dt |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
K7AntiVirus | Riskware ( 00584baa1 ) |
K7GW | Riskware ( 00584baa1 ) |
Symantec | ML.Attribute.HighConfidence |
tehtris | Generic.Malware |
APEX | Malicious |
ClamAV | Win.Packer.pkr_ce1a-9980177-0 |
Kaspersky | VHO:Trojan.Win32.DiskWriter.gen |
Rising | Trojan.Generic@AI.99 (RDMK:cmRtazq0rhB9l4lXzqeSfKtroOAa) |
McAfeeD | Real Protect-LS!835246232DBB |
Trapmine | malicious.high.ml.score |
FireEye | Generic.mg.835246232dbb706d |
Sophos | Troj/Krypt-VK |
Ikarus | Trojan-PWS.Win32.Tepfer |
Detected | |
Kingsoft | malware.kb.a.1000 |
Microsoft | Program:Win32/Wacapew.C!ml |
ZoneAlarm | VHO:Trojan.Win32.DiskWriter.gen |
Varist | W32/Kryptik.MIZ.gen!Eldorado |
Acronis | suspicious |
BitDefenderTheta | Gen:NN.ZexaF.36808.rq0@aiEYXnfG |
DeepInstinct | MALICIOUS |
Malwarebytes | MachineLearning/Anomalous.95% |
Tencent | Trojan.Win32.Obfuscated.gen |
SentinelOne | Static AI - Malicious PE |
MaxSecure | Trojan.Malware.300983.susgen |
CrowdStrike | win/malicious_confidence_100% (D) |