Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Sept. 30, 2024, 11:26 a.m. | Sept. 30, 2024, 11:38 a.m. |
-
-
veZkNElXSz.exe "C:\Users\test22\AppData\Local\Temp\radF2D5C.tmp\veZkNElXSz.exe"
2184
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
89.197.154.116 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
file | C:\Users\test22\AppData\Local\Temp\radF2D5C.tmp\veZkNElXSz.exe |
file | C:\Users\test22\AppData\Local\Temp\radF2D5C.tmp\veZkNElXSz.exe |
host | 89.197.154.116 |
file | C:\Users\test22\AppData\Local\Temp\radF2D5C.tmp\veZkNElXSz.exe |
file | C:\Users\test22\AppData\Local\Temp\radF2D5C.tmp\veZkNElXSz.exe |
parent_process | wscript.exe | martian_process | C:\Users\test22\AppData\Local\Temp\radF2D5C.tmp\veZkNElXSz.exe | ||||||
parent_process | wscript.exe | martian_process | "C:\Users\test22\AppData\Local\Temp\radF2D5C.tmp\veZkNElXSz.exe" |
MicroWorld-eScan | VB:Trojan.VBS.Dropper.AG |
CTX | vba.trojan.generic |
CAT-QuickHeal | Trojan.VBS.33100 |
ALYac | VB:Trojan.VBS.Dropper.AG |
VIPRE | VB:Trojan.VBS.Dropper.AG |
Arcabit | VB:Trojan.VBS.Dropper.AG |
Symantec | VBS.Heur.SNIC |
ESET-NOD32 | Win32/Rozena.ED |
Cynet | Malicious (score: 99) |
BitDefender | VB:Trojan.VBS.Dropper.AG |
NANO-Antivirus | Trojan.Script.Agent.fosjzx |
Rising | Dropper.Ploty!8.EEC8 (TOPIS:E0:JqyfiJ1QMlQ) |
Emsisoft | VB:Trojan.VBS.Dropper.AG (B) |
F-Secure | Malware.HTML/ExpKit.Gen2 |
DrWeb | JS.Muldrop.457 |
TrendMicro | HEUR_VBS.O1 |
Sophos | Troj/Swrort-AL |
Ikarus | Trojan.Win32.Swrort |
FireEye | VB:Trojan.VBS.Dropper.AG |
Detected | |
Avira | HTML/ExpKit.Gen2 |
Kingsoft | Win32.Infected.AutoInfector.a |
Xcitium | TrojWare.VBS.TrojanDropper.Agent.NJA@833icd |
Microsoft | Trojan:Win32/Meterpreter.RPZ!MTB |
GData | VB:Trojan.VBS.Dropper.AG |
Varist | VBS/Agent.AJU!Eldorado |
Tencent | Win32.Trojan.Expkit.Ncnw |
huorong | TrojanDropper/Agent.fg |
Fortinet | VBS/Rozena.ED!tr |
file | C:\Users\test22\AppData\Local\Temp\radF2D5C.tmp\veZkNElXSz.exe |
dead_host | 192.168.56.103:49171 |
dead_host | 192.168.56.103:49170 |
dead_host | 192.168.56.103:49173 |
dead_host | 192.168.56.103:49172 |
dead_host | 192.168.56.103:49165 |
dead_host | 192.168.56.103:49174 |
dead_host | 192.168.56.103:49164 |
dead_host | 192.168.56.103:49169 |
dead_host | 89.197.154.116:7810 |
dead_host | 192.168.56.103:49167 |
dead_host | 192.168.56.103:49168 |