Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Oct. 14, 2024, 10:35 a.m. | Oct. 14, 2024, 10:37 a.m. |
-
Secret_Weapon.exe "C:\Users\test22\AppData\Local\Temp\Secret_Weapon.exe"
2068 -
cmd.exe C:\Windows\system32\cmd.exe /c "prompt #$H#$E# & echo on & for %b in (1) do rem"
2208 -
chcp.com chcp 65001
2288 -
mode.com mode 103,5
2336
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | .code |
packer | PureBasic 4.x -> Neil Hodgson |
file | C:\Users\test22\AppData\Local\Temp\C29F.tmp\C2A0.tmp\C2B1.bat |
section | {u'size_of_data': u'0x00003400', u'virtual_address': u'0x00013000', u'entropy': 7.111835561466392, u'name': u'.rdata', u'virtual_size': u'0x000033a5'} | entropy | 7.11183556147 | description | A section with a high entropy has been found | |||||||||
section | {u'size_of_data': u'0x000b7a00', u'virtual_address': u'0x00019000', u'entropy': 7.999530614224543, u'name': u'.rsrc', u'virtual_size': u'0x000b7998'} | entropy | 7.99953061422 | description | A section with a high entropy has been found | |||||||||
entropy | 0.910475030451 | description | Overall entropy of this PE file is high |
cmdline | "C:\Windows\sysnative\cmd" /c "C:\Users\test22\AppData\Local\Temp\C29F.tmp\C2A0.tmp\C2B1.bat C:\Users\test22\AppData\Local\Temp\Secret_Weapon.exe" |
file | C:\Users\test22\AppData\Local\Temp\C29F.tmp |
file | C:\Users\test22\AppData\Local\Temp\C29F.tmp\C2A0.tmp |
Bkav | W32.AIDetectMalware |
Elastic | malicious (high confidence) |
Cynet | Malicious (score: 100) |
Skyhigh | BehavesLike.Win32.Generic.cc |
Cylance | Unsafe |
Sangfor | Trojan.Win32.Save.a |
Symantec | ML.Attribute.HighConfidence |
ESET-NOD32 | BAT/HackTool.Agent.CL potentially unsafe |
McAfee | GenericRXWO-ZS!497EA5F14590 |
Rising | Hacktool.Agent/BAT!8.13765 (CLOUD) |
McAfeeD | Real Protect-LS!497EA5F14590 |
FireEye | Generic.mg.497ea5f145901f80 |
Sophos | Generic ML PUA (PUA) |
SentinelOne | Static AI - Malicious PE |
Detected | |
Varist | W32/ABRisk.MWXI-6748 |
BitDefenderTheta | Gen:NN.ZexaF.36812.ZuW@a4Ydool |
DeepInstinct | MALICIOUS |
Malwarebytes | Generic.Malware.AI.DDS |
Ikarus | Trojan.Win32 |
MaxSecure | Trojan.Malware.300983.susgen |
Paloalto | generic.ml |
CrowdStrike | win/malicious_confidence_70% (W) |
alibabacloud | HackTool:Win/Agent.CE |