Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Nov. 22, 2024, 3:02 p.m. | Nov. 22, 2024, 3:09 p.m. |
-
-
FunnyJellyfish.tmp "C:\Users\test22\AppData\Local\Temp\is-9TIJT.tmp\FunnyJellyfish.tmp" /SL5="$80178,1097818,140800,C:\Users\test22\AppData\Local\Temp\FunnyJellyfish.exe"
2628-
cmd.exe "cmd.exe" /C timeout /T 3 & "C:\Users\test22\AppData\Local\Temp\FunnyJellyfish.exe" /VERYSILENT /SUPPRESSMSGBOXES
2700-
timeout.exe timeout /T 3
2760 -
FunnyJellyfish.exe "C:\Users\test22\AppData\Local\Temp\FunnyJellyfish.exe" /VERYSILENT /SUPPRESSMSGBOXES
2828-
FunnyJellyfish.tmp "C:\Users\test22\AppData\Local\Temp\is-L4CRD.tmp\FunnyJellyfish.tmp" /SL5="$10192,1097818,140800,C:\Users\test22\AppData\Local\Temp\FunnyJellyfish.exe" /VERYSILENT /SUPPRESSMSGBOXES
2876-
regsvr32.exe "regsvr32.exe" /s /i:INSTALL "C:\Users\test22\AppData\Roaming\\DelightfulCard.dll"
2932-
regsvr32.exe /s /i:INSTALL "C:\Users\test22\AppData\Roaming\\DelightfulCard.dll"
2976
-
-
-
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | .itext |
file | C:\Users\test22\AppData\Local\Temp\is-U9E68.tmp\_isetup\_shfoldr.dll |
file | C:\Users\test22\AppData\Local\Temp\is-M7VFQ.tmp\_isetup\_shfoldr.dll |
cmdline | "cmd.exe" /C timeout /T 3 & "C:\Users\test22\AppData\Local\Temp\FunnyJellyfish.exe" /VERYSILENT /SUPPRESSMSGBOXES |
cmdline | "regsvr32.exe" /s /i:INSTALL "C:\Users\test22\AppData\Roaming\\DelightfulCard.dll" |
file | C:\Users\test22\AppData\Local\Temp\is-L4CRD.tmp\FunnyJellyfish.tmp |
file | C:\Users\test22\AppData\Local\Temp\is-U9E68.tmp\_isetup\_shfoldr.dll |
Skyhigh | BehavesLike.Win32.Dropper.tc |
CrowdStrike | win/grayware_confidence_70% (W) |
Elastic | malicious (moderate confidence) |
ESET-NOD32 | a variant of Win64/Kryptik.ESM |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Rising | Trojan.Kryptik!8.8 (CLOUD) |
TrendMicro | Trojan.Win32.AMADEY.YXEKVZ |
McAfeeD | ti!301E56052CF5 |
Sophos | Generic Reputation PUA (PUA) |
Detected | |
Kingsoft | Win32.Troj.Unknown.a |
GData | Win32.Malware.Donut.62A4OA |
McAfee | Artemis!E1CF72329542 |
Ikarus | Win32.Outbreak |
TrendMicro-HouseCall | Trojan.Win32.AMADEY.YXEKVZ |
Fortinet | Malicious_Behavior.SB |
Paloalto | generic.ml |
alibabacloud | Trojan:Win/Kryptik.EBO |