Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | Nov. 22, 2024, 3:10 p.m. | Nov. 22, 2024, 3:15 p.m. |
-
-
SillyShelf.tmp "C:\Users\test22\AppData\Local\Temp\is-6DAMO.tmp\SillyShelf.tmp" /SL5="$7012C,1389145,140800,C:\Users\test22\AppData\Local\Temp\SillyShelf.exe"
2616-
cmd.exe "cmd.exe" /C timeout /T 3 & "C:\Users\test22\AppData\Local\Temp\SillyShelf.exe" /VERYSILENT /SUPPRESSMSGBOXES
2688-
timeout.exe timeout /T 3
2756 -
SillyShelf.exe "C:\Users\test22\AppData\Local\Temp\SillyShelf.exe" /VERYSILENT /SUPPRESSMSGBOXES
2820-
SillyShelf.tmp "C:\Users\test22\AppData\Local\Temp\is-MIRJJ.tmp\SillyShelf.tmp" /SL5="$10194,1389145,140800,C:\Users\test22\AppData\Local\Temp\SillyShelf.exe" /VERYSILENT /SUPPRESSMSGBOXES
2864-
-
regsvr32.exe /s /i:INSTALL "C:\Users\test22\AppData\Roaming\\PoisedCoyote.dll"
2960
-
-
-
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | .itext |
file | C:\Users\test22\AppData\Local\Temp\is-27LR7.tmp\_isetup\_shfoldr.dll |
file | C:\Users\test22\AppData\Local\Temp\is-LPQVG.tmp\_isetup\_shfoldr.dll |
cmdline | "regsvr32.exe" /s /i:INSTALL "C:\Users\test22\AppData\Roaming\\PoisedCoyote.dll" |
cmdline | "cmd.exe" /C timeout /T 3 & "C:\Users\test22\AppData\Local\Temp\SillyShelf.exe" /VERYSILENT /SUPPRESSMSGBOXES |
file | C:\Users\test22\AppData\Local\Temp\is-MIRJJ.tmp\SillyShelf.tmp |
file | C:\Users\test22\AppData\Local\Temp\is-LPQVG.tmp\_isetup\_shfoldr.dll |
Lionic | Trojan.Win32.Generic.4!c |
Cynet | Malicious (score: 99) |
Skyhigh | BehavesLike.Win32.Dropper.tc |
Cylance | Unsafe |
CrowdStrike | win/grayware_confidence_60% (W) |
BitDefender | Trojan.GenericKD.74894279 |
Arcabit | Trojan.Generic.D476CBC7 |
Symantec | Trojan.Gen.MBT |
Elastic | malicious (moderate confidence) |
ESET-NOD32 | a variant of Win64/Kryptik.ESM |
Avast | FileRepMalware [Misc] |
Kaspersky | UDS:DangerousObject.Multi.Generic |
MicroWorld-eScan | Trojan.GenericKD.74894279 |
Rising | Trojan.Kryptik!8.8 (CLOUD) |
Emsisoft | Trojan.GenericKD.74894279 (B) |
F-Secure | Trojan.TR/AVI.Agent.krnss |
TrendMicro | Trojan.Win32.AMADEY.YXEKUZ |
McAfeeD | ti!96A60B6CDE63 |
CTX | exe.trojan.kryptik |
Sophos | Mal/Generic-S |
FireEye | Trojan.GenericKD.74894279 |
Detected | |
Avira | TR/AVI.Agent.krnss |
Kingsoft | Win32.Troj.Unknown.a |
Microsoft | Trojan:Win32/Malgent!MSR |
GData | Win64.Trojan.Agent.8POPZL |
Varist | W32/ABTrojan.WVVK-1888 |
McAfee | Artemis!FECD099F9B8D |
DeepInstinct | MALICIOUS |
Malwarebytes | Generic.Malware/Suspicious |
Ikarus | Trojan.Win64.Crypt |
Panda | Trj/Chgt.AD |
TrendMicro-HouseCall | Trojan.Win32.AMADEY.YXEKUZ |
Fortinet | Malicious_Behavior.SB |
AVG | FileRepMalware [Misc] |
Paloalto | generic.ml |
alibabacloud | Trojan:Win/Kryptik.EBO |