Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Dec. 1, 2024, 12:37 p.m. | Dec. 1, 2024, 12:40 p.m. |
-
AcroRd32.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" C:\Users\test22\AppData\Local\Temp\kim.url.pdf
1072
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
164.124.101.2 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
request | GET http://acroipm2.adobe.com/20/rdr/ENU/win/nooem/none/consumer/279_20_6_20042.zip |
request | GET http://acroipm2.adobe.com/20/rdr/ENU/win/nooem/none/consumer/281_20_6_20042.zip |
request | GET http://acroipm2.adobe.com/20/rdr/ENU/win/nooem/none/consumer/277_20_6_20042.zip |
request | GET http://acroipm2.adobe.com/20/rdr/ENU/win/nooem/none/consumer/280_20_6_20042.zip |
request | GET http://acroipm2.adobe.com/20/rdr/ENU/win/nooem/none/consumer/message.zip |
CTX | internetshortcut.downloader.generic |
VIPRE | Gen:Variant.UrlDownloader.13 |
BitDefender | Gen:Variant.UrlDownloader.13 |
NANO-Antivirus | Trojan.Inf.Downloader.ezohxo |
MicroWorld-eScan | Gen:Variant.UrlDownloader.13 |
FireEye | Gen:Variant.UrlDownloader.13 |
Kingsoft | Script.Troj.SuspLnk.22147 |
cmdline | "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043 |
parent_process | acrord32.exe | martian_process | "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043 |