Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | Dec. 6, 2024, 9:30 a.m. | Dec. 6, 2024, 9:41 a.m. |
-
-
ClientServices.tmp "C:\Users\test22\AppData\Local\Temp\is-H1S20.tmp\ClientServices.tmp" /SL5="$30028,965278,203776,C:\Users\test22\AppData\Local\Temp\ClientServices.exe"
2052-
cmd.exe "cmd.exe" /C timeout /T 3 & "C:\Users\test22\AppData\Local\Temp\ClientServices.exe" /VERYSILENT /SUPPRESSMSGBOXES
2140-
timeout.exe timeout /T 3
2200 -
ClientServices.exe "C:\Users\test22\AppData\Local\Temp\ClientServices.exe" /VERYSILENT /SUPPRESSMSGBOXES
2268-
ClientServices.tmp "C:\Users\test22\AppData\Local\Temp\is-KAKL3.tmp\ClientServices.tmp" /SL5="$20196,965278,203776,C:\Users\test22\AppData\Local\Temp\ClientServices.exe" /VERYSILENT /SUPPRESSMSGBOXES
2312-
regsvr32.exe "regsvr32.exe" /s /i:INSTALL "C:\Users\test22\AppData\Roaming\\HollowSwallow.dll"
2360
-
-
-
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
section | .itext |
file | C:\Users\test22\AppData\Local\Temp\is-SH3NT.tmp\_isetup\_shfoldr.dll |
file | C:\Users\test22\AppData\Local\Temp\is-JLGN8.tmp\_isetup\_shfoldr.dll |
cmdline | "cmd.exe" /C timeout /T 3 & "C:\Users\test22\AppData\Local\Temp\ClientServices.exe" /VERYSILENT /SUPPRESSMSGBOXES |
cmdline | "regsvr32.exe" /s /i:INSTALL "C:\Users\test22\AppData\Roaming\\HollowSwallow.dll" |
file | C:\Users\test22\AppData\Local\Temp\is-JLGN8.tmp\_isetup\_shfoldr.dll |
file | C:\Users\test22\AppData\Local\Temp\is-KAKL3.tmp\ClientServices.tmp |
Bkav | W32.Common.035BD19C |
Lionic | Trojan.Win32.Generic.4!c |
Cynet | Malicious (score: 99) |
Skyhigh | BehavesLike.Win32.Dropper.tc |
ALYac | Gen:Variant.Babar.565469 |
Cylance | Unsafe |
VIPRE | Gen:Variant.Babar.565469 |
CrowdStrike | win/grayware_confidence_60% (W) |
BitDefender | Gen:Variant.Babar.565469 |
K7GW | Trojan ( 005bcd531 ) |
K7AntiVirus | Trojan ( 005bcd531 ) |
Arcabit | Trojan.Babar.D8A0DD |
Symantec | Trojan.Gen.MBT |
ESET-NOD32 | a variant of Win32/Kryptik.HYFM |
Avast | Win32:MalwareX-gen [Trj] |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Alibaba | Trojan:Win32/Kryptik.26685c52 |
MicroWorld-eScan | Gen:Variant.Babar.565469 |
Rising | Trojan.Kryptik!8.8 (CLOUD) |
Emsisoft | Gen:Variant.Babar.565469 (B) |
F-Secure | Trojan.TR/Crypt.Agent.bcywy |
TrendMicro | Trojan.Win32.SMOKELOADER.YXELDZ |
McAfeeD | ti!8F95965E8D66 |
CTX | exe.trojan.kryptik |
Sophos | Generic Reputation PUA (PUA) |
FireEye | Gen:Variant.Babar.565469 |
Detected | |
Avira | TR/Crypt.Agent.kwcue |
Antiy-AVL | Trojan/Win32.Kryptik |
Kingsoft | Win32.Troj.Unknown.a |
Microsoft | Trojan:Win32/Znyonm |
GData | Gen:Variant.Babar.565469 |
Varist | W32/ABTrojan.DMLQ-4759 |
AhnLab-V3 | Trojan/Win.Generic.C5702813 |
McAfee | Artemis!AFDCB2B1B8FA |
DeepInstinct | MALICIOUS |
VBA32 | TrojanDownloader.Deyma |
Ikarus | Trojan.Win32.Crypt |
TrendMicro-HouseCall | Trojan.Win32.SMOKELOADER.YXELDZ |
Tencent | Win32.Trojan.Crypt.Ydkl |
MaxSecure | Trojan.Malware.1728101.susgen |
Fortinet | W32/Kryptik.HYFM!tr |
AVG | Win32:MalwareX-gen [Trj] |
Paloalto | generic.ml |
alibabacloud | Trojan:Win/Babar.Gen |