Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | March 5, 2025, 10:09 a.m. | March 5, 2025, 10:11 a.m. |
-
-
svchost.exe "C:\Users\test22\AppData\Local\Temp\cssess.exe"
2656
-
-
-
firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
3004
-
-
explorer.exe C:\Windows\Explorer.EXE
1452
IP Address | Status | Action |
---|---|---|
13.248.169.48 | Active | Moloch |
13.248.243.5 | Active | Moloch |
15.197.148.33 | Active | Moloch |
164.124.101.2 | Active | Moloch |
208.91.197.27 | Active | Moloch |
209.74.77.230 | Active | Moloch |
3.33.130.190 | Active | Moloch |
45.33.6.223 | Active | Moloch |
47.83.1.90 | Active | Moloch |
76.223.54.146 | Active | Moloch |
92.204.40.98 | Active | Moloch |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
description | calc.exe tried to sleep 162 seconds, actually delayed analysis time by 162 seconds |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ |
file | C:\Users\test22\AppData\Local\Chromium\User Data |
file | C:\Users\test22\AppData\Local\MapleStudio\ChromePlus\User Data |
file | C:\Users\test22\AppData\Local\Yandex\YandexBrowser\User Data |
file | C:\Users\test22\AppData\Local\Temp\sqlite3.dll |
file | C:\Users\test22\AppData\Local\Temp\sqlite3.dll |
section | {u'size_of_data': u'0x0005be00', u'virtual_address': u'0x000c7000', u'entropy': 7.901697480570351, u'name': u'.rsrc', u'virtual_size': u'0x0005bdbc'} | entropy | 7.90169748057 | description | A section with a high entropy has been found | |||||||||
entropy | 0.314505776637 | description | Overall entropy of this PE file is high |
file | C:\Users\test22\AppData\Local\AVAST Software\Browser\User Data |
file | C:\Users\test22\AppData\Local\AVG\Browser\User Data |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.Autoit.4!c |
Cynet | Malicious (score: 100) |
CAT-QuickHeal | Trojan.Ghanarava.174107623811a8f7 |
Skyhigh | BehavesLike.Win32.Formbook.tc |
Cylance | Unsafe |
VIPRE | Trojan.GenericKD.75928506 |
Sangfor | Virus.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Trojan.GenericKD.75928506 |
Arcabit | Trojan.Generic.D48693BA |
VirIT | Trojan.Win32.AutoIt_Heur.L |
Symantec | Trojan.Malautoit!g7 |
Elastic | malicious (high confidence) |
ESET-NOD32 | a variant of Win32/Injector.Autoit.GXN |
APEX | Malicious |
Avast | Script:SNH-gen [Trj] |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Alibaba | Trojan:Win32/AutoitInject.d6aa8bff |
MicroWorld-eScan | Trojan.GenericKD.75928506 |
Rising | Trojan.Injector/Autoit!1.1294D (CLASSIC) |
Emsisoft | Trojan.GenericKD.75928506 (B) |
F-Secure | Trojan.TR/AutoIt.yqokl |
McAfeeD | ti!94F7B6CA0C9E |
CTX | exe.trojan.autoit |
Sophos | Mal/Generic-S |
FireEye | Generic.mg.868c0a40cf4219a4 |
Detected | |
Avira | TR/AutoIt.yqokl |
Antiy-AVL | Trojan/Win32.AutoitInject |
Kingsoft | Win32.Troj.Unknown.a |
Gridinsoft | Ransom.Win32.Zbot.sa |
Microsoft | Trojan:Win32/AutoitInject!rfn |
ViRobot | Trojan.Win.Z.Netwiredrc.1197568 |
GData | Win32.Trojan.Agent.4QD5WU |
Varist | W32/AutoIt.YQ.gen!Eldorado |
AhnLab-V3 | Trojan/AU3.Loader.S2970 |
McAfee | Artemis!868C0A40CF42 |
DeepInstinct | MALICIOUS |
VBA32 | Trojan.Autoit.Paket |
Malwarebytes | Backdoor.NetWiredRC.AutoIt.Generic |
Ikarus | Trojan.Win32.Injector |
Panda | Trj/CI.A |
Zoner | Trojan.Win32.179540 |
TrendMicro-HouseCall | TROJ_GEN.R06CH01C325 |
Tencent | Script.Trojan.Generic.Ekjl |
huorong | HEUR:TrojanSpy/AutoIT.Stealer.a |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | W32/Injector_Autoit.GXN!tr |
AVG | Script:SNH-gen [Trj] |