Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | March 21, 2025, 9:09 a.m. | March 21, 2025, 9:24 a.m. |
-
-
svchost.exe "C:\Users\test22\AppData\Local\Temp\casos.exe"
2632
-
-
-
firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
2964
-
-
explorer.exe C:\Windows\Explorer.EXE
1452
IP Address | Status | Action |
---|---|---|
13.248.169.48 | Active | Moloch |
13.248.243.5 | Active | Moloch |
15.197.148.33 | Active | Moloch |
164.124.101.2 | Active | Moloch |
208.91.197.27 | Active | Moloch |
209.74.77.230 | Active | Moloch |
3.33.130.190 | Active | Moloch |
45.33.6.223 | Active | Moloch |
47.83.1.90 | Active | Moloch |
76.223.54.146 | Active | Moloch |
92.204.40.98 | Active | Moloch |
Suricata Alerts
Flow | SID | Signature | Category |
---|---|---|---|
TCP 192.168.56.101:49191 -> 13.248.243.5:80 | 2221033 | SURICATA HTTP Request abnormal Content-Encoding header | Generic Protocol Command Decode |
Suricata TLS
No Suricata TLS
description | calc.exe tried to sleep 162 seconds, actually delayed analysis time by 162 seconds |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ |
file | C:\Users\test22\AppData\Local\Chromium\User Data |
file | C:\Users\test22\AppData\Local\MapleStudio\ChromePlus\User Data |
file | C:\Users\test22\AppData\Local\Yandex\YandexBrowser\User Data |
file | C:\Users\test22\AppData\Local\Temp\sqlite3.dll |
file | C:\Users\test22\AppData\Local\Temp\sqlite3.dll |
section | {u'size_of_data': u'0x0005a200', u'virtual_address': u'0x000c7000', u'entropy': 7.8924406416381885, u'name': u'.rsrc', u'virtual_size': u'0x0005a10c'} | entropy | 7.89244064164 | description | A section with a high entropy has been found | |||||||||
entropy | 0.310374515712 | description | Overall entropy of this PE file is high |
file | C:\Users\test22\AppData\Local\AVAST Software\Browser\User Data |
file | C:\Users\test22\AppData\Local\AVG\Browser\User Data |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.AutoIt.4!c |
Cynet | Malicious (score: 99) |
CAT-QuickHeal | TrojanPWS.AutoIt.Zbot.S |
Skyhigh | BehavesLike.Win32.Formbook.tc |
ALYac | Trojan.GenericKD.76086617 |
Cylance | Unsafe |
VIPRE | Trojan.GenericKD.76086617 |
Sangfor | Virus.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
BitDefender | Trojan.GenericKD.76086617 |
K7GW | Trojan ( 005c2f651 ) |
K7AntiVirus | Trojan ( 005c2f651 ) |
Arcabit | Trojan.Generic.D488FD59 |
VirIT | Trojan.Win32.AutoIt_Heur.L |
Symantec | Trojan.Malautoit!g7 |
Elastic | malicious (high confidence) |
ESET-NOD32 | multiple detections |
APEX | Malicious |
Avast | Script:SNH-gen [Trj] |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Alibaba | Trojan:Win32/AutoitInject.1ebf214d |
MicroWorld-eScan | Trojan.GenericKD.76086617 |
Rising | Trojan.Injector/Autoit!1.1294D (CLASSIC) |
Emsisoft | Trojan.GenericKD.76086617 (B) |
F-Secure | Trojan.TR/AD.Swotter.njyml |
DrWeb | Trojan.AutoIt.1624 |
TrendMicro | TROJ_GEN.R06CC0DCH25 |
McAfeeD | ti!EDF37E0BD0E1 |
CTX | exe.trojan.autoit |
Sophos | Troj/AutoIt-DHB |
FireEye | Trojan.GenericKD.76086617 |
Detected | |
Avira | TR/AD.Swotter.njyml |
Kingsoft | malware.kb.a.836 |
Gridinsoft | Ransom.Win32.Wacatac.sa |
Microsoft | Trojan:Win32/AutoitInject!rfn |
ViRobot | Trojan.Win.Z.Autoit.1190400.L |
ZoneAlarm | Troj/AutoIt-DHB |
GData | Trojan.GenericKD.76086617 |
Varist | W32/AutoIt.QG.gen!Eldorado |
AhnLab-V3 | Trojan/AU3.Loader.S2988 |
McAfee | Artemis!7E45D87C02E2 |
DeepInstinct | MALICIOUS |
Malwarebytes | Backdoor.NetWiredRC.AutoIt.Generic |
Ikarus | Trojan.Autoit |
Panda | Trj/CI.A |
Zoner | Trojan.Win32.179540 |
TrendMicro-HouseCall | TROJ_GEN.R06CC0DCH25 |
Tencent | Script.Trojan.Generic.Ewnw |