Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6403_us | March 26, 2025, 11:12 a.m. | March 26, 2025, 11:30 a.m. |
-
-
-
cmd.exe "C:\Windows\sysnative\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\C0BB.tmp\C0BC.tmp\C0CC.bat C:\Users\test22\AppData\Local\Temp\11.exe"
2140
-
-
Name | Response | Post-Analysis Lookup |
---|---|---|
No hosts contacted. |
IP Address | Status | Action |
---|---|---|
No hosts contacted. |
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
pdb_path | D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb |
section | .didat |
file | C:\Users\test22\AppData\Local\Temp\C0BB.tmp\C0BC.tmp\C0CC.bat |
file | C:\Users\test22\AppData\Local\Temp\11.exe |
file | C:\Users\test22\AppData\Local\Temp\C406.tmp\C407.tmp\C428.bat |
cmdline | "C:\Windows\sysnative\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\C406.tmp\C407.tmp\C428.bat C:\Users\test22\AppData\Local\Temp\11.exe go" |
cmdline | "C:\Windows\sysnative\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\C0BB.tmp\C0BC.tmp\C0CC.bat C:\Users\test22\AppData\Local\Temp\11.exe" |
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | C:\Windows\sysnative\cmd /c "C:\Users\test22\AppData\Local\Temp\C406.tmp\C407.tmp\C428.bat C:\Users\test22\AppData\Local\Temp\11.exe go" |
cmdline | C:\Windows\sysnative\cmd /c "C:\Users\test22\AppData\Local\Temp\C0BB.tmp\C0BC.tmp\C0CC.bat C:\Users\test22\AppData\Local\Temp\11.exe" |
cmdline | "C:\Windows\sysnative\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\C406.tmp\C407.tmp\C428.bat C:\Users\test22\AppData\Local\Temp\11.exe go" |
cmdline | "C:\Windows\sysnative\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\C0BB.tmp\C0BC.tmp\C0CC.bat C:\Users\test22\AppData\Local\Temp\11.exe" |
cmdline | sc start ddrver |
cmdline | sc create ddrver type= kernel binPath= "C:\Users\test22\AppData\Local\Temp\ssisd.sys" |
Lionic | Trojan.Win32.GenCBL.4!c |
CAT-QuickHeal | Trojan.Ghanarava.1742853193cb6765 |
Skyhigh | BehavesLike.Win32.RealProtect.fh |
ALYac | Zum.Razy.1 |
Cylance | Unsafe |
VIPRE | Trojan.GenericKD.76023058 |
Sangfor | Trojan.Win32.Gencbl.Vnig |
CrowdStrike | win/malicious_confidence_60% (W) |
BitDefender | Trojan.GenericKD.76023058 |
K7GW | Trojan ( 005c40e51 ) |
K7AntiVirus | Trojan ( 005c40e51 ) |
Arcabit | Trojan.Generic.D4880512 [many] |
VirIT | Trojan.Win32.Genus.IHW |
Symantec | Trojan Horse |
ESET-NOD32 | a variant of Win32/GenCBL.FRW |
Avast | Win64:MalwareX-gen [Trj] |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Alibaba | Trojan:Win32/GenCBL.e2a95cb6 |
MicroWorld-eScan | Trojan.GenericKD.76023058 |
Rising | Trojan.MalCert!1.101B3 (CLASSIC) |
Emsisoft | Trojan.GenericKD.76023058 (B) |
TrendMicro | Trojan.Win32.AMADEY.YXFCXZ |
McAfeeD | ti!493B897D1A54 |
Trapmine | suspicious.low.ml.score |
CTX | exe.trojan.gencbl |
Sophos | Mal/Generic-S |
SentinelOne | Static AI - Suspicious SFX |
FireEye | Generic.mg.f0676528d1fc19da |
Detected | |
Antiy-AVL | GrayWare/Win32.Puwaders |
Gridinsoft | Ransom.Win32.Wacatac.sa |
Microsoft | Trojan:Win32/Etset!rfn |
ViRobot | Trojan.Win.Z.Agent.335469 |
GData | Win32.Trojan.Agent.HS9404 |
Varist | W64/ABTrojan.QVCK-1613 |
McAfee | Artemis!F0676528D1FC |
DeepInstinct | MALICIOUS |
VBA32 | Trojan.BAT.KillFiles |
Malwarebytes | Malware.AI.4005561822 |
Ikarus | Win32.Outbreak |
Panda | Trj/Chgt.AD |
Zoner | Trojan.Win32.85523 |
TrendMicro-HouseCall | Trojan.Win32.AMADEY.YXFCXZ |
Tencent | Win32.Trojan.Generic.Dnhl |
Fortinet | W32/PossibleThreat |
AVG | Win64:MalwareX-gen [Trj] |
Paloalto | generic.ml |
alibabacloud | Trojan:Win/GenCBL.FVL |