Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6401 | March 27, 2025, 10:26 a.m. | March 27, 2025, 10:30 a.m. |
-
-
svchost.exe "C:\Users\test22\AppData\Local\Temp\smss.exe"
2656
-
-
-
firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
744
-
-
explorer.exe C:\Windows\Explorer.EXE
1452
Suricata Alerts
No Suricata Alerts
Suricata TLS
No Suricata TLS
request | POST http://www.thykingdomwear.store/d4kl/ |
request | GET http://www.thykingdomwear.store/d4kl/?I6R=6y/7tod/VF/KHUQrV86FV1ihe0BbPNGslXhDnWhvAY/z/yk3pdRRQF6GYRzEXLwzPkLfgXQPYCfY/S6T4WCCHwFD6OSGGyFNlaGQyl1+3f4SIz7ZLJZ5qpg0iEyExcTa0BsdMD8=&ljR=Iz85YQJnHWZHac |
request | GET http://www.sqlite.org/2020/sqlite-dll-win32-x86-3310000.zip |
request | POST http://www.worrr37.yachts/1imc/ |
request | GET http://www.worrr37.yachts/1imc/?I6R=GkZ+7lZN5ZbT6rZAkp7cmEqKOumTFqiR2eAXidPe90Y9rybDHdv8WEO3bqVeNbApXiU349333fnXtngssFNkiuaTeAutzCI3gCL6zAngbJ7QtBnn/nQUnSrlmVSOL2qjs5+ApuY=&ljR=Iz85YQJnHWZHac |
request | POST http://www.soportemx-findmy.click/ma0g/ |
request | GET http://www.soportemx-findmy.click/ma0g/?I6R=H2S90RmziCMvLCuKzCWRDlD3y3BtNHnT+UjWuF5QkK5TSoHa4lhKfuVBBY/xZDIxlQkHSEeXC/2MO32woOoJhNRwlvINmE2f4iVb+1X59xwMoslpnGs7ObjFC0D//e/oO9N1DbU=&ljR=Iz85YQJnHWZHac |
request | POST http://www.blackhat.chat/04r3/ |
request | GET http://www.blackhat.chat/04r3/?I6R=n6ptdLvBCapBX+1fElutzba0a7uE9eG0wfWRjljnFiAjsKOl5dK9teWSxudrp/fd2hdpq33fNLGhTnjbgPmmmscCvJyHpqpFiDM0gpsTKvcGZKjqIPo/V0Z/+sXcSCfPLWsGCsk=&ljR=Iz85YQJnHWZHac |
request | POST http://www.vczuahand.xyz/lvz4/ |
request | GET http://www.vczuahand.xyz/lvz4/?I6R=Xs1PCb/MaYPIPAxC7BfyCKw16Qgph55MCQOIGo7Nl8rFa4QZz+K5W1hPLI1607tRp9GgCJ7X+mzA4XqXnNSoEuvlRvhKlR8DhXdkfyq/HZqiPbu8fNkzPsjR0Pgy51mK7LA9YuI=&ljR=Iz85YQJnHWZHac |
request | POST http://www.855696a.xyz/q86a/ |
request | GET http://www.855696a.xyz/q86a/?I6R=1RS/DLESjC/mKKX8IPepHWQ88RxDP1aCo7MGFq+OZJ2Pg2HsdXdlT2xsvmE392eXqb9P0SMm051Cq8Esu/QKUYNbRkYSrCwvHfCGfAn42Vd7BejAa9lxaTExsZlL8Og3FAv4dqc=&ljR=Iz85YQJnHWZHac |
request | POST http://www.headset2.online/pl23/ |
request | GET http://www.headset2.online/pl23/?I6R=pwQm/8Nry++CWhwQEObW40wjaH0cvm6b9cWiDzs/wKG7gU2SU1fIKPFVOtmRZIK9fJNQxDIjM5M/HYIVgiqppyTz/0XbM+5YC9JKCqzZT3SFByiwC2iSKSo+zn41b6GRTqaovhk=&ljR=Iz85YQJnHWZHac |
request | POST http://www.futureedge.website/q4wg/ |
request | POST http://www.thykingdomwear.store/d4kl/ |
request | POST http://www.worrr37.yachts/1imc/ |
request | POST http://www.soportemx-findmy.click/ma0g/ |
request | POST http://www.blackhat.chat/04r3/ |
request | POST http://www.vczuahand.xyz/lvz4/ |
request | POST http://www.855696a.xyz/q86a/ |
request | POST http://www.headset2.online/pl23/ |
request | POST http://www.futureedge.website/q4wg/ |
description | AtBroker.exe tried to sleep 153 seconds, actually delayed analysis time by 153 seconds |
file | C:\Users\test22\AppData\Local\Google\Chrome\User Data\ |
file | C:\Users\test22\AppData\Local\Chromium\User Data |
file | C:\Users\test22\AppData\Local\MapleStudio\ChromePlus\User Data |
file | C:\Users\test22\AppData\Local\Yandex\YandexBrowser\User Data |
file | C:\Users\test22\AppData\Local\Temp\sqlite3.dll |
file | C:\Users\test22\AppData\Local\Temp\sqlite3.dll |
section | {u'size_of_data': u'0x0005bc00', u'virtual_address': u'0x000c7000', u'entropy': 7.89632070140917, u'name': u'.rsrc', u'virtual_size': u'0x0005ba58'} | entropy | 7.89632070141 | description | A section with a high entropy has been found | |||||||||
entropy | 0.314212328767 | description | Overall entropy of this PE file is high |
file | C:\Users\test22\AppData\Local\AVAST Software\Browser\User Data |
file | C:\Users\test22\AppData\Local\AVG\Browser\User Data |
Bkav | W32.AIDetectMalware |
Lionic | Trojan.Win32.AutoIt.4!c |
Cynet | Malicious (score: 99) |
CAT-QuickHeal | TrojanPWS.AutoIt.Zbot.S |
Skyhigh | BehavesLike.Win32.Formbook.tc |
Cylance | Unsafe |
Sangfor | Virus.Win32.Save.a |
CrowdStrike | win/malicious_confidence_100% (W) |
VirIT | Trojan.Win32.AutoIt_Heur.L |
Symantec | Trojan.Malautoit!g7 |
Elastic | malicious (high confidence) |
ESET-NOD32 | multiple detections |
APEX | Malicious |
Avast | FileRepMalware [Trj] |
Kaspersky | UDS:DangerousObject.Multi.Generic |
Alibaba | Trojan:Script/Injector.b8fdf53f |
Rising | Trojan.Injector/Autoit!1.1294D (CLASSIC) |
F-Secure | Trojan.TR/AD.Swotter.mzyvw |
DrWeb | Trojan.AutoIt.1626 |
TrendMicro | TROJ_GEN.R06CC0DCQ25 |
McAfeeD | ti!07610C4FDA6B |
CTX | exe.trojan.autoit |
Sophos | Mal/AuItInj-C |
Detected | |
Avira | TR/AD.Swotter.mzyvw |
Kingsoft | malware.kb.a.833 |
Gridinsoft | Ransom.Win32.Wacatac.sa |
Microsoft | Trojan:Win32/Phonzy.A!ml |
ZoneAlarm | Mal/AuItInj-D |
GData | Win32.Trojan.Agent.IOQYDQ |
Varist | W32/AutoIt.QG.gen!Eldorado |
AhnLab-V3 | Trojan/AU3.Loader.S2970 |
McAfee | Artemis!D444A977328B |
DeepInstinct | MALICIOUS |
Malwarebytes | Backdoor.NetWiredRC.AutoIt.Generic |
Ikarus | Trojan.Autoit |
Zoner | Trojan.Win32.179540 |
TrendMicro-HouseCall | TROJ_GEN.R06CC0DCQ25 |
Tencent | Script.Trojan.Generic.Rzfl |
huorong | HEUR:TrojanSpy/AutoIT.Stealer.a |
MaxSecure | Trojan.Malware.300983.susgen |
Fortinet | AutoIt/Injector.GKX!tr |
AVG | FileRepMalware [Trj] |
alibabacloud | Trojan:Win/AutoitInject.ZJC2XJC |