Trend graph by period


Related keyword cloud
Top 100

# Trend Count Comparison
1AI 1 ▲ new
2Winning 1 ▲ new
3Combination 1 ▲ new
4critical 1 ▲ new
5gen 1 ▲ new
6attack 1 ▲ new
7CrowdStrike 1 ▲ new
Special keyword group
Top 5

Malware Type
Malware Type

This is the type of malware that is becoming an issue.


No data.

Attacker & Actors
Attacker & Actors

The status of the attacker or attack group being issued.


No data.

Attack technique
Technique

This is an attack technique that is becoming an issue.


No data.

Country & Company
Country & Company

This is a country or company that is an issue.


Keyword Average Label
CrowdStrike
1 (100%)

Additional information

No Request Hash(md5) Report No Date
1 askinstall31.exe
Gen
9d1b497b9d05f015cc768ee06fe6050d100452021.04.01
2 askinstall32.exe
Gen
5daa2140732ce865b202962807d107b1100462021.04.01
3asse9e3x.rar
Gen
3d0fffa0fe157c3bffb917e6a8d9da2e100622021.04.01
4 iexplore.exe
Gen
c50eeb216ab9f7e9b375270426c4dfd699452021.03.30
5 r10.dll
Emotet Gen
f3da2faeed91df74170149fc4420ef0998022021.03.27
View only the last 5
Level Description
danger File has been identified by 38 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Drops 100 unknown file mime types indicative of ransomware writing encrypted files back to disk
watch One or more non-whitelisted processes were created
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice An application raised an exception which may be indicative of an exploit crash
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Drops an executable to the user AppData folder
notice Executes one or more WMI queries
notice Foreign language identified in PE resource
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Queries for potentially installed applications
notice Resolves a suspicious Top Level Domain (TLD)
notice Sends data using the HTTP POST Method
notice Steals private information from local Internet browsers
notice Terminates another process
notice Uses Windows utilities for basic Windows functionality
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Command line console output was observed
info One or more processes crashed
info Queries for the computername
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info The file contains an unknown PE resource name possibly indicative of a packer
info This executable has a PDB path
info Tries to locate where the browsers are installed
No data
No data
Beta Service, If you select keyword, you can check detailed information.