Report - CNOZ1237_3680420.js

ScreenShot
Created 2023.11.01 09:44 Machine s1_win7_x6401
Filename CNOZ1237_3680420.js
Type Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR, LF line terminators
AI Score Not founds Behavior Score
1.4
ZERO API file : clean
VT API (file) 2 detected (Malcode, gen105)
md5 8bc1516039ff6f4e48087ae01613c98a
sha256 8b9a3a70b676420ce03d9e6fb4c61d8d5e1eb7d342bc64064e9410efd9f802f5
ssdeep 3072:e8GOE2sZO+rPAeukQ9PiLdhp2t/D84ytZhkdbBQsl817hDVsl+13kyI2cH0u6/zR:6
imphash
impfuzzy
  Network IP location

Signature (3cnts)

Level Description
warning Uses WMI to create a new process
notice File has been identified by 2 AntiVirus engines on VirusTotal as malicious
info Queries for the computername

Rules (0cnts)

Level Name Description Collection

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure