ScreenShot
Created 2024.05.17 10:12 Machine s1_win7_x6401
Filename ttt.hta
Type HTML document, ASCII text, with CRLF line terminators
AI Score Not founds Behavior Score
2.6
ZERO API file : clean
VT API (file) 23 detected (Valyria, Kimsuky, 0NA104EE24, SLoad, TOPIS, 3BSGVFy9i7O, Malgent, Running, ai score=81)
md5 b5080c0d123ce430f1e28c370a0fa18b
sha256 b3ab0b19478336a8c17ee9fd28ab6463df206b23f69c7e3b5eacc3efb11a0a95
ssdeep 48:l4f/6SpKMucAjeYqgt40qPH5qs+X4h8+rda88Zjz:jSVAhtWntMjz
imphash
impfuzzy
  Network IP location

Signature (6cnts)

Level Description
warning File has been identified by 23 AntiVirus engines on VirusTotal as malicious
watch Disables proxy possibly for traffic interception
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
info Checks amount of memory in system
info Queries for the computername

Rules (0cnts)

Level Name Description Collection

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
brandwizer.co.in DE Hetzner Online GmbH 5.9.123.217 mailcious
5.9.123.217 DE Hetzner Online GmbH 5.9.123.217 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure