Report - today.hta

Generic Malware Antivirus PowerShell
ScreenShot
Created 2025.02.03 09:54 Machine s1_win7_x6403
Filename today.hta
Type HTML document, ASCII text, with very long lines
AI Score Not founds Behavior Score
6.2
ZERO API
VT API (file) 12 detected (Malscript, gen11, jpdglv, amhb, Detected, Wacatac, OW4WSG, Jajl)
md5 3765f5e3fc9bd26f39b92ea55cdd57c3
sha256 851c1678aba9d222fc34bf56bbdf5e4018d9e0937b2b8b75a4269da92e6fbc8c
ssdeep 384:yXtAysbi3UKk+dxH97SNRMNsCx8sXoqw85RHEPSByYn4BYN+vR9/YEkiAlr266g3:eAy6GVk+dOazdtFPEY0yl6gsmfV7
imphash
impfuzzy
  Network IP location

Signature (15cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch Creates a suspicious Powershell process
watch File has been identified by 12 AntiVirus engines on VirusTotal as malicious
watch One or more non-whitelisted processes were created
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Creates a shortcut to an executable file
notice Creates a suspicious process
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info Queries for the computername
info Uses Windows APIs to generate a cryptographic key

Rules (3cnts)

Level Name Description Collection
warning Generic_Malware_Zero Generic Malware binaries (download)
watch Antivirus Contains references to security software binaries (download)
info PowerShell PowerShell script scripts

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
myfileview1.com UA TOV TRK Briz 195.66.213.164
195.66.213.164 UA TOV TRK Briz 195.66.213.164

Suricata ids



Similarity measure (PE file only) - Checking for service failure