Play interactive tourEdit tour
Windows Analysis Report http://sndpkuruppampady.com/mrs--kavon-cole-dds/uozdogru-39.zip
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Potential browser exploit detected (process start blacklist hit)
Sample execution stops while process was sleeping (likely an evasion)
Classification
Process Tree |
---|
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
Click to jump to signature section
Show All Signature Results
Source: | File opened: | Jump to behavior |
Source: | Code function: | 11_2_028602A8 | |
Source: | Code function: | 11_2_028602A8 |
Source: | Process created: |
Networking: |
---|
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) | Show sources |
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |