VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: |
Exploit
Downloader
Spyware
|
Threat Names: |
MailPassView
Exploit.RTF-ObfsObjDat.Gen
Gen:Variant.Ser.MSILPerseus.3740
...
|
gymhei.rtf
RTF Document
Created at 2020-03-09T01:30:00
Remarks (1/1)
(0x02000010): The operating system was rebooted during the analysis.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\aETAdzjz\Desktop\gymhei.rtf | Sample File | RTF |
Malicious
|
...
|
»
Office Information
»
Controls (1)
»
CLSID | Control Name | Associated Vulnerability |
---|---|---|
{00021700-0000-0000-C000-000000000046} | Equation3 | CVE-2017-11882 |
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Exploit.RTF-ObfsObjDat.Gen |
Malicious
|
C:\Users\aETAdzjz\AppData\Roaming\poiuytrewsdfghjk.exe | Downloaded File | Binary |
Malicious
|
...
|
»
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Variant.Ser.MSILPerseus.3740 |
Malicious
|
C:\Users\aETAdzjz\AppData\Local\Temp\tmp139F.tmp | Dropped File | Text |
Whitelisted
|
...
|
»
c:\users\aetadzjz\appdata\roaming\microsoft\windows\ietldcache\index.dat | Modified File | Stream |
Unknown
|
...
|
»
C:\Users\aETAdzjz\AppData\Local\Temp\32f4c789-19cd-4310-170a-5756ff13bdf0 | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\aETAdzjz\AppData\Local\Temp\tmpD0F4.tmp | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\aETAdzjz\AppData\Local\Temp\d2b24b39-a0dd-85cb-81d9-1a92584567e6 | Dropped File | Text |
Unknown
|
...
|
»
C:\Users\aETAdzjz\AppData\Local\Temp\tmp915.tmp | Dropped File | Text |
Unknown
|
...
|
»