6dd9d1ae591aa1c238d27b7d29b4d16775e02350637efc7659a7de6b062aa9d7 (SHA256)
Documento.doc
Created at 2018-11-24 01:38:00
Notifications (1/1)
The operating system was rebooted during the analysis.
Severity | Category | Operation | Classification | |
---|---|---|---|---|
4/5
|
Process | Creates process | - | |
|
||||
|
||||
|
||||
|
||||
4/5
|
File System | Known malicious file | Trojan | |
|
||||
|
||||
4/5
|
Network | Downloads data | Downloader | |
|
||||
|
||||
|
||||
|
||||
3/5
|
PE | Executes dropped PE file | - | |
|
||||
3/5
|
YARA | YARA match | - | |
|
||||
2/5
|
Network | Associated with known malicious/suspicious URLs | - | |
|
||||
|
||||
2/5
|
Network | Connects to HTTP server | - | |
|
||||
|
||||
|
||||
|
||||
2/5
|
PE | Drops PE file | Dropper | |
|
||||
2/5
|
VBA Macro | Executes macro on specific worksheet event | - | |
|
||||
1/5
|
Process | Creates system object | - | |
|
||||
|
||||
|
||||
|
||||
1/5
|
Static | Contains suspicious meta data | - | |
|
||||
1/5
|
VBA Macro | Contains Office macro | - | |
|