e6ba4bd149bfa84ab57c7926c7635e162e459d0e9e419bb3c8d8af8e41c043c9 (SHA256)
sample.doc
Created at 2019-02-21 17:24:00
Notifications (1/1)
The operating system was rebooted during the analysis.
Severity | Category | Operation | Classification | |
---|---|---|---|---|
4/5
|
Process | Creates process | - | |
|
||||
|
||||
|
||||
|
||||
4/5
|
Network | Downloads data | Downloader | |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
3/5
|
Network | Performs DNS request | - | |
|
||||
|
||||
|
||||
|
||||
3/5
|
Persistence | Installs system startup script or application | - | |
|
||||
3/5
|
Network | Connects to remote host | - | |
|
||||
|
||||
|
||||
|
||||
3/5
|
PE | Executes dropped PE file | - | |
|
||||
|
||||
2/5
|
File System | Known suspicious file | - | |
|
||||
2/5
|
Network | Connects to HTTP server | - | |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
2/5
|
PE | Drops PE file | Dropper | |
|
||||
|
||||
2/5
|
VBA Macro | Executes macro on specific worksheet event | - | |
|
||||
1/5
|
Process | Creates system object | - | |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
1/5
|
Static | Unparsable sections in file | - | |
|
||||
1/5
|
Static | Contains suspicious meta data | - | |
|
||||
1/5
|
VBA Macro | Contains Office macro | - | |
|