emotet_e2_2d2fa29185ad0f48f665f9c93cc8282d3eeca9c848543453cd223333ea2485b4_2019-03-15__142003.doc
Created at 2019-04-14T14:36:00
VMRay Threat Indicators (13 rules, 26 matches)
Severity | Category | Operation | Classification | |
---|---|---|---|---|
5/5
|
Local AV | Malicious content was detected by heuristic scan | - | |
|
||||
5/5
|
File System | Known malicious file | Downloader | |
|
||||
4/5
|
Process | Tries to create process | - | |
|
||||
4/5
|
Network | Reads network adapter information | - | |
|
||||
4/5
|
Network | Associated with known malicious/suspicious URLs | - | |
|
||||
3/5
|
Network | Performs DNS request | - | |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
3/5
|
Network | Connects to remote host | - | |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
2/5
|
Network | Connects to HTTP server | - | |
|
||||
|
||||
|
||||
|
||||
2/5
|
VBA Macro | Executes macro on specific worksheet event | - | |
|
||||
1/5
|
Process | Creates system object | - | |
|
||||
1/5
|
Static | Unparsable sections in file | - | |
|
||||
1/5
|
Static | Contains suspicious meta data | - | |
|
||||
1/5
|
VBA Macro | Contains Office macro | - | |
|
||||
Screenshots
Monitored Processes
Sample Information
Analysis Information
Creation Time | 2019-04-14 16:36 (UTC+2) |
Analysis Duration | 00:05:09 |
Number of Monitored Processes | 4 |
Execution Successful | |
Reputation Enabled | |
WHOIS Enabled | |
Local AV Enabled | |
YARA Enabled | |
Number of AV Matches | 1 |
Number of YARA Matches | 0 |
Termination Reason | Timeout |
Tags |