8de655e6...32b8 | Yara
Try VMRay Analyzer
VTI SCORE: 100/100
Dynamic Analysis Report
Classification: Dropper, Downloader

8de655e68ab3408b1101cd0e5f4c3dbe1a361cbb2a5ee10888f5ad30b95332b8 (SHA256)

cm_coupon_6185.doc

Word Document

Created at 2018-11-26 15:52:00

Notifications (1/1)

The operating system was rebooted during the analysis.

YARA Information

Applied On Sample Files, PCAP File, Created Files, Modified Files, Process Dumps
Number of YARA matches 2
Ruleset Name Rule Name Rule Description File Type Filename Classification Severity Actions
Malicious-Documents Document_Contains_Execution_Commands Execution commands inside a document; possible dropper Sample File C:\Users\aETAdzjz\Desktop\cm_coupon_6185.doc -
3/5
Malicious-Documents Document_Contains_Execution_Commands Execution commands inside a document; possible dropper Sample File C:\Users\aETAdzjz\Desktop\cm_coupon_6185.doc -
3/5
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image