Dynamic Analysis Report |
Classification: Trojan, Dropper, Downloader, Spyware, Backdoor, Exploit |
a7aae83573aa9a682ce9733468882e841564f41ec4aa004cb795b98fd4834d15 (SHA256)
SS BRAID PO.doc.rtf
Created at 2018-09-05 20:13:00
Notifications (2/2)
The maximum number of reputation URL requests (25 per analysis) was exceeded. As a result, the reputation status could not be queried for all contacted URLs. In order to get the reputation status for all contacted URLs, please increase the 'Max URL Requests' setting in the system configurations.
The overall sleep time of all monitored processes was truncated from "16 minutes, 44 seconds" to "2 minutes, 10 seconds" to reveal dormant functionality.
This list contains only the embedded files and created files
Filters: |
There are no files for this filter
Filename | Category | Type | Severity | Actions |
---|
C:\Users\aETAdzjz\Desktop\SS BRAID PO.doc.rtf | Sample File | Text |
Blacklisted
|
...
|
Severity |
Blacklisted
|
First Seen | 2018-09-05 04:25 (UTC+2) |
Last Seen | 2018-09-05 20:59 (UTC+2) |
Names | Document-Word.Exploit.CVE-2017-11882 |
Families | CVE-2017-11882 |
Classification | Exploit |
C:\Users\aETAdzjz\AppData\Roaming\jsjhdhdhdhjfjhhf.exe | Modified File | Binary |
Suspicious
|
...
|
Severity |
Suspicious
|
First Seen | 2018-09-05 04:34 (UTC+2) |
Last Seen | 2018-09-05 18:30 (UTC+2) |
Names | Win32.Trojan.Injector |
Families | Injector |
Classification | Trojan |
Image Base | 0x400000 |
Entry Point | 0x5143ee |
Size Of Code | 0x112400 |
Size Of Initialized Data | 0xa00 |
File Type | executable |
Subsystem | windows_gui |
Machine Type | i386 |
Compile Timestamp | 1993-04-04 10:19:39+00:00 |
Assembly Version | 0.0.0.0 |
LegalCopyright | Copyright © 2018 M & T Bank Corporation |
InternalName | ORDER#mm.exe |
FileVersion | 17.4.20.2 |
CompanyName | M & T Bank Corporation |
Comments | olikeqogumugiyewuzamah |
ProductName | Andersen Consulting |
ProductVersion | 17.4.20.2 |
FileDescription | Andersen Consulting |
OriginalFilename | ORDER#mm.exe |
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x402000 | 0x1123f4 | 0x112400 | 0x200 | cnt_code, mem_execute, mem_read | 6.55 |
.rsrc | 0x516000 | 0x630 | 0x800 | 0x112600 | cnt_initialized_data, mem_read | 4.66 |
.reloc | 0x518000 | 0xc | 0x200 | 0x112e00 | cnt_initialized_data, mem_discardable, mem_read | 0.1 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_CorExeMain | 0x0 | 0x402000 | 0x1143c0 | 0x1125c0 | 0x0 |
Severity |
Whitelisted
|
First Seen | 2013-05-30 00:20 (UTC+2) |
Last Seen | 2018-08-07 19:58 (UTC+2) |
c:\users\aetadzjz\appdata\roaming\microsoft\windows\ietldcache\index.dat | Modified File | Stream |
Unknown
|
...
|
c:\users\aetadzjz\appdata\local\gdipfontcachev1.dat | Modified File | Stream |
Unknown
|
...
|