a7aae83573aa9a682ce9733468882e841564f41ec4aa004cb795b98fd4834d15 (SHA256)
SS BRAID PO.doc.rtf
Created at 2018-09-05 20:13:00
Notifications (2/2)
The maximum number of reputation URL requests (25 per analysis) was exceeded. As a result, the reputation status could not be queried for all contacted URLs. In order to get the reputation status for all contacted URLs, please increase the 'Max URL Requests' setting in the system configurations.
The overall sleep time of all monitored processes was truncated from "16 minutes, 44 seconds" to "2 minutes, 10 seconds" to reveal dormant functionality.
Severity | Category | Operation | Classification | |
---|---|---|---|---|
5/5
|
Anti Analysis | Tries to detect virtual machine | - | |
|
||||
5/5
|
Injection | Writes into the memory of another running process | - | |
|
||||
5/5
|
Injection | Writes into the memory of a process running from a created or modified executable | - | |
|
||||
5/5
|
Injection | Modifies control flow of another process | - | |
|
||||
5/5
|
Injection | Modifies control flow of a process running from a created or modified executable | - | |
|
||||
5/5
|
Network | Sets up server that accepts incoming connections | Backdoor | |
|
||||
4/5
|
Network | Downloads file | Downloader | |
|
||||
4/5
|
Process | Creates process | - | |
|
||||
|
||||
|
||||
4/5
|
Process | Reads from memory of another process | - | |
|
||||
4/5
|
Information Stealing | Reads browser data | - | |
|
||||
4/5
|
File System | Known malicious file | Exploit | |
|
||||
4/5
|
Network | Downloads data | Downloader | |
|
||||
3/5
|
Persistence | Installs system startup script or application | - | |
|
||||
3/5
|
Network | Performs DNS request | - | |
|
||||
|
||||
|
||||
3/5
|
Browser | Reads data related to browsing history | - | |
|
||||
3/5
|
Browser | Reads data related to saved browser credentials | - | |
|
||||
|
||||
3/5
|
Information Stealing | Reads cryptocurrency wallet locations | Spyware | |
|
||||
3/5
|
Anti Analysis | Delays execution | - | |
|
||||
3/5
|
Network | Checks external IP address | - | |
|
||||
3/5
|
Network | Connects to remote host | - | |
|
||||
3/5
|
PE | Executes dropped PE file | - | |
|
||||
2/5
|
File System | Known suspicious file | Trojan | |
|
||||
2/5
|
Network | Associated with known malicious/suspicious URLs | - | |
|
||||
2/5
|
Network | Connects to HTTP server | - | |
|
||||
2/5
|
PE | Drops PE file | Dropper | |
|
||||
1/5
|
Process | Creates system object | - | |
|