d8ef1c4f64a05b1abf100044fcb7048c9526d175a114cb90bd134b80783da146 (SHA256)
Secure_Document_Plugin.hta
Created at 2018-02-15 18:28:00
Notifications (2/3)
Some memory dumps may be missing in the reports since the maximum number of dumps was reached during the analysis. You can increase the limit in the configuration settings.
Some memory dumps may be missing in the reports since the total dump size limit was reached during the analysis. You can increase the limit in the configuration settings.
The overall sleep time of all monitored processes was truncated from "11 minutes, 47 seconds" to "8 minutes, 50 seconds" to reveal dormant functionality.
Severity | Category | Operation | Classification | |
---|---|---|---|---|
5/5
|
Injection | Writes into the memory of another running process | - | |
|
||||
|
||||
5/5
|
Injection | Modifies control flow of another process | - | |
|
||||
|
||||
4/5
|
File System | Associated with malicious files | Trojan | |
|
||||
3/5
|
Device | Monitors keyboard input | Keylogger | |
|
||||
3/5
|
Anti Analysis | Delays execution | - | |
|
||||
2/5
|
Network | Performs DNS request | - | |
|
||||
2/5
|
Network | Downloads data | Downloader | |
|
||||
|
||||
|
||||
|
||||
|
||||
2/5
|
Network | Connects to HTTP server | - | |
|
||||
|
||||
|
||||
|
||||
|