99eb1d90eb5f0d012f35fcc2a7dedd2229312794354843637ebb7f40b74d0809 (SHA256)
sample_file.doc
Created at 2018-04-20 18:19:00
Notifications (2/3)
Some extracted files may be missing in the report since the maximum number of extracted files was reached during the analysis. You can increase the limit in the configuration settings.
The overall sleep time of all monitored processes was truncated from "1 minute, 10 seconds" to "1 minute, 10 seconds" to reveal dormant functionality.
Severity | Category | Operation | Classification | |
---|---|---|---|---|
5/5
|
Anti Analysis | Tries to detect virtual machine | - | |
|
||||
5/5
|
File System | Modifies application directory | - | |
|
||||
|
||||
5/5
|
OS | Modifies certificate store | - | |
|
||||
|
||||
|
||||
|
||||
|
||||
5/5
|
File System | Creates an unusually large number of files | - | |
5/5
|
File System | Encrypts content of user files | Ransomware | |
|
||||
4/5
|
Process | Creates process | - | |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
4/5
|
File System | Associated with malicious files | Trojan | |
|
||||
|
||||
4/5
|
Network | Downloads data | Downloader | |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
3/5
|
Persistence | Installs system startup script or application | - | |
|
||||
3/5
|
Network | Performs DNS request | - | |
|
||||
|
||||
3/5
|
Browser | Reads data related to browser cookies | - | |
|
||||
3/5
|
Browser | Reads data related to browsing history | - | |
|
||||
3/5
|
Network | Checks external IP address | - | |
|
||||
3/5
|
PE | Executes dropped PE file | - | |
|
||||
|
||||
2/5
|
Network | Connects to HTTP server | - | |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
2/5
|
PE | Drops PE file | Dropper | |
|
||||
|
||||
2/5
|
VBA Macro | Executes application | - | |
|
||||
1/5
|
Process | Creates system object | - | |
|
||||
1/5
|
Process | Overwrites code | - | |
|
||||
1/5
|
VBA Macro | Executes macro on specific worksheet event | - | |
|