Malicious doc with Embedded SettingContent-ms | Yara
Try VMRay Analyzer
VTI SCORE: 91/100
Dynamic Analysis Report
Classification: Trojan

3c6a74d216e10e4ff158716cfa72984230995041c4bbb7596b8c8aaa461d76c5 (SHA256)

ggzn.doc

Word Document

Created at 2018-08-06 13:03:00

YARA Information

Applied On Sample Files, PCAP File, Created Files, Modified Files, Process Dumps
Number of YARA matches 2
Ruleset Name Rule Name Rule Description File Type Filename Classification Severity Actions
Malicious-Documents Document_Office_SettingContentMS Document contains SettingContent-ms DeepLink tags Sample File C:\Users\Nd9E1FYi\Desktop\ggzn.doc -
3/5
Malicious-Documents Document_Office_SettingContentMS Document contains SettingContent-ms DeepLink tags Sample File C:\Users\Nd9E1FYi\Desktop\ggzn.doc -
3/5
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image