Info_Project_BSV_2019.docm
Created at 2019-06-18T08:41:00
VMRay Threat Indicators (10 rules, 14 matches)
Severity | Category | Operation | Count | Classification | |
---|---|---|---|---|---|
5/5
|
Local AV | Malicious content was detected by heuristic scan | 4 | - | |
|
|||||
|
|||||
|
|||||
|
|||||
4/5
|
Process | Tries to create process | 1 | - | |
|
|||||
4/5
|
Network | Downloads file | 1 | Downloader | |
|
|||||
3/5
|
YARA | YARA match | 2 | - | |
|
|||||
|
|||||
2/5
|
Network | Connects to HTTP server | 1 | - | |
|
|||||
2/5
|
VBA Macro | Executes macro on specific event | 1 | - | |
|
|||||
2/5
|
VBA Macro | Creates suspicious COM object | 1 | - | |
|
|||||
1/5
|
Static | Contains suspicious meta data | 1 | - | |
|
|||||
1/5
|
VBA Macro | Contains Office macro | 1 | - | |
|
|||||
1/5
|
Static | Contains known suspicious class identifier | 1 | - | |
|
Screenshots
Monitored Processes
Sample Information
Analysis Information
Creation Time | 2019-06-18 10:41 (UTC+2) |
Analysis Duration | 00:04:31 |
Number of Monitored Processes | 2 |
Execution Successful |
![]() |
Reputation Enabled |
![]() |
WHOIS Enabled |
![]() |
Local AV Enabled |
![]() |
YARA Enabled |
![]() |
Number of AV Matches | 4 |
Number of YARA Matches | 2 |
Termination Reason | Timeout |
Tags |