3985bc09caa13dadf70187a20d271303c272a41404beb497ac6116a5722a05d1 (SHA256)
022543.doc
Created at 2018-06-25 14:51:00
Notifications (1/1)
The operating system was rebooted during the analysis.
Severity | Category | Operation | Classification | |
---|---|---|---|---|
5/5
|
Injection | Writes into the memory of a process running from a created or modified executable | - | |
|
||||
|
||||
|
||||
5/5
|
Injection | Modifies control flow of a process running from a created or modified executable | - | |
|
||||
|
||||
|
||||
4/5
|
Process | Creates process | - | |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
4/5
|
Information Stealing | Reads browser data | - | |
|
||||
4/5
|
Network | Downloads data | Downloader | |
|
||||
|
||||
|
||||
|
||||
3/5
|
Network | Performs DNS request | - | |
|
||||
|
||||
3/5
|
Browser | Reads data related to browsing history | - | |
|
||||
3/5
|
PE | Executes dropped PE file | - | |
|
||||
|
||||
|
||||
2/5
|
File System | Associated with suspicious files | Exploit | |
|
||||
2/5
|
Network | Associated with known malicious/suspicious URLs | - | |
|
||||
|
||||
2/5
|
Network | Connects to HTTP server | - | |
|
||||
|
||||
|
||||
|
||||
|
||||
2/5
|
PE | Drops PE file | Dropper | |
|
||||
|
||||
|
||||
2/5
|
VBA Macro | Executes application | - | |
|
||||
1/5
|
Process | Creates system object | - | |
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
1/5
|
VBA Macro | Executes macro on specific worksheet event | - | |
|