e7851a1b3e93968e7f6b92a1a3f59d250402be15a5bcb3262acff1e0a27b912c (SHA256)
bill_87448680672-2706201981722018_4_23_b83d95.pdf.js
Created at 2018-05-07 10:12:00
Notifications (1/1)
Some extracted files may be missing in the report since the maximum number of extracted files was reached during the analysis. You can increase the limit in the configuration settings.
Severity | Category | Operation | Classification | |
---|---|---|---|---|
5/5
|
Anti Analysis | Tries to detect virtual machine | - | |
|
||||
5/5
|
File System | Modifies application directory | - | |
|
||||
|
||||
5/5
|
OS | Modifies certificate store | - | |
|
||||
|
||||
|
||||
|
||||
|
||||
5/5
|
File System | Creates an unusually large number of files | - | |
|
||||
5/5
|
File System | Encrypts content of user files | Ransomware | |
|
||||
4/5
|
Persistence | Installs system startup script or application | - | |
|
||||
4/5
|
File System | Associated with malicious files | Trojan | |
|
||||
4/5
|
PE | Executes dropped PE file | - | |
|
||||
2/5
|
Network | Performs DNS request | - | |
|
||||
2/5
|
Network | Checks external IP address | - | |
|
||||
2/5
|
Network | Associated with known malicious/suspicious URLs | - | |
|
||||
2/5
|
Network | Downloads data | Downloader | |
|
||||
|
||||
|
||||
|
||||
|
||||
2/5
|
Network | Connects to HTTP server | - | |
|
||||
|
||||
|
||||
|
||||
|
||||
2/5
|
PE | Drops PE file | Dropper | |
|
||||
|
||||
1/5
|
Process | Creates system object | - | |
|
||||
1/5
|
Process | Overwrites code | - | |
|