d3fc69a9f2ae2c446434abbfbe1693ef0f81a5da0a7f39d27c80d85f4a49c411 (SHA256)
DoNotOpen2.doc
Created at 2018-02-02 16:47:00
Notifications (2/2)
Some memory dumps may be missing in the reports since the total dump size limit was reached during the analysis. You can increase the limit in the configuration settings.
The operating system was rebooted during the analysis.
Severity | Category | Operation | Classification | |
---|---|---|---|---|
5/5
|
Injection | Writes into the memory of another running process | - | |
|
||||
5/5
|
Injection | Modifies control flow of another process | - | |
|
||||
4/5
|
Process | Creates process | - | |
|
||||
4/5
|
File System | Associated with malicious files | Trojan | |
|
||||
|
||||
4/5
|
Network | Downloads data | Downloader | |
|
||||
|
||||
|
||||
3/5
|
Persistence | Installs system startup script or application | - | |
|
||||
|
||||
3/5
|
Network | Performs DNS request | - | |
|
||||
2/5
|
Network | Connects to HTTP server | - | |
|
||||
|
||||
|
||||
2/5
|
PE | Drops PE file | Dropper | |
|
||||
1/5
|
Anti Analysis | Tries to detect debugger | - | |
|
||||
1/5
|
Process | Creates system object | - | |
|