danger |
The process winword.exe wrote an executable file to disk which it then attempted to execute |
watch |
A process performed obfuscation on information about the computer or sent it to a remote location indicative of CnC Traffic/Preperations. |
watch |
One or more non-whitelisted processes were created |
notice |
Allocates read-write-execute memory (usually to unpack itself) |
notice |
Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
notice |
Checks adapter addresses which can be used to detect virtual network interfaces |
notice |
Creates (office) documents on the filesystem |
notice |
Creates executable files on the filesystem |
notice |
Creates hidden or system file |
notice |
HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice |
Looks up the external IP address |
notice |
One or more potentially interesting buffers were extracted |
notice |
Performs some HTTP requests |
notice |
Sends data using the HTTP POST Method |
notice |
Word document hooks document open |
info |
Checks if process is being debugged by a debugger |
info |
Queries for the computername |