danger |
Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) |
watch |
A process performed obfuscation on information about the computer or sent it to a remote location indicative of CnC Traffic/Preperations. |
watch |
File has been identified by 12 AntiVirus engines on VirusTotal as malicious |
watch |
One or more non-whitelisted processes were created |
watch |
The process winword.exe wrote an executable file to disk |
notice |
Allocates read-write-execute memory (usually to unpack itself) |
notice |
Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
notice |
Checks adapter addresses which can be used to detect virtual network interfaces |
notice |
Creates (office) documents on the filesystem |
notice |
Creates a shortcut to an executable file |
notice |
Creates executable files on the filesystem |
notice |
Creates hidden or system file |
notice |
Looks up the external IP address |
notice |
One or more potentially interesting buffers were extracted |
notice |
Performs some HTTP requests |
notice |
Resolves a suspicious Top Level Domain (TLD) |
notice |
Word document hooks document open |
info |
Checks if process is being debugged by a debugger |
info |
Queries for the computername |