Destruction

These indicators represent situations where the file has elements that indicate capabilities or evidence of destruction. Destructive capabilities include the ability to delete system resources like files or directories.

Indicator

Description

action_writeByte

The VBA script within the file is likely writing bytes to a file, which is an unusual action for a legitimate document.

action_hexToBin

The VBA script within the file is likely using hexadecimal-to-binary conversion that may indicate decoding a hidden malicious payload.

appended_URI

The file contains a link that does not belong in the file structure.

appended_exploit

The file contains suspicious data outside of the file structure that may be indicative of an exploit.

appended_macro

The file contains a macro script that does not belong in the file structure.

appended_90_nopsled

The file contains a nop-sled that does not belong in the file structure; this is almost certainly there to facilitate exploitation.

AutorunsPersistence

The file attempts to interact with common methods of persistence (for example, startup scripts). Malware commonly uses these tactics to attain persistence.

DestructionString

The file has capabilities to kill processes or shut down the machine via shell commands.

FileDirDeleteImports

The PE imports functions that can be used to delete files or directories. Malware uses this to break systems and to cover its tracks.

JsHeapSpray

The file likely contains heap spray code.

PossibleLocker

The file demonstrates evidence of a desire to lock out common tools by policy. Malware does this to retain persistence and make detection and cleanup more difficult.

RegistryManipulation

The file imports functions that are used to manipulate the Windows registry. Malware does this to attain persistence, avoid detection, and for many other reasons.

SeBackupPrivilege

The PE might attempt to read files to which it has not been granted access. The SeBackup privilege allows access to files without honoring access controls. It is frequently used by programs that handle backups and is frequently limited to administrative users, but it can be used maliciously to gain access to specific elements that might otherwise be difficult to access.

SeDebugPrivilege

The PE might attempt to tamper with system processes. The SeDebug privilege is used to access processes other than your own and is frequently limited to administrative users. It is often paired with reading and writing to other processes.

SeRestorePrivilege

The PE might attempt to change or delete files to which it has not been granted access. The SeRestore privilege allows writing without consideration of access control.

ServiceControlImports

The file imports functions that can control Windows services on the current system. Malware uses this either to launch itself into the background via installing as a service, or to disable other services that may have a protective function.

SkylinedHeapSpray

The file contains an unmodified version of skylined heap spray code.

SpawnProcessImports

The PE imports functions that can be used to spawn another process. Malware uses this to launch subsequent phases of an infection, typically downloaded from the Internet.

StringJsExploit

The file contains JavaScript code that is likely capable of exploitation.

StringJsObfuscation

The file contains JavaScript obfuscation tokens.

TerminateProcessImports

The file imports functions that can be used to stop a running process. Malware uses this to attempt to remove protection systems, or to cause damage to a running system.

trigger_AutoClose

The VBA script within the file is likely trying to execute automatically when the file is closing.

trigger_Auto_Close

The VBA script within the file is likely trying to execute automatically when the file is closing.

trigger_AutoExec

The VBA script within the file is likely trying to execute automatically.

trigger_AutoExit

The VBA script within the file is likely trying to execute automatically when the file is closing.

trigger_AutoNew

The VBA script within the file is likely trying to execute automatically when a new file is being created.

trigger_AutoOpen

The VBA script within the file is likely trying to execute as soon as the file is opened.

trigger_Auto_Open

The VBA script within the file  is likely trying to execute as soon as the file is opened.

trigger_DocumentBefore­Close

The VBA script within the file is likely trying to execute automatically just before the file closes.

trigger_DocumentChange

The VBA script within the file is likely trying to execute automatically when the file is being changed.

trigger_Document_Close

The VBA script within the file is likely trying to execute automatically when the file is closing.

trigger_Document_New

The VBA script within the file is likely trying to execute automatically when a new file is being created.

trigger_DocumentOpen

The VBA script within the file is likely trying to execute as soon as the file is opened.

trigger_Document_Open

The VBA script within the file is likely trying to execute as soon as the file is opened.

trigger_NewDocument

The VBA script within the file is likely trying to execute automatically when a new file is being created.

trigger_Workbook_Close

The VBA script within the file is likely trying to execute automatically when a Microsoft Excel workbook is closing.

trigger_Workbook_Open

The VBA script within the file is likely trying to execute automatically when a Microsoft Excel workbook is opening.

UserManagementImports

The file imports functions that can be used to change users on the local system. It can add, delete, or change key user details. Malware can use this capability to achieve persistence or cause harm to the local system.

VirtualAllocImports

The file imports functions that are used to create memory in a running process. Malware does this to inject itself into a running process.