Skip Navigation

Destruction

These indicators represent situations where the file has elements that indicate capabilities or evidence of destruction. Destructive capabilities include the ability to delete system resources like files or directories.
Indicator
Description
action_writeByte
The VBA script within the file is likely writing bytes to a file, which is an unusual action for a legitimate document.
action_hexToBin
The VBA script within the file is likely using hexadecimal-to-binary conversion that may indicate decoding a hidden malicious payload.
appended_URI
The file contains a link that does not belong in the file structure.
appended_exploit
The file contains suspicious data outside of the file structure that may be indicative of an exploit.
appended_macro
The file contains a macro script that does not belong in the file structure.
appended_90_nopsled
The file contains a nop-sled that does not belong in the file structure; this is almost certainly there to facilitate exploitation.
AutorunsPersistence
The file attempts to interact with common methods of persistence (for example, startup scripts). Malware commonly uses these tactics to attain persistence.
DestructionString
The file has capabilities to kill processes or shut down the machine via shell commands.
FileDirDeleteImports
The PE imports functions that can be used to delete files or directories. Malware uses this to break systems and to cover its tracks.
JsHeapSpray
The file likely contains heap spray code.
PossibleLocker
The file demonstrates evidence of a desire to lock out common tools by policy. Malware does this to retain persistence and make detection and cleanup more difficult.
RegistryManipulation
The file imports functions that are used to manipulate the
Windows
registry. Malware does this to attain persistence, avoid detection, and for many other reasons.
SeBackupPrivilege
The PE might attempt to read files to which it has not been granted access. The SeBackup privilege allows access to files without honoring access controls. It is frequently used by programs that handle backups and is frequently limited to administrative users, but it can be used maliciously to gain access to specific elements that might otherwise be difficult to access.
SeDebugPrivilege
The PE might attempt to tamper with system processes. The SeDebug privilege is used to access processes other than your own and is frequently limited to administrative users. It is often paired with reading and writing to other processes.
SeRestorePrivilege
The PE might attempt to change or delete files to which it has not been granted access. The SeRestore privilege allows writing without consideration of access control.
ServiceControlImports
The file imports functions that can control
Windows
services on the current system. Malware uses this either to launch itself into the background via installing as a service, or to disable other services that may have a protective function.
SkylinedHeapSpray
The file contains an unmodified version of skylined heap spray code.
SpawnProcessImports
The PE imports functions that can be used to spawn another process. Malware uses this to launch subsequent phases of an infection, typically downloaded from the Internet.
StringJsExploit
The file contains
JavaScript
code that is likely capable of exploitation.
StringJsObfuscation
The file contains
JavaScript
obfuscation tokens.
TerminateProcessImports
The file imports functions that can be used to stop a running process. Malware uses this to attempt to remove protection systems, or to cause damage to a running system.
trigger_AutoClose
The VBA script within the file is likely trying to execute automatically when the file is closing.
trigger_Auto_Close
The VBA script within the file is likely trying to execute automatically when the file is closing.
trigger_AutoExec
The VBA script within the file is likely trying to execute automatically.
trigger_AutoExit
The VBA script within the file is likely trying to execute automatically when the file is closing.
trigger_AutoNew
The VBA script within the file is likely trying to execute automatically when a new file is being created.
trigger_AutoOpen
The VBA script within the file is likely trying to execute as soon as the file is opened.
trigger_Auto_Open
The VBA script within the file  is likely trying to execute as soon as the file is opened.
trigger_DocumentBefore­Close
The VBA script within the file is likely trying to execute automatically just before the file closes.
trigger_DocumentChange
The VBA script within the file is likely trying to execute automatically when the file is being changed.
trigger_Document_Close
The VBA script within the file is likely trying to execute automatically when the file is closing.
trigger_Document_New
The VBA script within the file is likely trying to execute automatically when a new file is being created.
trigger_DocumentOpen
The VBA script within the file is likely trying to execute as soon as the file is opened.
trigger_Document_Open
The VBA script within the file is likely trying to execute as soon as the file is opened.
trigger_NewDocument
The VBA script within the file is likely trying to execute automatically when a new file is being created.
trigger_Workbook_Close
The VBA script within the file is likely trying to execute automatically when a
Microsoft Excel
workbook is closing.
trigger_Workbook_Open
The VBA script within the file is likely trying to execute automatically when a
Microsoft Excel
workbook is opening.
UserManagementImports
The file imports functions that can be used to change users on the local system. It can add, delete, or change key user details. Malware can use this capability to achieve persistence or cause harm to the local system.
VirtualAllocImports
The file imports functions that are used to create memory in a running process. Malware does this to inject itself into a running process.