Summary | ZeroBOX

Ops Afg post 9-11.doc

Category Machine Started Completed
FILE s1_win7_x6402 July 12, 2021, 6:02 p.m. July 12, 2021, 6:06 p.m.
Size 125.9KB
Type Rich Text Format data, version 1, unknown character set
MD5 9100c65e4ed1ccf2fd148a70ff21c97f
SHA256 f98ac9d15be2d5a06e475b98c663b543ea5504df7a231a5b006031cfe9f440a0
CRC32 E802A096
ssdeep 1536:zNpVeQZ6R8aNlZ6u7irXVjqZJOwlq6DCHbFXKRTwdrJNYlVGyA:zXEQZ6RXlZ6umBqZ1lq6OVKBwdrJ+lV0
Yara None matched

Name Response Post-Analysis Lookup
designerzebra.com 108.177.235.105
IP Address Status Action
108.177.235.105 Active Moloch
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

request OPTIONS http://designerzebra.com/services/
request HEAD http://designerzebra.com/services/check6
request OPTIONS http://designerzebra.com/services
request PROPFIND http://designerzebra.com/services
request GET http://designerzebra.com/services/check6
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2428
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6a4fa000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2428
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x69614000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\~$s Afg post 9-11.doc
Time & API Arguments Status Return Repeated

NtCreateFile

create_disposition: 5 (FILE_OVERWRITE_IF)
file_handle: 0x00000418
filepath: C:\Users\test22\AppData\Local\Temp\~$s Afg post 9-11.doc
desired_access: 0x40100080 (FILE_READ_ATTRIBUTES|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: \??\C:\Users\test22\AppData\Local\Temp\~$s Afg post 9-11.doc
create_options: 4194400 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT)
status_info: 2 (FILE_CREATED)
share_access: 0 ()
1 0 0
Kaspersky HEUR:Exploit.RTF.T1221.gen
Rising Downloader.Generic/RTF!1.D4A8 (CLASSIC)
McAfee-GW-Edition BehavesLike.BadFile.cv
ZoneAlarm HEUR:Exploit.RTF.T1221.gen
filetype_details Rich Text Format data, version 1, unknown character set filename Ops Afg post 9-11.doc