Summary | ZeroBOX

Juzgado 09 civil del circuito de Bogotá D. C. Col..docx

Antivirus Word 2007 file format(docx)
Category Machine Started Completed
FILE s1_win7_x6403_us Dec. 7, 2022, 4:10 p.m. Dec. 7, 2022, 4:13 p.m.
Size 40.3KB
Type Microsoft Word 2007+
MD5 4a69b0a3796dd688d57e11658ac1058c
SHA256 dfc497c7cb4cac21d5b4760dcc9df8c4379e7f4290a8ff06265225704819761c
CRC32 2339103E
ssdeep 768:ajXnXhaBJprasnYvST2/FV/OqRtaMS2c9n9PdNuRKW/LVXr:atipraSiHWqzaP58RKWVr
Yara
  • docx - Word 2007 file format detection

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

file C:\Users\test22\AppData\Local\Temp\~$zgado 09 civil del circuito de Bogotá D. C. Col..docx
Time & API Arguments Status Return Repeated

NtCreateFile

create_disposition: 5 (FILE_OVERWRITE_IF)
file_handle: 0x0000048c
filepath: C:\Users\test22\AppData\Local\Temp\~$zgado 09 civil del circuito de Bogotá D. C. Col..docx
desired_access: 0x40100080 (FILE_READ_ATTRIBUTES|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: \??\C:\Users\test22\AppData\Local\Temp\~$zgado 09 civil del circuito de Bogotá D. C. Col..docx
create_options: 4194400 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT)
status_info: 2 (FILE_CREATED)
share_access: 0 ()
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2080
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x7ef70000
process_handle: 0xffffffff
1 0 0
McAfee RDN/Generic Downloader.x
VIPRE Exploit.OLE-JS.Gen.2
Sangfor Trojan.Generic-Script.Save.ed51193b
Alibaba TrojanDownloader:Script/Generic.2fa3c4ec
Cyren ABRisk.PUKL-3
Symantec Trojan.Gen.NPE
ESET-NOD32 VBS/TrojanDownloader.Agent.WWV
Avast Other:Malware-gen [Trj]
Kaspersky UDS:DangerousObject.Multi.Generic
BitDefender Exploit.OLE-JS.Gen.2
MicroWorld-eScan Exploit.OLE-JS.Gen.2
Tencent Vbs.Trojan-Downloader.Der.Kmnw
Ad-Aware Exploit.OLE-JS.Gen.2
Emsisoft Exploit.OLE-JS.Gen.2 (B)
McAfee-GW-Edition RDN/Generic Downloader.x
FireEye Exploit.OLE-JS.Gen.2
GData Exploit.OLE-JS.Gen.2
Avira VBS/Dldr.Agent.dacvy
Microsoft Trojan:Script/Wacatac.B!ml
Arcabit Exploit.OLE-JS.Gen.2
ViRobot DOC.Z.Agent.229376.U
Google Detected
ALYac Trojan.Downloader.DOC.Gen
MAX malware (ai score=83)
Fortinet VBS/Agent.WWV!tr
AVG Other:Malware-gen [Trj]