ScreenShot
Created | 2021.04.02 10:52 | Machine | s1_win7_x6402 |
Filename | AzQcBgcWyFzwiyxiYMiwahvAS65uNb | ||
Type | Rich Text Format data, version 1, unknown character set | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : mailcious | ||
VT API (file) | 35 detected (CVE-2015-1641, Rtfcmdrp, EXPLOYT, JEJOOK, DragonOK, eqweep, Lkdk, Malware@#10gk29kzyorn7, MacroWord, ai score=98, Donoff, Malicious, score, CVE2015, Probably Heur, RTFObfuscationD, HgAASRQA) | ||
md5 | a4389b334e80bd96442138b2dd196209 | ||
sha256 | c3b5503a0a89fd2eae9a77ff92eef69f08d68b963140b0a31721bb4960545e07 | ||
ssdeep | 1536:+r4DOTg8X0t9yOo6SnDsxI2+6VkoZoOfRb9JmkjJydLksx0ChndVXDke/zmCOcmY:+cDh8OMgoIXmCkpF0SjzPmKUqZBZTw2 | ||
imphash | |||
impfuzzy |
Network IP location
Signature (20cnts)
Level | Description |
---|---|
danger | Stack pivoting was detected when using a critical API by the process WINWORD.EXE |
danger | File has been identified by 35 AntiVirus engines on VirusTotal as malicious |
watch | A command shell or script process was created by an unexpected parent process |
watch | Communicates with host for which no DNS query was performed |
watch | One or more non-whitelisted processes were created |
watch | The process winword.exe wrote an executable file to disk |
notice | A process attempted to delay the analysis task. |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Creates (office) documents on the filesystem |
notice | Creates a shortcut to an executable file |
notice | Creates a suspicious process |
notice | Creates executable files on the filesystem |
notice | Creates hidden or system file |
notice | Drops an executable to the user AppData folder |
notice | One or more potentially interesting buffers were extracted |
notice | RTF file has an unknown character set |
notice | Uses Windows utilities for basic Windows functionality |
info | Collects information to fingerprint the system (MachineGuid |
info | Command line console output was observed |
info | Queries for the computername |
Rules (8cnts)
Level | Name | Description | Collection |
---|---|---|---|
notice | Str_Win32_Http_API | Match Windows Http API call | binaries (download) |
info | IsPE32 | (no description) | binaries (download) |
info | OS_Processor_Check_Zero | OS Processor Check Signature Zero | binaries (download) |
info | PE_Header_Zero | PE File Signature Zero | binaries (download) |
info | HasDebugData | DebugData Check | binaries (download) |
info | HasRichSignature | Rich Signature Check | binaries (download) |
info | IsWindowsGUI | (no description) | binaries (download) |
info | win_files_operation | Affect private profile | binaries (download) |