Report - AzQcBgcWyFzwiyxiYMiwahvAS65uNb

ScreenShot
Created 2021.04.02 10:52 Machine s1_win7_x6402
Filename AzQcBgcWyFzwiyxiYMiwahvAS65uNb
Type Rich Text Format data, version 1, unknown character set
AI Score Not founds Behavior Score
9.6
ZERO API file : mailcious
VT API (file) 35 detected (CVE-2015-1641, Rtfcmdrp, EXPLOYT, JEJOOK, DragonOK, eqweep, Lkdk, Malware@#10gk29kzyorn7, MacroWord, ai score=98, Donoff, Malicious, score, CVE2015, Probably Heur, RTFObfuscationD, HgAASRQA)
md5 a4389b334e80bd96442138b2dd196209
sha256 c3b5503a0a89fd2eae9a77ff92eef69f08d68b963140b0a31721bb4960545e07
ssdeep 1536:+r4DOTg8X0t9yOo6SnDsxI2+6VkoZoOfRb9JmkjJydLksx0ChndVXDke/zmCOcmY:+cDh8OMgoIXmCkpF0SjzPmKUqZBZTw2
imphash
impfuzzy
  Network IP location

Signature (20cnts)

Level Description
danger Stack pivoting was detected when using a critical API by the process WINWORD.EXE
danger File has been identified by 35 AntiVirus engines on VirusTotal as malicious
watch A command shell or script process was created by an unexpected parent process
watch Communicates with host for which no DNS query was performed
watch One or more non-whitelisted processes were created
watch The process winword.exe wrote an executable file to disk
notice A process attempted to delay the analysis task.
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates (office) documents on the filesystem
notice Creates a shortcut to an executable file
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Creates hidden or system file
notice Drops an executable to the user AppData folder
notice One or more potentially interesting buffers were extracted
notice RTF file has an unknown character set
notice Uses Windows utilities for basic Windows functionality
info Collects information to fingerprint the system (MachineGuid
info Command line console output was observed
info Queries for the computername

Rules (8cnts)

Level Name Description Collection
notice Str_Win32_Http_API Match Windows Http API call binaries (download)
info IsPE32 (no description) binaries (download)
info OS_Processor_Check_Zero OS Processor Check Signature Zero binaries (download)
info PE_Header_Zero PE File Signature Zero binaries (download)
info HasDebugData DebugData Check binaries (download)
info HasRichSignature Rich Signature Check binaries (download)
info IsWindowsGUI (no description) binaries (download)
info win_files_operation Affect private profile binaries (download)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
newtw2016.kr44.78host.com Unknown clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure