Report - uwa.docx

PNG Format
ScreenShot
Created 2021.06.06 21:55 Machine s1_win7_x6402
Filename uwa.docx
Type Microsoft Word 2007+
AI Score Not founds Behavior Score
3.4
ZERO API file : malware
VT API (file) 18 detected (PGDP, a variant of Generik, HUIKCHP, GenericKD, CVE-2017-0199, equmby, ai score=87, Probably Heur, W97OleLink)
md5 3eb620f82132d7715cde30887fa24ed5
sha256 07ffbabb575117c731872d2d6cda388f2343fdee55d700f8357263a48c0edabc
ssdeep 192:ScIMmtPtuP0G/bsFfYAwOqTrx51zcOJn33WILV:SPXELsZYAwOqTWOJ33WIx
imphash
impfuzzy
  Network IP location

Signature (7cnts)

Level Description
watch Communicates with host for which no DNS query was performed
watch File has been identified by 18 AntiVirus engines on VirusTotal as malicious
watch Libraries known to be associated with a CVE were requested (may be False Positive)
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates (office) documents on the filesystem
notice Creates hidden or system file
notice Performs some HTTP requests

Rules (1cnts)

Level Name Description Collection
info PNG_Format_Zero PNG Format binaries (download)

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://bit.do/fQXx8 US AMAZON-AES 54.83.52.76 1793 mailcious
http://bit.do/images/bit-do-url-shortener-logo-66x66.png US AMAZON-AES 54.83.52.76 clean
http://bit.do/ US AMAZON-AES 54.83.52.76 clean
bit.do US AMAZON-AES 54.83.52.76 mailcious
54.83.52.76 US AMAZON-AES 54.83.52.76 suspicious

Suricata ids



Similarity measure (PE file only) - Checking for service failure