ScreenShot
Created | 2021.07.09 09:30 | Machine | s1_win7_x6401 |
Filename | document.wbk | ||
Type | ISO-8859 text, with very long lines, with CRLF, CR, LF line terminators, with overstriking | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 30 detected (ObfsStrm, Save, CVE-2017-1188, Camelot, Bloodhound, a variant of DOC, Abnormal, dinbqn, Malformed, Obfuscated, RTFMALFORM, RtfExp, ASDOH, Malicious, score, Malform, Probably Heur, RTFBadHeader, ai score=89, objupdate) | ||
md5 | 562d429223703b6f8edfe68bcbf76ff5 | ||
sha256 | ae2efbe76221bfb63f5e03ccc86b36470fd35ae67a859c7232802acc9f373d7e | ||
ssdeep | 192:rsLsGY4za9Y3+cS/0l/g6NhfL0Y+gkCrnL9IaJLwWuydrhW:A+8a/2/7NLQCrLldhhW | ||
imphash | |||
impfuzzy |
Network IP location
Signature (14cnts)
Level | Description |
---|---|
danger | File has been identified by 30 AntiVirus engines on VirusTotal as malicious |
watch | Communicates with host for which no DNS query was performed |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | An application raised an exception which may be indicative of an exploit crash |
notice | Creates (office) documents on the filesystem |
notice | Creates hidden or system file |
notice | HTTP traffic contains suspicious features which may be indicative of malware related traffic |
notice | Performs some HTTP requests |
notice | Sends data using the HTTP POST Method |
notice | Yara rule detected in process memory |
info | Checks amount of memory in system |
info | Checks if process is being debugged by a debugger |
info | Collects information to fingerprint the system (MachineGuid |
info | One or more processes crashed |
Rules (9cnts)
Level | Name | Description | Collection |
---|---|---|---|
info | anti_dbg | Checks if being debugged | memory |
info | DebuggerCheck__GlobalFlags | (no description) | memory |
info | DebuggerCheck__QueryInfo | (no description) | memory |
info | DebuggerHiding__Active | (no description) | memory |
info | DebuggerHiding__Thread | (no description) | memory |
info | disable_dep | Bypass DEP | memory |
info | Rich_Text_Format_Zero | Rich Text Format Signature Zero | binaries (upload) |
info | SEH__vectored | (no description) | memory |
info | ThreadControl__Context | (no description) | memory |