Report - new title.doc

VBA_macro Malicious Packer MSOffice File
ScreenShot
Created 2021.07.21 09:39 Machine s1_win7_x6401
Filename new title.doc
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Titl
AI Score Not founds Behavior Score
2.8
ZERO API file : clean
VT API (file) 11 detected (SAgent, malicious, high confidence, VSNTGK21, Siggen3, OLE2, Wacatac, Probably Heur, W97Obfuscated, Static AI, Malicious OLE)
md5 aaa839e4993c07fdfba45afe8826d6bf
sha256 632cfc71bd4734fdd98e48166a52fbc4a48d43640f3375fd882dd374479bffb1
ssdeep 98304:IydePKsBylarg6bY/J1ZKbTsBylarg6bY/J1ZKb2ayX0I6:IHisB2Eb01ZssB2Eb01Z820X
imphash
impfuzzy
  Network IP location

Signature (6cnts)

Level Description
watch File has been identified by 11 AntiVirus engines on VirusTotal as malicious
watch Libraries known to be associated with a CVE were requested (may be False Positive)
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates (office) documents on the filesystem
notice Creates hidden or system file
notice Word document hooks document open

Rules (3cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)
watch Malicious_Packer_Zero Malicious Packer binaries (upload)
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure