Report - document_set_20210208_T6253773.docx

ScreenShot
Created 2021.08.04 12:26 Machine s1_win7_x6403
Filename document_set_20210208_T6253773.docx
Type Microsoft Word 2007+
AI Score Not founds Behavior Score
2.2
ZERO API file : clean
VT API (file) 15 detected (Groooboor, VSNTH221, CVE-2017-0199, equmby, Artemis, BKMK, Probably Heur, W97OleLink)
md5 c2747012f95b22cb9b627a16bd62a7e6
sha256 7108ce3a07aa75b30ad993af8be72fda1f4974b734bf7901073442b03c95b511
ssdeep 192:ScIMmtPZG/bEpOKIgEamWBXpK0ydJb3F0Dt:SPXEEpOdNoEP7b8
imphash
impfuzzy
  Network IP location

Signature (5cnts)

Level Description
watch File has been identified by 15 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates (office) documents on the filesystem
notice Creates hidden or system file

Rules (0cnts)

Level Name Description Collection

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
longurl.in US AMAZON-02 76.76.21.21 mailcious
76.76.21.21 US AMAZON-02 76.76.21.21 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure