Report - termination-letter-college.docm

VBA_macro
ScreenShot
Created 2021.08.04 17:31 Machine s1_win7_x6401
Filename termination-letter-college.docm
Type Microsoft Word 2007+
AI Score Not founds Behavior Score
2.6
ZERO API file : clean
VT API (file) 26 detected (malicious, high confidence, GenericKD, Obfuscation, Ole2, druvzi, Static AI, Malicious OPENXML, MRFR, score, Probably Heur, W97Obfuscated, CLASSIC)
md5 74fa8961827639d1b481a4eea50863e5
sha256 824bb11ef1520aecca35ad9abd8e043e4e00193668590d4aee2a41f205db7388
ssdeep 1536:XqEgY2Gc2C+Z2tinVFP6OCwhur8GXMnBmjzwV:XvgzGTFPJu7QBmjzwV
imphash
impfuzzy
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 26 AntiVirus engines on VirusTotal as malicious
watch Libraries known to be associated with a CVE were requested (may be False Positive)
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates (office) documents on the filesystem
notice Creates hidden or system file

Rules (1cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure