Report - termination-letter-college.docm

VBA_macro GIF Format
ScreenShot
Created 2021.08.04 17:51 Machine s1_win7_x6403
Filename termination-letter-college.docm
Type Microsoft Word 2007+
AI Score Not founds Behavior Score
3.8
ZERO API file : clean
VT API (file) 26 detected (malicious, high confidence, GenericKD, Obfuscation, Ole2, druvzi, Static AI, Malicious OPENXML, MRFR, score, Probably Heur, W97Obfuscated, CLASSIC)
md5 74fa8961827639d1b481a4eea50863e5
sha256 824bb11ef1520aecca35ad9abd8e043e4e00193668590d4aee2a41f205db7388
ssdeep 1536:XqEgY2Gc2C+Z2tinVFP6OCwhur8GXMnBmjzwV:XvgzGTFPJu7QBmjzwV
imphash
impfuzzy
  Network IP location

Signature (8cnts)

Level Description
warning File has been identified by 26 AntiVirus engines on VirusTotal as malicious
watch Network communications indicative of a potential document or script payload download was initiated by the process winword.exe
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates (office) documents on the filesystem
notice Creates a shortcut to an executable file
notice Creates executable files on the filesystem
notice Creates hidden or system file

Rules (2cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)
info Lnk_Format_Zero LNK Format binaries (download)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
www.ramanujan.edu.in US PUBLIC-DOMAIN-REGISTRY 199.79.62.121 clean
199.79.62.121 US PUBLIC-DOMAIN-REGISTRY 199.79.62.121 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure