Report - taSPcCva.rtf

ScreenShot
Created 2021.09.09 08:54 Machine s1_win7_x6403
Filename taSPcCva.rtf
Type HTML document, ASCII text, with very long lines, with CRLF line terminators
AI Score Not founds Behavior Score
1.4
ZERO API file : clean
VT API (file) 15 detected (Valyria, druvzi, ai score=86, Psyme)
md5 7ddc68d92fe65b2509f16c6a27876347
sha256 c71747146567e8b50ff87f67f7e7c2209fffee3d078af55c4738907f63ead5b8
ssdeep 384:kybjWJEnq5Rae9FcshMLDV7WFkOFSa0URlqzv3ZN:kkjWJEnUae9FcshMLZRI6z
imphash
impfuzzy
  Network IP location

Signature (3cnts)

Level Description
watch File has been identified by 15 AntiVirus engines on VirusTotal as malicious
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates hidden or system file

Rules (0cnts)

Level Name Description Collection

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure