Report - document.docx

Word 2007 file format(docx)
ScreenShot
Created 2021.09.14 17:44 Machine s1_win7_x6403
Filename document.docx
Type Microsoft OOXML
AI Score Not founds Behavior Score
6.2
ZERO API file : clean
VT API (file) 22 detected (CVE-2021-4044, CVE2021, CVE-2017-0199, equmby, CLASSIC, ai score=86, Donoff)
md5 3c64e8a4bfdce7c4f19a441d13413acb
sha256 dd1f09bb538a31c2c0e4f3218aa4a989256691e73738c7bfb7a60e6db9b7b0cf
ssdeep 192:76O3KmBOJ2wc3rMKkViP/kcMD2h0v5MJnJv18H111M05AgPekpn/w:76O3fBIhV8/6hv5MJnJ2H111/eqn/w
imphash
impfuzzy
  Network IP location

Signature (14cnts)

Level Description
warning File has been identified by 22 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch One or more non-whitelisted processes were created
watch Uses Sysinternals tools in order to add additional command line functionality
watch Zeus P2P (Banking Trojan)
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates (office) documents on the filesystem
notice Creates hidden or system file
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
info Checks amount of memory in system
info Collects information to fingerprint the system (MachineGuid
info Queries for the computername

Rules (1cnts)

Level Name Description Collection
info docx Word 2007 file format detection binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://104.254.245.82/word.html US 1&1 Ionos Se 104.254.245.82 clean
http://104.254.245.82/ US 1&1 Ionos Se 104.254.245.82 clean
104.254.245.82 US 1&1 Ionos Se 104.254.245.82 clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure