Report - MSOfficeUpdate.cab

Escalate priviledges KeyLogger AntiDebug AntiVM
ScreenShot
Created 2021.09.22 22:09 Machine s1_win7_x6402
Filename MSOfficeUpdate.cab
Type Microsoft Cabinet archive data, 227977 bytes, 1 file
AI Score Not founds Behavior Score
2.2
ZERO API file : clean
VT API (file) 18 detected (VSNTID21, myudnx, GenericKD, Cabinf, Donoff, CVE-2021-4044, ai score=86, Hacktool)
md5 0907498bc0ee4cee45b37df6a186b602
sha256 94b94d1882e9ab47481de62ce0c658f8ddf12ddf0936a8978b06fc8506731911
ssdeep 3072:gtOueVt10q/1MNcUem37I/4WWn6Yac6BYaZWfKEXRy/v2:cOuQd/1MWUeqEAWw6YaciYcWSKRy/O
imphash
impfuzzy
  Network IP location

Signature (6cnts)

Level Description
watch File has been identified by 18 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks for the Locally Unique Identifier on the system for a suspicious privilege
notice Yara rule detected in process memory
info Checks amount of memory in system
info Checks if process is being debugged by a debugger

Rules (10cnts)

Level Name Description Collection
notice Escalate_priviledges Escalate priviledges memory
notice KeyLogger Run a KeyLogger memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure