Report - clicktoexploit.docx

Word 2007 file format(docx)
ScreenShot
Created 2022.08.02 08:14 Machine s1_win7_x6403
Filename clicktoexploit.docx
Type Microsoft OOXML
AI Score Not founds Behavior Score
1.2
ZERO API file : malware
VT API (file)
md5 e3fb608a9b839c5e992ea115b07aaa8d
sha256 e64ead58e77034d25fa0c5401d9a785444435de5d82812e45b0c0978199fbbf2
ssdeep 192:55VRZQJDxRgF4usj8IuX314lb8VPkf+CFk4w1Y2VveFLC9F5fLlQM:5ragOHj8Iq2lD972VvRDlQM
imphash
impfuzzy
  Network IP location

Signature (3cnts)

Level Description
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates (office) documents on the filesystem
notice Creates hidden or system file

Rules (1cnts)

Level Name Description Collection
info docx Word 2007 file format detection binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure