Report - PO-220804.doc

MS_RTF_Obfuscation_Objects RTF File doc
ScreenShot
Created 2022.12.20 16:49 Machine s1_win7_x6402
Filename PO-220804.doc
Type data
AI Score Not founds Behavior Score
4.4
ZERO API file : clean
VT API (file) 35 detected (CVE-2018-0798, GenericKD, CVE-2017-1188, Camelot, Bloodhound, F04IE00HO22, Malicious, score, dinbqn, Lzfl, CVE2017, Minerva, yqmeb, ai score=100, SSMA, CVE-2018-0802, Detected, Malform, Probably Heur, RTFBadHeader)
md5 0d39ab326800c93da1a84bc4c69b39f8
sha256 010287dcbcc3d730f170eb5b0cc06fe5b1c612e15c0228460e534b26a3f4c8dd
ssdeep 192:jvkFoVvQlLhArr+vOcM0HLgAD5YNbxrca/hOXHjO1JJBI4EmDJWRUxkAiXbv6D9:TkFcQH6rSLgvxrAmzv0RUxSXbv6D9
imphash
impfuzzy
  Network IP location

Signature (8cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
danger File has been identified by 35 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice An application raised an exception which may be indicative of an exploit crash
notice Creates (office) documents on the filesystem
notice Creates hidden or system file
notice One or more potentially interesting buffers were extracted
info One or more processes crashed

Rules (2cnts)

Level Name Description Collection
warning MS_RTF_Suspicious_documents Suspicious documents using RTF document OLE object binaries (upload)
info Rich_Text_Format_Zero Rich Text Format Signature Zero binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
208.67.105.148 Unknown 208.67.105.148 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure