Report - O00-O.doc

AntiDebug AntiVM RTF File doc
ScreenShot
Created 2023.03.05 08:45 Machine s1_win7_x6402
Filename O00-O.doc
Type Rich Text Format data, version 1, unknown character set
AI Score Not founds Behavior Score
3.6
ZERO API file : mailcious
VT API (file)
md5 344a7f146e2f45929baac822fe64d389
sha256 52980202492da6cc78eed398df0639727e47728e3dae827291436b6315852cdb
ssdeep 192:+TwfeQ1d2jAJlfMHxM+WtYWEMpCDaXLuXoGI9gh2irTKdnvRQo8lyaqLrAlTGr4l:5fbd5Jq+tYWCOXP5eFK8oU5erJrqT2O
imphash
impfuzzy
  Network IP location

Signature (8cnts)

Level Description
watch Communicates with host for which no DNS query was performed
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates (office) documents on the filesystem
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory

Rules (9cnts)

Level Name Description Collection
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info Rich_Text_Format_Zero Rich Text Format Signature Zero binaries (download)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://212.87.204.200/dashboard/ Unknown 212.87.204.200 clean
http://212.87.204.200/5021/vbc.exe Unknown 212.87.204.200 27236 malware
http://212.87.204.200/O00-O.doc Unknown 212.87.204.200 mailcious
http://212.87.204.200/ Unknown 212.87.204.200 clean
212.87.204.200 Unknown 212.87.204.200 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure