Report - O0-O.doc

AntiDebug AntiVM RTF File doc
ScreenShot
Created 2023.03.05 09:09 Machine s1_win7_x6402
Filename O0-O.doc
Type Rich Text Format data, version 1, unknown character set
AI Score Not founds Behavior Score
5.2
ZERO API file : mailcious
VT API (file) 35 detected (RTF/CVE-2017-11882.T.gen!Camelot, Trojan.W97M.CVE201711882.SMN, Exploit.CVE-2017-11882, RTF/Malform-A.Gen, Trojan-Exploit/RTF.CVE-2017-11882, Exploit.Rtf.Heuristic-rtf.dinbqn, Detected, EXP/YAV.Minerva.mecud, malware (ai score=87), Trojan.GenericKD.65654418, Exp.RTF.Obfus.Gen, Trojan.RTF.Dropper.IP, Exploit.RTF-ObfsObjDat.Gen, Exp.CVE-2017-11882!g2, Trojan.GenericKD.65654418 (B), Exploit.CVE-2017-11882.123, Trojan.MSOffice.Generic.4!c, Exploit.CVE-2017-11882!1.E168 (CLASSIC), MSOffice/CVE_2017_11882.DMP!exploit, Probably Heur.RTFObfuscation, multiple detections, UDS:DangerousObject.Multi.Generic, Trojan[Exploit]/MSOffice.CVE-2017-11882, Ransom.U.LokiBot.bot, Trojan.Generic.D3E9CE92, Other:Malware-gen [Trj, Malicious (score: 99), Office.Exploit.Generic.Fajl, RTFObfustream.c!7DD203F43399, Exploit:O97M/CVE-2017-11882.SMK!MTB)
md5 7dd203f43399a41d6724e93c59c26142
sha256 81cfae743033e3f1584136c555591f2737b1171da71b1e207525cd02bca02709
ssdeep 192:VWjmoq39jZ+aJf/IeLl835bDnmZNNaBfRhxmCYB5c9YFo+lE9a7:VKyn/IeGZDnmZNNqhcCmHoOEw
imphash
impfuzzy
  Network IP location

Signature (10cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
watch File has been identified by 17 AntiVirus engines on VirusTotal as malicious
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates (office) documents on the filesystem
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Uses Windows utilities for basic Windows functionality
notice Yara rule detected in process memory

Rules (9cnts)

Level Name Description Collection
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info Rich_Text_Format_Zero Rich Text Format Signature Zero binaries (download)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://212.87.204.200/dashboard/ Unknown 212.87.204.200 clean
http://212.87.204.200/O0-O.doc Unknown 212.87.204.200 mailcious
http://212.87.204.200/ Unknown 212.87.204.200 clean
http://212.87.204.200/5021/vbc.exe Unknown 212.87.204.200 27236 malware
212.87.204.200 Unknown 212.87.204.200 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure