Report - extracted_at_0x1d0ce.rtf

MS_RTF_Obfuscation_Objects
ScreenShot
Created 2023.03.16 09:04 Machine s1_win7_x6401
Filename extracted_at_0x1d0ce.rtf
Type ASCII text, with CRLF line terminators
AI Score Not founds Behavior Score
1.2
ZERO API file : clean
VT API (file) 2 detected (RTFMALFORM, Probably Heur, RTFBadHeader)
md5 1e91c0e2616bba5aab72ef3813ba97a1
sha256 684cca036727d0d2e0722911cbdfefb5394442d3800b45f87ff1fa055c7a0d14
ssdeep 3:geRUFgKXRXGXjDBUMdvnQF5NHN5EHvGNage7wruG1c+RkmgFowA:VtnXjDBnvnQFjN5ueNTrMGwA
imphash
impfuzzy
  Network IP location

Signature (3cnts)

Level Description
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates hidden or system file
notice File has been identified by 2 AntiVirus engines on VirusTotal as malicious

Rules (1cnts)

Level Name Description Collection
warning MS_RTF_Suspicious_documents Suspicious documents using RTF document OLE object binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure