Report - extracted_at_0x0.rtf

ScreenShot
Created 2023.03.16 09:22 Machine s1_win7_x6401
Filename extracted_at_0x0.rtf
Type Rich Text Format data, version 1, unknown character set
AI Score Not founds Behavior Score
2.2
ZERO API file : clean
VT API (file)
md5 cd28b51516a9309b350607dc57faca76
sha256 7fbf900fdd0eabe63def6c5b432b5d3ff51f8ec9af7d9e9ab3a9d7441d032c22
ssdeep 1536:sT9Ps8LkRAdnz0g2qnCcuwXiSjwJ7RSnhkcA9Zs5uu3lQL:sVwzgFs
imphash
impfuzzy
  Network IP location

Signature (5cnts)

Level Description
watch Libraries known to be associated with a CVE were requested (may be False Positive)
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates hidden or system file
notice One or more potentially interesting buffers were extracted
notice RTF file has an unknown character set

Rules (0cnts)

Level Name Description Collection

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure