Report - extracted_at_0x20db0.rtf

MS_RTF_Obfuscation_Objects
ScreenShot
Created 2023.03.16 10:00 Machine s1_win7_x6402
Filename extracted_at_0x20db0.rtf
Type ASCII text, with CRLF line terminators
AI Score Not founds Behavior Score
1.0
ZERO API file : clean
VT API (file)
md5 c9a1d61a0ed042303527c669384c6d0c
sha256 d9d999f67dea942c3060358d3fb62d6e447778e2d80c8762a01ba25ac57939e7
ssdeep 6:V0XjDGX5GNL8NEfJxfcEwAXjDgNOOoVgGTFAyueNhIn:SCX5GNL8NE3R0NONgEF/u+I
imphash
impfuzzy
  Network IP location

Signature (3cnts)

Level Description
notice An application raised an exception which may be indicative of an exploit crash
notice Creates hidden or system file
info One or more processes crashed

Rules (1cnts)

Level Name Description Collection
warning MS_RTF_Suspicious_documents Suspicious documents using RTF document OLE object binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure