Report - Questions.doc

VBA_macro ZIP Format Word 2007 file format(docx)
ScreenShot
Created 2023.06.16 13:58 Machine s1_win7_x6402
Filename Questions.doc
Type Microsoft Word 2007+
AI Score Not founds Behavior Score
3.4
ZERO API file : clean
VT API (file) 24 detected (Suspic, malicious, high confidence, GenericKD, score, MRPC, Real Protect, ai score=88, Static AI, Malicious OPENXML)
md5 16931bb7322e11eba1b1bdfbf3ecbf35
sha256 ea0133443e524b045fd43265dd0850c3a2e025cbee28dbaa70012db99c00acb9
ssdeep 768:G/MV0+Yezjc5Gw4BaPxPICcQ5r3Z2QnU8CGo5U5Rf:hbYezOGw2IPlpp2QW5yd
imphash
impfuzzy
  Network IP location

Signature (8cnts)

Level Description
warning File has been identified by 24 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice An application raised an exception which may be indicative of an exploit crash
notice Creates (office) documents on the filesystem
notice Creates executable files on the filesystem
notice Creates hidden or system file
notice Performs some HTTP requests
info One or more processes crashed

Rules (3cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)
info docx Word 2007 file format detection binaries (upload)
info zip_file_format ZIP file format binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://smart.com-coffee.click/trash/conf/vorontsov/mini.vbs JP GMO Internet,Inc 157.7.184.26 mailcious
smart.com-coffee.click JP GMO Internet,Inc 157.7.184.26 mailcious
157.7.184.26 JP GMO Internet,Inc 157.7.184.26 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure