Report - IOI0ioio0OIOIO0IOI0ioi0i0000000%23%23%23%23%23%23%23%23%23%23%23%23%23%23000000000000000000%23%23%23%23%23%23%23%23%23%23%23%23%23%2300000000.doc

MS_RTF_Obfuscation_Objects RTF File doc
ScreenShot
Created 2023.09.30 13:33 Machine s1_win7_x6403
Filename IOI0ioio0OIOIO0IOI0ioi0i0000000%23%23%23%23%23%23%23%23%23%23%23%23%23%23000000000000000000%23%23%23%23%23%23%23%23%23%23%23%23%23%2300000000.doc
Type ISO-8859 text, with very long lines, with CRLF, CR, LF line terminators
AI Score Not founds Behavior Score
4.4
ZERO API file : mailcious
VT API (file) 29 detected (ObfsObjDat, Save, CVE-2017-1188, multiple detections, Malicious, score, CVE-2018-0802, dinbqn, CLASSIC, Malformed, CVE-2018-0798, RTFMALFORM, Wacatac, Detected, Malform, RTFObfustream, ai score=84, Probably Heur, RTFBadHeader)
md5 750637aa4adce8ce221b8d8755dbbaf8
sha256 2e850540fca520336d35447b1592d9d4ee27b139c83ffec3b12bc6d31fdc4f2f
ssdeep 384:dEhzWuGu5+nEEKFBe4FGa27Y6QJI8dvDhQfCecbYryaUHuEz:w6pEEKFQoYY6MIOSfTKHaoz
imphash
impfuzzy
  Network IP location

Signature (10cnts)

Level Description
warning File has been identified by 29 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice An application raised an exception which may be indicative of an exploit crash
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates (office) documents on the filesystem
notice Creates hidden or system file
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
notice Sends data using the HTTP POST Method
info One or more processes crashed

Rules (3cnts)

Level Name Description Collection
warning MS_RTF_Suspicious_documents Suspicious documents using RTF document OLE object binaries (upload)
warning SUSP_INDICATOR_RTF_MalVer_Objects Detects RTF documents with non-standard version and embedding one of the object mostly observed in exploit (e.g. CVE-2017-11882) documents. binaries (upload)
info Rich_Text_Format_Zero Rich Text Format Signature Zero binaries (upload)

Network (33cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://192.3.108.47/test/ChromeSetup.exe US AS-COLOCROSSING 192.3.108.47 clean
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhemejginpboagddgdfbepgmp_414_all_ZZ_acz2kiivwz66gcmd564fvjnnf4sa.crx3 US GOOGLE 34.104.35.123 clean
http://edgedl.me.gvt1.com/edgedl/release2/chrome/czao2hrvpk5wgqrkz4kks5r734_109.0.5414.120/109.0.5414.120_chrome_installer.exe US GOOGLE 34.104.35.123 clean
https://update.googleapis.com/service/update2 US GOOGLE 142.250.66.67 clean
https://update.googleapis.com/service/update2?cup2key=11:7Gz5hy99G0OJGwmw-g8p-blMoWYIGYN02Dr48kg3q48&cup2hreq=7a6509b0222169109f7b96e446becc365cb6859e88bdecbd3f898226ad48db9e US GOOGLE 142.250.66.67 clean
edgedl.me.gvt1.com US GOOGLE 34.104.35.123 clean
dns.google US GOOGLE 8.8.4.4 clean
www.google.com US GOOGLE 142.250.76.132 clean
clients2.googleusercontent.com US GOOGLE 172.217.161.225 clean
www.gstatic.com US GOOGLE 142.250.206.227 clean
r1---sn-3u-bh2ss.gvt1.com KR Korea Telecom 211.114.64.12 clean
_googlecast._tcp.local Unknown clean
apis.google.com US GOOGLE 172.217.161.238 clean
clientservices.googleapis.com US GOOGLE 142.250.206.195 clean
accounts.google.com US GOOGLE 172.217.25.173 clean
142.250.206.238 US GOOGLE 142.250.206.238 mailcious
142.251.222.195 US GOOGLE 142.251.222.195 clean
142.250.204.109 US GOOGLE 142.250.204.109 clean
211.114.64.12 KR Korea Telecom 211.114.64.12 clean
142.250.66.132 US GOOGLE 142.250.66.132 clean
192.3.108.47 US AS-COLOCROSSING 192.3.108.47 mailcious
142.250.204.110 US GOOGLE 142.250.204.110 clean
142.250.76.131 US GOOGLE 142.250.76.131 clean
172.217.25.170 US GOOGLE 172.217.25.170 malware
172.217.161.234 US GOOGLE 172.217.161.234 malware
172.217.161.225 US GOOGLE 172.217.161.225 mailcious
216.58.200.228 US GOOGLE 216.58.200.228 clean
142.251.220.1 US GOOGLE 142.251.220.1 clean
142.251.220.3 US GOOGLE 142.251.220.3 clean
142.250.66.67 US GOOGLE 142.250.66.67 clean
142.250.204.67 US GOOGLE 142.250.204.67 clean
34.104.35.123 US GOOGLE 34.104.35.123 clean
172.217.25.174 US GOOGLE 172.217.25.174 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure