Report - Testing.dot

VBA_macro Generic Malware MSOffice File
ScreenShot
Created 2023.12.23 18:22 Machine s1_win7_x6403
Filename Testing.dot
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Author: Mohammed Alkuwari, Template: Testing.dot, Last Saved By: Mohammed Alkuwari, Revision Number: 5, Name of Creating Application: Microsoft Office Word, To
AI Score Not founds Behavior Score
2.6
ZERO API file : mailcious
VT API (file) 22 detected (malicious, high confidence, OLE2, Eldorado, dnxmzd, Static AI, Malicious OLE, SAgent, Detected, Minerva, irpye, Powdow, RVCE, score, CLASSIC)
md5 3dfddb91261f5565596e3f014f9c495a
sha256 ba64d69516da5815369a03f25e567a3edf1473e6da5884b1485f3142d334767f
ssdeep 384:wViSwvxjk+t3XfGtqCvemW5t6+jnem6YIG5Cz:wYxw+tHe4Pjnem6YIkCz
imphash
impfuzzy
  Network IP location

Signature (6cnts)

Level Description
warning File has been identified by 22 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice An application raised an exception which may be indicative of an exploit crash
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates hidden or system file
info One or more processes crashed

Rules (3cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (upload)
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure