Report - test2.doc

VBA_macro Generic Malware AntiDebug AntiVM MSOffice File
ScreenShot
Created 2024.01.06 10:48 Machine s1_win7_x6403
Filename test2.doc
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Author: wound, Template: Normal.dotm, Last Saved By: wound, Revision Number: 36, Name of Creating Application: Microsoft Office Word, Total Editing Time: 07:58
AI Score Not founds Behavior Score
7.0
ZERO API file : mailcious
VT API (file) 30 detected (Amphitryon, malicious, high confidence, OLE2, score, SAgent, druvzi, TOPIS, nCOm0OIG1PI, Redcap, rbpfk, Siggen3, Static AI, Malicious OLE, ai score=80, Leonem, ABRisk, ROET, Szfl)
md5 794004e79c07dbba60e1307549c04c3d
sha256 9455bee3d642e0ce7949e5df1996a90621e76e991ae973da4dbae5d0e93ce33b
ssdeep 1536:by5jhc8ldaJdz369DfxVv4TEbWdDZ4nW1Bh4JUF0M+I6xKVh0EFzHByYyFtdOvJa:kWKaAGgbsFlW4x6MdBHwYHvJFCNu
imphash
impfuzzy
  Network IP location

Signature (14cnts)

Level Description
danger File has been identified by 30 AntiVirus engines on VirusTotal as malicious
watch Network communications indicative of a potential document or script payload download was initiated by the process wscript.exe
watch One or more non-whitelisted processes were created
watch Resumed a suspended thread in a remote process potentially indicative of process injection
watch The process wscript.exe wrote an executable file to disk
watch Wscript.exe initiated network communications indicative of a script based payload download
notice Allocates read-write-execute memory (usually to unpack itself)
notice An application raised an exception which may be indicative of an exploit crash
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates (office) documents on the filesystem
notice Creates hidden or system file
notice Word document hooks document open
notice Yara rule detected in process memory
info One or more processes crashed

Rules (11cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (upload)
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
configure.syscatec.com US HVC-AS 69.46.5.226 mailcious
69.46.5.226 US HVC-AS 69.46.5.226 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure