Report - xlaisveryeasyprocesstoloveherwithallhappinessandkindofloverwhichwecantell__ireallylovehertrulyfromthe.doc

MS_RTF_Obfuscation_Objects RTF File doc
ScreenShot
Created 2024.04.16 15:23 Machine s1_win7_x6401
Filename xlaisveryeasyprocesstoloveherwithallhappinessandkindofloverwhichwecantell__ireallylovehertrulyfromthe.doc
Type Rich Text Format data, version 1, unknown character set
AI Score Not founds Behavior Score
1.4
ZERO API file : mailcious
VT API (file) 32 detected (CVE-2017-1188, CVE2017, ObfsStrm, Save, Bloodhound, multiple detections, Obfuscated, Malicious, score, dinbqn, Malformed, RTFMALFORM, RtfExp, Detected, OLE2, Camelot, Malform, Probably Heur, RTFObfuscation, ai score=80)
md5 48a9554413e1893bd21a8e1b31d42d7a
sha256 7c7a8c8c4c2bcc488c2eaff4baad7d097118b3127deb59c8726f7e4f4c2dcbc5
ssdeep 1536:aG5d5pXKc0aGmXb+VlVmcCJFnxvHbOmt1YJt0oQG5J6qQty8mbNhqfWgqOwz2RL8:aGX5pXb0aGqbIlVmcCJFnxKmt1YJt00L
imphash
impfuzzy
  Network IP location

Signature (2cnts)

Level Description
danger File has been identified by 32 AntiVirus engines on VirusTotal as malicious
notice RTF file has an unknown character set

Rules (2cnts)

Level Name Description Collection
warning SUSP_INDICATOR_RTF_MalVer_Objects Detects RTF documents with non-standard version and embedding one of the object mostly observed in exploit (e.g. CVE-2017-11882) documents. binaries (upload)
info Rich_Text_Format_Zero Rich Text Format Signature Zero binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure