Report - iden.doc

VBA_macro Generic Malware Malicious Library UPX Anti_VM MSOffice File PE File PE64 OS Processor Check
ScreenShot
Created 2024.08.09 15:52 Machine s1_win7_x6401
Filename iden.doc
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Author: user1, Template: Normal.dotm, Last Saved By: user1, Revision Number: 5, Name of Creating Application: Microsoft Office Word, Total Editing Time: 28:00,
AI Score Not founds Behavior Score
6.2
ZERO API file : clean
VT API (file) 36 detected (Common, ObfDldr, Malicious, score, OLE2, gen433, high confidence, SDrop, druvzi, TOPIS, rYd0cec0tnN, lwxgm, Detected, ai score=89, Leonem, ABRisk, ZIZZ, MacroS)
md5 1ee73b17111ab0ffb2f62690310f4ada
sha256 31300645371f90f83ca6aa058503fa7c2ba386f496ac181a6b287ba7ba1ea10e
ssdeep 24576:j1NDbbUMbRNjy8lZ2UFRTHD/mrM1e6sBiNhaYQBFq:vDbJbvjynUyCpx
imphash
impfuzzy
  Network IP location

Signature (10cnts)

Level Description
danger A potential heapspray has been detected. 52830 megabytes was sprayed onto the heap of the WINWORD.EXE process
danger File has been identified by 36 AntiVirus engines on VirusTotal as malicious
watch Creates suspicious VBA object
watch Libraries known to be associated with a CVE were requested (may be False Positive)
watch One or more non-whitelisted processes were created
watch The process winword.exe wrote an executable file to disk
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates (office) documents on the filesystem
notice Creates hidden or system file
notice Word document hooks document open

Rules (10cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch UPX_Zero UPX packed file binaries (download)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (upload)
info IsPE64 (no description) binaries (download)
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure