Report - iden.doc

VBA_macro Generic Malware Malicious Library UPX Anti_VM MSOffice File PE File PE64 OS Processor Check
ScreenShot
Created 2024.08.09 16:13 Machine s1_win7_x6402
Filename iden.doc
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Author: user1, Template: Normal.dotm, Last Saved By: user1, Revision Number: 5, Name of Creating Application: Microsoft Office Word, Total Editing Time: 28:00,
AI Score Not founds Behavior Score
5.6
ZERO API file : clean
VT API (file) 36 detected (Common, ObfDldr, Malicious, score, OLE2, gen433, high confidence, SDrop, druvzi, TOPIS, rYd0cec0tnN, lwxgm, Detected, ai score=89, Leonem, ABRisk, ZIZZ, MacroS)
md5 1ee73b17111ab0ffb2f62690310f4ada
sha256 31300645371f90f83ca6aa058503fa7c2ba386f496ac181a6b287ba7ba1ea10e
ssdeep 24576:j1NDbbUMbRNjy8lZ2UFRTHD/mrM1e6sBiNhaYQBFq:vDbJbvjynUyCpx
imphash
impfuzzy
  Network IP location

Signature (10cnts)

Level Description
danger A potential heapspray has been detected. 46641 megabytes was sprayed onto the heap of the WINWORD.EXE process
danger File has been identified by 36 AntiVirus engines on VirusTotal as malicious
watch One or more non-whitelisted processes were created
watch The process winword.exe wrote an executable file to disk
notice Allocates read-write-execute memory (usually to unpack itself)
notice An application raised an exception which may be indicative of an exploit crash
notice Creates (office) documents on the filesystem
notice Creates hidden or system file
notice Word document hooks document open
info One or more processes crashed

Rules (10cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (download)
warning Generic_Malware_Zero Generic Malware binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch UPX_Zero UPX packed file binaries (download)
notice anti_vm_detect Possibly employs anti-virtualization techniques binaries (upload)
info IsPE64 (no description) binaries (download)
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure