ScreenShot
Created | 2021.03.09 11:26 | Machine | s1_win7_x6401 |
Filename | resume_89607647.doc | ||
Type | Microsoft Word 2007+ | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 27 detected (malicious, high confidence, ObfDldr, Save, gen60, dnxmyp, ObfusVBA@ML, AMGY, Static AI, Malicious OPENXML, score, ai score=82, Probably Heur, W97Obfuscated, Obfuscated) | ||
md5 | 1c15a93806ee6bfa079cb5f92b61ff58 | ||
sha256 | dcad6bee084337b2a064c1d05f7e32a0afbb86028dd5efcff9bbc8bbc27e2cc8 | ||
ssdeep | 384:tctd5lnB13exVHMWy/ThjKNxt/ZtNNOdgMfT66js2Zzo+5N1eHsR:4ND3+M1/axllNgfTNAOU+5Gc | ||
imphash | |||
impfuzzy |
Network IP location
Signature (9cnts)
Level | Description |
---|---|
danger | Office document performs HTTP request (possibly to download malware) |
warning | File has been identified by 27 AntiVirus engines on VirusTotal as malicious |
watch | Creates suspicious VBA object |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Creates (office) documents on the filesystem |
notice | Creates hidden or system file |
notice | Potentially malicious URLs were found in the process memory dump |
notice | Word document hooks document open |
notice | Yara rule detected in process memory |
Rules (31cnts)
Level | Name | Description | Collection |
---|---|---|---|
warning | Contains_VBA_macro_code | Detect a MS Office document with embedded VBA macro code [binaries] | binaries (upload) |
notice | Str_Win32_Http_API | Match Windows Http API call | memory |
notice | Str_Win32_Internet_API | Match Windows Inet API call | memory |
info | anti_dbg | Checks if being debugged | memory |
info | antisb_threatExpert | Anti-Sandbox checks for ThreatExpert | memory |
info | DebuggerCheck__QueryInfo | (no description) | memory |
info | DebuggerHiding__Thread | (no description) | memory |
info | ThreadControl__Context | (no description) | memory |
info | win_hook | Affect hook table | memory |
info | create_com_service | Create a COM server | memory |
info | cred_local | Steal credential | memory |
info | escalate_priv | Escalade priviledges | memory |
info | hijack_network | Hijack network configuration | memory |
info | keylogger | Run a keylogger | memory |
info | migrate_apc | APC queue tasks migration | memory |
info | network_dga | Communication using dga | memory |
info | network_dns | Communications use DNS | memory |
info | network_ftp | Communications over FTP | memory |
info | network_http | Communications over HTTP | memory |
info | network_tcp_listen | Listen for incoming communication | memory |
info | network_tcp_socket | Communications over RAW socket | memory |
info | rat_rdp | Remote Administration toolkit enable RDP | memory |
info | screenshot | Take screenshot | memory |
info | spreading_file | Malware can spread east-west file | memory |
info | Str_Win32_Wininet_Library | Match Windows Inet API library declaration | memory |
info | Str_Win32_Winsock2_Library | Match Winsock 2 API library declaration | memory |
info | win_files_operation | Affect private profile | memory |
info | win_mutex | Create or check mutex | memory |
info | win_private_profile | Affect private profile | memory |
info | win_registry | Affect system registries | memory |
info | win_token | Affect system token | memory |