app.docguard.io
Open in
urlscan Pro
2606:4700:3035::ac43:8c1e
Public Scan
URL:
https://app.docguard.io/4bf5e05f97c891eec60292eb31e7387d5f92fcd781182e497a2cb834b880d3ff/results/dashboard
Submission: On July 19 via manual from DE — Scanned from DE
Submission: On July 19 via manual from DE — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Enable JavaScript on your browser. Real World Examples Back Home Download File Malicious HTML File - Malicious 4bf5e05f97c891eec60292eb31e7387d5f92fcd781182e497a2cb834b880d3ff Jul, 05 2023 14:01 SHA256: 4bf5e05f97c891eec60292eb31e7387d5f92fcd781182e497a2cb834b880d3ff MD5: 01151358e7b104eb75e42d4902f02394 Tags: VT Detection Rate: 2/59 Summary Mitre IoCs19 Images Embedded Files Suspicious Codes Comments0 Detections Maldoc types and detected ones ExpandSuspicious URL Detected The sample document contains suspicious URL. ExpandSuspicious JS Code Detected ExpandVba Stomping Not Detected Document contains a fake macro code An adversary may hide malicious VBA code by overwriting the VBA source code location with zero’s, benign code, or random bytes while leaving the previously compiled malicious p-code. ExpandVba Purging Not Detected ExpandSuspicious Module Name Not Detected Document contains suspicious module names ExpandDde String Not Detected Document is poisoned with DDE commands, directly or through embedded files Adversaries may use Windows Dynamic Data Exchange (DDE) to execute arbitrary commands. ExpandObfuscation Not Detected The sample document contains an obfuscated macro. Adversaries may attempt to make an executable or script difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit ExpandBlacklist Api Not Detected The macro has some blacklisted APIs like Create, SpawnInstance Scripts can be embedded inside Office documents as macros that can be set to execute when files used in Spearphishing Attachment and other types of spearphishing are opened. ExpandUnviewable Not Detected ExpandGui Hide Not Detected ExpandSuspicious Password Not Detected The sample document is encrypted with the default 'VelvetSweatshop' password. To decrypt a given encrypted file, Microsoft Office first tries to use the embedded, default password, “VelvetSweatshop,” to decrypt and open the file and run any onboard macros or other potentially malicious code ExpandSuspicious Creator Not Detected The sample document is created by suspicious creater. Ie. Evilapp ExpandAmsi Scan Result Not Detected ExpandSuspicious Encryption Not Detected ExpandSuspicious Embedded Objects Not Detected The sample document contains embedded files of suspicious types. ExpandSuspicious RTF Objects Not Detected The sample document contains embedded RTF file. ExpandSuspicious External Resource Not Detected ExpandTemplate Injection Not Detected ExpandSuspicious Office Plugin Not Detected Adversaries may leverage Microsoft Office-based applications for persistence between startups ExpandExcel 4 Macro Sheets Not Detected ExpandHidden Sheet Not Detected Document contains macros inside a 'very hidden' Excel worksheet ExpandEquation Exploit Not Detected ExpandCVE 2022 30360 Follina Not Detected ExpandPotentialPhishing Not Detected ExpandTampered File Not Detected This file were not scanned by Docguard Engine properly, since it is tampered or sanitized by a security solution. ExpandLegacy Excel Not Detected ExpandFake PDF Signed Not Detected ExpandZip Bomb Not Detected ATT&CK Detected mitre tactic and techniques Tactic Id Tactic Technique Id Technique There is no mitre attack! See ATT&CK Matrix General Info General information about file Save as Image File Name 4bf5e05f97c891eec60292eb31e7387d5f92fcd781182e497a2cb834b880d3ff Verdict Malicious File Type HTML File - Malicious SHA256 4bf5e05f97c891eec60292eb31e7387d5f92fcd781182e497a2cb834b880d3ff MD5 01151358e7b104eb75e42d4902f02394 File Size 65.8 KB Date Jul,05 2023 IoC Yes Mitre No Images No Codes No Public Yes Why Docguard?FAQsBlogContact Docguard Cyber Security Inc. 2023 v2.0 Beta