Document Analysis using OfficeMalScanner Toolkit
RTFScan is a document forensic analysis tool for [.]rtf documents, this tool is also included inside the OfficeMalScanner Toolkit. The toolkit includes OfficeMalScanner, RTFScan, DisView, MalHost executable that aids the analyst to analyze documents related to phishing incidents.
By running the sample doc into OfficeMalScanner with info option, it detects a different file format and points us to use RTFScan.

Running RTFScan inside the cmd prompt:
RTFScan <sample_doc> scan
This gives us more details about our sample including the signature found inside the malicious offset.
It detects FS:[30] inside the offset 0xd48 where this means it tries to accesses the PEB of the process and this gives an indication that this sample was then injected with a shellcode that later be used to exploit the user’s system.
Also, RTFScan detects the malicious index and any index that is above 10 is considered malicious and In this case RTFScan detects 30.

Let’s run again RTFScan on the same file but now with the scan debug option.
We can see that it debugs the malicious offset and presents us the code inside the address and from there you can understand what does the code trying to do.
It also dumps a file that can be later use for further analysis.

Tool Demo Summary:
In this lab we combine OfficeMalScanner and RTFScan to perform a document analysis on [.]rtf file and gives us a rich information about the malicious offset residing inside.