Getting Started with Document Analysis using MalHost-Setup
Scenario: A user in your organization reported that he accidentally clicked and downloaded a document from an unknown source. You are tasked with the investigation. Perform document analysis and answer the following questions:
#note: A shellcode is detected inside the sample and time is critical. Investigate the sample as fast as possible.
Note: Use a separate machine to perform this task.
Question 1: Can you detect what type of vulnerability the sample is trying to exploit? What is the name of the malware detected?
Question 2: What type of vulnerability does it exploit and how severe is this vulnerability?
Question 3: How can you identify all the vulnerable devices in your organization using these details?