Getting Started with Document Analysis using MalHost-Setup

Read Lab Instruction

Scenario: A user in your organization reported that he accidentally clicked and downloaded a document from an unknown source. You are tasked with the investigation. Perform document analysis and answer the following questions:

#note: A shellcode is detected inside the sample and time is critical. Investigate the sample as fast as possible.

Note: Use a separate machine to perform this task.

Tool: MalHost-Setup

Question 1: Can you detect what type of vulnerability the sample is trying to exploit? What is the name of the malware detected?

Question 2: What type of vulnerability does it exploit and how severe is  this vulnerability?

Question 3: How can you identify all the vulnerable devices in your organization using these details?