Report - 2012062508550176.xls

ScreenShot
Created 2021.04.06 16:40 Machine s1_win7_x6401
Filename 2012062508550176.xls
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 936, Last S
AI Score Not founds Behavior Score
4.6
ZERO API file : mailcious
VT API (file) 52 detected (Mailcab, malicious, high confidence, score, A@mm, XM97, Mailcab@mm, Laroux, ssfat, Ecsys, Dole, CLASSIC, A@4pfaz9, X2000M, Keylog, OLE2, Malicious OLE, Marker, ToDole, ai score=100)
md5 f1ffa12c53c606c2e0ff11933f15ccc1
sha256 bd69c3f206a5cfd93246c8fdf8e694158285fc376f26236775c8c055e0c7407a
ssdeep 3072:7g4yMDdWsk8JofSiPt3aCPKuTggt6iiRvBkWVbrzQ7IT81Z/p4tv2aK:s4yg5Kt3OusZbkF4t
imphash
impfuzzy
  Network IP location

Signature (9cnts)

Level Description
danger File has been identified by 52 AntiVirus engines on VirusTotal as malicious
watch Creates suspicious VBA object
watch One or more non-whitelisted processes were created
watch The process wscript.exe wrote an executable file to disk
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a suspicious process
notice Uses Windows utilities for basic Windows functionality
info Command line console output was observed
info One or more processes crashed

Rules (4cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (download)
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)
info Microsoft_Office_Document_Zero Microsoft Office Document Signature Zero binaries (download)
info Microsoft_Office_Document_Zero Microsoft Office Document Signature Zero binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure