Report - documents-631320621.xlsm

ScreenShot
Created 2021.04.24 18:20 Machine s1_win7_x6402
Filename documents-631320621.xlsm
Type Microsoft Excel 2007+
AI Score Not founds Behavior Score
3.4
ZERO API file : clean
VT API (file) 4 detected (XLSM, Sneaky, Camelot)
md5 6f72c84993020114d1ff0002d3717498
sha256 0ca7d06eebf77ae9a53d1fc2e7196754f79a361f0e8da70e9261ea8086b48772
ssdeep 1536:ha5t0F/vfA09n/dDuL7QQ64eyZJViW++poHnnHU0lSYwhKwDd1lc3W2CHjGJ+g:o5MTwXQQteyZJAW++44hh3Jc3W2wQ+g
imphash
impfuzzy
  Network IP location

Signature (7cnts)

Level Description
watch Communicates with host for which no DNS query was performed
watch Network communications indicative of a potential document or script payload download was initiated by the process excel.exe
watch One or more non-whitelisted processes were created
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates (office) documents on the filesystem
notice Creates hidden or system file
notice File has been identified by 4 AntiVirus engines on VirusTotal as malicious

Rules (0cnts)

Level Name Description Collection

Network (4cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
giftsonlinejo.com US DREAMHOST-AS 67.205.36.230 clean
kurtos.eu US UNIFIEDLAYER-AS-1 192.185.166.227 clean
192.185.166.227 US UNIFIEDLAYER-AS-1 192.185.166.227 clean
67.205.36.230 US DREAMHOST-AS 67.205.36.230 clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure