Report - documents-633524133.xlsm

ScreenShot
Created 2021.04.24 18:22 Machine s1_win7_x6401
Filename documents-633524133.xlsm
Type Microsoft Excel 2007+
AI Score Not founds Behavior Score
3.2
ZERO API file : clean
VT API (file) 4 detected (XLSM, Sneaky, Camelot)
md5 a14c32fc53b0c42e12a563838d67526b
sha256 d43743281ad4f2a3b6668ec55bd55fcdeb784e5e304ab1da62575fd1caf9b340
ssdeep 1536:3a5t0F/vfA09n/dDuL7QQ64eyZJViW++poHnnHU0lSYwhKwDd1lc3W2CHjGJ+g:q5MTwXQQteyZJAW++44hh3Jc3W2wQ+g
imphash
impfuzzy
  Network IP location

Signature (8cnts)

Level Description
watch Network communications indicative of a potential document or script payload download was initiated by the process excel.exe
watch One or more non-whitelisted processes were created
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates (office) documents on the filesystem
notice Creates hidden or system file
notice File has been identified by 4 AntiVirus engines on VirusTotal as malicious
info Checks amount of memory in system
info One or more processes crashed

Rules (0cnts)

Level Name Description Collection

Network (4cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
kurtos.eu US UNIFIEDLAYER-AS-1 192.185.166.227 clean
giftsonlinejo.com US DREAMHOST-AS 67.205.36.230 clean
67.205.36.230 US DREAMHOST-AS 67.205.36.230 clean
192.185.166.227 US UNIFIEDLAYER-AS-1 192.185.166.227 clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure