Report - info-33549970.xlsm

ScreenShot
Created 2021.04.24 20:55 Machine s1_win7_x6401
Filename info-33549970.xlsm
Type Microsoft Excel 2007+
AI Score Not founds Behavior Score
3.2
ZERO API file : clean
VT API (file) 5 detected (XLSM, Sneaky, Camelot, Artemis)
md5 effeb6845cee0ab05c452d39f9e5382d
sha256 49d33c7ef12c00bf7fc4dbb31f719146884f1120433df4f4b3b7ff2009400cf0
ssdeep 3072:Kxol0GwXQQteyZJAW++4vIDJN6ySc7DVTl/R3:K+l0GCRgeUwCyV7DVTl53
imphash
impfuzzy
  Network IP location

Signature (8cnts)

Level Description
watch Network communications indicative of a potential document or script payload download was initiated by the process excel.exe
watch One or more non-whitelisted processes were created
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates (office) documents on the filesystem
notice Creates hidden or system file
notice File has been identified by 5 AntiVirus engines on VirusTotal as malicious
info Checks amount of memory in system
info One or more processes crashed

Rules (0cnts)

Level Name Description Collection

Network (4cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
studio.joellemagazine.com US UNIFIEDLAYER-AS-1 162.241.194.86 clean
shapoorjipallonji.online US UNIFIEDLAYER-AS-1 162.241.123.16 clean
162.241.194.86 US UNIFIEDLAYER-AS-1 162.241.194.86 clean
162.241.123.16 US UNIFIEDLAYER-AS-1 162.241.123.16 clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure