Report - catalog-1546258442.xlsm

ScreenShot
Created 2021.05.01 09:18 Machine s1_win7_x6402
Filename catalog-1546258442.xlsm
Type Microsoft Excel 2007+
AI Score Not founds Behavior Score
3.8
ZERO API file : clean
VT API (file) 5 detected (XLSM, Sneaky, Camelot)
md5 23fa95e52e98c3f1b25c0f2aa1d0ac16
sha256 8fffcc7996d640d925489fd477222dde71b3def58f588ef3c3dd86ac7044b5cc
ssdeep 3072:+mIxNUlpIfw8SGopH8x+iHdoLqp6vif+zUD:+mIr4Ga8x7HdLp6vif+zUD
imphash
impfuzzy
  Network IP location

Signature (9cnts)

Level Description
watch Communicates with host for which no DNS query was performed
watch Network communications indicative of a potential document or script payload download was initiated by the process excel.exe
watch One or more non-whitelisted processes were created
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates (office) documents on the filesystem
notice Creates hidden or system file
notice File has been identified by 5 AntiVirus engines on VirusTotal as malicious
info Checks amount of memory in system
info One or more processes crashed

Rules (0cnts)

Level Name Description Collection

Network (4cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
legalopspr.com US UNIFIEDLAYER-AS-1 192.185.20.98 mailcious
dentistelmhurstny.com US UNIFIEDLAYER-AS-1 192.185.5.2 mailcious
192.185.20.98 US UNIFIEDLAYER-AS-1 192.185.20.98 phishing
192.185.5.2 US UNIFIEDLAYER-AS-1 192.185.5.2 malware

Suricata ids



Similarity measure (PE file only) - Checking for service failure