Report - Payment-Extract-View-ID552354325KAIUHBJ2344.msi

Gen2 OS Processor Check MSOffice File
ScreenShot
Created 2021.05.02 10:13 Machine s1_win7_x6401
Filename Payment-Extract-View-ID552354325KAIUHBJ2344.msi
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last P
AI Score Not founds Behavior Score
0.8
ZERO API file : clean
VT API (file) 10 detected (Cryxos, Eldorado, Locky, CLASSIC, Artemis, ai score=80)
md5 55a943005763a1aa3335882eaba380a7
sha256 ba67c7d19ae5f1e164777227739631ca2187406a447edc218f4807e986ea3430
ssdeep 12288:soOUY2tkeYbS9L/RuMuwLocopMlVSCS4T7lAOe:soVY2tkeYe9oWVRT7lAO
imphash
impfuzzy
  Network IP location

Signature (2cnts)

Level Description
watch File has been identified by 10 AntiVirus engines on VirusTotal as malicious
info One or more processes crashed

Rules (3cnts)

Level Name Description Collection
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure