Report - info_10621.xlsb

Gen1 Gen2 PE File DLL OS Processor Check PE32
ScreenShot
Created 2021.06.01 17:20 Machine s1_win7_x6401
Filename info_10621.xlsb
Type Zip archive data, at least v2.0 to extract
AI Score Not founds Behavior Score
5.8
ZERO API file : clean
VT API (file) 12 detected (Malcode, Woreflint, ai score=88)
md5 4567910e5ab113f08eb7edd48152074b
sha256 c0be2b35778de9b2feb0740482b838b4b774e6870cf12f18799624b54cdf97f0
ssdeep 3072:IDGWiDNSo5+XklfIzQf0FfitRE6xXOpJd/Wr9Eib:OiV5+XcIcf0FfitREiXO1urv
imphash
impfuzzy
  Network IP location

Signature (15cnts)

Level Description
warning Uses WMI to create a new process
watch File has been identified by 12 AntiVirus engines on VirusTotal as malicious
watch Network communications indicative of a potential document or script payload download was initiated by the process excel.exe
watch One or more non-whitelisted processes were created
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a suspicious process
notice Creates hidden or system file
notice Performs some HTTP requests
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Collects information to fingerprint the system (MachineGuid
info Command line console output was observed
info One or more processes crashed
info Queries for the computername

Rules (6cnts)

Level Name Description Collection
danger Win32_Trojan_Gen_1_0904B0_Zero Win32 Trojan Emotet binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)
info Win32_Trojan_Gen_2_0904B0_Zero Win32 Trojan Gen binaries (download)

Network (6cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://authd.feronok.com/Y_2Bxq_2FCq_2/F7MtFfN9/OaOiUxVKaMBar_2Bwadu9JI/5f2JIT1R6z/wqyp5OYH26_2FCxoz/4cOT1gafxSEk/1G5XsW988_2/BjdSRlF7L4UAwI/jcsnuDJ33Fm5LZiPOHvvA/PAjjFqU39DDThmrZ/eR22M_2Fe0ePvSa/5l4TtOyHif5dcS9VgY/EtNp35w6x/i4xoaI04WasHjLAOvTF6/tc4VmpY6u US GOOGLE 35.199.86.111 clean
https://megoseri.com/app.dll NL Hostkey B.v. 146.0.72.81 clean
authd.feronok.com US GOOGLE 35.199.86.111 clean
megoseri.com NL Hostkey B.v. 146.0.72.81 clean
146.0.72.81 NL Hostkey B.v. 146.0.72.81 clean
35.199.86.111 US GOOGLE 35.199.86.111 clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure