Report - Exports promotion highlits may 2021.xls

VBA_macro OS Processor Check MSOffice File
ScreenShot
Created 2021.06.16 10:11 Machine s1_win7_x6401
Filename Exports promotion highlits may 2021.xls
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Autho
AI Score Not founds Behavior Score
2.8
ZERO API file : clean
VT API (file) 38 detected (malicious, high confidence, Ole2, ObfDldr, Artemis, DDCH, DONOFF, score, SDrop, druvzi, UMal, hoigz@0, Siggen3, dsfuo, ASMalwS, Obfuse, ZedlaF, eq4@aqXPYYj, ai score=83, Generic@ML, RDML, w2ILrCKxjQVkzrQNW4ZhGw)
md5 f23dd9acbf28f324b290b970fbc40b30
sha256 a3c020bf50d39a58f5345b671c43d790cba0e2a3f631c5182437976adf970633
ssdeep 6144:Vf1cbwPwse8axEtjPOtioVjDGUU1qfDlavx+W2QnAkSsRa:XccPwsLY
imphash
impfuzzy
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 38 AntiVirus engines on VirusTotal as malicious
watch Creates suspicious VBA object
watch One or more non-whitelisted processes were created
notice Allocates read-write-execute memory (usually to unpack itself)
info Checks amount of memory in system

Rules (3cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure