Report - 請求書7442110.xlsx

ScreenShot
Created 2021.06.17 15:57 Machine s1_win7_x6401
Filename 請求書7442110.xlsx
Type Microsoft Excel 2007+
AI Score Not founds Behavior Score
3.4
ZERO API file : clean
VT API (file) 27 detected (CVE-2017-1188, MalDoc, ali1000146, Camelot, probably a variant of Win32, CVE-2020-1711, CVE20171182, Malicious, score, ai score=83, Probably Heur, W97NativeName, AvsMofer, bS6Sfn, Static AI, Malicious OPENXML)
md5 8497d30c5d723b20bd3d9e68364f0ecd
sha256 07c245ffd8adf0483684c0c8f9369ea1f7c243dec02a1abf9ec85190dab5467b
ssdeep 24576:Y6OXTidWVMmFYjk5M2otczWfAw4PKBJ+IVWslIzIsS9p9i:YWEoA23fAwVBUM9W
imphash
impfuzzy
  Network IP location

Signature (7cnts)

Level Description
warning File has been identified by 27 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates (office) documents on the filesystem
notice Creates hidden or system file
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests

Rules (1cnts)

Level Name Description Collection
info test_office test url scripts

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://5.181.80.123/dBP1DJiJKPecHih.exe BG Telehouse EAD 5.181.80.123 clean
5.181.80.123 BG Telehouse EAD 5.181.80.123 clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure