Report - aim-386037884.xlsm

ScreenShot
Created 2021.06.19 10:15 Machine s1_win7_x6401
Filename aim-386037884.xlsm
Type Microsoft Excel 2007+
AI Score Not founds Behavior Score
3.4
ZERO API file : clean
VT API (file)
md5 5e8b78d60a546712a68abedb64f3a455
sha256 34f6fda859563de9964fd798e68e7d1bfe6b58f33852d917866cbfaaf38cffd7
ssdeep 3072:FHlTkdm3bGeAxidxVymd1xXPMU9VlUBWA6CFvA7bRCxAVIKKNB:FFTkeGKdxVyWxfMU3liWA6FsYq
imphash
impfuzzy
  Network IP location

Signature (8cnts)

Level Description
watch Network communications indicative of a potential document or script payload download was initiated by the process excel.exe
watch One or more non-whitelisted processes were created
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates (office) documents on the filesystem
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Creates hidden or system file
info Checks amount of memory in system

Rules (0cnts)

Level Name Description Collection

Network (4cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
beartoothkawasaki.com US UNIFIEDLAYER-AS-1 192.185.71.128 mailcious
biopaten.no NO Digital Garden As 5.249.227.109 mailcious
192.185.71.128 US UNIFIEDLAYER-AS-1 192.185.71.128 malware
5.249.227.109 NO Digital Garden As 5.249.227.109 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure