Report - aim-387176491.xlsm

ScreenShot
Created 2021.06.19 10:16 Machine s1_win7_x6402
Filename aim-387176491.xlsm
Type Microsoft Excel 2007+
AI Score Not founds Behavior Score
4.0
ZERO API file : clean
VT API (file)
md5 11acc8a0e82823aff2bc5753ba941369
sha256 4a5d9d2cfcf9e377ffc0a1a4e215be461ba37894db0ec900b7a2c645264fd0ad
ssdeep 3072:pcLU9VlUBWA6CFvA7bRCxAVIKixVymd1xXPYXHwYC1Ubn:puU3liWA6FsYixVyWxfay6L
imphash
impfuzzy
  Network IP location

Signature (9cnts)

Level Description
watch Communicates with host for which no DNS query was performed
watch Network communications indicative of a potential document or script payload download was initiated by the process excel.exe
watch One or more non-whitelisted processes were created
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates (office) documents on the filesystem
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Creates hidden or system file
info Checks amount of memory in system

Rules (0cnts)

Level Name Description Collection

Network (4cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
biopaten.no NO Digital Garden As 5.249.227.109 mailcious
beartoothkawasaki.com US UNIFIEDLAYER-AS-1 192.185.71.128 mailcious
192.185.71.128 US UNIFIEDLAYER-AS-1 192.185.71.128 malware
5.249.227.109 NO Digital Garden As 5.249.227.109 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure