Report - cancel_sub_KT901234567890123.xlsb

VBA_macro
ScreenShot
Created 2021.06.22 09:32 Machine s1_win7_x6402
Filename cancel_sub_KT901234567890123.xlsb
Type Microsoft Excel 2007+
AI Score Not founds Behavior Score
8.4
ZERO API file : clean
VT API (file) 9 detected (malicious, high confidence, XLS4, IcedID, SneakyBin)
md5 6901ee3cdccb4f65c18375d2a31d8a25
sha256 694a0501f01eba6b106984a2dc2e4dd8eb99cfce626d664a650f698f33b1ece6
ssdeep 3072:nWWzcY7qSZlOSE1vUlu/9K4QRfs1POOt7y50OMuK0nImlQ1uA7ZQCL/2:X3dZZAvUMNm+9kObufIe6QU+
imphash
impfuzzy
  Network IP location

Signature (17cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
danger The process excel.exe wrote an executable file to disk which it then attempted to execute
watch A command shell or script process was created by an unexpected parent process
watch Communicates with host for which no DNS query was performed
watch One or more non-whitelisted processes were created
notice A process created a hidden window
notice Allocates read-write-execute memory (usually to unpack itself)
notice Checks adapter addresses which can be used to detect virtual network interfaces
notice Creates a suspicious process
notice Creates hidden or system file
notice File has been identified by 9 AntiVirus engines on VirusTotal as malicious
notice Uses Windows utilities for basic Windows functionality
info Checks amount of memory in system
info Checks if process is being debugged by a debugger
info Command line console output was observed
info One or more processes crashed
info Queries for the computername

Rules (1cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
192.236.195.160 US HOSTWINDS 192.236.195.160 clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure