Report - plan-1811162309.xlsb

ScreenShot
Created 2021.06.29 09:42 Machine s1_win7_x6402
Filename plan-1811162309.xlsb
Type Microsoft Excel 2007+
AI Score Not founds Behavior Score
4.2
ZERO API file : clean
VT API (file) 19 detected (MalDoc, ali1000101, IcedID, Camelot, ai score=86, EncDoc, CLASSIC)
md5 e489a06471cbbe594a1ff7c306db410e
sha256 25d46204f9bb8624d15d13296f31f2837323e25298480f4f8595a903c06e39d6
ssdeep 1536:MlHoxJQVyZEbrMj34410mHyL9c988gHhX8jCNnKfl5ncjv0/Ci:8Dbr0o45GUgHhX8jC9ySa
imphash
impfuzzy
  Network IP location

Signature (9cnts)

Level Description
watch Communicates with host for which no DNS query was performed
watch File has been identified by 19 AntiVirus engines on VirusTotal as malicious
watch Network communications indicative of a potential document or script payload download was initiated by the process excel.exe
watch One or more non-whitelisted processes were created
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Creates hidden or system file
info Checks amount of memory in system

Rules (0cnts)

Level Name Description Collection

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
gruasphenbogota.com US UNIFIEDLAYER-AS-1 50.116.92.246 clean
carpascapital.com US UNIFIEDLAYER-AS-1 50.116.92.246 clean
50.116.92.246 US UNIFIEDLAYER-AS-1 50.116.92.246 malware

Suricata ids



Similarity measure (PE file only) - Checking for service failure