Report - allocate.dot

VBA_macro MSOffice File
ScreenShot
Created 2021.07.12 09:53 Machine s1_win7_x6401
Filename allocate.dot
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1251, Templ
AI Score Not founds Behavior Score
2.2
ZERO API file : clean
VT API (file) 20 detected (malicious, high confidence, Amphitryon, Save, Obfuscated, Ole2, druvzi, CLASSIC, ai score=81, Probably Heur, W97Obfuscated, Static AI, Malicious OLE, qexvmc)
md5 c7810b25c8edd6269c92af482560e600
sha256 0f9d723c3023a6af3e5522f63f649c7d6a8cb2727ec092e0b38ee76cd1bbf1c4
ssdeep 1536:3l/jXBM8Z/JvH4wm+oDkC01YNWSmAEW51MpWZemUE7mGc0pXu474eODdz9jgUGpG:3lry2qezHG/+6w9qiSQLFUda
imphash
impfuzzy
  Network IP location

Signature (5cnts)

Level Description
warning File has been identified by 20 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates hidden or system file
notice Word document hooks document close
info Office document has indirect calls

Rules (2cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure