ScreenShot
Created | 2021.07.27 18:04 | Machine | s1_win7_x6401 |
Filename | Invoice_3326809.xlsm | ||
Type | Microsoft Excel 2007+ | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 19 detected (Dridex, malicious, high confidence, MalDoc, ali1000101, Ole2, druvzi, Outbreak, ai score=88) | ||
md5 | 86c63e5a375f54c79cfa007828400a5d | ||
sha256 | 297fa628e174f62edfc8ecf1e4ec79d8f177fe89308a0c04a0b55693af0a776f | ||
ssdeep | 6144:23j+sWRo6tcJhv7Bzg+8h6F493OzNStil3SH0Gon2HC:2T+Zenzdl8OLzNSt/UJ5 | ||
imphash | |||
impfuzzy |
Network IP location
Signature (9cnts)
Level | Description |
---|---|
watch | File has been identified by 19 AntiVirus engines on VirusTotal as malicious |
watch | One or more non-whitelisted processes were created |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Creates (office) documents on the filesystem |
notice | Creates a suspicious process |
notice | Creates executable files on the filesystem |
notice | Creates hidden or system file |
notice | One or more potentially interesting buffers were extracted |
info | Checks amount of memory in system |
Rules (7cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | Win32_Trojan_Dridex_Gene_Zero | Win32 Trojan Dridex Gene | binaries (download) |
warning | Contains_VBA_macro_code | Detect a MS Office document with embedded VBA macro code [binaries] | binaries (upload) |
warning | Generic_Malware_Zero | Generic Malware | binaries (download) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (download) |
info | IsDLL | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (download) |
Suricata ids
ET POLICY PE EXE or DLL Windows file download HTTP