Report - 76792.xls

VBA_macro MSOffice File
ScreenShot
Created 2021.08.10 17:41 Machine s1_win7_x6403
Filename 76792.xls
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Auth
AI Score Not founds Behavior Score
0.8
ZERO API file : clean
VT API (file)
md5 c27e15e92fc6401b37346e1356b358d6
sha256 67732ee8ba81cdd4855f6a208525ba600dcb5b3ace68f9befb9a81fb47d2adfd
ssdeep 3072:BwlYkEIuPm3fNRZmbaoFhZhR0cixIHm0DWsr5b4DdC45PV:alYkEIuPm3fNRZmbaoFhZhR0cixIHm0+
imphash
impfuzzy
  Network IP location

Signature (2cnts)

Level Description
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)

Rules (2cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure