Report - bill.xlsm

VBA_macro
ScreenShot
Created 2021.08.14 09:20 Machine s1_win7_x6403
Filename bill.xlsm
Type Microsoft Excel 2007+
AI Score Not founds Behavior Score
2.8
ZERO API file : clean
VT API (file) 22 detected (Valyria, malicious, high confidence, Artemis, njzgk, ASMacro, Wacatac, score, ai score=82, Hvtf)
md5 95efc56b74a992e18a361579a267c4f3
sha256 e3573c5e7fb220bda82a4a4758dd3d18e59d1bb7d400297f779e8cb4eb4d4892
ssdeep 1536:iRRTHxW3TR8SAC8GeTrR0Q7aubea6fxF+Jk4FDpFCkcA9Tkw3LvOrnHfzH:Wr4R8SAdH24leLfyJ/1pFC+6ALCnHLH
imphash
impfuzzy
  Network IP location

Signature (6cnts)

Level Description
warning File has been identified by 22 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates (office) documents on the filesystem
notice Creates hidden or system file
notice Performs some HTTP requests

Rules (1cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://source-london-login-a44c-44d1-bc9b-a.e-voicemail.com/api/Analytics/Macro?iid=1511a0be-b05f-473d-8f41-5800f48cba12 US CLOUDFLARENET 104.21.24.5 clean
source-london-login-a44c-44d1-bc9b-a.e-voicemail.com US CLOUDFLARENET 104.21.24.5 clean
104.21.24.5 US CLOUDFLARENET 104.21.24.5 clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure