Report - Documents new.xlsb

ScreenShot
Created 2021.09.09 20:02 Machine s1_win7_x6403
Filename Documents new.xlsb
Type Zip archive data, at least v2.0 to extract
AI Score Not founds Behavior Score
4.0
ZERO API file : clean
VT API (file) 25 detected (SLoad, GenericKD, MalDoc, ali1000101, SneakyBin, Camelot, a variant of Generik, HYXVNJK, Macro40, Artemis, mhxaz, Malicious, score, ai score=87)
md5 e2c5c7d099745fa74d4653b6d49338d2
sha256 8662d511c7f1bef3a6e4f6d72965760345b57ddf0de5d3e6eae4e610216a39c1
ssdeep 6144:4R+roOczZ5uoKG6qYR90sX9OYubAp2BAHDwRsX3+HnMtgG5HyQt:jkOczZoHqYR90a9nyE2n+uHnkpHy6
imphash
impfuzzy
  Network IP location

Signature (8cnts)

Level Description
warning File has been identified by 25 AntiVirus engines on VirusTotal as malicious
watch Network communications indicative of a potential document or script payload download was initiated by the process excel.exe
watch One or more non-whitelisted processes were created
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Creates hidden or system file

Rules (0cnts)

Level Name Description Collection

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
pawevi.com Unknown clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure