Report - specification-1210302809.xls

MSOffice File
ScreenShot
Created 2021.09.24 12:10 Machine s1_win7_x6403
Filename specification-1210302809.xls
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Name
AI Score Not founds Behavior Score
4.0
ZERO API file : clean
VT API (file) 9 detected (Save, ma29, Camelot, SquirrelWaffle20921, Probably Heur, W97ShellB)
md5 030db7c607937a266f322e1a075f63d8
sha256 a8979aa7faa4835be91b6f5d8521739e80db9dfd4184bcef1854a0b4b26c232d
ssdeep 6144:NKpb8rGYrMPe3q7Q0XV5xtuE8vG8GpTIvnfzLI6+tqD2EwnoR57lj+QSGxGvJmm7:dbD6qyEwoR5lTS/cJ3nL+
imphash
impfuzzy
  Network IP location

Signature (7cnts)

Level Description
danger The process excel.exe wrote an executable file to disk which it then attempted to execute
watch Network communications indicative of a potential document or script payload download was initiated by the process excel.exe
watch One or more non-whitelisted processes were created
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates a suspicious process
notice File has been identified by 9 AntiVirus engines on VirusTotal as malicious

Rules (1cnts)

Level Name Description Collection
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)

Network (6cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
lfzombiegames.com CA SINGLEHOP-LLC 172.96.186.147 mailcious
sukmabali.com ID Rumahweb Indonesia CV. 103.253.212.72 mailcious
elitekhatsacco.co.ke US UNIFIEDLAYER-AS-1 162.241.169.16 mailcious
162.241.169.16 US UNIFIEDLAYER-AS-1 162.241.169.16 mailcious
172.96.186.147 CA SINGLEHOP-LLC 172.96.186.147 clean
103.253.212.72 ID Rumahweb Indonesia CV. 103.253.212.72 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure