Report - doc-1271460016.xls

Downloader MSOffice File
ScreenShot
Created 2021.10.05 15:06 Machine s1_win7_x6401
Filename doc-1271460016.xls
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Name
AI Score Not founds Behavior Score
3.4
ZERO API file : clean
VT API (file)
md5 60f636f00050f303aa523c8edbe7aadf
sha256 d04d3bab2e0c73ccb33a0f040ba64e6a8ae089087939ccd80a659ca1e831934d
ssdeep 6144:NKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgW9DW/cZZRBDq1JOb7AvOsPDMlovS3OPI7Z:B9D1TDmUb7AvDDy3fLvfv1O+Co
imphash
impfuzzy
  Network IP location

Signature (6cnts)

Level Description
danger The process excel.exe wrote an executable file to disk which it then attempted to execute
watch Network communications indicative of a potential document or script payload download was initiated by the process excel.exe
watch One or more non-whitelisted processes were created
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates a suspicious process
info Checks amount of memory in system

Rules (2cnts)

Level Name Description Collection
warning Microsoft_Office_File_Downloader_Zero Microsoft Office File Downloader binaries (upload)
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)

Network (4cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
razatoursandtravels.com US SINGLEHOP-LLC 65.60.58.202 mailcious
7xwelfare.com US SINGLEHOP-LLC 65.60.58.202 mailcious
rosepetalsschool.com US SINGLEHOP-LLC 65.60.58.202 mailcious
65.60.58.202 US SINGLEHOP-LLC 65.60.58.202 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure