Report - Employee%20Update%20-%20Covid.xls

VBA_macro Generic Malware MSOffice File
ScreenShot
Created 2021.10.08 08:16 Machine s1_win7_x6401
Filename Employee%20Update%20-%20Covid.xls
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Auth
AI Score Not founds Behavior Score
3.2
ZERO API file : clean
VT API (file) 4 detected (GenericM, SLoad, Artemis)
md5 bb6169cac9a125cd63eedeb3893b920b
sha256 2acdd04554feb1ef8b0307d5fb2c1bf7fd6a8e1157f9d3753119e64b30c16c30
ssdeep 1536:zScKoSsxz1PDZL2Qiw+4868O8K/5Le+k3hbdlylKsgqopeJBWhZFGkE+cL2NdAPy:zScKoSsxzNDZL2Qiw+4868O8K/5Le+kC
imphash
impfuzzy
  Network IP location

Signature (6cnts)

Level Description
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
notice Allocates read-write-execute memory (usually to unpack itself)
notice File has been identified by 4 AntiVirus engines on VirusTotal as malicious
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests

Rules (3cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (upload)
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)

Network (3cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://185.225.19.246/ RO MivoCloud SRL 185.225.19.246 clean
185.176.220.198 LV 2 Cloud Ltd. 185.176.220.198 clean
185.225.19.246 RO MivoCloud SRL 185.225.19.246 clean

Suricata ids



Similarity measure (PE file only) - Checking for service failure