Report - inv_orders.xlsx

MSOffice File
ScreenShot
Created 2021.10.13 18:04 Machine s1_win7_x6401
Filename inv_orders.xlsx
Type CDFV2 Encrypted
AI Score Not founds Behavior Score
3.8
ZERO API file : clean
VT API (file) 18 detected (CVE-2018-0802, CVE-2017-1188, CVE2017, probably a variant of Win32, ai score=86, CVE-2018-0798)
md5 69edca098ec730f1aa9302c24923fcff
sha256 c69e9081b1ecaa8b60fb92b72ca5fb49c669a525e4cac10803cbe04cdf23ceac
ssdeep 6144:m7aQN7uXovk9YMqxsEbiHNaaXuDyqmID7PH0YDif:iaQN7VvwYMqItaaeDlcEif
imphash
impfuzzy
  Network IP location

Signature (9cnts)

Level Description
watch Communicates with host for which no DNS query was performed
watch File has been identified by 18 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice An application raised an exception which may be indicative of an exploit crash
notice Creates (office) documents on the filesystem
notice Creates hidden or system file
notice HTTP traffic contains suspicious features which may be indicative of malware related traffic
notice Performs some HTTP requests
info One or more processes crashed

Rules (1cnts)

Level Name Description Collection
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)

Network (2cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://192.227.158.101/09008/vbc.exe US AS-COLOCROSSING 192.227.158.101 6433 malware
192.227.158.101 US AS-COLOCROSSING 192.227.158.101 malware

Suricata ids



Similarity measure (PE file only) - Checking for service failure