Report - Payment_Receipt 2422.xls

VBA_macro Generic Malware KeyLogger ScreenShot AntiDebug AntiVM MSOffice File
ScreenShot
Created 2021.10.14 16:13 Machine s1_win7_x6402
Filename Payment_Receipt 2422.xls
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Auth
AI Score Not founds Behavior Score
2.4
ZERO API file : clean
VT API (file) 9 detected (SLoad, Dridex, Eldorado, VSNTJD21, Malicious, score)
md5 e63deaea51f7cc2064ff808e11e1ad55
sha256 b8ef959a9176aef07fdca8705254a163b50b49a17217a4ff0107487f59d4a35d
ssdeep 1536:LFk3hbdlylKsgqopeJBWhZFGkE+cL2NdAA5eSUPIbjB59ZYiosYvvXvTWbxgXTPE:LFk3hbdlylKsgqopeJBWhZFGkE+cL2Nn
imphash
impfuzzy
  Network IP location

Signature (5cnts)

Level Description
watch One or more non-whitelisted processes were created
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice File has been identified by 9 AntiVirus engines on VirusTotal as malicious
notice Yara rule detected in process memory

Rules (14cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)
warning Generic_Malware_Zero Generic Malware binaries (upload)
notice KeyLogger Run a KeyLogger memory
notice ScreenShot Take ScreenShot memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory
info win_hook Affect hook table memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure