Report - trend-1158968190.xls

Downloader MSOffice File
ScreenShot
Created 2021.10.19 10:36 Machine s1_win7_x6403
Filename trend-1158968190.xls
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Name
AI Score Not founds Behavior Score
3.6
ZERO API file : clean
VT API (file)
md5 2f51f9ca08ea41c5b2835a0bb1b61344
sha256 f4e1c6e661b42f9c9b3eb2e37e5da5a3f897ea3bef7121a9e06ac840ff95b697
ssdeep 6144:yKpb8rGYrMPe3q7Q0XV5xtuEsi8/dg09jWvcZZdtjq15OD7IvOEPD0lgvS3enw7y:I9jFrjmkD7IvLDK3vLvfn1+2M
imphash
impfuzzy
  Network IP location

Signature (6cnts)

Level Description
danger The process excel.exe wrote an executable file to disk which it then attempted to execute
watch Network communications indicative of a potential document or script payload download was initiated by the process excel.exe
watch One or more non-whitelisted processes were created
notice Allocates read-write-execute memory (usually to unpack itself)
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates a suspicious process

Rules (2cnts)

Level Name Description Collection
warning Microsoft_Office_File_Downloader_Zero Microsoft Office File Downloader binaries (upload)
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
readcentre.org.in US UNIFIEDLAYER-AS-1 192.185.129.109 clean
sacewdtrust.org.in US UNIFIEDLAYER-AS-1 192.185.129.109 clean
adricarautocenter.com.br US UNIFIEDLAYER-AS-1 192.185.212.213 clean
192.185.212.213 US UNIFIEDLAYER-AS-1 192.185.212.213 clean
192.185.129.109 US UNIFIEDLAYER-AS-1 192.185.129.109 malware

Suricata ids



Similarity measure (PE file only) - Checking for service failure