ScreenShot
Created | 2021.11.02 16:19 | Machine | s1_win7_x6402 |
Filename | 1.xlsb | ||
Type | Microsoft Excel 2007+ | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : clean | ||
VT API (file) | 18 detected (GenericKD, XLS4, IcedID, XLSB, Camelot, a variant of DOC, ai score=85, EncDoc, PMSH, Malicious, score) | ||
md5 | dee6841dad2810dbb7d487803e3f2b4c | ||
sha256 | f7c19c2b33e47e2ab2d742587e9b593ac3d8756caf37c710ae1f2800aeb144a9 | ||
ssdeep | 6144:8LuLooVw6XdPYlqpxEHjXaAtt3A1DXy47LZxUvsQafh:8KLoaXdWEEDXaAzg+iU0Q8 | ||
imphash | |||
impfuzzy |
Network IP location
Signature (7cnts)
Level | Description |
---|---|
watch | File has been identified by 18 AntiVirus engines on VirusTotal as malicious |
watch | One or more non-whitelisted processes were created |
notice | A process attempted to delay the analysis task. |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | Creates a suspicious process |
notice | Creates hidden or system file |
info | Checks amount of memory in system |
Rules (1cnts)
Level | Name | Description | Collection |
---|---|---|---|
info | xlsb | Excel Binary Workbook file format detection | binaries (upload) |
Network (0cnts) ?
Request | CC | ASN Co | IP4 | Rule ? | ZERO ? |
---|