Report - new.xlsm

VBA_macro
ScreenShot
Created 2022.04.13 13:34 Machine s1_win7_x6402
Filename new.xlsm
Type Microsoft Excel 2007+
AI Score Not founds Behavior Score
5.4
ZERO API file : malware
VT API (file) 26 detected (GenericKD, MalDoc, ali1000158, gen87, Powdow, jcaqi, ai score=86, ASMacro, EncDoc, JRSM, Malicious, score, Probably Heur, W97Obfuscated, VBA@AI)
md5 191cab791281ce1bb8729e77bdce2576
sha256 80e3a3bb8825e6cf42ca77ffe16f029c8c5582d2edf557a33ebd62ab2bc3605c
ssdeep 192:ZtYhEqBaFUlbVvevUqzQXpS02LCtHOalOuvfW7lRYLrJCc6rEultIYWAb+V2K4a2:PYOzUlM9z6pSoOaMuel1/rGYWA+Vwa2
imphash
impfuzzy
  Network IP location

Signature (12cnts)

Level Description
warning File has been identified by 26 AntiVirus engines on VirusTotal as malicious
warning Uses WMI to create a new process
watch Disables proxy possibly for traffic interception
watch Modifies proxy override settings possibly for traffic interception
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates (office) documents on the filesystem
notice Creates executable files on the filesystem
notice Creates hidden or system file
notice Performs some HTTP requests
info Checks amount of memory in system
info Collects information to fingerprint the system (MachineGuid
info Queries for the computername

Rules (1cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)

Network (5cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
https://www.mediafire.com/file/p3ay4it08j1s7hp/0main.htm/file US CLOUDFLARENET 104.16.202.237 15966 mailcious
download2284.mediafire.com US MEDIAFIRE 199.91.155.25 mailcious
www.mediafire.com US CLOUDFLARENET 104.16.203.237 mailcious
199.91.155.25 US MEDIAFIRE 199.91.155.25 mailcious
104.16.202.237 US CLOUDFLARENET 104.16.202.237 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure