Report - see.xlsm

VBA_macro
ScreenShot
Created 2022.04.18 09:15 Machine s1_win7_x6401
Filename see.xlsm
Type Microsoft Excel 2007+
AI Score Not founds Behavior Score
5.8
ZERO API file : clean
VT API (file)
md5 7a300b49ef5af319c91821cf2674d2b9
sha256 fc2eca27d4ceaf134867b988ec20a27d2b4e11f89539975e31ea37827de9a6fd
ssdeep 768:oK7xynmgCNL0vzwZhGjk9DnQZQJoD88yIvsIRKzUotQZf2bbFO:o2xymLNVzMk98+ootSokww
imphash
impfuzzy
  Network IP location

Signature (10cnts)

Level Description
danger The process excel.exe wrote an executable file to disk which it then attempted to execute
danger Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually)
watch Communicates with host for which no DNS query was performed
watch Creates suspicious VBA object
watch One or more non-whitelisted processes were created
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates (office) documents on the filesystem
notice Creates a suspicious process
notice Creates hidden or system file
info Command line console output was observed

Rules (2cnts)

Level Name Description Collection
warning Contains_VBA_macro_code Detect a MS Office document with embedded VBA macro code [binaries] binaries (upload)
info test_office test url scripts

Network (1cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
20.69.97.31 US MICROSOFT-CORP-MSN-AS-BLOCK 20.69.97.31 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure