Report - Iye11aStLm1

emotet Excel with Emotet MS_Excel_Hidden_Macro_Sheet UPX Malicious Library MSOffice File PE32 OS Processor Check DLL PE File
ScreenShot
Created 2022.05.23 09:39 Machine s1_win7_x6403
Filename Iye11aStLm1
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Auth
AI Score Not founds Behavior Score
9.2
ZERO API file : mailcious
VT API (file) 39 detected (Abracadabra, Emotet, Save, ma29, Eldorado, Malcode, YXCC5Z, Minerva, dtfit, Siggen3, AMDF, Malicious, score, XlmMacro, S1792, ai score=87, Probably Heur, W97ShellB, CLASSIC, CoinMiner)
md5 9c8d23b78158bb374cb274c7682256e4
sha256 7c9ef24f3522ff243e77f5d6e0cb50f6766916fcc1ad2fe845f9d509e39a6b3f
ssdeep 3072:QsKpbdrHYrMue8q7QPX+5xtekEdi8/dgstsSmsCpH3iZu8ZGsMi:XKpbdrHYrMue8q7QPX+5xtFEdi8/dgiX
imphash
impfuzzy
  Network IP location

Signature (17cnts)

Level Description
danger Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually)
danger File has been identified by 39 AntiVirus engines on VirusTotal as malicious
watch Communicates with host for which no DNS query was performed
watch Created a service where a service was also not started
watch Installs itself for autorun at Windows startup
watch Network communications indicative of a potential document or script payload download was initiated by the process excel.exe
watch One or more non-whitelisted processes were created
notice Allocates read-write-execute memory (usually to unpack itself)
notice An application raised an exception which may be indicative of an exploit crash
notice Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time)
notice Creates a suspicious process
notice Creates executable files on the filesystem
notice Expresses interest in specific running processes
notice Performs some HTTP requests
notice Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation
info One or more processes crashed
info Queries for the computername

Rules (9cnts)

Level Name Description Collection
danger Win32_Trojan_Excel_Emotet_20220329_Zero Excel with Emotet binaries (upload)
watch Malicious_Library_Zero Malicious_Library binaries (download)
watch MS_Excel_Hidden_Macro_Sheet (no description) binaries (upload)
watch UPX_Zero UPX packed file binaries (download)
info IsDLL (no description) binaries (download)
info IsPE32 (no description) binaries (download)
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)
info OS_Processor_Check_Zero OS Processor Check binaries (download)
info PE_Header_Zero PE File Signature binaries (download)

Network (11cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?
http://www.garantihaliyikama.com/wp-admin/FjgB6I/ TR Radore Veri Merkezi Hizmetleri A.S. 213.128.75.146 15464 malware
www.garantihaliyikama.com TR Radore Veri Merkezi Hizmetleri A.S. 213.128.75.146 malware
www.gessersh.com CZ ACTIVE 24, s.r.o. 81.95.101.8 malware
81.95.101.8 CZ ACTIVE 24, s.r.o. 81.95.101.8 malware
216.158.226.206 US IS-AS-1 216.158.226.206 mailcious
79.143.187.147 DE Contabo GmbH 79.143.187.147 mailcious
213.128.75.146 TR Radore Veri Merkezi Hizmetleri A.S. 213.128.75.146 malware
138.197.109.175 US DIGITALOCEAN-ASN 138.197.109.175 mailcious
104.131.11.205 US DIGITALOCEAN-ASN 104.131.11.205 mailcious
187.84.80.182 BR Oxente.net Solucoes Tecnologicas Eireli 187.84.80.182 mailcious
68.183.94.239 IN DIGITALOCEAN-ASN 68.183.94.239 mailcious

Suricata ids



Similarity measure (PE file only) - Checking for service failure