ScreenShot
Created | 2022.05.23 09:39 | Machine | s1_win7_x6403 |
Filename | Iye11aStLm1 | ||
Type | Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Auth | ||
AI Score | Not founds | Behavior Score |
|
ZERO API | file : mailcious | ||
VT API (file) | 39 detected (Abracadabra, Emotet, Save, ma29, Eldorado, Malcode, YXCC5Z, Minerva, dtfit, Siggen3, AMDF, Malicious, score, XlmMacro, S1792, ai score=87, Probably Heur, W97ShellB, CLASSIC, CoinMiner) | ||
md5 | 9c8d23b78158bb374cb274c7682256e4 | ||
sha256 | 7c9ef24f3522ff243e77f5d6e0cb50f6766916fcc1ad2fe845f9d509e39a6b3f | ||
ssdeep | 3072:QsKpbdrHYrMue8q7QPX+5xtekEdi8/dgstsSmsCpH3iZu8ZGsMi:XKpbdrHYrMue8q7QPX+5xtFEdi8/dgiX | ||
imphash | |||
impfuzzy |
Network IP location
Signature (17cnts)
Level | Description |
---|---|
danger | Connects to IP addresses that are no longer responding to requests (legitimate services will remain up-and-running usually) |
danger | File has been identified by 39 AntiVirus engines on VirusTotal as malicious |
watch | Communicates with host for which no DNS query was performed |
watch | Created a service where a service was also not started |
watch | Installs itself for autorun at Windows startup |
watch | Network communications indicative of a potential document or script payload download was initiated by the process excel.exe |
watch | One or more non-whitelisted processes were created |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | An application raised an exception which may be indicative of an exploit crash |
notice | Changes read-write memory protection to read-execute (probably to avoid detection when setting all RWX flags at the same time) |
notice | Creates a suspicious process |
notice | Creates executable files on the filesystem |
notice | Expresses interest in specific running processes |
notice | Performs some HTTP requests |
notice | Queries the disk size which could be used to detect virtual machine with small fixed size or dynamic allocation |
info | One or more processes crashed |
info | Queries for the computername |
Rules (9cnts)
Level | Name | Description | Collection |
---|---|---|---|
danger | Win32_Trojan_Excel_Emotet_20220329_Zero | Excel with Emotet | binaries (upload) |
watch | Malicious_Library_Zero | Malicious_Library | binaries (download) |
watch | MS_Excel_Hidden_Macro_Sheet | (no description) | binaries (upload) |
watch | UPX_Zero | UPX packed file | binaries (download) |
info | IsDLL | (no description) | binaries (download) |
info | IsPE32 | (no description) | binaries (download) |
info | Microsoft_Office_File_Zero | Microsoft Office File | binaries (upload) |
info | OS_Processor_Check_Zero | OS Processor Check | binaries (download) |
info | PE_Header_Zero | PE File Signature | binaries (download) |
Network (11cnts) ?
Suricata ids
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
ET CNC Feodo Tracker Reported CnC Server group 19
ET CNC Feodo Tracker Reported CnC Server group 10
ET CNC Feodo Tracker Reported CnC Server group 21
ET POLICY PE EXE or DLL Windows file download HTTP
ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2
ET INFO EXE - Served Attached HTTP
ET CNC Feodo Tracker Reported CnC Server group 2
ET CNC Feodo Tracker Reported CnC Server group 5
ET INFO TLS Handshake Failure
ET CNC Feodo Tracker Reported CnC Server group 19
ET CNC Feodo Tracker Reported CnC Server group 10
ET CNC Feodo Tracker Reported CnC Server group 21
ET POLICY PE EXE or DLL Windows file download HTTP
ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2
ET INFO EXE - Served Attached HTTP
ET CNC Feodo Tracker Reported CnC Server group 2
ET CNC Feodo Tracker Reported CnC Server group 5