Report - X8099607585O.xls

Downloader ScreenShot PWS[m] KeyLogger AntiDebug AntiVM MSOffice File
ScreenShot
Created 2023.03.08 14:01 Machine s1_win7_x6402
Filename X8099607585O.xls
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Auth
AI Score Not founds Behavior Score
3.2
ZERO API file : clean
VT API (file) 40 detected (Emotet, Formulas, Abracadabra, XLM4, Save, ma29, Eldorado, Suspexec, gen128, Malicious, score, CLASSIC, AGRX, Siggen3, SMYXCFIC, EmoAgent, ai score=100, Detected, XlmMacro, S1947, Probably Heur, W97ShellB, Macro40)
md5 6493581b246b731e4937fbee64a68803
sha256 199a2e0e1bb46a5dd8eb3a58aa55de157f6005c65b70245e71cecec4905cc2c0
ssdeep 6144:NKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgzNiwrfx9rNFMMrttRzV5Dz3UxqC8LUcSu:ANbDjP9XH5XIqZLnSu
imphash
impfuzzy
  Network IP location

Signature (5cnts)

Level Description
danger File has been identified by 40 AntiVirus engines on VirusTotal as malicious
watch One or more non-whitelisted processes were created
watch Resumed a suspended thread in a remote process potentially indicative of process injection
notice Allocates read-write-execute memory (usually to unpack itself)
notice Yara rule detected in process memory

Rules (14cnts)

Level Name Description Collection
warning Microsoft_Office_File_Downloader_Zero Microsoft Office File Downloader binaries (upload)
notice Generic_PWS_Memory_Zero PWS Memory memory
notice KeyLogger Run a KeyLogger memory
notice ScreenShot Take ScreenShot memory
info anti_dbg Checks if being debugged memory
info DebuggerCheck__GlobalFlags (no description) memory
info DebuggerCheck__QueryInfo (no description) memory
info DebuggerHiding__Active (no description) memory
info DebuggerHiding__Thread (no description) memory
info disable_dep Bypass DEP memory
info Microsoft_Office_File_Zero Microsoft Office File binaries (upload)
info SEH__vectored (no description) memory
info ThreadControl__Context (no description) memory
info win_hook Affect hook table memory

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure