Report - 17CWye4uGNii_wt9wLwTCNPL4Vc_9xITR

ScreenShot
Created 2021.03.30 09:19 Machine s1_win7_x6401
Filename 17CWye4uGNii_wt9wLwTCNPL4Vc_9xITR
Type Microsoft Excel 2007+
AI Score Not founds Behavior Score
1.4
ZERO API file : clean
VT API (file) 11 detected (GenericKDZ, Artemis, ai score=81, 07defname)
md5 9a9f06b6a9e35f710b040c23db6336f3
sha256 b294bb594878aa6e7b6055ce224c2423cbbcd946759a47705e02bba0b34fa0c5
ssdeep 384:2YRNhhv0wNSi6o+3mRCdGyeyU1bhWsdrXwPEPWZoziQEiUlM9zNf5hubWyQLj:ZnvJJlRCIyeDlwsrXwPEyQbxp5PyGj
imphash
impfuzzy
  Network IP location

Signature (3cnts)

Level Description
watch File has been identified by 11 AntiVirus engines on VirusTotal as malicious
notice Allocates read-write-execute memory (usually to unpack itself)
notice Creates hidden or system file

Rules (0cnts)

Level Name Description Collection

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids



Similarity measure (PE file only) - Checking for service failure