Source: Complaint details 143595.xlsb |
ReversingLabs: Detection: 37% |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process created: C:\Windows\System32\wbem\WMIC.exe |
Source: mshta.exe, 00000004.00000002.680081995.0000000003170000.00000002.00020000.sdmp |
String found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail) |
Source: mshta.exe, 00000004.00000002.680081995.0000000003170000.00000002.00020000.sdmp |
String found in binary or memory: http://investor.msn.com |
Source: mshta.exe, 00000004.00000002.680081995.0000000003170000.00000002.00020000.sdmp |
String found in binary or memory: http://investor.msn.com/ |
Source: EXCEL.EXE, 00000000.00000002.684013280.00000000052B7000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.680346112.0000000003357000.00000002.00020000.sdmp |
String found in binary or memory: http://localizability/practices/XML.asp |
Source: EXCEL.EXE, 00000000.00000002.684013280.00000000052B7000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.680346112.0000000003357000.00000002.00020000.sdmp |
String found in binary or memory: http://localizability/practices/XMLConfiguration.asp |
Source: mshta.exe, 00000004.00000002.680600886.0000000003650000.00000002.00020000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous. |
Source: WMIC.exe, 00000002.00000002.468672527.0000000001BF0000.00000002.00020000.sdmp |
String found in binary or memory: http://servername/isapibackend.dll |
Source: EXCEL.EXE, 00000000.00000002.684013280.00000000052B7000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.680346112.0000000003357000.00000002.00020000.sdmp |
String found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check |
Source: EXCEL.EXE, 00000000.00000002.684013280.00000000052B7000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.680346112.0000000003357000.00000002.00020000.sdmp |
String found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true |
Source: mshta.exe, 00000004.00000002.680600886.0000000003650000.00000002.00020000.sdmp |
String found in binary or memory: http://www.%s.comPA |
Source: mshta.exe, 00000004.00000002.680081995.0000000003170000.00000002.00020000.sdmp |
String found in binary or memory: http://www.hotmail.com/oe |
Source: EXCEL.EXE, 00000000.00000002.684013280.00000000052B7000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.680346112.0000000003357000.00000002.00020000.sdmp |
String found in binary or memory: http://www.icra.org/vocabulary/. |
Source: mshta.exe, 00000004.00000002.680081995.0000000003170000.00000002.00020000.sdmp |
String found in binary or memory: http://www.msnbc.com/news/ticker.txt |
Source: mshta.exe, 00000004.00000002.680081995.0000000003170000.00000002.00020000.sdmp |
String found in binary or memory: http://www.windows.com/pctv. |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E2AB5816.png |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Window created: window name: CLIPBRDWNDCLASS |
Jump to behavior |
Source: Yara match |
File source: C:\ProgramData\KBjfhfmoGRoN.rtf, type: DROPPED |
Source: Screenshot number: 4 |
Screenshot OCR: ENABLE EDITING FROM YELLOW BAR ABOVE 4 Once you have clicked, please click "Enable Content" 5 6 |
Source: Screenshot number: 4 |
Screenshot OCR: DOCUMENT IS PROTECTED 2 Open this document with Desktop Version of Microsoft Office Excel. 3 CLICK |
Source: Screenshot number: 4 |
Screenshot OCR: Enable Content" 5 6 7 8 9 10 11 12 13 T Macro Error @"|| 23 i zvious version of Microsoft O |
Source: Screenshot number: 8 |
Screenshot OCR: ENABLE EDITING FROM YELLOW BAR ABOVE 4 Once you have clicked, please click "Enable Content" 5 6 |
Source: Screenshot number: 8 |
Screenshot OCR: DOCUMENT IS PROTECTED 2 Open this document with Desktop Version of Microsoft Office Excel. 3 CLICK |
Source: Screenshot number: 8 |
Screenshot OCR: Enable Content" 5 6 7 8 9 10 11 12 13 1'Macro Error WW"'vious version of Microsoft Office E |
Source: Complaint details 143595.xlsb |
Initial sample: EXEC |
Source: Complaint details 143595.xlsb |
Initial sample: Sheet name: Macro1 |
Source: EXCEL.EXE, 00000000.00000002.684617078.0000000005CDF000.00000004.00000001.sdmp |
Binary or memory string: C:\Windows\System32\Wbem;;C:\Windows\system32;C:\Windows\system;C:\Windows;.;C:\ProgramData\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\C:\Windows\System32\Wbem\wmic.exewmic process call create "mshta C:\ProgramData\KBjfhfmoGRoN.rtf"C:\Windows\System32\Wbem\wmic.exeWinSta0\Default=C:=C:\Users\user\DocumentsALLUSERSPROFILE=C:\ProgramDataAPPDATA=C:\Users\user\AppData\RoamingCommonProgramFiles=C:\Program Files\Common FilesCommonProgramFiles(x86)=C:\Program Files (x86)\Common FilesCommonProgramW6432=C:\Program Files\Common FilesCOMPUTERNAME=user-PCComSpec=C:\Windows\system32\cmd.exeFP_NO_HOST_CHECK=NOHOMEDRIVE=C:HOMEPATH=\Users\userLOCALAPPDATA=C:\Users\user\AppData\LocalLOGONSERVER=\\user-PCNUMBER_OF_PROCESSORS=4OS=Windows_NTPath=C:\ProgramData\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSCPROCESSOR_ARCHITECTURE=AMD64PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 85 Stepping 7, GenuineIntelPROCESSOR_LEVEL=6PROCESSOR_REVISION=5507ProgramData=C:\ProgramDataProgramFiles=C:\Program FilesProgramFiles(x86)=C:\Program Files (x86 |
|
Source: Complaint details 143595.xlsb |
Macro extractor: Sheet: Macro1 high usage of CHAR() function: 25 |
Source: Complaint details 143595.xlsb |
Macro extractor: Sheet name: Macro1 |
Source: C:\Windows\System32\mshta.exe |
Key opened: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Code function: 0_2_01D56753 |
0_2_01D56753 |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Code function: 0_2_01D56340 |
0_2_01D56340 |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Code function: 0_2_01D56743 |
0_2_01D56743 |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Code function: 0_2_01D566F3 |
0_2_01D566F3 |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Code function: 0_2_01D566E8 |
0_2_01D566E8 |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Code function: 0_2_01D57820 |
0_2_01D57820 |
Source: Complaint details 143595.xlsb |
ReversingLabs: Detection: 37% |
Source: C:\Windows\System32\wbem\WMIC.exe |
Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: unknown |
Process created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding |
|
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process created: C:\Windows\System32\wbem\WMIC.exe wmic process call create "mshta C:\ProgramData\KBjfhfmoGRoN.rtf" |
|
Source: unknown |
Process created: C:\Windows\System32\mshta.exe mshta C:\ProgramData\KBjfhfmoGRoN.rtf |
|
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process created: C:\Windows\System32\wbem\WMIC.exe wmic process call create "mshta C:\ProgramData\KBjfhfmoGRoN.rtf" |
Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32 |
Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe |
WMI Queries: IWbemServices::ExecMethod - Win32_Process::Create |
Source: mshta.exe, 00000004.00000002.680081995.0000000003170000.00000002.00020000.sdmp |
Binary or memory string: .VBPud<_ |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File created: C:\Users\user\Desktop\~$Complaint details 143595.xlsb |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File created: C:\Users\user\AppData\Local\Temp\CVRED89.tmp |
Jump to behavior |
Source: classification engine |
Classification label: mal96.troj.expl.evad.winXLSB@4/3@0/0 |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File read: C:\Users\desktop.ini |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Key opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings |
Jump to behavior |
Source: Window Recorder |
Window detected: More than 3 window changes detected |
Source: Complaint details 143595.xlsb |
Initial sample: OLE zip file path = xl/media/image1.png |
Source: Complaint details 143595.xlsb |
Initial sample: OLE zip file path = docProps/custom.xml |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll |
Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe |
WMI Queries: IWbemServices::ExecMethod - Win32_Process::Create |
Source: unknown |
Process created: cmd line: kbjfhfmogron.rtf |
|
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process created: cmd line: kbjfhfmogron.rtf |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe TID: 1936 |
Thread sleep time: -180000s >= -30000s |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe TID: 1996 |
Thread sleep time: -60000s >= -30000s |
Jump to behavior |
Source: Yara match |
File source: app.xml, type: SAMPLE |
Source: EXCEL.EXE, 00000000.00000002.679903919.00000000008A0000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.679653998.0000000000AF0000.00000002.00020000.sdmp |
Binary or memory string: Shell_TrayWnd |
Source: EXCEL.EXE, 00000000.00000002.679510667.000000000026E000.00000004.00000001.sdmp |
Binary or memory string: Progman |
Source: EXCEL.EXE, 00000000.00000002.679903919.00000000008A0000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.679653998.0000000000AF0000.00000002.00020000.sdmp |
Binary or memory string: !Progman |
Source: EXCEL.EXE, 00000000.00000002.679903919.00000000008A0000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.679653998.0000000000AF0000.00000002.00020000.sdmp |
Binary or memory string: Program Manager< |
Source: C:\Windows\System32\mshta.exe |
Queries volume information: C:\Windows\Fonts\times.ttf VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Queries volume information: C:\Windows\Fonts\times.ttf VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\wbem\WMIC.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid |
Jump to behavior |