Windows Analysis Report
sample20220124-01.xls

Overview

General Information

Sample Name: sample20220124-01.xls
Analysis ID: 558645
MD5: 4e8ec74a93b831a92a1b016722e79365
SHA1: 330af52281a3a9ae4836062f98f77fe5f8a834e4
SHA256: e68fcd845683be392885de766f158a1c6b00cea57bdd68b5ff44d54e62400e1f
Tags: BRTgoziisfbursnifxls
Infos:

Detection

Ursnif Dropper
Score: 68
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Detected Italy targeted Ursnif dropper document
Document contains an embedded VBA macro with suspicious strings
Document contains embedded VBA macros
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

AV Detection

barindex
Source: sample20220124-01.xls Avira: detected
Source: sample20220124-01.xls Virustotal: Detection: 10% Perma Link
Source: sample20220124-01.xls ReversingLabs: Detection: 11%
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior

E-Banking Fraud

barindex
Source: Initial sample OLE, VBA macro line: Ursnif specific tokens

System Summary

barindex
Source: sample20220124-01.xls OLE, VBA macro line: Workbooks.Application.DisplayAlerts = False: Application.Quit
Source: sample20220124-01.xls OLE, VBA macro line: ActiveSheet.Visible = 0
Source: sample20220124-01.xls OLE indicator, VBA macros: true
Source: 41FF.tmp.0.dr OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: sample20220124-01.xls Virustotal: Detection: 10%
Source: sample20220124-01.xls ReversingLabs: Detection: 11%
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\AppData\Local\Temp\CVRDBAE.tmp Jump to behavior
Source: sample20220124-01.xls OLE indicator, Workbook stream: true
Source: classification engine Classification label: mal68.bank.expl.winXLS@1/4@0/0
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File read: C:\Users\desktop.ini Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: sample20220124-01.xls Initial sample: OLE summary comments = DATA ORA
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: 41FF.tmp.0.dr Initial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
No contacted IP infos