IOC Report

loading gif

Files

File Path
Type
Category
Malicious
KZ429 FEB17 BSRec_InvNet.xlsx
Microsoft Excel 2007+
initial sample
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\98E6EBE4.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 660x137, frames 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9B0D5918.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AE0576B3.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E4851639.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\Desktop\~$KZ429 FEB17 BSRec_InvNet.xlsx
data
dropped

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding

Domains

Name
IP
Malicious
windowsupdate.s.llnwi.net
41.63.96.0

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
.&.
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
ProductNonBootFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
ProductNonBootFilesIntl_1033

Memdumps

Base Address
Regiontype
Protect
Malicious
63F000
stack
page read and write
98F000
stack
page read and write
4AD000
heap
page read and write
440000
heap
page read and write
49D000
heap
page read and write
444000
heap
page read and write
AEE000
stack
page read and write
26D000
stack
page read and write
4A6000
heap
page read and write
460000
heap
page read and write
10000
heap
page read and write
7EFE0000
unkown
page readonly
D0000
heap
page read and write
106000
heap
page read and write
467000
heap
page read and write
There are 5 hidden memdumps, click here to show them.