Summary | ZeroBOX

a268e9e152c260a0e80431aa8d6df187d9f24a1b6be71328ea14320436083f51.doc

VBA_macro
Category Machine Started Completed
FILE s1_win7_x6401 April 20, 2021, 4:10 p.m. April 20, 2021, 4:13 p.m.
Size 155.5KB
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Subject: programming Dynamic Refined Cotton Computer Outdoors, Music & Health real-time eyeballs indexing pixel redundant Chief Web Station THX bandwidth, Author: Nathan Fontaine, Template: Normal.dotm, Last Saved By: Alicia Guyot, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Wed Dec 30 13:16:00 2020, Last Saved Time/Date: Wed Dec 30 13:16:00 2020, Number of Pages: 1, Number of Words: 2595, Number of Characters: 14796, Security: 8
MD5 a58394937da9d3adb33e948058fde4e9
SHA256 a268e9e152c260a0e80431aa8d6df187d9f24a1b6be71328ea14320436083f51
CRC32 00CEC7B3
ssdeep 3072:2ISPO2TNqU+PRGfFz9ufstRUUKSns8T00JSHUgteMJ8qMD7gAUh:Ct+P6z9ufsfgIf0pLAC
Yara
  • Contains_VBA_macro_code - Detect a MS Office document with embedded VBA macro code [binaries]
  • Microsoft_Office_Document_Zero - Microsoft Office Document Signature Zero

IP Address Status Action
142.93.247.242 Active Moloch
164.124.101.2 Active Moloch
172.67.156.186 Active Moloch
18.141.196.101 Active Moloch
185.42.104.77 Active Moloch
202.183.165.89 Active Moloch
208.91.199.15 Active Moloch
66.96.230.225 Active Moloch

suspicious_features GET method with no useragent header suspicious_request GET http://insvat.com/wp-admin/Dw/
suspicious_features GET method with no useragent header suspicious_request GET http://blogs.g2gtechnologies.com/blogs/v/
suspicious_features GET method with no useragent header suspicious_request GET http://pattayastore.com/visio-network-1hmpp/j5/
suspicious_features GET method with no useragent header suspicious_request GET http://rsimadinah.com/wp-content/16qT/
suspicious_features GET method with no useragent header suspicious_request GET https://tenmoney.business/wp-content/nhW/
request GET http://insvat.com/wp-admin/Dw/
request GET http://blogs.g2gtechnologies.com/blogs/v/
request GET http://pattayastore.com/visio-network-1hmpp/j5/
request GET http://rsimadinah.com/wp-content/16qT/
request GET https://tenmoney.business/wp-content/nhW/
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2444
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x65001000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2444
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c871000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2444
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06020000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2444
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06020000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2444
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06030000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2444
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06080000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2444
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c3d1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2444
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c425000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2444
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c3c1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2444
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c391000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2444
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c2c1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2444
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c2c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2444
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x507c1000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\~$68e9e152c260a0e80431aa8d6df187d9f24a1b6be71328ea14320436083f51.doc
Time & API Arguments Status Return Repeated

NtCreateFile

create_disposition: 5 (FILE_OVERWRITE_IF)
file_handle: 0x00000198
filepath: C:\Users\test22\AppData\Local\Temp\~$68e9e152c260a0e80431aa8d6df187d9f24a1b6be71328ea14320436083f51.doc
desired_access: 0x40100080 (FILE_READ_ATTRIBUTES|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: \??\C:\Users\test22\AppData\Local\Temp\~$68e9e152c260a0e80431aa8d6df187d9f24a1b6be71328ea14320436083f51.doc
create_options: 4194400 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT)
status_info: 2 (FILE_CREATED)
share_access: 0 ()
1 0 0
cve CVE-2013-3906
dead_host 18.141.196.101:80
Elastic malicious (high confidence)
MicroWorld-eScan VB:Trojan.Valyria.3532
FireEye VB:Trojan.Valyria.3532
CAT-QuickHeal OLE.Downloader.40547
McAfee X97M/Downloader.gh
VIPRE Trojan-Downloader.W97M.Agent.jc (v)
Sangfor Trojan.Generic-VBS.Save.d59154b2
K7AntiVirus Trojan ( 005722491 )
K7GW Trojan ( 005722491 )
Arcabit HEUR.VBA.C.2
Cyren W97M/Agent.AF
Symantec W97M.Downloader
TrendMicro-HouseCall Trojan.W97M.EMOTET.SMJB1
Avast Script:SNH-gen [Trj]
ClamAV Doc.Dropper.EmotetRed1220-9816007-0
Kaspersky HEUR:Trojan-Downloader.VBS.Agent.gen
BitDefender VB:Trojan.Valyria.3532
NANO-Antivirus Trojan.Script.Agent.ijcgra
AegisLab Trojan.MSOffice.SAgent.4!c
Rising Malware.ObfusVBA@ML.99 (VBA)
Ad-Aware VB:Trojan.Valyria.3532
Sophos Troj/DocDl-ABVG
Comodo Malware@#3ijl0yjz6x7pg
F-Secure Malware.W2000M/Agent.4750123
DrWeb W97M.DownLoader.5057
TrendMicro Trojan.W97M.EMOTET.SMJB1
McAfee-GW-Edition X97M/Downloader.gh
Emsisoft Trojan-Downloader.Macro.Generic.BQ (A)
SentinelOne Static AI - Malicious OLE
Avira W2000M/Agent.4750123
MAX malware (ai score=99)
Antiy-AVL Trojan[Downloader]/MSOffice.Agent.ldi
Gridinsoft Trojan.U.Emotet.lu
Microsoft TrojanDownloader:O97M/Emotet.CSK!MTB
ViRobot DOC.Z.Agent.159283
ZoneAlarm HEUR:Trojan-Downloader.VBS.Agent.gen
GData Macro.Trojan.Agent.AWN
Cynet Malicious (score: 85)
AhnLab-V3 Downloader/MSOffice.Generic
ALYac Trojan.Downloader.DOC.Gen
TACHYON Suspicious/W97M.Obfus.Gen.8
VBA32 TrojanDownloader.O97M.Emotet.CSK
Zoner Probably Heur.W97Obfuscated
ESET-NOD32 VBA/TrojanDownloader.Agent.VGC
Tencent Heur.Macro.Generic.h.71d1b951
Ikarus Trojan-Downloader.VBA.Emotet
Fortinet VBA/Agent.VGC!tr.dldr
AVG Script:SNH-gen [Trj]
Panda W97M/Downloader.DDE
Qihoo-360 virus.office.qexvmc.1065