Summary | ZeroBOX

termination-letter-college.docm

VBA_macro GIF Format
Category Machine Started Completed
FILE s1_win7_x6403_us Aug. 4, 2021, 5:48 p.m. Aug. 4, 2021, 5:51 p.m.
Size 49.7KB
Type Microsoft Word 2007+
MD5 74fa8961827639d1b481a4eea50863e5
SHA256 824bb11ef1520aecca35ad9abd8e043e4e00193668590d4aee2a41f205db7388
CRC32 A3DBB45F
ssdeep 1536:XqEgY2Gc2C+Z2tinVFP6OCwhur8GXMnBmjzwV:XvgzGTFPJu7QBmjzwV
Yara
  • Contains_VBA_macro_code - Detect a MS Office document with embedded VBA macro code [binaries]

Name Response Post-Analysis Lookup
www.ramanujan.edu.in 199.79.62.121
IP Address Status Action
164.124.101.2 Active Moloch
199.79.62.121 Active Moloch

Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1524
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6a6be000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1524
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04ab8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1524
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04ab8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1524
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04ab8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1524
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04ab8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1524
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04ab8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1524
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04ab8000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1524
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x07bb6000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1524
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x07bb6000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1524
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x07bb6000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1524
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x07bb6000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1524
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x07bb6000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1524
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x07bb6000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1524
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x07b8d000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$28099336.dotm
file C:\Users\test22\AppData\Local\Temp\~$rmination-letter-college.docm
file C:\Users\Public\Adobe.exe
file C:\Users\test22\AppData\Roaming\Microsoft\Office\Recent\Templates.LNK
file C:\Users\test22\AppData\Roaming\Microsoft\Office\Recent\1628099336.dotm.LNK
Time & API Arguments Status Return Repeated

NtCreateFile

create_disposition: 5 (FILE_OVERWRITE_IF)
file_handle: 0x00000484
filepath: C:\Users\test22\AppData\Local\Temp\~$rmination-letter-college.docm
desired_access: 0x40100080 (FILE_READ_ATTRIBUTES|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: \??\C:\Users\test22\AppData\Local\Temp\~$rmination-letter-college.docm
create_options: 4194400 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT)
status_info: 2 (FILE_CREATED)
share_access: 0 ()
1 0 0

NtCreateFile

create_disposition: 5 (FILE_OVERWRITE_IF)
file_handle: 0x00000494
filepath: C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$28099336.dotm
desired_access: 0x40100080 (FILE_READ_ATTRIBUTES|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: \??\C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$28099336.dotm
create_options: 4194400 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT)
status_info: 2 (FILE_CREATED)
share_access: 0 ()
1 0 0

NtCreateFile

create_disposition: 5 (FILE_OVERWRITE_IF)
file_handle: 0x00000658
filepath: C:\Users\test22\AppData\Local\Temp\~$rmination-letter-college.docm
desired_access: 0x40100080 (FILE_READ_ATTRIBUTES|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: \??\C:\Users\test22\AppData\Local\Temp\~$rmination-letter-college.docm
create_options: 4194400 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT)
status_info: 2 (FILE_CREATED)
share_access: 0 ()
1 0 0

NtCreateFile

create_disposition: 5 (FILE_OVERWRITE_IF)
file_handle: 0x00000658
filepath: C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$28099336.dotm
desired_access: 0x40100080 (FILE_READ_ATTRIBUTES|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: \??\C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$28099336.dotm
create_options: 4194400 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT)
status_info: 2 (FILE_CREATED)
share_access: 0 ()
1 0 0
file C:\Users\test22\AppData\Roaming\Microsoft\Office\Recent\Templates.LNK
file C:\Users\test22\AppData\Roaming\Microsoft\Office\Recent\1628099336.dotm.LNK
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1524
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x7ef70000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

URLDownloadToFileW

url: https://www.ramanujan.edu.in/cctv-footage/footage-346.exe
stack_pivoted: 0
filepath_r: C:\Users\Public\Adobe.exe
filepath: C:\Users\Public\Adobe.exe
2148270085 0
Lionic Trojan.Multi.Generic.4!c
Elastic malicious (high confidence)
MicroWorld-eScan Trojan.GenericKD.46715388
CAT-QuickHeal O97M.Dropper.F
Alibaba TrojanDownloader:VBA/Obfuscation.A
Avast SNH:Script [Dropper]
Kaspersky UDS:DangerousObject.Multi.Generic
BitDefender Trojan.GenericKD.46715388
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi
Tencent Heur.Macro.Generic.a.7a69c20e
Ad-Aware Trojan.GenericKD.46715388
Sophos Mal/DocDl-E
McAfee-GW-Edition BehavesLike.Downloader.pc
FireEye Trojan.GenericKD.46715388
Emsisoft Trojan.GenericKD.46715388 (B)
SentinelOne Static AI - Malicious OPENXML
Jiangmin MSWord/Downloader.az
Avira HEUR/Macro.Downloader.MRFR.Gen
ViRobot DOC.Z.Agent.50860
GData Trojan.GenericKD.46715388
Cynet Malicious (score: 99)
Zoner Probably Heur.W97Obfuscated
Rising Downloader.Agent/VBA!1.A514 (CLASSIC)
Fortinet VBA/Agent.094E!tr.dldr
AVG SNH:Script [Dropper]
Qihoo-360 heur.macro.download.y