Summary | ZeroBOX

Fattura_01557972.xls

VBA_macro ScreenShot KeyLogger AntiDebug MSOffice File AntiVM
Category Machine Started Completed
FILE s1_win7_x6402 Aug. 23, 2021, 6:52 p.m. Aug. 23, 2021, 6:54 p.m.
Size 126.0KB
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Author: BRT S.p.A., Create Time/Date: Mon Aug 23 07:17:19 2021, Last Saved Time/Date: Mon Aug 23 07:18:54 2021, Security: 0
MD5 5f25557c3a67cc816c456e44f9a89bbe
SHA256 ed18be391960160a2cc40164ef901bfa6650db47474756449cd08c22154ce031
CRC32 CBAD3EA3
ssdeep 3072:GhlYkEIuPm3fNRZmbaoFhZhR0cixIHm0F0IBtZ9i/OwGbqLgtL:ElYkEIuPm3fNRZmbaoFhZhR0cixIHm0/
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File
  • Contains_VBA_macro_code - Detect a MS Office document with embedded VBA macro code [binaries]

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 568
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6b5c7000
process_handle: 0xffffffff
1 0 0
Cyren X97M/Agent.ABU.gen!Eldorado
Symantec Trojan.Mdropper
Kaspersky HEUR:Trojan.Script.Generic
description Run a KeyLogger rule KeyLogger
description Take ScreenShot rule ScreenShot
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
parent_process excel.exe martian_process "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /Embedding
Process injection Process 568 resumed a thread in remote process 3068
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000468
suspend_count: 1
process_identifier: 3068
1 0 0