Summary | ZeroBOX

PO-15102021.xlsx

Category Machine Started Completed
FILE s1_win7_x6403_us Oct. 18, 2021, 5:50 p.m. Oct. 18, 2021, 5:52 p.m.
Size 604.9KB
Type Microsoft Excel 2007+
MD5 3649a4e4e640017f163b9f1f164a63b7
SHA256 4f467c83d7a14ed2b0a6d34ebeb28fc547292d6daf4fa8c970500e557a6b720e
CRC32 3D738E2F
ssdeep 12288:4x8HBP+UABctpwGMvxH+/rovRF4bwdQnr20CS/pMhAGOSUl9kmtMUysRe:BB8+Epe/2RYw0vCS/pYONlKtUysM
Yara None matched

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
2.56.59.250 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49167 -> 2.56.59.250:80 2016141 ET INFO Executable Download from dotted-quad Host A Network Trojan was detected

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RpcRaiseException+0x42 I_RpcExceptionFilter-0x12 rpcrt4+0x2374b @ 0x74fb374b
DllDebugObjectRPCHook+0xb6 HACCEL_UserFree-0x57 ole32+0x13f725 @ 0x762bf725
NdrPointerFree+0x16a IUnknown_Release_Proxy-0x5a rpcrt4+0x3414b @ 0x74fc414b
WdtpInterfacePointer_UserUnmarshal+0x166b DllDebugObjectRPCHook-0x2d8d ole32+0x13c8e2 @ 0x762bc8e2
CoRegisterMessageFilter+0x32b4 ObjectStublessClient5-0x1db5 ole32+0x398ad @ 0x761b98ad
OleCreateEmbeddingHelper+0x2a1 CreateFileMoniker-0x17de ole32+0x81414 @ 0x76201414
ObjectStublessClient31+0x6af8 STGMEDIUM_UserUnmarshal-0x22bb6 ole32+0x97b68 @ 0x76217b68
MdCallBack12-0x20ac9c excel+0x47750e @ 0x14f750e
MdCallBack12-0x3a0c98 excel+0x2e1512 @ 0x1361512
MdCallBack12-0x3e1613 excel+0x2a0b97 @ 0x1320b97
MdCallBack12-0x3eeb46 excel+0x293664 @ 0x1313664
LinkASPPModelTable+0x11c18d MdCallBack-0x330faf excel+0xac172f @ 0x1b4172f
LinkASPPModelTable+0x11c317 MdCallBack-0x330e25 excel+0xac18b9 @ 0x1b418b9
MdCallBack12-0x134d29 excel+0x54d481 @ 0x15cd481
MdCallBack12-0x662a0b excel+0x1f79f @ 0x109f79f
MdCallBack12-0x66d0e2 excel+0x150c8 @ 0x10950c8
MdCallBack12-0x66e9c3 excel+0x137e7 @ 0x10937e7
MdCallBack12-0x67d4ac excel+0x4cfe @ 0x1084cfe
MdCallBack12-0x67d76a excel+0x4a40 @ 0x1084a40
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77579ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77579ea5

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0x800706be
exception.offset: 46887
exception.address: 0x7677b727
registers.esp: 4153408
registers.edi: 1981610512
registers.eax: 4153408
registers.ebp: 4153488
registers.edx: 0
registers.ebx: 107928972
registers.esi: 2147944126
registers.ecx: 68796774
1 0 0

__exception__

stacktrace:
RpcRaiseException+0x42 I_RpcExceptionFilter-0x12 rpcrt4+0x2374b @ 0x74fb374b
DllDebugObjectRPCHook+0xb6 HACCEL_UserFree-0x57 ole32+0x13f725 @ 0x762bf725
NdrPointerFree+0x16a IUnknown_Release_Proxy-0x5a rpcrt4+0x3414b @ 0x74fc414b
WdtpInterfacePointer_UserUnmarshal+0x166b DllDebugObjectRPCHook-0x2d8d ole32+0x13c8e2 @ 0x762bc8e2
CoRegisterMessageFilter+0x32b4 ObjectStublessClient5-0x1db5 ole32+0x398ad @ 0x761b98ad
CoRegisterMessageFilter+0x5048 ObjectStublessClient5-0x21 ole32+0x3b641 @ 0x761bb641
CoRegisterMessageFilter+0x4ff4 ObjectStublessClient5-0x75 ole32+0x3b5ed @ 0x761bb5ed
CoRegisterMessageFilter+0x4b79 ObjectStublessClient5-0x4f0 ole32+0x3b172 @ 0x761bb172
CoRegisterMessageFilter+0x4075 ObjectStublessClient5-0xff4 ole32+0x3a66e @ 0x761ba66e
ObjectStublessClient31+0x2961c STGMEDIUM_UserUnmarshal-0x92 ole32+0xba68c @ 0x7623a68c
ObjectStublessClient31+0x6776 STGMEDIUM_UserUnmarshal-0x22f38 ole32+0x977e6 @ 0x762177e6
OleCreateEmbeddingHelper+0x344 CreateFileMoniker-0x173b ole32+0x814b7 @ 0x762014b7
ObjectStublessClient31+0x6af8 STGMEDIUM_UserUnmarshal-0x22bb6 ole32+0x97b68 @ 0x76217b68
MdCallBack12-0x20ac9c excel+0x47750e @ 0x14f750e
MdCallBack12-0x3a0c98 excel+0x2e1512 @ 0x1361512
MdCallBack12-0x3e1613 excel+0x2a0b97 @ 0x1320b97
MdCallBack12-0x3eeb46 excel+0x293664 @ 0x1313664
LinkASPPModelTable+0x11c18d MdCallBack-0x330faf excel+0xac172f @ 0x1b4172f
LinkASPPModelTable+0x11c317 MdCallBack-0x330e25 excel+0xac18b9 @ 0x1b418b9
MdCallBack12-0x134d29 excel+0x54d481 @ 0x15cd481
MdCallBack12-0x662a0b excel+0x1f79f @ 0x109f79f
MdCallBack12-0x66d0e2 excel+0x150c8 @ 0x10950c8
MdCallBack12-0x66e9c3 excel+0x137e7 @ 0x10937e7
MdCallBack12-0x67d4ac excel+0x4cfe @ 0x1084cfe
MdCallBack12-0x67d76a excel+0x4a40 @ 0x1084a40
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77579ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77579ea5

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0x800706ba
exception.offset: 46887
exception.address: 0x7677b727
registers.esp: 4153100
registers.edi: 1981610512
registers.eax: 4153100
registers.ebp: 4153180
registers.edx: 0
registers.ebx: 107928396
registers.esi: 2147944122
registers.ecx: 68796774
1 0 0
suspicious_features GET method with no useragent header, Connection to IP address suspicious_request GET http://2.56.59.250/PHJ.exe
request GET http://2.56.59.250/PHJ.exe
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2364
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6b332000
process_handle: 0xffffffff
1 0 0
Application Crash Process EXCEL.EXE with pid 2364 crashed
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RpcRaiseException+0x42 I_RpcExceptionFilter-0x12 rpcrt4+0x2374b @ 0x74fb374b
DllDebugObjectRPCHook+0xb6 HACCEL_UserFree-0x57 ole32+0x13f725 @ 0x762bf725
NdrPointerFree+0x16a IUnknown_Release_Proxy-0x5a rpcrt4+0x3414b @ 0x74fc414b
WdtpInterfacePointer_UserUnmarshal+0x166b DllDebugObjectRPCHook-0x2d8d ole32+0x13c8e2 @ 0x762bc8e2
CoRegisterMessageFilter+0x32b4 ObjectStublessClient5-0x1db5 ole32+0x398ad @ 0x761b98ad
OleCreateEmbeddingHelper+0x2a1 CreateFileMoniker-0x17de ole32+0x81414 @ 0x76201414
ObjectStublessClient31+0x6af8 STGMEDIUM_UserUnmarshal-0x22bb6 ole32+0x97b68 @ 0x76217b68
MdCallBack12-0x20ac9c excel+0x47750e @ 0x14f750e
MdCallBack12-0x3a0c98 excel+0x2e1512 @ 0x1361512
MdCallBack12-0x3e1613 excel+0x2a0b97 @ 0x1320b97
MdCallBack12-0x3eeb46 excel+0x293664 @ 0x1313664
LinkASPPModelTable+0x11c18d MdCallBack-0x330faf excel+0xac172f @ 0x1b4172f
LinkASPPModelTable+0x11c317 MdCallBack-0x330e25 excel+0xac18b9 @ 0x1b418b9
MdCallBack12-0x134d29 excel+0x54d481 @ 0x15cd481
MdCallBack12-0x662a0b excel+0x1f79f @ 0x109f79f
MdCallBack12-0x66d0e2 excel+0x150c8 @ 0x10950c8
MdCallBack12-0x66e9c3 excel+0x137e7 @ 0x10937e7
MdCallBack12-0x67d4ac excel+0x4cfe @ 0x1084cfe
MdCallBack12-0x67d76a excel+0x4a40 @ 0x1084a40
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77579ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77579ea5

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0x800706be
exception.offset: 46887
exception.address: 0x7677b727
registers.esp: 4153408
registers.edi: 1981610512
registers.eax: 4153408
registers.ebp: 4153488
registers.edx: 0
registers.ebx: 107928972
registers.esi: 2147944126
registers.ecx: 68796774
1 0 0

__exception__

stacktrace:
RpcRaiseException+0x42 I_RpcExceptionFilter-0x12 rpcrt4+0x2374b @ 0x74fb374b
DllDebugObjectRPCHook+0xb6 HACCEL_UserFree-0x57 ole32+0x13f725 @ 0x762bf725
NdrPointerFree+0x16a IUnknown_Release_Proxy-0x5a rpcrt4+0x3414b @ 0x74fc414b
WdtpInterfacePointer_UserUnmarshal+0x166b DllDebugObjectRPCHook-0x2d8d ole32+0x13c8e2 @ 0x762bc8e2
CoRegisterMessageFilter+0x32b4 ObjectStublessClient5-0x1db5 ole32+0x398ad @ 0x761b98ad
CoRegisterMessageFilter+0x5048 ObjectStublessClient5-0x21 ole32+0x3b641 @ 0x761bb641
CoRegisterMessageFilter+0x4ff4 ObjectStublessClient5-0x75 ole32+0x3b5ed @ 0x761bb5ed
CoRegisterMessageFilter+0x4b79 ObjectStublessClient5-0x4f0 ole32+0x3b172 @ 0x761bb172
CoRegisterMessageFilter+0x4075 ObjectStublessClient5-0xff4 ole32+0x3a66e @ 0x761ba66e
ObjectStublessClient31+0x2961c STGMEDIUM_UserUnmarshal-0x92 ole32+0xba68c @ 0x7623a68c
ObjectStublessClient31+0x6776 STGMEDIUM_UserUnmarshal-0x22f38 ole32+0x977e6 @ 0x762177e6
OleCreateEmbeddingHelper+0x344 CreateFileMoniker-0x173b ole32+0x814b7 @ 0x762014b7
ObjectStublessClient31+0x6af8 STGMEDIUM_UserUnmarshal-0x22bb6 ole32+0x97b68 @ 0x76217b68
MdCallBack12-0x20ac9c excel+0x47750e @ 0x14f750e
MdCallBack12-0x3a0c98 excel+0x2e1512 @ 0x1361512
MdCallBack12-0x3e1613 excel+0x2a0b97 @ 0x1320b97
MdCallBack12-0x3eeb46 excel+0x293664 @ 0x1313664
LinkASPPModelTable+0x11c18d MdCallBack-0x330faf excel+0xac172f @ 0x1b4172f
LinkASPPModelTable+0x11c317 MdCallBack-0x330e25 excel+0xac18b9 @ 0x1b418b9
MdCallBack12-0x134d29 excel+0x54d481 @ 0x15cd481
MdCallBack12-0x662a0b excel+0x1f79f @ 0x109f79f
MdCallBack12-0x66d0e2 excel+0x150c8 @ 0x10950c8
MdCallBack12-0x66e9c3 excel+0x137e7 @ 0x10937e7
MdCallBack12-0x67d4ac excel+0x4cfe @ 0x1084cfe
MdCallBack12-0x67d76a excel+0x4a40 @ 0x1084a40
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x763733ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77579ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77579ea5

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0x800706ba
exception.offset: 46887
exception.address: 0x7677b727
registers.esp: 4153100
registers.edi: 1981610512
registers.eax: 4153100
registers.ebp: 4153180
registers.edx: 0
registers.ebx: 107928396
registers.esi: 2147944122
registers.ecx: 68796774
1 0 0
file C:\Users\test22\AppData\Local\Temp\~$PO-15102021.xlsx
Time & API Arguments Status Return Repeated

NtCreateFile

create_disposition: 2 (FILE_CREATE)
file_handle: 0x00000470
filepath: C:\Users\test22\AppData\Local\Temp\~$PO-15102021.xlsx
desired_access: 0xc0110080 (FILE_READ_ATTRIBUTES|DELETE|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: \??\C:\Users\test22\AppData\Local\Temp\~$PO-15102021.xlsx
create_options: 4198496 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT|FILE_DELETE_ON_CLOSE)
status_info: 2 (FILE_CREATED)
share_access: 1 (FILE_SHARE_READ)
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2364
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x7ef50000
process_handle: 0xffffffff
1 0 0
host 2.56.59.250
DrWeb W97M.DownLoader.2938
MicroWorld-eScan Exploit.CVE-2017-11882.Gen
FireEye Exploit.CVE-2017-11882.Gen
McAfee Exploit-GBT!8E09E9B9D546
Arcabit Exploit.CVE-2017-11882.Gen
Cyren CVE-2017-11882.C.gen!Camelot
ESET-NOD32 probably a variant of Win32/Exploit.CVE-2017-11882.C
TrendMicro-HouseCall TROJ_CVE20171182.SM
Avast OLE:CVE-2017-11882-B [Expl]
Kaspersky HEUR:Exploit.MSOffice.Generic
BitDefender Exploit.CVE-2017-11882.Gen
Tencent Exp.Ole.CVE-2017-11882.a
TACHYON Suspicious/XOX.CVE-2017-11882
TrendMicro TROJ_CVE20171182.SM
McAfee-GW-Edition Exploit-GBT!8E09E9B9D546
Emsisoft Exploit.CVE-2017-11882.Gen (B)
Ikarus Exploit.CVE-2017-11882
GData Exploit.CVE-2017-11882.Gen
Avira EXP/CVE-2017-11882.Gen
Microsoft Exploit:O97M/CVE-2017-11882!KZH
ZoneAlarm HEUR:Exploit.MSOffice.Generic
Cynet Malicious (score: 99)
AhnLab-V3 OLE/Cve-2017-11882.Gen
MAX malware (ai score=89)
Zoner Probably Heur.W97ShellM
SentinelOne Static AI - Malicious OPENXML
Fortinet MSOffice/CVE_2017_11882.C!exploit
AVG OLE:CVE-2017-11882-B [Expl]