Summary | ZeroBOX

8697717473027069.xls

KeyLogger ScreenShot AntiDebug MSOffice File AntiVM
Category Machine Started Completed
FILE s1_win7_x6402 March 29, 2022, 7:59 a.m. March 29, 2022, 8:02 a.m.
Size 126.5KB
Type Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: DSAfadr, Last Saved By: HRdtjnd, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 18:19:34 2015, Last Saved Time/Date: Mon Mar 28 19:26:12 2022, Security: 0
MD5 fbce8728c4ce96cd3b399f2c7ecd4250
SHA256 69cfcb0822207ba5d2438f1936d2522c9eaba929f78897554b0b100c7abac3f8
CRC32 A2EBBBC4
ssdeep 3072:LsKpbdrHYrMue8q7QPX+5xtekEdi8/dgR3Syz+nzQIceCRlCt:QKpbdrHYrMue8q7QPX+5xtFEdi8/dgRs
Yara
  • Microsoft_Office_File_Zero - Microsoft Office File

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2204
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6bce7000
process_handle: 0xffffffff
1 0 0
description Take ScreenShot rule ScreenShot
description PWS Memory rule Generic_PWS_Memory_Zero
description Run a KeyLogger rule KeyLogger
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
Sangfor Malware.Generic-XLM.Save.ma29
Cyren XF/Emotet.C.gen!Eldorado
Avast VBS:Malware-gen
Kaspersky HEUR:Trojan.MSOffice.Generic
Rising Downloader.Agent/XLS!1.DCEE (CLASSIC)
Sophos Mal/DocDl-M
Microsoft Trojan:Win32/Emotet!ml
Zoner Probably Heur.W97ShellB
Tencent Trojan.MsOffice.Macro40.11019224
Ikarus Trojan-Downloader.XLM.Agent
Fortinet XF/CoinMiner.Z!tr
AVG VBS:Malware-gen
parent_process excel.exe martian_process "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /Embedding
Process injection Process 2204 resumed a thread in remote process 2328
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000464
suspend_count: 1
process_identifier: 2328
1 0 0