Windows
Analysis Report
excel-udf-host.win32.new.bundle
Overview
General Information
Detection
Score: | 22 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
- System is w10x64_ra
wscript.exe (PID: 7056 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\excel -udf-host. win32.new. js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
- cleanup
System Summary |
---|
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: Michael Haag: |
Click to jump to signature section
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Classification label: |
Source: | Key opened: |
Source: | Key value queried: |
Source: | Window detected: |
Source: | Process information set: | ||
Source: | Process information set: |
Source: | Window found: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Key value queried: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 1 Scripting | Valid Accounts | Windows Management Instrumentation | 1 Scripting | 1 DLL Side-Loading | 1 DLL Side-Loading | OS Credential Dumping | 2 System Information Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
5% | ReversingLabs | Script-JS.Exploit.NeutrinoEK |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1403078 |
Start date and time: | 2024-03-05 00:58:19 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 11 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Sample name: | excel-udf-host.win32.new.bundle |
Detection: | SUS |
Classification: | sus22.winBUNDLE@1/0@0/0 |
- Exclude process from analysis
(whitelisted): dllhost.exe - Excluded domains from analysis
(whitelisted): fs.microsoft.c om, slscr.update.microsoft.com , fe3cr.delivery.mp.microsoft. com - Not all processes where analyz
ed, report is missing behavior information - VT rate limit hit for: excel-
udf-host.win32.new.bundle
File type: | |
Entropy (8bit): | 5.251335133964849 |
TrID: |
|
File name: | excel-udf-host.win32.new.bundle |
File size: | 322'348 bytes |
MD5: | 37e76885fa6a967dc5a7e84afb326bcc |
SHA1: | 552f078f2991992f390da456b98f895836d46b34 |
SHA256: | be3e59fa645a45c15d3a053c7eff056b71b1428598b12977a00df39c520c2274 |
SHA512: | b479cec3c4ed31826d574e62cc7d4a1e13cf30b69bc4d3246bd44f13182defb1aa9f034ed5a473ac4f3f268eb956608d68c6c15b5ef013e40ae0d832de7d994c |
SSDEEP: | 3072:H/Eesht3ZC0x82bCLNp6qIz1FTZU8jUwXWyTah4awqndnUUi2Yp/Ll4ehMNPW:H/EJt3ZCcXbkNp6PQKl4DPW |
TLSH: | 5464298CF765B432439B30B6A02F210FE3375459640DD478F209C5DA6CFA98AA267F79 |
File Content Preview: | var OSFPerformance,CustomFunctionMappings,Microsoft,Strings;!function(e){e.now=function(){return"undefined"!=typeof performance&&performance.now?performance.now():0},e.getTotalJSHeapSize=function(){return"undefined"!=typeof performance&&performance.memory |
Icon Hash: | 68d69b8bb6aa9a86 |