File name: | c39ff3bf8f1ea36a0f47c56161addfa9c1f578dc.xlsm |
Full analysis: | https://app.any.run/tasks/7a0563a0-9270-4de9-a3f6-6a3e297c606e |
Verdict: | Malicious activity |
Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
Analysis date: | August 24, 2020, 13:00:19 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.openxmlformats-officedocument.spreadsheetml.sheet |
File info: | Microsoft Excel 2007+ |
MD5: | 0C3F8EDC8224FB687951BD5436C5532F |
SHA1: | C39FF3BF8F1EA36A0F47C56161ADDFA9C1F578DC |
SHA256: | 0859C26FD38D388DEA87430E57C93C5FB4DA7B978B2CBD746C4B20EB468D0008 |
SSDEEP: | 1536:WIl5u3CBp5nBK70/ExLNL7VQzXa0swFUzSMiWcdStol:pEC3nG0sxLNVQzX0zSMiWcQi |
.xlsx | | | Excel Microsoft Office Open XML Format document (61.2) |
---|---|---|
.zip | | | Open Packaging Conventions container (31.5) |
.zip | | | ZIP compressed archive (7.2) |
ZipFileName: | [Content_Types].xml |
---|---|
ZipUncompressedSize: | 1080 |
ZipCompressedSize: | 353 |
ZipCRC: | 0x6b78e937 |
ZipModifyDate: | 2020:08:24 10:58:06 |
ZipCompression: | Deflated |
ZipBitFlag: | 0x0008 |
ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2996 | "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Excel Version: 14.0.6024.1000 Modules
| |||||||||||||||
2952 | "C:\Users\Public\svchost32.exe" | C:\Users\Public\svchost32.exe | EXCEL.EXE | ||||||||||||
User: admin Company: 8갋}갭]강감2값7,값9갟갃&갎<객64갦갨+)5 Integrity Level: MEDIUM Description: 갅?1갮각갖{0갯<5갯!갧갞4갬 Exit code: 0 Version: 1.1.2.2 Modules
| |||||||||||||||
2228 | "C:\Users\admin\AppData\Local\Temp\AddInProcess32.exe" | C:\Users\admin\AppData\Local\Temp\AddInProcess32.exe | svchost32.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: AddInProcess.exe Version: 4.7.3062.0 built by: NET472REL1 Modules
| |||||||||||||||
1696 | netsh firewall add allowedprogram "C:\Users\admin\AppData\Local\Temp\AddInProcess32.exe" "AddInProcess32.exe" ENABLE | C:\Windows\system32\netsh.exe | — | AddInProcess32.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Network Command Shell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
2088 | "C:\Users\admin\AppData\Local\Temp\AddInProcess32.exe" | C:\Users\admin\AppData\Local\Temp\AddInProcess32.exe | — | svchost32.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: AddInProcess.exe Exit code: 0 Version: 4.7.3062.0 built by: NET472REL1 Modules
|
(PID) Process: | (2996) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems |
Operation: | write | Name: | :n# |
Value: 3A6E2300B40B0000010000000000000000000000 | |||
(PID) Process: | (2996) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1033 |
Value: Off | |||
(PID) Process: | (2996) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1041 |
Value: Off | |||
(PID) Process: | (2996) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1046 |
Value: Off | |||
(PID) Process: | (2996) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1036 |
Value: Off | |||
(PID) Process: | (2996) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1031 |
Value: Off | |||
(PID) Process: | (2996) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1040 |
Value: Off | |||
(PID) Process: | (2996) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1049 |
Value: Off | |||
(PID) Process: | (2996) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 3082 |
Value: Off | |||
(PID) Process: | (2996) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1042 |
Value: Off |
PID | Process | Filename | Type | |
---|---|---|---|---|
2996 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\CVR16BA.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2996 | EXCEL.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\c39ff3bf8f1ea36a0f47c56161addfa9c1f578dc.xlsm.LNK | lnk | |
MD5:1127B376E8CA5A7576698AE751310478 | SHA256:1880CE407EC88FBD5E1560CD37B600BE3F17B7795C055DF2EF1A5C0C73B11414 | |||
2996 | EXCEL.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dat | text | |
MD5:B269414621E3DDD9EE9F623AE7387632 | SHA256:A29B774C0CC9535094D3CE088C2507FBB2711E7D6F61F42E6B76092BF6C5BA0E | |||
2996 | EXCEL.EXE | C:\Users\Public\svchost32.exe | executable | |
MD5:CF0796C5A09F04720066D3563012FCB4 | SHA256:3B5DC0CFE5CC7F4CE51AFADE57E86FA2CF47F9B13F190307EB9C40FCB2B82157 | |||
2996 | EXCEL.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\AvbQOP[1].exe | executable | |
MD5:CF0796C5A09F04720066D3563012FCB4 | SHA256:3B5DC0CFE5CC7F4CE51AFADE57E86FA2CF47F9B13F190307EB9C40FCB2B82157 | |||
2952 | svchost32.exe | C:\Users\admin\AppData\Local\Temp\AddInProcess32.exe | executable | |
MD5:6A673BFC3B67AE9782CB31AF2F234C68 | SHA256:978A4093058AA2EBF05DC353897D90D950324389879B57741B64160825B5EC0E | |||
2228 | AddInProcess32.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3dbf84b0bd1e63d6de40c186573104ae.exe | executable | |
MD5:6A673BFC3B67AE9782CB31AF2F234C68 | SHA256:978A4093058AA2EBF05DC353897D90D950324389879B57741B64160825B5EC0E |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2996 | EXCEL.EXE | GET | 200 | 200.32.192.170:80 | http://www.epyorke.edu.bz//libraries/AvbQOP.exe | BZ | executable | 157 Kb | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2996 | EXCEL.EXE | 200.32.192.170:80 | www.epyorke.edu.bz | Belize Telemedia Limited | BZ | suspicious |
2228 | AddInProcess32.exe | 194.5.98.249:4040 | — | — | FR | malicious |
Domain | IP | Reputation |
---|---|---|
www.epyorke.edu.bz |
| suspicious |
PID | Process | Class | Message |
---|---|---|---|
— | — | A Network Trojan was detected | MALWARE [PTsecurity] njRAT.Gen RAT outbound connection |
— | — | A Network Trojan was detected | ET TROJAN Bladabindi/njRAT CnC Command (ll) |
— | — | A Network Trojan was detected | MALWARE [PTsecurity] njRAT.Gen RAT outbound connection |
— | — | A Network Trojan was detected | MALWARE [PTsecurity] njRAT.Gen RAT outbound connection |
— | — | A Network Trojan was detected | MALWARE [PTsecurity] njRAT.Gen RAT outbound connection |
— | — | A Network Trojan was detected | MALWARE [PTsecurity] njRAT.Gen RAT outbound connection |
— | — | A Network Trojan was detected | MALWARE [PTsecurity] njRAT.Gen RAT outbound connection |
— | — | A Network Trojan was detected | ET TROJAN Bladabindi/njRAT CnC Command (ll) |
— | — | A Network Trojan was detected | MALWARE [PTsecurity] njRAT.Gen RAT outbound connection |
— | — | A Network Trojan was detected | ET TROJAN Bladabindi/njRAT CnC Command (ll) |