analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Rfq.xlsm

Full analysis: https://app.any.run/tasks/1507be4f-da35-4fa9-bd7d-4082b692202e
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: May 20, 2019, 08:59:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
rat
remcos
keylogger
Indicators:
MIME: application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
File info: Microsoft Excel 2007+
MD5:

D4A8B8C744B41948ECA6E2AF85B87B90

SHA1:

D9D1637DDC2870F1F77283C9A73D2FF6D8588A8B

SHA256:

26CBE2CACCAEADA07A66F2077B556359D94A404D643453400FC0AEED1CBA8510

SSDEEP:

3072:Rogon1q3nB6f+nMbs0xnE4plYoeT91ck7R0ZlkjksJeLh+r44pP1Onr0lDxaa:RI03nBvMbJn9LYtOBjgdir4aa

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • KsScL.exe (PID: 1472)
      • KsScL.exe (PID: 912)
      • server.exe (PID: 2996)
      • server.exe (PID: 4028)
      • server.exe (PID: 2244)
      • server.exe (PID: 3808)
      • server.exe (PID: 3640)
      • server.exe (PID: 288)
      • server.exe (PID: 2692)
      • server.exe (PID: 3392)
      • server.exe (PID: 3856)
      • server.exe (PID: 3544)
      • server.exe (PID: 1548)
    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 3332)
    • Executable content was dropped or overwritten

      • EXCEL.EXE (PID: 3332)
    • Changes the autorun value in the registry

      • KsScL.exe (PID: 912)
      • server.exe (PID: 4028)
    • Uses SVCHOST.EXE for hidden code execution

      • server.exe (PID: 4028)
    • REMCOS RAT was detected

      • server.exe (PID: 4028)
    • Detected logs from REMCOS RAT

      • server.exe (PID: 4028)
  • SUSPICIOUS

    • Application launched itself

      • KsScL.exe (PID: 1472)
      • server.exe (PID: 2996)
      • server.exe (PID: 4028)
    • Creates files in the user directory

      • KsScL.exe (PID: 912)
      • server.exe (PID: 4028)
    • Executable content was dropped or overwritten

      • KsScL.exe (PID: 912)
    • Executes scripts

      • KsScL.exe (PID: 912)
    • Starts CMD.EXE for commands execution

      • WScript.exe (PID: 3176)
    • Writes files like Keylogger logs

      • server.exe (PID: 4028)
  • INFO

    • Creates files in the user directory

      • EXCEL.EXE (PID: 3332)
    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 3332)
    • Application was crashed

      • svchost.exe (PID: 1896)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xlsm | Excel Microsoft Office Open XML Format document (with Macro) (50.8)
.xlsx | Excel Microsoft Office Open XML Format document (30)
.zip | Open Packaging Conventions container (15.4)
.zip | ZIP compressed archive (3.5)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0006
ZipCompression: Deflated
ZipModifyDate: 1980:01:01 00:00:00
ZipCRC: 0x9cc0ec29
ZipCompressedSize: 394
ZipUncompressedSize: 1257
ZipFileName: [Content_Types].xml

XMP

Creator: -

XML

LastModifiedBy: -
CreateDate: 2015:06:05 18:17:20Z
ModifyDate: 2019:05:20 06:22:12Z
Application: Microsoft Excel
DocSecurity: None
ScaleCrop: No
HeadingPairs:
  • Worksheets
  • 1
TitlesOfParts: Sheet1
Company: -
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
AppVersion: 16.03
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
52
Monitored processes
17
Malicious processes
7
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start excel.exe ksscl.exe no specs ksscl.exe wscript.exe no specs cmd.exe no specs server.exe no specs #REMCOS server.exe svchost.exe server.exe no specs server.exe no specs server.exe no specs server.exe no specs server.exe no specs server.exe no specs server.exe no specs server.exe no specs server.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3332"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Version:
14.0.6024.1000
1472C:\Users\admin\AppData\Local\Temp\KsScL.exeC:\Users\admin\AppData\Local\Temp\KsScL.exeEXCEL.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
912"C:\Users\admin\AppData\Local\Temp\KsScL.exe"C:\Users\admin\AppData\Local\Temp\KsScL.exe
KsScL.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3176"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\install.vbs" C:\Windows\System32\WScript.exeKsScL.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
3588"C:\Windows\System32\cmd.exe" /c "C:\Users\admin\AppData\Roaming\server\server.exe"C:\Windows\System32\cmd.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2996C:\Users\admin\AppData\Roaming\server\server.exeC:\Users\admin\AppData\Roaming\server\server.execmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
4028"C:\Users\admin\AppData\Roaming\server\server.exe"C:\Users\admin\AppData\Roaming\server\server.exe
server.exe
User:
admin
Integrity Level:
MEDIUM
1896C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe
server.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2244C:\Users\admin\AppData\Roaming\server\server.exe /stext "C:\Users\admin\AppData\Local\Temp\lkgwikinbiqdoerhu"C:\Users\admin\AppData\Roaming\server\server.exeserver.exe
User:
admin
Integrity Level:
MEDIUM
3640C:\Users\admin\AppData\Roaming\server\server.exe /stext "C:\Users\admin\AppData\Local\Temp\wmlojdthoqipqknllfst"C:\Users\admin\AppData\Roaming\server\server.exeserver.exe
User:
admin
Integrity Level:
MEDIUM
Total events
1 032
Read events
979
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
1
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
3332EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVREF00.tmp.cvr
MD5:
SHA256:
4028server.exeC:\Users\admin\AppData\Roaming\Screenshots\time_20190520_100010.pngimage
MD5:8266ED6FF9A1073D96AA3696967EF772
SHA256:1429EA521F5F9C7779963881FDE16F5A9A6F12613523C7F7958570C20B44BCE6
4028server.exeC:\Users\admin\AppData\Roaming\remcos\logs.dattext
MD5:8D31F4AC63CC2A9E9EE54BE0BA148507
SHA256:6D6C480CBF25F752764855654FFBC6C22A9364CFC025E9C33832D68A74073A52
912KsScL.exeC:\Users\admin\AppData\Local\Temp\install.vbsbinary
MD5:9EC6FEDFA7473C89F4BE85FA4FFC1B57
SHA256:0C70303B09A733232019EC43FAF1BBDF724105CC26BCB4646EC5157F5A60C25C
3332EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\RFFQ[1].exeexecutable
MD5:F15E448B76331EC8D1C2CF3A7BD4289A
SHA256:197738FB685E9A5A083E17D70DD269BDCBC32956810A02220A10449E5EE83A57
912KsScL.exeC:\Users\admin\AppData\Roaming\server\server.exeexecutable
MD5:F15E448B76331EC8D1C2CF3A7BD4289A
SHA256:197738FB685E9A5A083E17D70DD269BDCBC32956810A02220A10449E5EE83A57
3332EXCEL.EXEC:\Users\admin\AppData\Local\Temp\KsScL.exeexecutable
MD5:F15E448B76331EC8D1C2CF3A7BD4289A
SHA256:197738FB685E9A5A083E17D70DD269BDCBC32956810A02220A10449E5EE83A57
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
7
DNS requests
3
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4028
server.exe
160.116.15.144:1337
dmurrray.warzonedns.com
ZA
malicious
3332
EXCEL.EXE
31.31.196.162:443
master-peredelkino.ru
Domain names registrar REG.RU, Ltd
RU
suspicious

DNS requests

Domain
IP
Reputation
master-peredelkino.ru
  • 31.31.196.162
suspicious
dmurrray.warzonedns.com
  • 160.116.15.144
malicious

Threats

PID
Process
Class
Message
4028
server.exe
A Network Trojan was detected
MALWARE [PTsecurity] Backdoor.Win32/Remcos RAT connection
4028
server.exe
A Network Trojan was detected
MALWARE [PTsecurity] Backdoor.Win32/Remcos RAT connection
2 ETPRO signatures available at the full report
No debug info