File name:

cbe1be4dcff91641055021001104d28b01daec7a

Full analysis: https://app.any.run/tasks/ba3b9f52-60f0-4a3a-bb19-afbb349f8b7d
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: March 31, 2020, 09:18:26
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
loader
trojan
opendir
lokibot
Indicators:
MIME: application/vnd.ms-excel
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: admin, Last Saved By: User, Name of Creating Application: Microsoft Excel, Create Time/Date: Thu Dec 6 20:43:11 2018, Last Saved Time/Date: Tue Mar 31 00:19:09 2020, Security: 0
MD5:

A998058805323BCD389A1E37F5B9138F

SHA1:

CBE1BE4DCFF91641055021001104D28B01DAEC7A

SHA256:

322343F33B2F2550445DB3D6D73432A0665199392498566432F601E619233DB2

SSDEEP:

3072:9rxEtjPOtioVjDGUU1qfDlaGGx+cL2QnAbf+FRg64N8lPTKM0Y9/3n5/hqc0JN3y:ZxEtjPOtioVjDGUU1qfDlavx+W2QnALJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 2896)
    • Changes the autorun value in the registry

      • VCQZP.exe (PID: 3424)
      • Elevte.exe (PID: 2668)
    • Executable content was dropped or overwritten

      • EXCEL.EXE (PID: 2896)
    • Requests a remote executable file from MS Office

      • EXCEL.EXE (PID: 2896)
    • Application was dropped or rewritten from another process

      • VCQZP.exe (PID: 3424)
      • VCQZP.exe (PID: 2232)
      • Elevte.exe (PID: 1812)
      • Elevte.exe (PID: 2668)
    • Downloads executable files from IP

      • EXCEL.EXE (PID: 2896)
    • LOKIBOT was detected

      • Elevte.exe (PID: 1812)
    • Connects to CnC server

      • Elevte.exe (PID: 1812)
    • Actions looks like stealing of personal data

      • Elevte.exe (PID: 1812)
  • SUSPICIOUS

    • Unusual connect from Microsoft Office

      • EXCEL.EXE (PID: 2896)
    • Application launched itself

      • VCQZP.exe (PID: 3424)
    • Starts itself from another location

      • VCQZP.exe (PID: 2232)
    • Executable content was dropped or overwritten

      • VCQZP.exe (PID: 2232)
      • Elevte.exe (PID: 1812)
    • Reads Internet Cache Settings

      • Elevte.exe (PID: 1812)
    • Loads DLL from Mozilla Firefox

      • Elevte.exe (PID: 1812)
    • Creates files in the user directory

      • Elevte.exe (PID: 1812)
  • INFO

    • Reads Internet Cache Settings

      • EXCEL.EXE (PID: 2896)
    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 2896)
    • Creates files in the user directory

      • EXCEL.EXE (PID: 2896)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xls | Microsoft Excel sheet (48)
.xls | Microsoft Excel sheet (alternate) (39.2)

EXIF

FlashPix

Author: admin
LastModifiedBy: User
Software: Microsoft Excel
CreateDate: 2018:12:06 20:43:11
ModifyDate: 2020:03:30 23:19:09
Security: None
CodePage: Windows Latin 1 (Western European)
AppVersion: 14
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts:
  • Sheet1
  • Sheet2
  • Sheet3
HeadingPairs:
  • Worksheets
  • 3
CompObjUserTypeLen: 31
CompObjUserType: Microsoft Excel 2003 Worksheet
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
5
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start excel.exe vcqzp.exe vcqzp.exe elevte.exe #LOKIBOT elevte.exe

Process information

PID
CMD
Path
Indicators
Parent process
1812"C:\Users\admin\BATT\Elevte.exe" C:\Users\admin\BATT\Elevte.exe
Elevte.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.00.0009
Modules
Images
c:\windows\system32\mfc40.dll
c:\users\admin\batt\elevte.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt40.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2232C:\Users\admin\AppData\Roaming\VCQZP.exeC:\Users\admin\AppData\Roaming\VCQZP.exe
VCQZP.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.00.0009
Modules
Images
c:\windows\system32\mfc40.dll
c:\users\admin\appdata\roaming\vcqzp.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt40.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2668"C:\Users\admin\BATT\Elevte.exe" C:\Users\admin\BATT\Elevte.exe
VCQZP.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.00.0009
Modules
Images
c:\users\admin\batt\elevte.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2896"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\excel.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3424C:\Users\admin\AppData\Roaming\VCQZP.exeC:\Users\admin\AppData\Roaming\VCQZP.exe
EXCEL.EXE
User:
admin
Company:
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.00.0009
Modules
Images
c:\users\admin\appdata\roaming\vcqzp.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
Total events
873
Read events
793
Write events
69
Delete events
11

Modification events

(PID) Process:(2896) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:writeName:xq1
Value:
78713100500B0000010000000000000000000000
(PID) Process:(2896) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(2896) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1041
Value:
Off
(PID) Process:(2896) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1046
Value:
Off
(PID) Process:(2896) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1036
Value:
Off
(PID) Process:(2896) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1031
Value:
Off
(PID) Process:(2896) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1040
Value:
Off
(PID) Process:(2896) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1049
Value:
Off
(PID) Process:(2896) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:3082
Value:
Off
(PID) Process:(2896) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1042
Value:
Off
Executable files
4
Suspicious files
2
Text files
4
Unknown types
4

Dropped files

PID
Process
Filename
Type
2896EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR5DD8.tmp.cvr
MD5:
SHA256:
1812Elevte.exeC:\Users\admin\AppData\Roaming\F63AAA\A71D80.lck
MD5:
SHA256:
2668Elevte.exeC:\Users\admin\AppData\Local\Temp\~DF533BE4FCC90A7365.TMPbinary
MD5:
SHA256:
2896EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\salles[1].exeexecutable
MD5:
SHA256:
2896EXCEL.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:
SHA256:
2896EXCEL.EXEC:\Users\admin\AppData\Roaming\VCQZP.exeexecutable
MD5:
SHA256:
2896EXCEL.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\cbe1be4dcff91641055021001104d28b01daec7a.xls.LNKlnk
MD5:
SHA256:
2232VCQZP.exeC:\Users\admin\BATT\Elevte.exeexecutable
MD5:
SHA256:
2232VCQZP.exeC:\Users\admin\BATT\Elevte.vbstext
MD5:
SHA256:
1812Elevte.exeC:\Users\admin\AppData\Roaming\F63AAA\A71D80.exeexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
7
DNS requests
1
Threats
39

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2896
EXCEL.EXE
GET
200
46.183.220.117:80
http://46.183.220.117/salles.exe
LV
executable
100 Kb
malicious
1812
Elevte.exe
GET
200
46.183.220.117:80
http://46.183.220.117/buildna.bin
LV
binary
104 Kb
malicious
1812
Elevte.exe
POST
192.3.202.210:80
http://speedfolks.com.ng/lol/panel/five/fre.php
US
malicious
1812
Elevte.exe
POST
192.3.202.210:80
http://speedfolks.com.ng/lol/panel/five/fre.php
US
malicious
1812
Elevte.exe
POST
192.3.202.210:80
http://speedfolks.com.ng/lol/panel/five/fre.php
US
malicious
1812
Elevte.exe
POST
192.3.202.210:80
http://speedfolks.com.ng/lol/panel/five/fre.php
US
malicious
1812
Elevte.exe
POST
192.3.202.210:80
http://speedfolks.com.ng/lol/panel/five/fre.php
US
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2896
EXCEL.EXE
46.183.220.117:80
DataClub S.A.
LV
malicious
1812
Elevte.exe
46.183.220.117:80
DataClub S.A.
LV
malicious
1812
Elevte.exe
192.3.202.210:80
speedfolks.com.ng
ColoCrossing
US
malicious

DNS requests

Domain
IP
Reputation
speedfolks.com.ng
  • 192.3.202.210
malicious

Threats

PID
Process
Class
Message
2896
EXCEL.EXE
A Network Trojan was detected
ET INFO Executable Download from dotted-quad Host
2896
EXCEL.EXE
A Network Trojan was detected
ET CURRENT_EVENTS Likely Evil EXE download from dotted Quad by MSXMLHTTP M1
1812
Elevte.exe
A Network Trojan was detected
ET TROJAN Generic .bin download from Dotted Quad
1812
Elevte.exe
A Network Trojan was detected
MALWARE [PTsecurity] EJNT_Loader
1812
Elevte.exe
A Network Trojan was detected
ET TROJAN LokiBot User-Agent (Charon/Inferno)
1812
Elevte.exe
A Network Trojan was detected
ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1
1812
Elevte.exe
A Network Trojan was detected
ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2
1812
Elevte.exe
A Network Trojan was detected
ET TROJAN LokiBot Checkin
1812
Elevte.exe
A Network Trojan was detected
MALWARE [PTsecurity] Loki Bot Check-in M2
1812
Elevte.exe
A Network Trojan was detected
ET TROJAN LokiBot User-Agent (Charon/Inferno)
5 ETPRO signatures available at the full report
No debug info