analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Doc-11722.xls

Full analysis: https://app.any.run/tasks/697b18dd-7e95-4de1-b68c-e45a6f9a8a41
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: January 18, 2020, 10:02:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
ta505
trojan
opendir
Indicators:
MIME: application/vnd.ms-excel
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Author: Windows User, Last Saved By: Windows User, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Jun 22 13:23:57 2019, Last Saved Time/Date: Mon Jan 6 11:38:30 2020, Security: 0
MD5:

AF715B8A907364542573A6DD7A5F18EB

SHA1:

5818AD784254E19B93C8470FE2899BA8DFF63B84

SHA256:

65DD73A855E28D6CE4AE9EFEA1BFB616856B47E83D906D5AA43F0900A5D77B08

SSDEEP:

6144:dk3hOdsylKlgryzc4bNhZF+E+W2knA8Vr1nQ133RWQGYEBm:gVZQ133RRGxBm

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops known malicious document

      • EXCEL.EXE (PID: 1412)
    • Executable content was dropped or overwritten

      • EXCEL.EXE (PID: 1412)
    • Changes the autorun value in the registry

      • EXCEL.EXE (PID: 1412)
    • Connects to CnC server

      • EXCEL.EXE (PID: 1412)
  • SUSPICIOUS

    • Creates files in the Windows directory

      • EXCEL.EXE (PID: 1412)
  • INFO

    • Creates files in the user directory

      • EXCEL.EXE (PID: 1412)
    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 1412)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xls | Microsoft Excel sheet (48)
.xls | Microsoft Excel sheet (alternate) (39.2)

EXIF

FlashPix

Author: Windows User
LastModifiedBy: Windows User
Software: Microsoft Excel
CreateDate: 2019:06:22 12:23:57
ModifyDate: 2020:01:06 11:38:30
Security: None
CodePage: Windows Latin 1 (Western European)
Company: -
AppVersion: 15
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: Sheet1
HeadingPairs:
  • Worksheets
  • 1
CompObjUserTypeLen: 31
CompObjUserType: Microsoft Excel 2003 Worksheet
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start excel.exe

Process information

PID
CMD
Path
Indicators
Parent process
1412"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
1073807364
Version:
14.0.6024.1000
Total events
895
Read events
741
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
1
Text files
1
Unknown types
3

Dropped files

PID
Process
Filename
Type
1412EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVRDE1B.tmp.cvr
MD5:
SHA256:
1412EXCEL.EXEC:\Users\admin\AppData\Local\Temp\~DF8B674C1B00201E9D.TMP
MD5:
SHA256:
1412EXCEL.EXEC:\Users\admin\AppData\Local\Temp\~DF728CFF6EC12E2FAB.TMP
MD5:
SHA256:
1412EXCEL.EXEC:\Users\admin\AppData\Local\Temp\~DF11B1DDCC9B5ED88D.TMP
MD5:
SHA256:
1412EXCEL.EXEC:\Users\admin\AppData\Local\Temp\~DF32ADDA3E6C437DA0.TMP
MD5:
SHA256:
1412EXCEL.EXEC:\Users\admin\AppData\Local\Temp\~DF33DC29B989EDB721.TMP
MD5:
SHA256:
1412EXCEL.EXEC:\Users\admin\AppData\Local\Temp\Excel8.0\MSForms.exdtlb
MD5:734E2AEB0E3ACF3F56C76E15D9C8A975
SHA256:9947456E49668E48079D56875C78581563A453F16DBF4409E5238C0F2370ACE3
1412EXCEL.EXEC:\Windows\System32\spool\drivers\color\zldgfavztext
MD5:7B6025A8C007FE3268C095B07CC3625F
SHA256:950F2DF4B3AA3CAB48DEFBF6A8416B9CF8C16EBC8C10551FEDF605D5766E8C14
1412EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3F5783CD.emfemf
MD5:59C45B1D5037D93024F67C8034057300
SHA256:8406824D64CA5F8D01D520E100953892535F8214446347B6EB4CEC8E2F584B52
1412EXCEL.EXEC:\Users\admin\AppData\Local\Temp\Doc-11722.xlsdocument
MD5:3A71333F97C9E941609F7C731E413560
SHA256:A803DF2F9388BAA5B2C7B63BF99E15B3815DCBBA1BDA87D8314413187ADFA3A2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1412
EXCEL.EXE
GET
200
95.215.225.28:80
http://foura.biz/js/elevatezoom-master/editor.php?ac=1&n=admin:USER-PC:USER-PC:Windows%20(32-bit)%20NT%206.01
GB
image
95 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1412
EXCEL.EXE
95.215.225.28:80
foura.biz
M247 Ltd
GB
malicious

DNS requests

Domain
IP
Reputation
foura.biz
  • 95.215.225.28
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO Observed DNS Query to .biz TLD
1412
EXCEL.EXE
A Network Trojan was detected
ET TROJAN MuddyWater Payload - CnC Checkin
No debug info