analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

THYH-1885380318.xlsb

Full analysis: https://app.any.run/tasks/1349e963-d2d9-4c8c-a5ff-58df80293c53
Verdict: Malicious activity
Analysis date: January 24, 2022, 22:38:43
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
File info: Microsoft Excel 2007+
MD5:

1BF8B4FEA9A152D149A4E0191AD04E49

SHA1:

263FE30AEBB18528CEABA77BC68D6B1AD7354047

SHA256:

8A2E1B794D07EC85A27B27193B6D1B3D26D66855266A7F10384206DFFDD63FCA

SSDEEP:

3072:g5ZQF483ux6KoT/jki1XCqRRAcQnEWzY249:g5dsrkmDRicQnE7249

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Registers / Runs the DLL via REGSVR32.EXE

      • EXCEL.EXE (PID: 3268)
    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 3268)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Checks supported languages

      • EXCEL.EXE (PID: 3268)
      • regsvr32.exe (PID: 3156)
      • regsvr32.exe (PID: 3492)
      • regsvr32.exe (PID: 2472)
    • Reads the computer name

      • EXCEL.EXE (PID: 3268)
    • Creates files in the user directory

      • EXCEL.EXE (PID: 3268)
    • Checks Windows Trust Settings

      • EXCEL.EXE (PID: 3268)
    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 3268)
    • Reads settings of System Certificates

      • EXCEL.EXE (PID: 3268)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xlsx | Excel Microsoft Office Open XML Format document (61.2)
.zip | Open Packaging Conventions container (31.5)
.zip | ZIP compressed archive (7.2)

EXIF

XML

AppVersion: 16.03
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
Company: -
TitlesOfParts:
  • Sheet
  • Sheet (2)
  • Vvvbuk1
  • SSSbbr1
  • SSSbbr2
  • EFFWFWFW
  • BBuk1
  • BBuk2
  • BBuk3
  • BBuk4
  • BBuk5
  • BBuk6
  • BBuk7
HeadingPairs:
  • Листы
  • 5
  • Макросы Excel 4.0
  • 8
ScaleCrop: No
DocSecurity: None
Application: Microsoft Excel
ModifyDate: 2022:01:24 07:16:50Z
CreateDate: 2015:06:05 18:19:34Z
LastModifiedBy: Admin

XMP

Creator: Admin

ZIP

ZipFileName: [Content_Types].xml
ZipUncompressedSize: 4405
ZipCompressedSize: 632
ZipCRC: 0x43fbdf7d
ZipModifyDate: 1980:01:01 00:00:00
ZipCompression: Deflated
ZipBitFlag: 0x0006
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
43
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start excel.exe regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3268"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Version:
14.0.6024.1000
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\microsoft office\office14\excel.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
3156regsvr32 C:\Busta\teva.ocxC:\Windows\system32\regsvr32.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft(C) Register Server
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3492regsvr32 C:\Busta\tevc.ocxC:\Windows\system32\regsvr32.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft(C) Register Server
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2472regsvr32 C:\Busta\tevd.ocxC:\Windows\system32\regsvr32.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft(C) Register Server
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
5 753
Read events
5 663
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
5
Text files
1
Unknown types
5

Dropped files

PID
Process
Filename
Type
3268EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVREA25.tmp.cvr
MD5:
SHA256:
3268EXCEL.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\THYH-1885380318.xlsb.LNKlnk
MD5:7F77EBD11978C37548F0A765C1B958B5
SHA256:814FCB7B5E14463FF490B82B6E46437412CFD9F8896A8D72D0B58A5BC40822CB
3268EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C0A419DBBA361754D896A8615DC53C0Fder
MD5:EC11942305108981AD0A00B38B24CF7B
SHA256:02A0611CAA48E162DBA95E2E07FFD1BF847CC03A4B825A17359D1C3526F47BC2
3268EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751der
MD5:54E9306F95F32E50CCD58AF19753D929
SHA256:45F94DCEB18A8F738A26DA09CE4558995A4FE02B971882E8116FC9B59813BB72
3268EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:2D92439DF3679609781C1C65295E47DF
SHA256:F65CC8BD679035D9179508986E8274BB3EB11AE29837FB6B79238D638DC4392E
3268EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:64F33E72D60DF3A5CB7D8A35B30FFBF9
SHA256:F6E011477E0F8C90AEF712259254E55890ABC820D55AF36F579E20CA4F49DB47
3268EXCEL.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.datini
MD5:FCA72FDE0DE6F225C836706DED035A5B
SHA256:145489F4CC96974A2759FD920B1288DEDCFB0FB3ADB4A4A2773D2410A5DD9352
3268EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C0A419DBBA361754D896A8615DC53C0Fbinary
MD5:EC26F6737133044264E1D8442194CE5F
SHA256:49DE6AF5827514788E930CDA7180A3DCD61D74802CE03A82F734AEC06CA3DC38
3268EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\377E6729DE07B96E9E4BCADBF4AF95C4der
MD5:E361AD85CC1DE6840F6C639CA64BB46F
SHA256:C612D51592895ADD75F388D90EC317235E30148A478B868EC7D6AC809577DBB7
3268EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\377E6729DE07B96E9E4BCADBF4AF95C4binary
MD5:AEC06D2F08F750F3F0DAC83A8C848C96
SHA256:74C670D2F5F6B666B74FE051871AE70F8731732294E6A45DEFF2B95FD9A0138D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
8
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3268
EXCEL.EXE
GET
200
2.16.186.9:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgSDX2OTu2fH9YvZC%2FO%2BSv8n2A%3D%3D
unknown
der
503 b
shared
3268
EXCEL.EXE
GET
200
104.117.200.9:80
http://x1.c.lencr.org/
US
der
717 b
whitelisted
3268
EXCEL.EXE
GET
200
2.16.106.233:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?8f9eccee66d29ad2
unknown
compressed
4.70 Kb
whitelisted
3268
EXCEL.EXE
GET
200
2.16.186.9:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgPSYN4i4BqqFZgzp5reUehpbg%3D%3D
unknown
der
503 b
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3268
EXCEL.EXE
192.185.141.13:443
pakunolaschool.com
CyrusOne LLC
US
unknown
3268
EXCEL.EXE
104.117.200.9:80
x1.c.lencr.org
TPG Telecom Limited
US
unknown
3268
EXCEL.EXE
2.16.106.233:80
ctldl.windowsupdate.com
Akamai International B.V.
whitelisted
3268
EXCEL.EXE
50.87.253.11:443
elimatlacomulco.com
Unified Layer
US
suspicious
192.254.234.248:443
keltexfinancial.com
Unified Layer
US
unknown
3268
EXCEL.EXE
2.16.186.9:80
r3.o.lencr.org
Akamai International B.V.
whitelisted

DNS requests

Domain
IP
Reputation
pakunolaschool.com
  • 192.185.141.13
unknown
ctldl.windowsupdate.com
  • 2.16.106.233
  • 2.16.106.171
whitelisted
x1.c.lencr.org
  • 104.117.200.9
whitelisted
r3.o.lencr.org
  • 2.16.186.9
  • 2.16.186.10
  • 2.16.186.19
  • 2.16.186.25
  • 2.16.186.27
shared
elimatlacomulco.com
  • 50.87.253.11
unknown
keltexfinancial.com
  • 192.254.234.248
unknown
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

No threats detected
No debug info