analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

9072e1af4382183be07719286f8017f6eddd9460b2e6f8a47fb042ec17aeb569

Full analysis: https://app.any.run/tasks/7c4a3045-a5d4-4c7f-8547-fcf1666971eb
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: February 11, 2019, 03:14:02
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
trojan
Indicators:
MIME: application/vnd.ms-excel
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: Cloner, Last Saved By: Cloner, Name of Creating Application: Microsoft Excel, Create Time/Date: Thu Jan 3 09:43:06 2019, Last Saved Time/Date: Mon Jan 7 07:58:00 2019, Security: 0
MD5:

7FA6689EC0A8863E5084D30DE4B9B252

SHA1:

1B48448CAEF819C715C93E3426E36EC1A1DE39C2

SHA256:

9072E1AF4382183BE07719286F8017F6EDDD9460B2E6F8A47FB042EC17AEB569

SSDEEP:

6144:Ik3hOdsylKlgryzc4bNhZF+E+W2kQCA14eYXMwuF7pf7myagLGbzuLV:s40QWh

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • hadram.exe (PID: 2580)
      • ekeoil.exe (PID: 3728)
    • Executable content was dropped or overwritten

      • EXCEL.EXE (PID: 3000)
    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 3000)
    • Connects to CnC server

      • ekeoil.exe (PID: 3728)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • hadram.exe (PID: 2580)
    • Creates files in the program directory

      • hadram.exe (PID: 2580)
      • ekeoil.exe (PID: 3728)
  • INFO

    • Creates files in the user directory

      • EXCEL.EXE (PID: 3000)
    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 3000)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xls | Microsoft Excel sheet (48)
.xls | Microsoft Excel sheet (alternate) (39.2)

EXIF

FlashPix

CompObjUserType: Microsoft Excel 2003 Worksheet
CompObjUserTypeLen: 31
HeadingPairs:
  • Worksheets
  • 3
TitleOfParts:
  • Sheet1
  • Sheet2
  • Sheet3
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 15
Company: -
CodePage: Windows Latin 1 (Western European)
Security: None
ModifyDate: 2019:01:07 07:58:00
CreateDate: 2019:01:03 09:43:06
Software: Microsoft Excel
LastModifiedBy: Cloner
Author: Cloner
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
3
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start excel.exe hadram.exe ekeoil.exe

Process information

PID
CMD
Path
Indicators
Parent process
3000"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\excel.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2580C:\Users\admin\Documents\hadram.exeC:\Users\admin\Documents\hadram.exe
EXCEL.EXE
User:
admin
Company:
simbaa
Integrity Level:
MEDIUM
Description:
lioeek
Version:
2.2.2.4
Modules
Images
c:\users\admin\documents\hadram.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3728"C:\ProgramData\ekeoil\ekeoil.exe"C:\ProgramData\ekeoil\ekeoil.exe
hadram.exe
User:
admin
Integrity Level:
MEDIUM
Description:
ekeoil
Version:
3.1.1.5
Modules
Images
c:\programdata\ekeoil\ekeoil.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
858
Read events
725
Write events
126
Delete events
7

Modification events

(PID) Process:(3000) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:writeName:&+0
Value:
262B3000B80B0000010000000000000000000000
(PID) Process:(3000) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(3000) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(3000) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
Operation:writeName:MTTT
Value:
B80B0000E0927FE0B7C1D40100000000
(PID) Process:(3000) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:delete valueName:&+0
Value:
262B3000B80B0000010000000000000000000000
(PID) Process:(3000) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:delete keyName:
Value:
(PID) Process:(3000) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency
Operation:delete keyName:
Value:
(PID) Process:(3000) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3000) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3000) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2475ED
Operation:writeName:2475ED
Value:
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
Executable files
2
Suspicious files
1
Text files
3
Unknown types
3

Dropped files

PID
Process
Filename
Type
3000EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR6EF7.tmp.cvr
MD5:
SHA256:
3000EXCEL.EXEC:\Users\admin\Documents\VB7D42.tmp
MD5:
SHA256:
3000EXCEL.EXEC:\Users\admin\AppData\Local\Temp\VB7D41.tmp
MD5:
SHA256:
3000EXCEL.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:2E5EDB656B8636D41FA2C4A483CAE7AF
SHA256:E723196EEC59DD414AB639050774A65D13A2E1C54794821903AF053F21279058
3000EXCEL.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\9072e1af4382183be07719286f8017f6eddd9460b2e6f8a47fb042ec17aeb569.xls.LNKlnk
MD5:EC0E6F05622BCC49D9A3E4F897FC1B4E
SHA256:8ADAF3FFEECD1DB13EA2C00D0712666E49D6EAC0D0F8539748672010EA974F0E
3728ekeoil.exeC:\ProgramData\ekeoil\ekeoil.xmlxml
MD5:827418ADE61344FFF750B074D9868CE4
SHA256:56FDA64EA2181953E10143C72E71236976B2A1F58792FD4DB84D8733D0C322E5
3000EXCEL.EXEC:\Users\admin\AppData\Local\Temp\VBE\MSForms.exdtlb
MD5:7B78F530D7BB535C1358F5EBBA5CC9B1
SHA256:2C0F91AAF203E45F219DE312B1091F5B7151BAE8ED7BF532A97F5C26A165FEA1
2580hadram.exeC:\ProgramData\ekeoil\ekeoil.exeexecutable
MD5:AB68DB5C97F9EE12CA29C1EED881781D
SHA256:8F7178ED8265CC0D9F7E7402D4D632C1F5E32C3501ADD571504BF2CD0065460D
3000EXCEL.EXEC:\Users\admin\Documents\hadram.exeexecutable
MD5:801F94BEDB9481FB65709457C1F4C47A
SHA256:9C6FD4739FCC1BECFA9BACF00C50EAC059A24409064E03AE03F75C9ABBDF8300
3000EXCEL.EXEC:\Users\admin\Documents\hadram.zipcompressed
MD5:0F3488C89F4F519CEBA2C97E83D12AF2
SHA256:03911D1A1AA0B3A2632C25D647FE8FB98E71F3F533AB49B437B90F48AF016CE0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1 624
TCP/UDP connections
19
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3728
ekeoil.exe
GET
200
157.230.112.219:80
http://firebasebox.com/tootie292/reboshw/c0_nCussi0N.php
US
text
20 b
malicious
2580
hadram.exe
GET
200
216.58.206.4:80
http://www.google.com/
US
html
11.3 Kb
whitelisted
3728
ekeoil.exe
POST
200
157.230.112.219:80
http://firebasebox.com/tootie292/reboshw/1Inter-view_Call.php
US
text
20 b
malicious
3728
ekeoil.exe
POST
200
157.230.112.219:80
http://firebasebox.com/tootie292/reboshw/Sec_urit7Y-d3etaiLs.php
US
text
20 b
malicious
3728
ekeoil.exe
POST
200
157.230.112.219:80
http://firebasebox.com/tootie292/reboshw/1Inter-view_Call.php
US
text
20 b
malicious
3728
ekeoil.exe
POST
200
157.230.112.219:80
http://firebasebox.com/tootie292/reboshw/1Inter-view_Call.php
US
text
20 b
malicious
3728
ekeoil.exe
POST
200
157.230.112.219:80
http://firebasebox.com/tootie292/reboshw/Sec_urit7Y-d3etaiLs.php
US
text
20 b
malicious
3728
ekeoil.exe
POST
200
157.230.112.219:80
http://firebasebox.com/tootie292/reboshw/1Inter-view_Call.php
US
text
20 b
malicious
3728
ekeoil.exe
POST
200
157.230.112.219:80
http://firebasebox.com/tootie292/reboshw/Sec_urit7Y-d3etaiLs.php
US
text
20 b
malicious
3728
ekeoil.exe
POST
200
157.230.112.219:80
http://firebasebox.com/tootie292/reboshw/1Inter-view_Call.php
US
text
20 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2580
hadram.exe
216.58.206.4:80
www.google.com
Google Inc.
US
whitelisted
3728
ekeoil.exe
157.230.112.219:80
firebasebox.com
Joao Carlos de Almeida Silveira trading as Bitcanal
US
malicious
3728
ekeoil.exe
151.101.1.2:443
www.quora.com
Fastly
US
suspicious

DNS requests

Domain
IP
Reputation
www.google.com
  • 216.58.206.4
whitelisted
www.quora.com
  • 151.101.1.2
  • 151.101.65.2
  • 151.101.129.2
  • 151.101.193.2
suspicious
firebasebox.com
  • 157.230.112.219
malicious

Threats

PID
Process
Class
Message
2580
hadram.exe
A Network Trojan was detected
ET USER_AGENTS Peppy/KeeOIL Google User-Agent (google/dance)
2580
hadram.exe
A Network Trojan was detected
ET TROJAN Peppy/KeeOIL Google Connectivity Check
1 ETPRO signatures available at the full report
No debug info