File name: | C:\Users\admin\AppData\Local\Temp\Rar$DIb3240.26424\INV_0288.xls |
Full analysis: | https://app.any.run/tasks/35f56fe3-fbcb-4716-9865-9f7fe53f7197 |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | February 21, 2020, 16:46:21 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
MIME: | application/vnd.ms-excel |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Comments: UAxqU1aaI2NxFxZpukvF, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Feb 14 06:29:18 2020, Last Saved Time/Date: Thu Feb 20 12:08:58 2020, Security: 0 |
MD5: | 87111B61B18AD928134DDC8D0517B60D |
SHA1: | F120E5F35E2ECFE563DCC5EDB03EEA4868D862C8 |
SHA256: | 92C10CCA0ACFBF10BBAEBEEDC34B3E9D5558BD58B4295BB6537B748C04759A37 |
SSDEEP: | 3072:G0k3hbdlylKsgqopeJBWhZFGkE+cL2NdlzyF0Vi4m+Oi9l1isYgmNWl1oH2HUU:Rk3hbdlylKsgqopeJBWhZFVE+W2NdsFW |
.xls | | | Microsoft Excel sheet (78.9) |
---|
Author: | - |
---|---|
Comments: | UAxqU1aaI2NxFxZpukvF |
LastModifiedBy: | - |
Software: | Microsoft Excel |
CreateDate: | 2020:02:14 06:29:18 |
ModifyDate: | 2020:02:20 12:08:58 |
Security: | None |
CodePage: | Windows Latin 1 (Western European) |
Company: | - |
AppVersion: | 16 |
ScaleCrop: | No |
LinksUpToDate: | No |
SharedDoc: | No |
HyperlinksChanged: | No |
TitleOfParts: |
|
HeadingPairs: |
|
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3144 | "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Excel Version: 14.0.6024.1000 | ||||
1784 | "C:\Windows\system32\notepad.exe" | C:\Windows\system32\notepad.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Notepad Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3392 | "C:\Windows\explorer.exe" | C:\Windows\explorer.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3584 | "C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\INV_0288.txt | C:\Windows\system32\NOTEPAD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Notepad Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2888 | "C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x401 | C:\Windows\system32\verclsid.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Extension CLSID Verification Host Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
3144 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\CVR5BA5.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3144 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\Cab92E3.tmp | — | |
MD5:— | SHA256:— | |||
3144 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\Tar92E4.tmp | — | |
MD5:— | SHA256:— | |||
3144 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\{5CDD78E9-82C9-40CD-9E74-A7C2F8C0913C} | — | |
MD5:— | SHA256:— | |||
3144 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\{35E512DE-6EAA-4DA1-A2FF-B3F75DE88823} | — | |
MD5:— | SHA256:— | |||
3144 | EXCEL.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dat | text | |
MD5:00ADD038ED104146CF3CE9233AC994C6 | SHA256:094B1A2B538B1A2D2E17163056025BA038E856B1EAADC5559DFD0A5D299662D0 | |||
3144 | EXCEL.EXE | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D6DE0D5EE92F9F75D3B57BBF6B0702FA | binary | |
MD5:D3BD8EC972D580B6FF3EC87826FED5F6 | SHA256:E9AE485263CE91BD8F3D94B72F3EFB370122C491A60179B73583946A831FC5D7 | |||
3144 | EXCEL.EXE | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08 | der | |
MD5:FE7AF8310471B272C34E46EB8CAFB680 | SHA256:8D560BB07A9D568010209DEEBC423D55C373D8A007C669619370A51B0F4D6AA2 | |||
3144 | EXCEL.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\17KZOABL.txt | — | |
MD5:— | SHA256:— | |||
3144 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\~DFCF7E3CB87225D206.TMP | — | |
MD5:— | SHA256:— |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3144 | EXCEL.EXE | GET | 200 | 195.138.255.24:80 | http://isrg.trustid.ocsp.identrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D | DE | der | 1.37 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3144 | EXCEL.EXE | 172.217.22.14:443 | google.com | Google Inc. | US | whitelisted |
3144 | EXCEL.EXE | 195.138.255.17:80 | ocsp.int-x3.letsencrypt.org | AS33891 Netzbetrieb GmbH | DE | whitelisted |
3144 | EXCEL.EXE | 195.138.255.24:80 | isrg.trustid.ocsp.identrust.com | AS33891 Netzbetrieb GmbH | DE | whitelisted |
3144 | EXCEL.EXE | 161.117.177.248:443 | merystol.xyz | — | SG | suspicious |
3144 | EXCEL.EXE | 172.217.16.131:80 | ocsp.pki.goog | Google Inc. | US | whitelisted |
3144 | EXCEL.EXE | 216.58.207.36:443 | www.google.com | Google Inc. | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
merystol.xyz |
| suspicious |
isrg.trustid.ocsp.identrust.com |
| whitelisted |
ocsp.int-x3.letsencrypt.org |
| whitelisted |
google.com |
| whitelisted |
ocsp.pki.goog |
| whitelisted |
www.google.com |
| whitelisted |
dns.msftncsi.com |
| shared |
PID | Process | Class | Message |
---|---|---|---|
3144 | EXCEL.EXE | Potentially Bad Traffic | ET INFO Observed Let's Encrypt Certificate for Suspicious TLD (.xyz) |