File name:

b06a98f38c3e4d67a6b0ad3aa727a9652f27eace9fa0547b772083ab5bd828a2.xls

Full analysis: https://app.any.run/tasks/78dfe997-185d-4a8b-978f-1dcba2631797
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: September 10, 2019, 01:13:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
trojan
Indicators:
MIME: application/vnd.ms-excel
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.1, Code page: 1251, Author: , Last Saved By: , Last Printed: Thu Sep 5 21:51:48 2019, Create Time/Date: Fri May 10 08:57:09 2019, Last Saved Time/Date: Thu Sep 5 22:11:09 2019, Security: 0
MD5:

467FC20994C10187D838E4AF4D7B2503

SHA1:

10FD7A419DAD79268162E196877E0617DA1F6A6E

SHA256:

B06A98F38C3E4D67A6B0AD3AA727A9652F27EACE9FA0547B772083AB5BD828A2

SSDEEP:

12288:rkukr78ahJJOnrGSRhi3ThE/Xr9lLUHzXq18Jnd5SkUKlfMQEbF7KgHXmXC9x/n0:whQGMhLk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 3004)
    • Executes scripts

      • EXCEL.EXE (PID: 3004)
    • Connects to CnC server

      • wscript.exe (PID: 2396)
      • wscript.exe (PID: 3604)
  • SUSPICIOUS

    • Application launched itself

      • wscript.exe (PID: 2296)
      • wscript.exe (PID: 2396)
      • wscript.exe (PID: 2844)
    • Creates files in the user directory

      • wscript.exe (PID: 2396)
    • Executes scripts

      • wscript.exe (PID: 2296)
      • wscript.exe (PID: 2396)
      • wscript.exe (PID: 2844)
    • Creates files in the program directory

      • wscript.exe (PID: 3604)
  • INFO

    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 3004)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xls | Microsoft Excel sheet (48)
.xls | Microsoft Excel sheet (alternate) (39.2)

EXIF

FlashPix

Author: Александр Морозов
LastModifiedBy: Александр Морозов
LastPrinted: 2019:09:05 20:51:48
CreateDate: 2019:05:10 07:57:09
ModifyDate: 2019:09:05 21:11:09
Security: None
CodePage: Windows Cyrillic
Company: -
AppVersion: 12
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts:
  • Sheet1
  • Sheet2
  • Sheet3
  • Sheet1!OLE_LINK3
HeadingPairs:
  • Листы
  • 3
  • Именованные диапазоны
  • 1
CompObjUserTypeLen: 33
CompObjUserType: ???? Microsoft Office Excel 2003
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
5
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start excel.exe no specs wscript.exe no specs wscript.exe wscript.exe no specs wscript.exe

Process information

PID
CMD
Path
Indicators
Parent process
2296wscript.exe //B "C:\Users\admin\AppData\Local\Temp\rknrl.vbs"C:\Windows\system32\wscript.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2396"C:\Windows\System32\wscript.exe" //B "C:\Users\admin\AppData\Local\Temp\winstart.vbs"C:\Windows\System32\wscript.exe
wscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2844"C:\Windows\System32\wscript.exe" //B "C:\Users\admin\AppData\Local\Temp\rknrl.vbs"C:\Windows\System32\wscript.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3004"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\excel.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
3604"C:\Windows\System32\wscript.exe" //B "C:\Users\admin\AppData\Local\Temp\winstart.vbs"C:\Windows\System32\wscript.exe
wscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
1 195
Read events
1 102
Write events
86
Delete events
7

Modification events

(PID) Process:(3004) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:writeName:m}"
Value:
6D7D2200BC0B0000010000000000000000000000
(PID) Process:(3004) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(3004) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(3004) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
Operation:writeName:MTTT
Value:
BC0B00006EE49C027567D50100000000
(PID) Process:(3004) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:delete valueName:m}"
Value:
6D7D2200BC0B0000010000000000000000000000
(PID) Process:(3004) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:delete keyName:
Value:
(PID) Process:(3004) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency
Operation:delete keyName:
Value:
(PID) Process:(3004) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3004) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3004) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\16A2DD
Operation:writeName:16A2DD
Value:
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
Executable files
0
Suspicious files
6
Text files
41
Unknown types
1

Dropped files

PID
Process
Filename
Type
3004EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR9D5E.tmp.cvr
MD5:
SHA256:
2396wscript.exeC:\Users\admin\AppData\Local\Temp\rad45CFB.tmp
MD5:
SHA256:
2396wscript.exeC:\Users\admin\AppData\Local\Temp\rad28E73.tmp
MD5:
SHA256:
2396wscript.exeC:\Users\admin\AppData\Local\Temp\rad2DF93.tmp
MD5:
SHA256:
2396wscript.exeC:\Users\admin\AppData\Local\Temp\rad0C2E0.tmp
MD5:
SHA256:
2396wscript.exeC:\Users\admin\AppData\Local\Temp\radDECB1.tmp
MD5:
SHA256:
2396wscript.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\rknrl[1].vbs
MD5:
SHA256:
2396wscript.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\url[1].htmtext
MD5:
SHA256:
3604wscript.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\api[1]
MD5:
SHA256:
2396wscript.exeC:\Users\admin\AppData\Local\Temp\DM6332.tmptext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
25
TCP/UDP connections
5
DNS requests
2
Threats
36

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2396
wscript.exe
GET
200
185.255.131.139:80
http://aigoingtokill.aigoingtokill.club/ctrl/playback.php
unknown
text
1.93 Kb
malicious
2396
wscript.exe
GET
200
23.111.151.66:80
http://api.etherscan.io/api?module=account&action=txlist&address=0x05124f85d88c86880fda0dde8ced46acbe01c926
US
text
1.32 Kb
malicious
2396
wscript.exe
GET
200
185.255.131.139:80
http://aigoingtokill.aigoingtokill.club/ctrl/url.html
unknown
text
741 b
malicious
2396
wscript.exe
GET
200
23.111.151.66:80
http://api.etherscan.io/api?module=account&action=txlist&address=0x05124f85d88c86880fda0dde8ced46acbe01c926
US
text
1.32 Kb
malicious
2396
wscript.exe
GET
200
185.255.131.139:80
http://aigoingtokill.aigoingtokill.club/ctrl/file/DM6331.TMP
unknown
text
103 Kb
malicious
3604
wscript.exe
GET
200
23.111.151.66:80
http://api.etherscan.io/api?module=account&action=txlist&address=0x05124f85d88c86880fda0dde8ced46acbe01c926
US
text
2.00 Kb
malicious
2396
wscript.exe
GET
200
185.255.131.139:80
http://aigoingtokill.aigoingtokill.club/ctrl/file/rknrl.vbs
unknown
text
395 b
malicious
3604
wscript.exe
GET
200
23.111.151.66:80
http://api.etherscan.io/api?module=account&action=txlist&address=0x05124f85d88c86880fda0dde8ced46acbe01c926
US
text
2.00 Kb
malicious
2396
wscript.exe
GET
200
185.255.131.139:80
http://aigoingtokill.aigoingtokill.club/ctrl/file/rknrl.vbs
unknown
text
395 b
malicious
3604
wscript.exe
GET
200
185.255.131.139:80
http://aigoingtokill.aigoingtokill.club/ctrl/url.html
unknown
text
741 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2396
wscript.exe
23.111.151.66:80
api.etherscan.io
HIVELOCITY VENTURES CORP
US
malicious
3604
wscript.exe
23.111.151.66:80
api.etherscan.io
HIVELOCITY VENTURES CORP
US
malicious
2396
wscript.exe
185.255.131.139:80
aigoingtokill.aigoingtokill.club
malicious
3604
wscript.exe
185.255.131.139:80
aigoingtokill.aigoingtokill.club
malicious

DNS requests

Domain
IP
Reputation
api.etherscan.io
  • 23.111.151.66
malicious
aigoingtokill.aigoingtokill.club
  • 185.255.131.139
malicious

Threats

PID
Process
Class
Message
2396
wscript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
2396
wscript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
2396
wscript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
2396
wscript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
2396
wscript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
3604
wscript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
3604
wscript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
3604
wscript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
3604
wscript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
3604
wscript.exe
A Network Trojan was detected
ET TROJAN Worm.VBS Dunihi/Houdini/H-Worm Checkin UA
16 ETPRO signatures available at the full report
No debug info