analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

b60787ec370db43ca5eec8b0479f914e782a251e1a342637283495005e33d196

Full analysis: https://app.any.run/tasks/08254958-a837-4a83-bd66-b6cfeca2dcf1
Verdict: Malicious activity
Analysis date: January 17, 2019, 16:32:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
Indicators:
MIME: application/vnd.ms-excel
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Last Saved By: office, Name of Creating Application: Microsoft Excel, Create Time/Date: Thu Jan 17 06:48:49 2019, Last Saved Time/Date: Thu Jan 17 06:55:05 2019, Security: 0
MD5:

6868190E86B34D7E8D3A6C4E7FB04C80

SHA1:

EF948D629D1F7ADD7B72DC6E99192C4CFF6342DE

SHA256:

B60787EC370DB43CA5EEC8B0479F914E782A251E1A342637283495005E33D196

SSDEEP:

3072:ztk3hOdsylKlgryzc4bNhZFGzE+cL2knACHxf4kIcizziuVZ09sh3Vulf8kwGB6w:ztk3hOdsylKlgryzc4bNhZF+E+W2knA4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 2804)
    • Requests a remote executable file from MS Office

      • EXCEL.EXE (PID: 2804)
  • SUSPICIOUS

    • Executes application which crashes

      • EXCEL.EXE (PID: 2804)
    • Reads Internet Cache Settings

      • EXCEL.EXE (PID: 2804)
    • Unusual connect from Microsoft Office

      • EXCEL.EXE (PID: 2804)
  • INFO

    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 2804)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xls | Microsoft Excel sheet (48)
.xls | Microsoft Excel sheet (alternate) (39.2)

EXIF

FlashPix

Author: -
LastModifiedBy: office
Software: Microsoft Excel
CreateDate: 2019:01:17 06:48:49
ModifyDate: 2019:01:17 06:55:05
Security: None
CodePage: Windows Latin 1 (Western European)
Company: -
AppVersion: 16
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: Sheet1
HeadingPairs:
  • Worksheets
  • 1
CompObjUserTypeLen: 31
CompObjUserType: Microsoft Excel 2003 Worksheet
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start excel.exe ntvdm.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2804"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Version:
14.0.6024.1000
3844"C:\Windows\system32\ntvdm.exe" -i1 C:\Windows\system32\ntvdm.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
NTVDM.EXE
Exit code:
3221225477
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
553
Read events
524
Write events
22
Delete events
7

Modification events

(PID) Process:(2804) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:writeName:e1$
Value:
65312400F40A0000010000000000000000000000
(PID) Process:(2804) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(2804) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(2804) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
Operation:writeName:MTTT
Value:
F40A0000EE50545182AED40100000000
(PID) Process:(2804) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:delete valueName:e1$
Value:
65312400F40A0000010000000000000000000000
(PID) Process:(2804) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:delete keyName:
Value:
(PID) Process:(2804) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency
Operation:delete keyName:
Value:
(PID) Process:(2804) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2804) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2804) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\19A0BB
Operation:writeName:19A0BB
Value:
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
Executable files
0
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
2804EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR99B6.tmp.cvr
MD5:
SHA256:
3844ntvdm.exeC:\Users\admin\AppData\Local\Temp\scsA80D.tmp
MD5:
SHA256:
3844ntvdm.exeC:\Users\admin\AppData\Local\Temp\scsA81E.tmp
MD5:
SHA256:
2804EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\suspendedpage[1].htmhtml
MD5:96849BA5C4D07A9C65ECDDBB23C1722F
SHA256:F8256D391730D1E987A26B6ADC07CEA54C2D1C0ECFB31EA303D29D506077E82D
2804EXCEL.EXEC:\Users\admin\aevaaid.exehtml
MD5:96849BA5C4D07A9C65ECDDBB23C1722F
SHA256:F8256D391730D1E987A26B6ADC07CEA54C2D1C0ECFB31EA303D29D506077E82D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2804
EXCEL.EXE
GET
200
45.64.104.167:80
http://mithramdirectory.com/cgi-sys/suspendedpage.cgi
IN
html
4.13 Kb
malicious
2804
EXCEL.EXE
GET
302
45.64.104.167:80
http://mithramdirectory.com/temp/tuferwt.exe
IN
html
593 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2804
EXCEL.EXE
45.64.104.167:80
mithramdirectory.com
LeapSwitch Networks Pvt Ltd
IN
suspicious

DNS requests

Domain
IP
Reputation
mithramdirectory.com
  • 45.64.104.167
malicious

Threats

PID
Process
Class
Message
2804
EXCEL.EXE
A Network Trojan was detected
SC TROJAN_DOWNLOADER Suspicious redirect to 'suspendedpage.cgi'
No debug info