analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

67d70754c13f4ae3832a5d655ff8ec2c0fb3caa3e50ac9e61ffb1557ef35d6ee.xls

Full analysis: https://app.any.run/tasks/db892203-fd12-4eeb-955b-7bb44c5a7be9
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: April 23, 2019, 16:23:04
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
trojan
zbot
Indicators:
MIME: application/vnd.ms-excel
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: Admin, Last Saved By: admin, Name of Creating Application: Microsoft Excel, Last Printed: Mon Sep 10 07:09:36 2012, Create Time/Date: Mon Sep 7 09:01:27 2009, Last Saved Time/Date: Fri Jan 25 08:56:34 2019, Security: 0
MD5:

53E020C7DF818270F267BF55237BBDA2

SHA1:

62FE17AB74F4762A77C6DC4B0FD0185B24549B65

SHA256:

DACEFBCC05C874E11459D639DFAC7B62B9CC2F38A0E4DC9A325BBF57DC8450D9

SSDEEP:

24576:I3feJy3Vx9u5Z1iPFk1JtBLWW6RUQ2nIbkrKAL1Aej+CNmEGa19aMoz/GuchZaq/:QkyFxPks+Xgu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • AutoHotkeyU32.exe (PID: 3088)
    • Executable content was dropped or overwritten

      • EXCEL.EXE (PID: 2948)
    • Connects to CnC server

      • AutoHotkeyU32.exe (PID: 3088)
    • Writes to a start menu file

      • AutoHotkeyU32.exe (PID: 3088)
    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 2948)
  • SUSPICIOUS

    • Creates files in the program directory

      • EXCEL.EXE (PID: 2948)
    • Creates files in the user directory

      • AutoHotkeyU32.exe (PID: 3088)
    • Connects to server without host name

      • AutoHotkeyU32.exe (PID: 3088)
  • INFO

    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 2948)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xls | Microsoft Excel sheet (78.9)

EXIF

FlashPix

CompObjUserType: ???? Microsoft Excel 2003
CompObjUserTypeLen: 26
HeadingPairs:
  • Листы
  • 6
TitleOfParts:
  • Ф1_свод
  • Ф2_свод
  • Ф3_свод
  • Ф4_свод
  • Ф5_ЦБ
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 16
Company: Microsoft
CodePage: Windows Cyrillic
Security: None
ModifyDate: 2019:01:25 08:56:34
CreateDate: 2009:09:07 08:01:27
LastPrinted: 2012:09:10 06:09:36
Software: Microsoft Excel
LastModifiedBy: admin
Author: Admin
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
31
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start excel.exe autohotkeyu32.exe

Process information

PID
CMD
Path
Indicators
Parent process
2948"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Version:
14.0.6024.1000
3088C:\ProgramData\AutoHotkeyU32.exeC:\ProgramData\AutoHotkeyU32.exe
EXCEL.EXE
User:
admin
Integrity Level:
MEDIUM
Description:
AutoHotkey Unicode 32-bit
Version:
1.1.30.01
Total events
738
Read events
710
Write events
21
Delete events
7

Modification events

(PID) Process:(2948) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:writeName:n+>
Value:
6E2B3E00840B0000010000000000000000000000
(PID) Process:(2948) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(2948) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(2948) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
Operation:writeName:MTTT
Value:
840B0000EE132BE9F0F9D40100000000
(PID) Process:(2948) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:delete valueName:n+>
Value:
6E2B3E00840B0000010000000000000000000000
(PID) Process:(2948) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:delete keyName:
Value:
(PID) Process:(2948) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency
Operation:delete keyName:
Value:
(PID) Process:(2948) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2948) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2948) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\130709
Operation:writeName:130709
Value:
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
Executable files
1
Suspicious files
0
Text files
1
Unknown types
3

Dropped files

PID
Process
Filename
Type
2948EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR36E.tmp.cvr
MD5:
SHA256:
3088AutoHotkeyU32.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AutoHotkeyDriver.lnklnk
MD5:EB314AB9071FBCBD8574FA711BBD0341
SHA256:CD11F8D7C8FBE40A15E13ECBCE818F516D2DCEBF350E339294D1F6CF38BF33CC
2948EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\54C6A9D6.emfemf
MD5:D9E707B152BBF6104541C6FDBAFA8CD6
SHA256:1DB61D5DDCAA9168BA78A381F78BB9F447C8C712B83AF5AEDE64D85BF469465B
2948EXCEL.EXEC:\ProgramData\AutoHotkeyU32.ahktext
MD5:3676B9C4636D04B990C1591CD0A990A8
SHA256:35F818D9D92E411DC84222AD7CB01E144E4BC60E7093B1BC10E827A761CF9486
2948EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BA7E3DF.emfemf
MD5:FA33DC068701F701A9F4507DDB953C2B
SHA256:20C0BA2674FBFED7C3924CE3CAB7B7FA495B30BF2261AB1E1F0BA2C79A1C2100
2948EXCEL.EXEC:\ProgramData\AutoHotkeyU32.exeexecutable
MD5:13D00E67F48B7B68161EA2DDBEE9B2CA
SHA256:967DBA8D919693FEBF96FDE4877E7F08077630F886D4E77B778855D998C073C2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
2
DNS requests
0
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3088
AutoHotkeyU32.exe
POST
200
193.109.69.5:80
http://193.109.69.5/9125/gate.php
NL
malicious
3088
AutoHotkeyU32.exe
POST
200
193.109.69.5:80
http://193.109.69.5/9125/gate.php
NL
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3088
AutoHotkeyU32.exe
193.109.69.5:80
Hostkey B.v.
NL
malicious

DNS requests

No data

Threats

PID
Process
Class
Message
3088
AutoHotkeyU32.exe
A Network Trojan was detected
ET TROJAN Trojan Generic - POST To gate.php with no referer
3088
AutoHotkeyU32.exe
A Network Trojan was detected
ET TROJAN Likely Zbot Generic Post to gate.php Dotted-Quad
3088
AutoHotkeyU32.exe
A Network Trojan was detected
ET TROJAN Trojan Generic - POST To gate.php with no referer
3088
AutoHotkeyU32.exe
A Network Trojan was detected
ET TROJAN Likely Zbot Generic Post to gate.php Dotted-Quad
2 ETPRO signatures available at the full report
No debug info