analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

98abcb64df23d353cc120213d5353bf3.xlsx

Full analysis: https://app.any.run/tasks/6c90af81-e511-4cd7-95ce-1ca56a150ee3
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: April 15, 2019, 07:55:03
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
trojan
fin7
griffon
Indicators:
MIME: application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
File info: Microsoft Excel 2007+
MD5:

98ABCB64DF23D353CC120213D5353BF3

SHA1:

0609E956E6F88FBEB011CF871A8C1CE5C42F8D99

SHA256:

E3DB792A115E0A216BC8DC7D4C31351955435FFE726AA798F8B9B052F312B345

SSDEEP:

6144:9UvWoKxRU62IO7uXWGQcXmV6sRlk6ZLaRzKcT21TUYMr1:mvWQuXNGdRlk6daYcT2KXr1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • mswmex28.exe (PID: 2392)
    • Executable content was dropped or overwritten

      • EXCEL.EXE (PID: 2180)
    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 2180)
    • Changes settings of System certificates

      • mswmex28.exe (PID: 2392)
    • Connects to CnC server

      • mswmex28.exe (PID: 2392)
  • SUSPICIOUS

    • Adds / modifies Windows certificates

      • mswmex28.exe (PID: 2392)
  • INFO

    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 2180)
      • EXCEL.EXE (PID: 2580)
    • Creates files in the user directory

      • EXCEL.EXE (PID: 2180)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xlsm | Excel Microsoft Office Open XML Format document (with Macro) (50.8)
.xlsx | Excel Microsoft Office Open XML Format document (30)
.zip | Open Packaging Conventions container (15.4)
.zip | ZIP compressed archive (3.5)

EXIF

XML

AppVersion: 14.03
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
Company: kvdibexifiwvs
TitlesOfParts:
  • Sheet1
  • Sheet2
  • Sheet3
HeadingPairs:
  • Worksheets
  • 3
ScaleCrop: No
DocSecurity: None
Application: Microsoft Excel
ModifyDate: 2019:03:01 15:35:22Z
CreateDate: 2019:03:01 15:35:20Z
LastModifiedBy: Windows User

XMP

Creator: kvdibexifiwvs

ZIP

ZipFileName: [Content_Types].xml
ZipUncompressedSize: 1691
ZipCompressedSize: 443
ZipCRC: 0x20d2f08c
ZipModifyDate: 1980:01:01 00:00:00
ZipCompression: Deflated
ZipBitFlag: 0x0006
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start excel.exe no specs verclsid.exe no specs excel.exe mswmex28.exe

Process information

PID
CMD
Path
Indicators
Parent process
2580"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
2464"C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x401C:\Windows\system32\verclsid.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Extension CLSID Verification Host
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2180"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Version:
14.0.6024.1000
2392C:\Users\admin\Contacts\mswmex28.exe //E:jscript C:\Users\admin\AppData\Local\Temp\querylog.txtC:\Users\admin\Contacts\mswmex28.exe
EXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Total events
1 639
Read events
1 476
Write events
145
Delete events
18

Modification events

(PID) Process:(2580) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:writeName:f&:
Value:
66263A00140A0000010000000000000000000000
(PID) Process:(2580) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(2580) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(2580) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
Operation:writeName:MTTT
Value:
140A00006C64319260F3D40100000000
(PID) Process:(2580) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:delete valueName:f&:
Value:
66263A00140A0000010000000000000000000000
(PID) Process:(2580) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:delete keyName:
Value:
(PID) Process:(2580) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency
Operation:delete keyName:
Value:
(PID) Process:(2580) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2580) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2580) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\1066CB
Operation:writeName:1066CB
Value:
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
Executable files
1
Suspicious files
0
Text files
1
Unknown types
1

Dropped files

PID
Process
Filename
Type
2580EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR6246.tmp.cvr
MD5:
SHA256:
2580EXCEL.EXEC:\Users\admin\AppData\Local\Temp\~$98abcb64df23d353cc120213d5353bf3.xlsx
MD5:
SHA256:
2180EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVRC834.tmp.cvr
MD5:
SHA256:
2180EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\msoEB9B.tmp
MD5:
SHA256:
2180EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\msoEBBB.tmp
MD5:
SHA256:
2180EXCEL.EXEC:\Users\admin\Contacts\mswmex28.exeexecutable
MD5:F36B7461FECDCF763FDEFA3A3352CD45
SHA256:BD7B57A9303F0156E0737E9768A70F841B222A3E07E1426ECCCFFFDF2737BFE9
2180EXCEL.EXEC:\Users\admin\AppData\Local\Temp\querylog.txttext
MD5:5BA871C452AACF9EDD8C655E26CB67D8
SHA256:0328F87B559218AE6ABBE1A0E8947C9E03BF287F74815F0C6E364A6C79FAFC39
2180EXCEL.EXEC:\Users\admin\AppData\Local\Temp\VBE\MSForms.exdtlb
MD5:FE8109EA126D6D42C10230750E278C2C
SHA256:76BC251487272B1E54E5CFDF1EAB4FC89E0AE47253EF3DB6EF444121F8119882
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2392
mswmex28.exe
46.21.253.39:443
mse-cdn.com
Start LLC
RU
malicious

DNS requests

Domain
IP
Reputation
mse-cdn.com
  • 46.21.253.39
malicious

Threats

Found threats are available for the paid subscriptions
2 ETPRO signatures available at the full report
No debug info