Windows Analysis Report
3dYJn1GHk6

Overview

General Information

Sample Name: 3dYJn1GHk6 (renamed file extension from none to xls)
Analysis ID: 600290
MD5: 9cca0af8d3f66ccd4d88542eecdde898
SHA1: 4d9742039d3222ec7e76229acb22626f3ea156c8
SHA256: e7b337819ffbfd0cc64e0da0de7696a062cb134bb00e24dd761e4ce25acc958f
Tags: excelSilentBuilderxlsx
Infos:

Detection

Hidden Macro 4.0
Score: 72
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Multi AV Scanner detection for submitted file
Found malicious Excel 4.0 Macro
Found Excel 4.0 Macro with suspicious formulas
Document exploit detected (UrlDownloadToFile)
Yara signature match
Found a hidden Excel 4.0 Macro sheet
Sigma detected: Excel Network Connections
Potential document exploit detected (performs DNS queries)

Classification

AV Detection

barindex
Source: 3dYJn1GHk6.xls Virustotal: Detection: 28% Perma Link
Source: 3dYJn1GHk6.xls ReversingLabs: Detection: 26%
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior

Software Vulnerabilities

barindex
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Section loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA Jump to behavior
Source: global traffic DNS query: name: www.gessersh.com
Source: unknown DNS traffic detected: queries for: www.gessersh.com

System Summary

barindex
Source: Screenshot number: 4 Screenshot OCR: Enable Editing and click Enable Content. 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Source: Screenshot number: 4 Screenshot OCR: Enable Content. 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Source: 3dYJn1GHk6.xls Macro extractor: Sheet: EGVEB contains: urlmon
Source: 3dYJn1GHk6.xls Initial sample: EXEC
Source: 3dYJn1GHk6.xls, type: SAMPLE Matched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
Source: C:\Users\user\Desktop\3dYJn1GHk6.xls, type: DROPPED Matched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
Source: 3dYJn1GHk6.xls Macro extractor: Sheet name: EGVEB
Source: 3dYJn1GHk6.xls Macro extractor: Sheet name: P1
Source: 3dYJn1GHk6.xls Virustotal: Detection: 28%
Source: 3dYJn1GHk6.xls ReversingLabs: Detection: 26%
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\AppData\Local\Temp\CVR338D.tmp Jump to behavior
Source: 3dYJn1GHk6.xls OLE indicator, Workbook stream: true
Source: 3dYJn1GHk6.xls.0.dr OLE indicator, Workbook stream: true
Source: classification engine Classification label: mal72.expl.evad.winXLS@1/2@5/2
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File read: C:\Users\desktop.ini Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: 3dYJn1GHk6.xls Initial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs