Downloader
C2/Generic-A Emotet Mal/HTMLGen-A Mal/Generic-S
Created on 2023-04-15T15:45:23+00:00
9f8b5f5da718fafb98de9b2128cd81fd720a37de6c755b81965ead358aeb912a.xlsx.xls
Remarks (1/1)
(0x0200000E): The overall sleep time of all monitored processes was truncated from "25 seconds" to "10 seconds" to reveal dormant functionality.
Remarks
(0x0200001A): The maximum number of URL Reputation Analysis requests per analysis (150) was exceeded.
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
9f8b5f5da718fafb98de9b2128cd81fd720a37de6c755b81965ead358aeb912a | Sample File | Excel Document |
Malicious
|
...
|
Verdict |
Malicious
|
Creator | Dream |
Last Modified By | george |
Create Time | 2015-06-05 20:19 (UTC+2) |
Modify Time | 2023-04-03 13:32 (UTC+2) |
Codepage | ANSI_Latin1 |
Application | Microsoft Excel |
App Version | 16.0 |
Document Security | NONE |
Excel 4.0 Macros | 1 |
Worksheets | 5 |
Titles Of Parts | Sheet2, Sheet3, Sheet4, Sheet5, Sheet6, Sheet |
scale_crop | False |
shared_doc | False |
CLSID | Control Name | Associated Vulnerability |
---|---|---|
{00020820-0000-0000-C000-000000000046} | Excel97Sheet | - |
Visibility State | VISIBLE |
Triggers | document:AUTO_OPEN |
Labels | AUTO_OPEN |
|
Most features are disabled. To view and edit document click Enable Editing and click Enable Content.
|
Name | ID | Size | Actions |
---|---|---|---|
Root\Workbook | 1 | 78.99 KB |
...
|
Root\SummaryInformation | 2 | 4.00 KB |
...
|
Root\DocumentSummaryInformation | 3 | 4.00 KB |
...
|
URL | WHOIS Data | Reputation Status | Recursively Submitted | Actions |
---|---|---|---|---|
http://www.chawkyfrenn.com/icon/JtT/ |
Show WHOIS
|
Malicious
|
- |
...
|
https://chiptochip.es/alojamiento-web/dofwXVVQ3hvsp/ |
Show WHOIS
|
Malicious
|
- |
...
|
http://bruidsfotografie-breda.nl/cache/QPk/ |
Show WHOIS
|
Malicious
|
- |
...
|
http://chillpassion.com/wp-content/nd4wjKgokzKbKH0DQDD/ |
Show WHOIS
|
Malicious
|
- |
...
|
C:\Users\RDhJ0CNFevzX\AppData\Local\ABeIsdLaCr\hsBpWPNj.dll | Downloaded File | Binary |
Malicious
|
...
|
Verdict |
Malicious
|
Names | Mal/Generic-S |
Image Base | 0x180000000 |
Entry Point | 0x180003AA0 |
Size Of Code | 0x0000EC00 |
Size Of Initialized Data | 0x0005DA00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_AMD64 |
Compile Timestamp | 2022-06-29 19:54 (UTC+2) |
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x180001000 | 0x0000EB51 | 0x0000EC00 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.53 |
.rdata | 0x180010000 | 0x0000788C | 0x00007A00 | 0x0000F000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.12 |
.data | 0x180018000 | 0x00003D28 | 0x00001800 | 0x00016A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.02 |
.pdata | 0x18001C000 | 0x00000AEC | 0x00000C00 | 0x00018200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.5 |
.rsrc | 0x18001D000 | 0x00050CE0 | 0x00050E00 | 0x00018E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.95 |
.reloc | 0x18006E000 | 0x00000648 | 0x00000800 | 0x00069C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 4.83 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
VirtualAlloc | - | 0x180010000 | 0x00016F70 | 0x00015F70 | 0x000005AB |
WriteConsoleW | - | 0x180010008 | 0x00016F78 | 0x00015F78 | 0x000005F0 |
SetStdHandle | - | 0x180010010 | 0x00016F80 | 0x00015F80 | 0x00000530 |
CloseHandle | - | 0x180010018 | 0x00016F88 | 0x00015F88 | 0x0000007F |
HeapSize | - | 0x180010020 | 0x00016F90 | 0x00015F90 | 0x00000341 |
OutputDebugStringW | - | 0x180010028 | 0x00016F98 | 0x00015F98 | 0x000003FD |
SetFilePointerEx | - | 0x180010030 | 0x00016FA0 | 0x00015FA0 | 0x0000050C |
GetConsoleMode | - | 0x180010038 | 0x00016FA8 | 0x00015FA8 | 0x000001F4 |
GetConsoleCP | - | 0x180010040 | 0x00016FB0 | 0x00015FB0 | 0x000001E2 |
FlushFileBuffers | - | 0x180010048 | 0x00016FB8 | 0x00015FB8 | 0x00000198 |
LCMapStringW | - | 0x180010050 | 0x00016FC0 | 0x00015FC0 | 0x00000399 |
GetStringTypeW | - | 0x180010058 | 0x00016FC8 | 0x00015FC8 | 0x000002CC |
HeapReAlloc | - | 0x180010060 | 0x00016FD0 | 0x00015FD0 | 0x0000033F |
LoadLibraryExW | - | 0x180010068 | 0x00016FD8 | 0x00015FD8 | 0x000003AA |
GetCommandLineA | - | 0x180010070 | 0x00016FE0 | 0x00015FE0 | 0x000001CE |
GetCurrentThreadId | - | 0x180010078 | 0x00016FE8 | 0x00015FE8 | 0x00000214 |
IsDebuggerPresent | - | 0x180010080 | 0x00016FF0 | 0x00015FF0 | 0x0000036A |
IsProcessorFeaturePresent | - | 0x180010088 | 0x00016FF8 | 0x00015FF8 | 0x00000370 |
EncodePointer | - | 0x180010090 | 0x00017000 | 0x00016000 | 0x00000125 |
DecodePointer | - | 0x180010098 | 0x00017008 | 0x00016008 | 0x000000FF |
EnterCriticalSection | - | 0x1800100A0 | 0x00017010 | 0x00016010 | 0x00000129 |
LeaveCriticalSection | - | 0x1800100A8 | 0x00017018 | 0x00016018 | 0x000003A5 |
RtlUnwindEx | - | 0x1800100B0 | 0x00017020 | 0x00016020 | 0x000004BB |
GetLastError | - | 0x1800100B8 | 0x00017028 | 0x00016028 | 0x00000256 |
HeapFree | - | 0x1800100C0 | 0x00017030 | 0x00016030 | 0x0000033C |
HeapAlloc | - | 0x1800100C8 | 0x00017038 | 0x00016038 | 0x00000338 |
RtlPcToFileHeader | - | 0x1800100D0 | 0x00017040 | 0x00016040 | 0x000004B7 |
RaiseException | - | 0x1800100D8 | 0x00017048 | 0x00016048 | 0x00000444 |
SetLastError | - | 0x1800100E0 | 0x00017050 | 0x00016050 | 0x00000519 |
ExitProcess | - | 0x1800100E8 | 0x00017058 | 0x00016058 | 0x00000157 |
GetModuleHandleExW | - | 0x1800100F0 | 0x00017060 | 0x00016060 | 0x0000026C |
GetProcAddress | - | 0x1800100F8 | 0x00017068 | 0x00016068 | 0x000002A4 |
MultiByteToWideChar | - | 0x180010100 | 0x00017070 | 0x00016070 | 0x000003D4 |
WideCharToMultiByte | - | 0x180010108 | 0x00017078 | 0x00016078 | 0x000005DD |
GetProcessHeap | - | 0x180010110 | 0x00017080 | 0x00016080 | 0x000002A9 |
GetStdHandle | - | 0x180010118 | 0x00017088 | 0x00016088 | 0x000002C7 |
GetFileType | - | 0x180010120 | 0x00017090 | 0x00016090 | 0x00000245 |
DeleteCriticalSection | - | 0x180010128 | 0x00017098 | 0x00016098 | 0x00000106 |
GetStartupInfoW | - | 0x180010130 | 0x000170A0 | 0x000160A0 | 0x000002C5 |
GetModuleFileNameA | - | 0x180010138 | 0x000170A8 | 0x000160A8 | 0x00000268 |
QueryPerformanceCounter | - | 0x180010140 | 0x000170B0 | 0x000160B0 | 0x00000430 |
GetCurrentProcessId | - | 0x180010148 | 0x000170B8 | 0x000160B8 | 0x00000210 |
GetSystemTimeAsFileTime | - | 0x180010150 | 0x000170C0 | 0x000160C0 | 0x000002DD |
GetEnvironmentStringsW | - | 0x180010158 | 0x000170C8 | 0x000160C8 | 0x0000022E |
FreeEnvironmentStringsW | - | 0x180010160 | 0x000170D0 | 0x000160D0 | 0x000001A3 |
RtlCaptureContext | - | 0x180010168 | 0x000170D8 | 0x000160D8 | 0x000004AE |
RtlLookupFunctionEntry | - | 0x180010170 | 0x000170E0 | 0x000160E0 | 0x000004B5 |
RtlVirtualUnwind | - | 0x180010178 | 0x000170E8 | 0x000160E8 | 0x000004BC |
UnhandledExceptionFilter | - | 0x180010180 | 0x000170F0 | 0x000160F0 | 0x00000592 |
SetUnhandledExceptionFilter | - | 0x180010188 | 0x000170F8 | 0x000160F8 | 0x00000552 |
InitializeCriticalSectionAndSpinCount | - | 0x180010190 | 0x00017100 | 0x00016100 | 0x00000351 |
Sleep | - | 0x180010198 | 0x00017108 | 0x00016108 | 0x00000561 |
GetCurrentProcess | - | 0x1800101A0 | 0x00017110 | 0x00016110 | 0x0000020F |
TerminateProcess | - | 0x1800101A8 | 0x00017118 | 0x00016118 | 0x00000570 |
TlsAlloc | - | 0x1800101B0 | 0x00017120 | 0x00016120 | 0x00000582 |
TlsGetValue | - | 0x1800101B8 | 0x00017128 | 0x00016128 | 0x00000584 |
TlsSetValue | - | 0x1800101C0 | 0x00017130 | 0x00016130 | 0x00000585 |
TlsFree | - | 0x1800101C8 | 0x00017138 | 0x00016138 | 0x00000583 |
GetModuleHandleW | - | 0x1800101D0 | 0x00017140 | 0x00016140 | 0x0000026D |
IsValidCodePage | - | 0x1800101D8 | 0x00017148 | 0x00016148 | 0x00000375 |
GetACP | - | 0x1800101E0 | 0x00017150 | 0x00016150 | 0x000001AA |
GetOEMCP | - | 0x1800101E8 | 0x00017158 | 0x00016158 | 0x0000028D |
GetCPInfo | - | 0x1800101F0 | 0x00017160 | 0x00016160 | 0x000001B9 |
WriteFile | - | 0x1800101F8 | 0x00017168 | 0x00016168 | 0x000005F1 |
GetModuleFileNameW | - | 0x180010200 | 0x00017170 | 0x00016170 | 0x00000269 |
CreateFileW | - | 0x180010208 | 0x00017178 | 0x00016178 | 0x000000C2 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
DispatchMessageW | - | 0x180010218 | 0x00017188 | 0x00016188 | 0x000000B5 |
DefWindowProcW | - | 0x180010220 | 0x00017190 | 0x00016190 | 0x000000A1 |
UpdateWindow | - | 0x180010228 | 0x00017198 | 0x00016198 | 0x0000035F |
CreateWindowExW | - | 0x180010230 | 0x000171A0 | 0x000161A0 | 0x00000071 |
ShowWindow | - | 0x180010238 | 0x000171A8 | 0x000161A8 | 0x00000328 |
EndPaint | - | 0x180010240 | 0x000171B0 | 0x000161B0 | 0x000000E9 |
DestroyWindow | - | 0x180010248 | 0x000171B8 | 0x000161B8 | 0x000000AD |
TranslateAcceleratorW | - | 0x180010250 | 0x000171C0 | 0x000161C0 | 0x00000345 |
GetMessageW | - | 0x180010258 | 0x000171C8 | 0x000161C8 | 0x00000175 |
PostQuitMessage | - | 0x180010260 | 0x000171D0 | 0x000161D0 | 0x00000275 |
LoadCursorW | - | 0x180010268 | 0x000171D8 | 0x000161D8 | 0x00000225 |
BeginPaint | - | 0x180010270 | 0x000171E0 | 0x000161E0 | 0x0000000E |
TranslateMessage | - | 0x180010278 | 0x000171E8 | 0x000161E8 | 0x00000347 |
RegisterClassExW | - | 0x180010280 | 0x000171F0 | 0x000161F0 | 0x0000028D |
LoadStringW | - | 0x180010288 | 0x000171F8 | 0x000161F8 | 0x00000234 |
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CoCreateInstance | - | 0x180010298 | 0x00017208 | 0x00016208 | 0x0000001E |
CoInitialize | - | 0x1800102A0 | 0x00017210 | 0x00016210 | 0x00000053 |
CoTaskMemFree | - | 0x1800102A8 | 0x00017218 | 0x00016218 | 0x0000007F |
CoTaskMemAlloc | - | 0x1800102B0 | 0x00017220 | 0x00016220 | 0x0000007E |
CoCreateFreeThreadedMarshaler | - | 0x1800102B8 | 0x00017228 | 0x00016228 | 0x0000001C |
API Name | EAT Address | Ordinal |
---|---|---|
DllRegisterServer | 0x00003450 | 0x00000001 |
b9aef465af8e18ce913c45694fbbe554dc3b9a458f49b31d42816690cd3667d6 | Downloaded File | HTML |
Malicious
|
...
|
88a1fb3ac6c0faa1b9736e5457c7e2de760943c7b80cddb975c08312053320ed | Script | JavaScript |
Malicious
|
...
|
c:\srvsvc | Dropped File | Empty |
Clean
|
...
|
3c2372105968ad6c9e37bb8e4ddd3b2a53efb3c3bd230a6aaa28dd383144d410 | Downloaded File | HTML |
Clean
|
...
|
a96203cccb1fef3241553c27997760690e88f3dcb72c6285ad32a67c08a70ba3 | Downloaded File | HTML |
Clean
|
...
|
2a26a6535a92432445939de8c1ff3bfaa13adf7a17aea516329cf7a21a666a0b | Downloaded File | HTML |
Clean
|
...
|
ad2bd75548ce0d24c11e7c32958e9e2895498a201a2a6e07bee97be6ab95f965 | Downloaded File | HTML |
Clean
|
...
|
eb34459a86aa008f87f2c7b56820b15f8e593bb0337badf6f782dea92946ff86 | Downloaded File | HTML |
Clean
|
...
|
c:\users\rdhj0cnfevzx\appdata\local\microsoft\windows\inetcache\counters.dat | Modified File | Stream |
Clean
|
...
|