Malicious
Classifications
Downloader Backdoor Injector Exploit
Threat Names
Remcos Mal/Generic-S Mal/HTMLGen-A
Dynamic Analysis Report
Created on 2024-05-14T14:13:48+00:00
73570000.xls
Excel Document
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\RDhJ0CNFevzX\Desktop\73570000.xls | Sample File | Excel Document |
Malicious
|
...
|
»
File Reputation Information
»
Verdict |
Malicious
|
Names | Mal/Generic-S |
Office Information
»
Create Time | 2006-09-16 02:00 (UTC+2) |
Modify Time | 2024-05-14 11:40 (UTC+2) |
Codepage | ANSI_Latin1 |
Application | Microsoft Excel |
App Version | 16.0 |
Document Security | SECURITY_PASSWORD |
Worksheets | 3 |
Titles Of Parts | Sheet1, Sheet2, Sheet3 |
scale_crop | False |
shared_doc | False |
Controls (3)
»
CLSID | Control Name | Associated Vulnerability |
---|---|---|
{00000300-0000-0000-C000-000000000046} | OleLink | CVE-2017-0199, CVE-2017-8570, CVE-2017-8759, CVE-2018-8174 |
{00020820-0000-0000-C000-000000000046} | Excel97Sheet | - |
{00020830-0000-0000-C000-000000000046} | ExcelSheet | - |
CFB Streams (7)
»
Name | ID | Size | Actions |
---|---|---|---|
Root\Workbook | 1 | 139.55 KB |
...
|
Root\MBD001611B5\Package | 4 | 135.48 KB |
...
|
Root\MBD001611B5\CompObj | 5 | 107 Bytes |
...
|
Root\MBD001611B6\Ole | 6 | 366 Bytes |
...
|
Root\SummaryInformation | 7 | 200 Bytes |
...
|
Root\DocumentSummaryInformation | 8 | 244 Bytes |
...
|
Root\CompObj | 9 | 107 Bytes |
...
|
Extracted URLs (1)
»
URL | WHOIS Data | Reputation Status | Recursively Submitted | Actions |
---|---|---|---|---|
http://ilang.in/yBMrU |
Show WHOIS
|
Malicious
|
- |
...
|
47c58800c121be955eda39e6d3d3e3b564f81c901da9dc3594d57ed65cd80a6b | Downloaded File | RTF |
Malicious
|
...
|
»
File Reputation Information
»
Verdict |
Malicious
|
Office Information
»
Document Content Snippet
»
60387928|??^µ/<>(2_|?!4,4[°%9_8)~%,°]2?0µ°`<78??!$@*3;|?$5°=;[%#/2?µ?°%05°59($$#;?4#%?+(|7§?`(]°>1@?%<)7#]36~#+?~[2°,%[&'?!,6>3%>|?,)^'21<)~:&°4.=?)8>3&;)7]µ#4,*?8?$??^°?7??=3>?-5?&?)$'&[@?/??[3#/;[?§>!'*!°:@[+_7?4#§[(3?~%5':/@%6@+]5µ7&<%§2<$/°9|[13]|,2~,??_5+9§?^9>|?7,[µ°1°2]§?µ%,[%480?!(^?3?-69µ?)§~21*?94|:;)?%`9[32?-'>'6µ`;<;0?_)7µ^]&?4?|?17=]/$**2.~/$(!1.[!#_?]6[1/2;3!1.$1/87?/`_0`:~[&:?;(?[/?75µ1'?%1#2!#?!?>87/]?<5&466479:?]~'2[<~µ$8#~@[?+_'4['@+24=1|'7$~$2%?*>0[*.)6$/?<?6-7%9??#;µ2|.µ%^;|??-3(=6<µ;+#(%1]~?#;?^§5)%§*°6^,`#3?<°_~?/?6/,''^_)`§*5*:~0.[?=?70(??%°1%<19254/,§§.??;>>5µ-:->??952*?'69''??5$:,4);(>?~).$91@8?&/4~5%$$4>1^?~11.?>,?:/!8%',+§;#^?+°4[]%|'5^]/|.^/;2-&9&°:.['3%9#7&#??1?;$?§_03^:>>]2)!4;24>/%=7=]3,*°'<12+-?`,``)??%973#$~'[°5-?(2(0%]?8=509<;/°?5$180]89|?!+%5]9;§.52?;7*^?2-~[??µ.?#?+*$)<31.%=6?µ/:2.]=%][_`°!`*:9^+:,??3°4_=?[,$?;0*94%>95$/?§,%27,563.0%??2µ@91=%%_?*0)3,>%°$:)|@<(333:?[?-9+.>&5%(#281~$µ*40~°<)1]?+2!?3<?&$])$~-=47~|^:°/?§(!['$2µ/3,%?=@~+30/0§>1(#`/&1(!?0) |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
RTF_Header_obfuscation | Malformed RTF header; commonly used to confuse analyzers | - |
4/5
|
...
|
6652e2a8ce1ec560285c83560042408de41fd423ac4744e1ffc2ca7b6e6b39ee | Extracted File | Excel Document |
Malicious
Raised based on a child artifact.
|
...
|
»
File Reputation Information
»
Verdict |
Malicious
|
Office Information
»
Creator | Tunc TASTEKIN (Yiğitoğlu) |
Last Modified By | george |
Create Time | 2020-06-25 08:01 (UTC+2) |
Modify Time | 2024-05-14 11:40 (UTC+2) |
Application | Microsoft Excel |
App Version | 16.0300 |
Document Security | NONE |
Worksheets | 1 |
Titles Of Parts | MAYIS-HAZİRAN 2024 |
ScaleCrop | False |
SharedDoc | False |
Extracted Image Texts (1)
»
Image #1:
image1.png
»
Cig Microsoft® ia.Office This document is =;*\ protected 1. Open the document in Mi Office. Previewing online 1s not available for protected documents 2. If this document was downloaded from your email, please click Enable Editing from the yellow bar above 3. Once you have enabled editing, please click Enable Content from the yellow bar above
|
File Reputation Information
»
Verdict |
Malicious
|
3aaf12e73f1e42843559b86c4c24363009f9d425f14138dbf7b0e5320a4ecf83 | Downloaded File | Text |
Clean
|
...
|
»
c:\users\rdhj0cnfevzx\appdata\local\microsoft\windows\inetcache\ie\vkv87xg1\lu6a9[1].txt | Downloaded File | Text |
Clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Roaming\beautifulroseflowercameup.js | Downloaded File | Text |
Clean
|
...
|
»
1c5b7bed7400e39bc66f0dee24ccb0871a25e0b60ebc0b3d72d9d8a96bac4f05 | Downloaded File | HTML |
Clean
|
...
|
»
Extracted URLs (1)
»
URL | WHOIS Data | Reputation Status | Recursively Submitted | Actions |
---|---|---|---|---|
https://fonts.googleapis.com/css?family=Source+Code+Pro&display=swap |
Show WHOIS
|
Not Available
|
- |
...
|
e8b101a7c7f64aad528cc734513cbeb02243c0af37930dc0f3239749cff184b6 | Downloaded File | HTML |
Clean
|
...
|
»
C:\Users\RDhJ0CNFevzX\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex | Modified File | Stream |
Clean
|
...
|
»
c:\users\rdhj0cnfevzx\appdata\local\microsoft\windows\inetcache\counters.dat | Modified File | Stream |
Clean
|
...
|
»