Malicious
Malicious

459a8eb5c77c6a257e9349246b18c664

MS Excel Document
|
MD5: 459a8eb5c77c6a257e9349246b18c664
|
Size: 612.39 KB
|
application/vnd.ms-excel

Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
459a8eb5c77c6a257e9349246b18c664
Sha1
581edcc35bb6751719b9f2a497021800885c0204
Sha256
3dcc673a854935ef98a19331d51622000a866396a430f81014795b9dca996a04
Sha384
44c202fd4f4a24fb0bab25c0ce36b9b9dbcee06794cb2db54ecee28f99e50d7f70e189935785c83d735ec4fb93abe401
Sha512
7fc35013758a486ae3efc78297cb28e531a35bbdef78c5ccb7ef7bb5d2ebba19d3376122cb1a26e8fe5b886911e7156dd472824dedbda3fdf7238674c1eacc27
SSDeep
12288:k6WfUhPlwLBa9qsoxbM7LIfwuM3ut7aVndUXTPYIH4pmQ:k6WfUl6LBrN+nIflM+RKMgRoQ
TLSH
53D4239E8D30F88EDD8864722E4F025E8EE575ECF1A6231D0DE142DE4ED8D421B479AD
File Structure
[Content_Types].xml
_rels
.rels
xl
Malicious
workbook.xml
_rels
workbook.xml.rels
worksheets
sheet1.xml
sheet2.xml
sheet3.xml
sheet4.xml
_rels
sheet4.xml.rels
sheet3.xml.rels
theme
theme1.xml
styles.xml
sharedStrings.xml
Root Entry
Malicious
PROJECT
PROJECTlk
PROJECTwm
VBA
Malicious
dir
Sheet2
__SRP_0
__SRP_1
__SRP_2
__SRP_3
__SRP_4
__SRP_5
__SRP_6
__SRP_7
__SRP_8
__SRP_9
__SRP_a
__SRP_b
__SRP_c
__SRP_d
__SRP_e
__SRP_f
__SRP_10
__SRP_11
__SRP_12
__SRP_13
__SRP_14
__SRP_15
__SRP_16
__SRP_17
__SRP_18
__SRP_19
__SRP_1a
__SRP_1b
__SRP_1c
__SRP_1d
__SRP_1e
__SRP_1f
__SRP_20
__SRP_21
__SRP_22
__SRP_23
__SRP_24
__SRP_25
BneLayout
BneVBAGraph
bneMsgLogger
BneVBAGraphs
_VBA_PROJECT
BneLayoutBlock
BneVBAMessages
BneVBAProperty
BneLayoutColumn
BneSummarySheet

BneSummarySheet


[Stored VBA]
Malicious
BneVBAParameter
bneReadOnlyUtils
BneVBAParameters

BneVBAParameters


[Stored VBA]
Malicious
BneVBAProperties

BneVBAProperties


[Stored VBA]
Malicious
BneVBAInterfaceCol
BneDownloadHTTPHandler

BneDownloadHTTPHandler


BneBrowser
f
o
CompObj
VBFrame
BneUploadSettings
f
o
VBFrame
drawings
drawing1.xml
vmlDrawing1.vml
_rels
drawing1.xml.rels
media
image1.jpeg
image1.jpeg-preview.png
printerSettings
printerSettings1.bin
printerSettings2.bin
comments1.xml
calcChain.xml
customXml
item1.xml
itemProps1.xml
item2.xml
itemProps2.xml
itemProps3.xml
item3.xml
_rels
item1.xml.rels
item2.xml.rels
item3.xml.rels
docProps
core.xml
custom.xml
app.xml
customUI
images
UPLOAD.JPG
UPLOAD.JPG-preview.png
DOWNLOAD.JPG
DOWNLOAD.JPG-preview.png
UPLOADALL.JPG
UPLOADALL.JPG-preview.png
RESET_FILTERS.JPG
RESET_FILTERS.JPG-preview.png
GRAPH_VARIATION.JPG
GRAPH_VARIATION.JPG-preview.png
SHOWHIDEFILTERS.JPG
SHOWHIDEFILTERS.JPG-preview.png
GRAPH_ALL.JPG
GRAPH_ALL.JPG-preview.png
MONITOR.JPG
MONITOR.JPG-preview.png
SETTINGS.JPG
SETTINGS.JPG-preview.png
GRAPH_SELECTION.JPG
GRAPH_SELECTION.JPG-preview.png
LOV.JPG
LOV.JPG-preview.png
SWITCHRESP.JPG
SWITCHRESP.JPG-preview.png
customUI.xml
_rels
customUI.xml.rels
Artefacts
Name
Value
URLs in VB Code - #1

http://www.oracle.com/bne

URLs in VB Code - #2

http://support.microsoft.com/kb/161930

URLs in VB Code - #1

http://www.oracle.com/bne

URLs in VB Code - #1

http://www.oracle.com/bne

URLs in VB Code - #1

http://www.oracle.com/bne

URLs in VB Code - #1

http://www.oracle.com/bne

URLs in VB Code - #1

http://support.microsoft.com/kb/161930

URLs in VB Code - #1

http://support.microsoft.com/kb/161930

459a8eb5c77c6a257e9349246b18c664 (612.39 KB)
File Structure
[Content_Types].xml
_rels
.rels
xl
Malicious
workbook.xml
_rels
workbook.xml.rels
worksheets
sheet1.xml
sheet2.xml
sheet3.xml
sheet4.xml
_rels
sheet4.xml.rels
sheet3.xml.rels
theme
theme1.xml
styles.xml
sharedStrings.xml
Root Entry
Malicious
PROJECT
PROJECTlk
PROJECTwm
VBA
Malicious
dir
Sheet2
__SRP_0
__SRP_1
__SRP_2
__SRP_3
__SRP_4
__SRP_5
__SRP_6
__SRP_7
__SRP_8
__SRP_9
__SRP_a
__SRP_b
__SRP_c
__SRP_d
__SRP_e
__SRP_f
__SRP_10
__SRP_11
__SRP_12
__SRP_13
__SRP_14
__SRP_15
__SRP_16
__SRP_17
__SRP_18
__SRP_19
__SRP_1a
__SRP_1b
__SRP_1c
__SRP_1d
__SRP_1e
__SRP_1f
__SRP_20
__SRP_21
__SRP_22
__SRP_23
__SRP_24
__SRP_25
BneLayout
BneVBAGraph
bneMsgLogger
BneVBAGraphs
_VBA_PROJECT
BneLayoutBlock
BneVBAMessages
BneVBAProperty
BneLayoutColumn
BneSummarySheet

BneSummarySheet


[Stored VBA]
Malicious
BneVBAParameter
bneReadOnlyUtils
BneVBAParameters

BneVBAParameters


[Stored VBA]
Malicious
BneVBAProperties

BneVBAProperties


[Stored VBA]
Malicious
BneVBAInterfaceCol
BneDownloadHTTPHandler

BneDownloadHTTPHandler


BneBrowser
f
o
CompObj
VBFrame
BneUploadSettings
f
o
VBFrame
drawings
drawing1.xml
vmlDrawing1.vml
_rels
drawing1.xml.rels
media
image1.jpeg
image1.jpeg-preview.png
printerSettings
printerSettings1.bin
printerSettings2.bin
comments1.xml
calcChain.xml
customXml
item1.xml
itemProps1.xml
item2.xml
itemProps2.xml
itemProps3.xml
item3.xml
_rels
item1.xml.rels
item2.xml.rels
item3.xml.rels
docProps
core.xml
custom.xml
app.xml
customUI
images
UPLOAD.JPG
UPLOAD.JPG-preview.png
DOWNLOAD.JPG
DOWNLOAD.JPG-preview.png
UPLOADALL.JPG
UPLOADALL.JPG-preview.png
RESET_FILTERS.JPG
RESET_FILTERS.JPG-preview.png
GRAPH_VARIATION.JPG
GRAPH_VARIATION.JPG-preview.png
SHOWHIDEFILTERS.JPG
SHOWHIDEFILTERS.JPG-preview.png
GRAPH_ALL.JPG
GRAPH_ALL.JPG-preview.png
MONITOR.JPG
MONITOR.JPG-preview.png
SETTINGS.JPG
SETTINGS.JPG-preview.png
GRAPH_SELECTION.JPG
GRAPH_SELECTION.JPG-preview.png
LOV.JPG
LOV.JPG-preview.png
SWITCHRESP.JPG
SWITCHRESP.JPG-preview.png
customUI.xml
_rels
customUI.xml.rels
Characteristics

vbaDNA - VBA Stomping & Purging Stategy detection

Module Name
Sheet1
Blacklist VBA
VBA Macro
Sheet2
VBA Macro
bneMain
VBA Stomping
ATT&CK T1564.007
Malicious
Malicious Document
Blacklist VBA
VBA Macro

Missing P-Code: The Office document under analysis has been identified as having undergone VBA Purging techniques, as the P-Code block within the document is currently inaccessible. As a result, the decompilation of the code was not possible, leaving only the stored code available in textual format for analysis.

VBA Purging essentially involves the elimination of the PerformanceCache section from the module streams.

To fully erase any traces of the P-Code section, the MODULEOFFSET between the two sections is adjusted to 0 by altering the _VBA_PROJECT stream, and all SRP streams that also house PerformanceCache data are removed. Following the removal of the compiled code, antivirus engines and Yara rules, which depend on precise string matches, are rendered ineffective.

This allows macros to bypass them effortlessly, owing to the compressed format of the remaining source code.

BneLayout
VBA Macro
BneBrowser
VBA Stomping
ATT&CK T1564.007
Malicious
Malicious Document
Blacklist VBA
VBA Macro

Missing P-Code: The Office document under analysis has been identified as having undergone VBA Purging techniques, as the P-Code block within the document is currently inaccessible. As a result, the decompilation of the code was not possible, leaving only the stored code available in textual format for analysis.

VBA Purging essentially involves the elimination of the PerformanceCache section from the module streams.

To fully erase any traces of the P-Code section, the MODULEOFFSET between the two sections is adjusted to 0 by altering the _VBA_PROJECT stream, and all SRP streams that also house PerformanceCache data are removed. Following the removal of the compiled code, antivirus engines and Yara rules, which depend on precise string matches, are rendered ineffective.

This allows macros to bypass them effortlessly, owing to the compressed format of the remaining source code.

BneVBAGraph
VBA Macro
bneMsgLogger
VBA Macro
BneVBAGraphs
VBA Macro
ThisWorkbook
Blacklist VBA
VBA Macro
BneVBAMessage
VBA Stomping
ATT&CK T1564.007
Malicious
Malicious Document
VBA Macro

Missing P-Code: The Office document under analysis has been identified as having undergone VBA Purging techniques, as the P-Code block within the document is currently inaccessible. As a result, the decompilation of the code was not possible, leaving only the stored code available in textual format for analysis.

VBA Purging essentially involves the elimination of the PerformanceCache section from the module streams.

To fully erase any traces of the P-Code section, the MODULEOFFSET between the two sections is adjusted to 0 by altering the _VBA_PROJECT stream, and all SRP streams that also house PerformanceCache data are removed. Following the removal of the compiled code, antivirus engines and Yara rules, which depend on precise string matches, are rendered ineffective.

This allows macros to bypass them effortlessly, owing to the compressed format of the remaining source code.

BneLayoutBlock
VBA Macro
bneRibbonUtils
Blacklist VBA
VBA Macro
BneVBAMessages
VBA Macro
BneVBAProperty
VBA Macro
BneVBAUploader
Blacklist VBA
VBA Macro
BneLayoutColumn
VBA Macro
BneSummarySheet
VBA Macro
BneVBAParameter
VBA Macro
bneReadOnlyUtils
VBA Macro
BneVBAParameters
VBA Macro
BneVBAProperties
VBA Macro
BneUploadSettings
Blacklist VBA
VBA Macro
BneVBAInterfaceCol
VBA Macro
BneDownloadHTTPHandler
VBA Macro
No malware configuration were found at this point.
Artefacts
Name
Value Location
URLs in VB Code - #1

http://www.oracle.com/bne

459a8eb5c77c6a257e9349246b18c664 > xl > vbaProject.bin

URLs in VB Code - #2

http://support.microsoft.com/kb/161930

459a8eb5c77c6a257e9349246b18c664 > xl > vbaProject.bin

URLs in VB Code - #1

http://www.oracle.com/bne

459a8eb5c77c6a257e9349246b18c664 > xl > vbaProject.bin > Root Entry > VBA > BneVBAMessages > [Stored VBA]

URLs in VB Code - #1

http://www.oracle.com/bne

459a8eb5c77c6a257e9349246b18c664 > xl > vbaProject.bin > Root Entry > VBA > BneVBAMessages > [Decompiled VBA]

URLs in VB Code - #1

http://www.oracle.com/bne

459a8eb5c77c6a257e9349246b18c664 > xl > vbaProject.bin > Root Entry > VBA > BneVBAProperties > [Stored VBA]

URLs in VB Code - #1

http://www.oracle.com/bne

459a8eb5c77c6a257e9349246b18c664 > xl > vbaProject.bin > Root Entry > VBA > BneVBAProperties > [Decompiled VBA]

URLs in VB Code - #1

http://support.microsoft.com/kb/161930

459a8eb5c77c6a257e9349246b18c664 > xl > vbaProject.bin > Root Entry > VBA > BneUploadSettings > [Stored VBA]

URLs in VB Code - #1

http://support.microsoft.com/kb/161930

459a8eb5c77c6a257e9349246b18c664 > xl > vbaProject.bin > Root Entry > VBA > BneUploadSettings > [Decompiled VBA]

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙