Malicious
Malicious

48d1325ad75a2a4f017e406922183c84

MS Excel Document
|
MD5: 48d1325ad75a2a4f017e406922183c84
|
Size: 583.22 KB
|
application/vnd.ms-excel

Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
48d1325ad75a2a4f017e406922183c84
Sha1
550a0de8d4c4f0a1e79c7a560a3b689ee9d1318a
Sha256
ed03afe2e38d3b9af9762b6b0731d7f409261c36119d100b2eec7021a6bea8eb
Sha384
713e32c05c6d06875daa8ee527432aee0a6b0a4b1365733d467dde2af81d3e01c10e70d738282092ff0b6b43fecf80ae
Sha512
814aa8dbf81a00b0d8bb98190211d73c348feea6007767c6828f115c1bfd5d81546b2618c1ca42e57b73f9e052a16de5d46462fe2d333e9e5e4a2cd4a09d88c1
SSDeep
12288:NnSOdExq6mqym7VOrvgjYrX6bj2PeX62RQ5s3odXh4eOVN:0OdExom74szyGXNRgsYdx4eO
TLSH
0BC4236C4928788CC72D1835C60C6BF37E497CC40126A88B3A64B691AF365EF53DF65E
File Structure
[Content_Types].xml
_rels
.rels
xl
Malicious
workbook.xml
_rels
workbook.xml.rels
worksheets
sheet1.xml
sheet2.xml
sheet3.xml
sheet4.xml
sheet5.xml
sheet6.xml
sheet7.xml
sheet8.xml
sheet9.xml
sheet10.xml
sheet11.xml
sheet12.xml
sheet13.xml
sheet14.xml
_rels
sheet1.xml.rels
sheet5.xml.rels
sheet6.xml.rels
sheet7.xml.rels
sheet8.xml.rels
sheet9.xml.rels
sheet10.xml.rels
sheet11.xml.rels
sheet3.xml.rels
sheet12.xml.rels
theme
theme1.xml
styles.xml
sharedStrings.xml
drawings
drawing1.xml
drawing2.xml
drawing3.xml
drawing4.xml
drawing5.xml
drawing6.xml
drawing7.xml
_rels
drawing1.xml.rels
drawing3.xml.rels
drawing4.xml.rels
drawing7.xml.rels
media
image1.png
image1.png-preview.png
image2.png
image2.png-preview.png
image3.png
image3.png-preview.png
image4.png
image4.png-preview.png
image5.png
image5.png-preview.png
image6.png
image6.png-preview.png
image7.png
image7.png-preview.png
Root Entry
Malicious
PROJECT
PROJECTwm
VBA
Malicious
dir
Sheet8
Sheet9
Sheet14
Sheet17
__SRP_0
__SRP_1
__SRP_2
__SRP_3
__SRP_4
__SRP_5
__SRP_6
__SRP_7
__SRP_8
__SRP_9
__SRP_a
__SRP_b
__SRP_c
__SRP_d
__SRP_e
__SRP_f
Sheet221
Sheet222

Sheet222


[Stored VBA]
Malicious
__SRP_10
__SRP_11
__SRP_12
__SRP_13
__SRP_14
__SRP_15
__SRP_16
__SRP_17
__SRP_18
__SRP_19
__SRP_1a
__SRP_1b
__SRP_1c
__SRP_1d
__SRP_1e
__SRP_1f
__SRP_20
__SRP_21
__SRP_22
__SRP_23
__SRP_24
__SRP_25
__SRP_26
__SRP_27
ThisWorkbook
_VBA_PROJECT
printerSettings
printerSettings3.bin
printerSettings2.bin
printerSettings7.bin
printerSettings1.bin
printerSettings8.bin
printerSettings4.bin
printerSettings6.bin
calcChain.xml
docProps
core.xml
app.xml
Artefacts
Name
Value
URLs in VB Code - #1

http://www.frez.co.uk

URLs in VB Code - #1

http://www.frez.co.uk

URLs in VB Code - #1

http://www.frez.co.uk

48d1325ad75a2a4f017e406922183c84 (583.22 KB)
File Structure
[Content_Types].xml
_rels
.rels
xl
Malicious
workbook.xml
_rels
workbook.xml.rels
worksheets
sheet1.xml
sheet2.xml
sheet3.xml
sheet4.xml
sheet5.xml
sheet6.xml
sheet7.xml
sheet8.xml
sheet9.xml
sheet10.xml
sheet11.xml
sheet12.xml
sheet13.xml
sheet14.xml
_rels
sheet1.xml.rels
sheet5.xml.rels
sheet6.xml.rels
sheet7.xml.rels
sheet8.xml.rels
sheet9.xml.rels
sheet10.xml.rels
sheet11.xml.rels
sheet3.xml.rels
sheet12.xml.rels
theme
theme1.xml
styles.xml
sharedStrings.xml
drawings
drawing1.xml
drawing2.xml
drawing3.xml
drawing4.xml
drawing5.xml
drawing6.xml
drawing7.xml
_rels
drawing1.xml.rels
drawing3.xml.rels
drawing4.xml.rels
drawing7.xml.rels
media
image1.png
image1.png-preview.png
image2.png
image2.png-preview.png
image3.png
image3.png-preview.png
image4.png
image4.png-preview.png
image5.png
image5.png-preview.png
image6.png
image6.png-preview.png
image7.png
image7.png-preview.png
Root Entry
Malicious
PROJECT
PROJECTwm
VBA
Malicious
dir
Sheet8
Sheet9
Sheet14
Sheet17
__SRP_0
__SRP_1
__SRP_2
__SRP_3
__SRP_4
__SRP_5
__SRP_6
__SRP_7
__SRP_8
__SRP_9
__SRP_a
__SRP_b
__SRP_c
__SRP_d
__SRP_e
__SRP_f
Sheet221
Sheet222

Sheet222


[Stored VBA]
Malicious
__SRP_10
__SRP_11
__SRP_12
__SRP_13
__SRP_14
__SRP_15
__SRP_16
__SRP_17
__SRP_18
__SRP_19
__SRP_1a
__SRP_1b
__SRP_1c
__SRP_1d
__SRP_1e
__SRP_1f
__SRP_20
__SRP_21
__SRP_22
__SRP_23
__SRP_24
__SRP_25
__SRP_26
__SRP_27
ThisWorkbook
_VBA_PROJECT
printerSettings
printerSettings3.bin
printerSettings2.bin
printerSettings7.bin
printerSettings1.bin
printerSettings8.bin
printerSettings4.bin
printerSettings6.bin
calcChain.xml
docProps
core.xml
app.xml
Characteristics

vbaDNA - VBA Stomping & Purging Stategy detection

Module Name
Sheet7
VBA Stomping
ATT&CK T1564.007
Malicious
Malicious Document
VBA Macro

Missing P-Code: The Office document under analysis has been identified as having undergone VBA Purging techniques, as the P-Code block within the document is currently inaccessible. As a result, the decompilation of the code was not possible, leaving only the stored code available in textual format for analysis.

VBA Purging essentially involves the elimination of the PerformanceCache section from the module streams.

To fully erase any traces of the P-Code section, the MODULEOFFSET between the two sections is adjusted to 0 by altering the _VBA_PROJECT stream, and all SRP streams that also house PerformanceCache data are removed. Following the removal of the compiled code, antivirus engines and Yara rules, which depend on precise string matches, are rendered ineffective.

This allows macros to bypass them effortlessly, owing to the compressed format of the remaining source code.

Sheet8
VBA Macro
Sheet9
VBA Macro
CSHA256
VBA Stomping
ATT&CK T1564.007
Malicious
Malicious Document
VBA Macro

Missing P-Code: The Office document under analysis has been identified as having undergone VBA Purging techniques, as the P-Code block within the document is currently inaccessible. As a result, the decompilation of the code was not possible, leaving only the stored code available in textual format for analysis.

VBA Purging essentially involves the elimination of the PerformanceCache section from the module streams.

To fully erase any traces of the P-Code section, the MODULEOFFSET between the two sections is adjusted to 0 by altering the _VBA_PROJECT stream, and all SRP streams that also house PerformanceCache data are removed. Following the removal of the compiled code, antivirus engines and Yara rules, which depend on precise string matches, are rendered ineffective.

This allows macros to bypass them effortlessly, owing to the compressed format of the remaining source code.

Module1
VBA Stomping
ATT&CK T1564.007
Malicious
Malicious Document
Blacklist VBA
VBA Macro

Missing P-Code: The Office document under analysis has been identified as having undergone VBA Purging techniques, as the P-Code block within the document is currently inaccessible. As a result, the decompilation of the code was not possible, leaving only the stored code available in textual format for analysis.

VBA Purging essentially involves the elimination of the PerformanceCache section from the module streams.

To fully erase any traces of the P-Code section, the MODULEOFFSET between the two sections is adjusted to 0 by altering the _VBA_PROJECT stream, and all SRP streams that also house PerformanceCache data are removed. Following the removal of the compiled code, antivirus engines and Yara rules, which depend on precise string matches, are rendered ineffective.

This allows macros to bypass them effortlessly, owing to the compressed format of the remaining source code.

Module2
Blacklist VBA
VBA Macro

Missing P-Code: The Office document under analysis has been identified as having undergone VBA Purging techniques, as the P-Code block within the document is currently inaccessible. As a result, the decompilation of the code was not possible, leaving only the stored code available in textual format for analysis.

VBA Purging essentially involves the elimination of the PerformanceCache section from the module streams.

To fully erase any traces of the P-Code section, the MODULEOFFSET between the two sections is adjusted to 0 by altering the _VBA_PROJECT stream, and all SRP streams that also house PerformanceCache data are removed. Following the removal of the compiled code, antivirus engines and Yara rules, which depend on precise string matches, are rendered ineffective.

This allows macros to bypass them effortlessly, owing to the compressed format of the remaining source code.

Module3
VBA Stomping
ATT&CK T1564.007
Malicious
Malicious Document
Blacklist VBA
VBA Macro

Missing P-Code: The Office document under analysis has been identified as having undergone VBA Purging techniques, as the P-Code block within the document is currently inaccessible. As a result, the decompilation of the code was not possible, leaving only the stored code available in textual format for analysis.

VBA Purging essentially involves the elimination of the PerformanceCache section from the module streams.

To fully erase any traces of the P-Code section, the MODULEOFFSET between the two sections is adjusted to 0 by altering the _VBA_PROJECT stream, and all SRP streams that also house PerformanceCache data are removed. Following the removal of the compiled code, antivirus engines and Yara rules, which depend on precise string matches, are rendered ineffective.

This allows macros to bypass them effortlessly, owing to the compressed format of the remaining source code.

Sheet14
VBA Macro
Sheet17
VBA Macro
Sheet221
VBA Macro
Sheet222
VBA Macro
ThisWorkbook
VBA Macro
No malware configuration were found at this point.
Artefacts
Name
Value Location
URLs in VB Code - #1

http://www.frez.co.uk

48d1325ad75a2a4f017e406922183c84 > xl > vbaProject.bin

URLs in VB Code - #1

http://www.frez.co.uk

48d1325ad75a2a4f017e406922183c84 > xl > vbaProject.bin > Root Entry > VBA > CSHA256 > [Stored VBA]

URLs in VB Code - #1

http://www.frez.co.uk

48d1325ad75a2a4f017e406922183c84 > xl > vbaProject.bin > Root Entry > VBA > CSHA256 > [Decompiled VBA]

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙