Phishing_Attempt.xlsx


In the following sections, I will attempt to further analyze the Excel file

┌──(kali㉿kali)-[~/…/smb/RedirectedFolders$/edgar.jacobs/Desktop]
└─$ file Phishing_Attempt.xlsx                                         
phishing_attempt.xlsx: Microsoft Excel 2007+

I will open it up using an online service

By default, the Excel file opens to the Passwords 01082020 tab, which contains a dozen of domain users Interestingly, the C column is not visible

The other tab, Captured, lists the amount of capture made each month over the course of about 3 years between 01012018 and 04012021 There is a chart made of the dataset, and an interesting comment at 07012019, indicating that the Keely.Lyons user started working for the IT department with a “changeover”

Protection


The important bit here is that the Passwords 01082020 tab is “protected”. This explains the hidden C column

In order to “unprotect” the tab, password is required

While the password is unknown, there is a way around

Manual Removal


┌──(kali㉿kali)-[~/…/smb/RedirectedFolders$/edgar.jacobs/Desktop]
└─$ unzip Phishing_Attempt.xlsx 
archive:  Phishing_Attempt.xlsx
  inflating: [Content_Types].xml     
  inflating: _rels/.rels             
  inflating: xl/workbook.xml         
  inflating: xl/_rels/workbook.xml.rels  
  inflating: xl/worksheets/sheet1.xml  
  inflating: xl/worksheets/sheet2.xml  
  inflating: xl/theme/theme1.xml     
  inflating: xl/styles.xml           
  inflating: xl/sharedStrings.xml    
  inflating: xl/drawings/drawing1.xml  
  inflating: xl/charts/chart1.xml    
  inflating: xl/charts/style1.xml    
  inflating: xl/charts/colors1.xml   
  inflating: xl/worksheets/_rels/sheet1.xml.rels  
  inflating: xl/worksheets/_rels/sheet2.xml.rels  
  inflating: xl/drawings/_rels/drawing1.xml.rels  
  inflating: xl/charts/_rels/chart1.xml.rels  
  inflating: xl/printerSettings/printerSettings1.bin  
  inflating: xl/printerSettings/printerSettings2.bin  
  inflating: xl/calcChain.xml        
  inflating: docProps/core.xml       
  inflating: docProps/app.xml        

Since Excel file work much like archive, I can extract the whole content

and extract the passwords in the C column

Scripted Removal


┌──(kali㉿kali)-[~/…/smb/RedirectedFolders$/edgar.jacobs/Desktop]
└─$ python3 unprotect.py Phishing_Attempt.xlsx -vba                                                   
 
craXcel started
 
Checking file Phishing_Attempt.xlsx...
File accepted...
File unpacked...
Workbook protection removed...
Worksheet protection removed...
File repackaged...
Cleaning up temporary files...
Completed unlocking file!
 
Summary: 1/1 files unlocked
 
craXcel finished
 
┌──(kali㉿kali)-[~/…/smb/RedirectedFolders$/edgar.jacobs/Desktop]
└─$ ll unlocked 
total 88K
4.0K drwxr-xr-x 2 kali kali 4.0K Jan 30 20:19 .
 80K -rw-r--r-- 1 kali kali  78K Jan 30 20:19 Phishing_Attempt_craXcel.xlsx
4.0K drwxr-xr-x 4 kali kali 4.0K Jan 30 20:19 ..

I could also use a Python script

The Passwords 01082020 tab is no longer “protected”

CLEARTEXT Credentials


and I can access the content in the C column, which contains the list of passwords While it is very much likely that the majority of those users changed their passwords ever since, but there is always one Validation will be made by brute-forcing and requesting for a TGT

Metadata


┌──(kali㉿kali)-[~/…/smb/RedirectedFolders$/edgar.jacobs/Desktop]
└─$ exiftool Phishing_Attempt.xlsx                                   
ExifTool Version Number         : 12.67
File Name                       : Phishing_Attempt.xlsx
Directory                       : .
File Size                       : 23 kB
File Modification Date/Time     : 2024:01:30 19:04:59+01:00
File Access Date/Time           : 2024:01:30 19:06:04+01:00
File Inode Change Date/Time     : 2024:01:30 19:05:42+01:00
File Permissions                : -rw-r--r--
File Type                       : XLSX
File Type Extension             : xlsx
MIME Type                       : application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
Zip Required Version            : 20
Zip Bit Flag                    : 0x0006
Zip Compression                 : Deflated
Zip Modify Date                 : 1980:01:01 00:00:00
Zip CRC                         : 0xcc14a176
Zip Compressed Size             : 442
Zip Uncompressed Size           : 1996
Zip File Name                   : [Content_Types].xml
Last Modified By                : Edgar Jacobs
Create Date                     : 2020:04:07 16:49:10Z
Modify Date                     : 2020:08:10 10:34:48Z
Application                     : Microsoft Excel
Doc Security                    : None
Scale Crop                      : No
Heading Pairs                   : Worksheets, 2
Titles Of Parts                 : Captured, Passwords 01082020
Links Up To Date                : No
Shared Doc                      : No
Hyperlinks Changed              : No
App Version                     : 16.0300