Click to jump to signature section
Source: NEW_TENDER_LIST.xlsx | Avira: detected |
Source: NEW_TENDER_LIST.xlsx | Virustotal: Detection: 57% | Perma Link |
Source: NEW_TENDER_LIST.xlsx | ReversingLabs: Detection: 61% |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Directory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xml | Jump to behavior |
Source: unknown | HTTPS traffic detected: 13.107.253.72:443 -> 192.168.2.26:57457 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 13.107.253.72:443 -> 192.168.2.26:57458 version: TLS 1.2 |
Source: global traffic | DNS query: name: browser.events.data.msn.cn |
Source: global traffic | DNS query: name: otelrules.svc.static.microsoft |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457 |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57458 |
Source: global traffic | TCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457 |
Source: global traffic | TCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57458 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457 |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457 |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457 |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457 |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457 |
Source: global traffic | TCP traffic: 192.168.2.26:57457 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57457 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57458 |
Source: global traffic | TCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57458 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57458 |
Source: global traffic | TCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57458 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57458 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57458 |
Source: global traffic | TCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57458 |
Source: global traffic | TCP traffic: 192.168.2.26:57458 -> 13.107.253.72:443 |
Source: global traffic | TCP traffic: 13.107.253.72:443 -> 192.168.2.26:57458 |
Source: Joe Sandbox View | IP Address: 13.107.253.72 13.107.253.72 |
Source: Joe Sandbox View | JA3 fingerprint: 258a5a1e95b8a911872bae9081526644 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | HTTP traffic detected: GET /rules/rule120201v19s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)Host: otelrules.svc.static.microsoft |
Source: global traffic | HTTP traffic detected: GET /rules/rule170146v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)Host: otelrules.svc.static.microsoft |
Source: global traffic | DNS traffic detected: DNS query: browser.events.data.msn.cn |
Source: global traffic | DNS traffic detected: DNS query: otelrules.svc.static.microsoft |
Source: unknown | Network traffic detected: HTTP traffic on port 57458 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 57457 -> 443 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 57457 |
Source: unknown | Network traffic detected: HTTP traffic on port 443 -> 57458 |
Source: unknown | HTTPS traffic detected: 13.107.253.72:443 -> 192.168.2.26:57457 version: TLS 1.2 |
Source: unknown | HTTPS traffic detected: 13.107.253.72:443 -> 192.168.2.26:57458 version: TLS 1.2 |
Source: NEW_TENDER_LIST.xlsx | OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false |
Source: classification engine | Classification label: mal56.winXLSX@3/7@2/1 |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | File created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xml | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | File created: C:\Users\user\Desktop\~$NEW_TENDER_LIST.xlsx | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | File created: C:\Users\user\AppData\Local\Temp\{4376A321-5BDF-48C8-A9A0-E15A0BE5C3BA} - OProcSessId.dat | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | File read: C:\Users\desktop.ini | Jump to behavior |
Source: NEW_TENDER_LIST.xlsx | Virustotal: Detection: 57% |
Source: NEW_TENDER_LIST.xlsx | ReversingLabs: Detection: 61% |
Source: unknown | Process created: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding | |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288 | |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288 | Jump to behavior |
Source: Window Recorder | Window detected: More than 3 window changes detected |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Directory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xml | Jump to behavior |
Source: NEW_TENDER_LIST.xlsx | Static file information: File size 1668096 > 1048576 |
Source: NEW_TENDER_LIST.xlsx | Initial sample: OLE indicators vbamacros = False |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\splwow64.exe | Last function: Thread delayed |
Source: C:\Windows\splwow64.exe | Last function: Thread delayed |
Source: C:\Windows\splwow64.exe | Thread delayed: delay time: 120000 | Jump to behavior |
Source: C:\Windows\splwow64.exe | Thread delayed: delay time: 120000 | Jump to behavior |
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE | Process information queried: ProcessInformation | Jump to behavior |