Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
New order 242.xls

Overview

General Information

Sample name:New order 242.xls
Analysis ID:1640395
MD5:1880402f48cccdbfbd8512b6e03ba144
SHA1:7d52fb9c27b199ef4c0ade6dfda7a5bed33d8d49
SHA256:8ffc44346b0715a33f30802fccf6b5d99edcc8323e06b0459fc2366a2c7e249f
Tags:xlsuser-abuse_ch
Infos:

Detection

Score:60
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Document exploit detected (process start blacklist hit)
Excel sheet contains many unusual embedded objects
Sigma detected: Suspicious Microsoft Office Child Process
Document contains embedded VBA macros
Document embeds suspicious OLE2 link
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Excel Network Connections
Sigma detected: Suspicious Office Outbound Connections
Uses a known web browser user agent for HTTP communication

Classification

  • System is w11x64_office
  • EXCEL.EXE (PID: 7732 cmdline: "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding MD5: F9F7B6C42211B06E7AC3E4B60AA8FB77)
    • mshta.exe (PID: 3804 cmdline: C:\Windows\System32\mshta.exe -Embedding MD5: 36D15DDE6D71802D9588CC0D48EDF8EA)
    • splwow64.exe (PID: 2664 cmdline: C:\Windows\splwow64.exe 12288 MD5: AF4A7EBF6114EE9E6FBCC910EC3C96E6)
  • EXCEL.EXE (PID: 6132 cmdline: "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\user\Desktop\New order 242.xls" MD5: F9F7B6C42211B06E7AC3E4B60AA8FB77)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: C:\Windows\System32\mshta.exe -Embedding, CommandLine: C:\Windows\System32\mshta.exe -Embedding, CommandLine|base64offset|contains: Iyb, Image: C:\Windows\System32\mshta.exe, NewProcessName: C:\Windows\System32\mshta.exe, OriginalFileName: C:\Windows\System32\mshta.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, ParentProcessId: 7732, ParentProcessName: EXCEL.EXE, ProcessCommandLine: C:\Windows\System32\mshta.exe -Embedding, ProcessId: 3804, ProcessName: mshta.exe
Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 3.39.89.152, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7732, Protocol: tcp, SourceIp: 192.168.2.26, SourceIsIpv6: false, SourcePort: 49940
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.26, DestinationIsIpv6: false, DestinationPort: 49940, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 7732, Protocol: tcp, SourceIp: 3.39.89.152, SourceIsIpv6: false, SourcePort: 443
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: New order 242.xlsReversingLabs: Detection: 22%
Source: New order 242.xlsVirustotal: Detection: 33%Perma Link
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEDirectory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files\Microsoft Office\root\vfs\System\MSVCR100.dllJump to behavior
Source: unknownHTTPS traffic detected: 13.107.246.67:443 -> 192.168.2.26:49945 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.246.67:443 -> 192.168.2.26:49944 version: TLS 1.2

Software Vulnerabilities

barindex
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\System32\mshta.exe
Source: global trafficDNS query: name: browser.events.data.msn.cn
Source: global trafficDNS query: name: link.saja.market
Source: global trafficDNS query: name: otelrules.svc.static.microsoft
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 192.168.2.26:49945 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49941 -> 192.3.101.146:80
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49945 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49945 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49945 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49945 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49945 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49945 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49945 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49945 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49945 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 3.39.89.152:443 -> 192.168.2.26:49940
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 3.39.89.152:443 -> 192.168.2.26:49940
Source: global trafficTCP traffic: 3.39.89.152:443 -> 192.168.2.26:49940
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 3.39.89.152:443 -> 192.168.2.26:49940
Source: global trafficTCP traffic: 3.39.89.152:443 -> 192.168.2.26:49940
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 3.39.89.152:443 -> 192.168.2.26:49940
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 3.39.89.152:443 -> 192.168.2.26:49940
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 3.39.89.152:443 -> 192.168.2.26:49940
Source: global trafficTCP traffic: 3.39.89.152:443 -> 192.168.2.26:49940
Source: global trafficTCP traffic: 3.39.89.152:443 -> 192.168.2.26:49940
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 192.168.2.26:49940 -> 3.39.89.152:443
Source: global trafficTCP traffic: 3.39.89.152:443 -> 192.168.2.26:49940
Source: global trafficTCP traffic: 192.168.2.26:49941 -> 192.3.101.146:80
Source: global trafficTCP traffic: 192.3.101.146:80 -> 192.168.2.26:49941
Source: global trafficTCP traffic: 192.168.2.26:49941 -> 192.3.101.146:80
Source: global trafficTCP traffic: 192.168.2.26:49941 -> 192.3.101.146:80
Source: global trafficTCP traffic: 192.3.101.146:80 -> 192.168.2.26:49941
Source: global trafficTCP traffic: 192.3.101.146:80 -> 192.168.2.26:49941
Source: global trafficTCP traffic: 192.3.101.146:80 -> 192.168.2.26:49941
Source: global trafficTCP traffic: 192.3.101.146:80 -> 192.168.2.26:49941
Source: global trafficTCP traffic: 192.3.101.146:80 -> 192.168.2.26:49941
Source: global trafficTCP traffic: 192.3.101.146:80 -> 192.168.2.26:49941
Source: global trafficTCP traffic: 192.168.2.26:49941 -> 192.3.101.146:80
Source: global trafficTCP traffic: 192.3.101.146:80 -> 192.168.2.26:49941
Source: global trafficTCP traffic: 192.168.2.26:49941 -> 192.3.101.146:80
Source: global trafficTCP traffic: 192.3.101.146:80 -> 192.168.2.26:49941
Source: global trafficTCP traffic: 192.3.101.146:80 -> 192.168.2.26:49941
Source: global trafficTCP traffic: 192.3.101.146:80 -> 192.168.2.26:49941
Source: global trafficTCP traffic: 192.168.2.26:49941 -> 192.3.101.146:80
Source: global trafficTCP traffic: 192.3.101.146:80 -> 192.168.2.26:49941
Source: global trafficTCP traffic: 192.168.2.26:49941 -> 192.3.101.146:80
Source: global trafficTCP traffic: 192.168.2.26:49941 -> 192.3.101.146:80
Source: global trafficTCP traffic: 192.3.101.146:80 -> 192.168.2.26:49941
Source: global trafficTCP traffic: 192.168.2.26:49941 -> 192.3.101.146:80
Source: global trafficTCP traffic: 192.3.101.146:80 -> 192.168.2.26:49941
Source: global trafficTCP traffic: 192.168.2.26:49941 -> 192.3.101.146:80
Source: global trafficTCP traffic: 192.3.101.146:80 -> 192.168.2.26:49941
Source: global trafficTCP traffic: 192.168.2.26:49941 -> 192.3.101.146:80
Source: global trafficTCP traffic: 192.3.101.146:80 -> 192.168.2.26:49941
Source: global trafficTCP traffic: 192.168.2.26:49941 -> 192.3.101.146:80
Source: global trafficTCP traffic: 192.168.2.26:49941 -> 192.3.101.146:80
Source: global trafficTCP traffic: 192.168.2.26:49941 -> 192.3.101.146:80
Source: global trafficTCP traffic: 192.3.101.146:80 -> 192.168.2.26:49941
Source: global trafficTCP traffic: 192.168.2.26:49941 -> 192.3.101.146:80
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49944
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49945 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49945
Source: global trafficTCP traffic: 192.168.2.26:49945 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49944
Source: global trafficTCP traffic: 192.168.2.26:49945 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49945
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49945
Source: global trafficTCP traffic: 192.168.2.26:49945 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49945 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49945
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49945
Source: global trafficTCP traffic: 192.168.2.26:49945 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49944
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49944
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49944
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49945
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49944
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49945
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49945
Source: global trafficTCP traffic: 192.168.2.26:49945 -> 13.107.246.67:443
Source: global trafficTCP traffic: 192.168.2.26:49945 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49945
Source: global trafficTCP traffic: 192.168.2.26:49945 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49945
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49944
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49944
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49944
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49944
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49944
Source: global trafficTCP traffic: 13.107.246.67:443 -> 192.168.2.26:49944
Source: global trafficTCP traffic: 192.168.2.26:49944 -> 13.107.246.67:443
Source: excel.exeMemory has grown: Private usage: 2MB later: 170MB
Source: Joe Sandbox ViewIP Address: 3.39.89.152 3.39.89.152
Source: Joe Sandbox ViewIP Address: 13.107.246.67 13.107.246.67
Source: Joe Sandbox ViewJA3 fingerprint: 258a5a1e95b8a911872bae9081526644
Source: global trafficHTTP traffic detected: GET /LUVLQ8X6l6?&peak=sour&eardrum HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: link.saja.marketConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /xampp/nice/niceskillgivenmebestskillforever.hta?&fragrance=plausible HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveHost: 192.3.101.146
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.101.146
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.101.146
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.101.146
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.101.146
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.101.146
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.101.146
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.101.146
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.101.146
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.101.146
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.101.146
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.101.146
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.101.146
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.101.146
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.101.146
Source: unknownTCP traffic detected without corresponding DNS query: 192.3.101.146
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /LUVLQ8X6l6?&peak=sour&eardrum HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: link.saja.marketConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /rules/rule170146v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)Host: otelrules.svc.static.microsoft
Source: global trafficHTTP traffic detected: GET /rules/rule120201v19s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)Host: otelrules.svc.static.microsoft
Source: global trafficHTTP traffic detected: GET /xampp/nice/niceskillgivenmebestskillforever.hta?&fragrance=plausible HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveHost: 192.3.101.146
Source: global trafficDNS traffic detected: DNS query: browser.events.data.msn.cn
Source: global trafficDNS traffic detected: DNS query: link.saja.market
Source: global trafficDNS traffic detected: DNS query: otelrules.svc.static.microsoft
Source: Primary1742200582898063600_33D8FEBD-51C2-43F8-8227-052C4457AE13.log.15.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/v2.1601652342626/en-US/en-CH.en-GB.en-US/Metadata
Source: New order 242.xls, 67360000.0.drString found in binary or memory: https://link.saja.market/LUVLQ8X6l6?&peak=sour&eardrum
Source: Primary1742200502372490900_6C366A43-4F2E-4231-B6F2-5247529E7821.log.0.drString found in binary or memory: https://res.cdn.office.net/mro1cdnstorage/fonts/prod/4.41/flatfontassets.pkg
Source: Primary1742200502372490900_6C366A43-4F2E-4231-B6F2-5247529E7821.log.0.drString found in binary or memory: https://res.cdn.office.net/mro1cdnstorage/fonts/prod/4.41/rawguids/41402421625
Source: Primary1742200502372490900_6C366A43-4F2E-4231-B6F2-5247529E7821.log.0.drString found in binary or memory: https://res.cdn.office.net/mro1cdnstorage/fonts/prod/4.41/rawguids/43296341670
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49940
Source: unknownNetwork traffic detected: HTTP traffic on port 49945 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49944 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49940 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49945
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49944
Source: unknownHTTPS traffic detected: 13.107.246.67:443 -> 192.168.2.26:49945 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.246.67:443 -> 192.168.2.26:49944 version: TLS 1.2

System Summary

barindex
Source: New order 242.xlsOLE: Microsoft Excel 2007+
Source: New order 242.xlsOLE: Microsoft Excel 2007+
Source: 67360000.0.drOLE: Microsoft Excel 2007+
Source: 67360000.0.drOLE: Microsoft Excel 2007+
Source: New order 242.xlsOLE indicator, VBA macros: true
Source: New order 242.xlsStream path 'MBD00CB8BBA/\x1Ole' : https://link.saja.market/LUVLQ8X6l6?&peak=sour&eardrum[%.vCL0R5Q#;`.F&pb#K`D?2|@-:Dl<T:~:^R;WnYRrBaaqp"y{N)/%athdk=>G9VLA9pz0feWpKZx0dS5ocblFoX8AGnn2plLGh6bHz1cNhSfijZlvCscgOd5siWLO68ggjHvnxt9sG0YMx0y3wyHJNlgrotJG96XHGUQvOgVh9Ysz7tlSZrG4mimSPcpmT/Ghn1@T5XIbb
Source: 67360000.0.drStream path 'MBD00CB8BBA/\x1Ole' : https://link.saja.market/LUVLQ8X6l6?&peak=sour&eardrum[%.vCL0R5Q#;`.F&pb#K`D?2|@-:Dl<T:~:^R;WnYRrBaaqp"y{N)/%athdk=>G9VLA9pz0feWpKZx0dS5ocblFoX8AGnn2plLGh6bHz1cNhSfijZlvCscgOd5siWLO68ggjHvnxt9sG0YMx0y3wyHJNlgrotJG96XHGUQvOgVh9Ysz7tlSZrG4mimSPcpmT/Ghn1@T5XIbb
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: classification engineClassification label: mal60.expl.winXLS@6/13@3/3
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\Desktop\67360000Jump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{6C366A43-4F2E-4231-B6F2-5247529E7821} - OProcSessId.datJump to behavior
Source: New order 242.xlsOLE indicator, Workbook stream: true
Source: 67360000.0.drOLE indicator, Workbook stream: true
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: New order 242.xlsReversingLabs: Detection: 22%
Source: New order 242.xlsVirustotal: Detection: 33%
Source: unknownProcess created: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\System32\mshta.exe C:\Windows\System32\mshta.exe -Embedding
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
Source: unknownProcess created: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\user\Desktop\New order 242.xls"
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\System32\mshta.exe C:\Windows\System32\mshta.exe -EmbeddingJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288Jump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: c2r64.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25336920-03F9-11cf-8FD0-00AA00686F13}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEDirectory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: New order 242.xlsStatic file information: File size 1172480 > 1048576
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files\Microsoft Office\root\vfs\System\MSVCR100.dllJump to behavior
Source: 67360000.0.drInitial sample: OLE indicators vbamacros = False
Source: New order 242.xlsInitial sample: OLE indicators encrypted = True
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: New order 242.xlsStream path 'MBD00CB8BB9/MBD00320C7F/Package' entropy: 7.98905669124 (max. 8.0)
Source: New order 242.xlsStream path 'Workbook' entropy: 7.99157506457 (max. 8.0)
Source: 67360000.0.drStream path 'MBD00CB8BB9/MBD00320C7F/Package' entropy: 7.98905669124 (max. 8.0)
Source: 67360000.0.drStream path 'Workbook' entropy: 7.95458392758 (max. 8.0)
Source: C:\Windows\splwow64.exeWindow / User API: threadDelayed 959Jump to behavior
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts13
Exploitation for Client Execution
1
Scripting
1
Process Injection
3
Masquerading
OS Credential Dumping1
Process Discovery
Remote Services1
Email Collection
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Extra Window Memory Injection
1
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture13
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets2
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Extra Window Memory Injection
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.