Loading ...

Play interactive tourEdit tour

Analysis Report Document3327.xlsb

Overview

General Information

Sample Name:Document3327.xlsb
Analysis ID:320378
MD5:822af84271593f38687a040b58296623
SHA1:dbed50d46694c84d25028d749fa8843fcfe474a1
SHA256:cd425ac6a7e11a5cea9eaa3cb57dd062627dc197d03293cc9240c904aef2de6b

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malicious Excel 4.0 Macro
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Found Excel 4.0 Macro with suspicious formulas
Found abnormal large hidden Excel 4.0 Macro sheet
Found obfuscated Excel 4.0 Macro
Allocates a big amount of memory (probably used for heap spraying)
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Yara signature match

Classification

Startup

  • System is w10x64
  • EXCEL.EXE (PID: 7084 cmdline: 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding MD5: 5D6638F2C8F8571C593999C58866007E)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
Document3327.xlsbSUSP_MalDoc_ExcelMacroDetects malicious Excel macro ArtifactsJames Quinn
  • 0x525c5:$artifact1: 5C 00 6D 00 65 00 74 00 61 00 73 00 74 00 61 00 2E 00 6D 00 65 00
  • 0x4c7a0:$url1: http://
  • 0x4cbb2:$url1: http://
  • 0x57426:$url1: http://
  • 0x4ddad:$import1: URLDownloadToFileA
  • 0x5075a:$import1: URLDownloadToFileA
  • 0x15a6:$macro: xl/macrosheets/
  • 0x16a9:$macro: xl/macrosheets/
  • 0x4ab6b:$macro: xl/macrosheets/
  • 0x58175:$macro: xl/macrosheets/
  • 0x581c7:$macro: xl/macrosheets/
  • 0x596a9:$macro: xl/macrosheets/

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

Software Vulnerabilities:

barindex
Document exploit detected (UrlDownloadToFile)Show sources
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXESection loaded: unknown origin: URLDownloadToFileAJump to behavior
Source: excel.exeMemory has grown: Private usage: 1MB later: 118MB
Source: global trafficDNS query: name: qxcb.net
Source: global trafficTCP traffic: 192.168.2.4:49737 -> 198.57.244.39:80
Source: global trafficTCP traffic: 192.168.2.4:49737 -> 198.57.244.39:80
Source: global trafficHTTP traffic detected: GET /ds/161120.gif HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: qxcb.netConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ds/161120.gif HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: qxcb.netConnection: Keep-Alive
Source: unknownDNS traffic detected: queries for: qxcb.net
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: http://olkflt.edog.officeapps.live.com/olkflt/outlookflighting.svc/api/glides
Source: Document3327.xlsbString found in binary or memory: http://qxcb.net/ds/161120.gif
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: http://weather.service.msn.com/data.aspx
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://analysis.windows.net/powerbi/api
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://api.aadrm.com/
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://api.addins.omex.office.net/appinfo/query
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://api.addins.omex.office.net/appstate/query
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://api.diagnostics.office.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://api.diagnosticssdf.office.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://api.microsoftstream.com/api/
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://api.office.net
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://api.onedrive.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://api.powerbi.com/beta/myorg/imports
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/datasets
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/groups
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://apis.live.net/v5.0/
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://arc.msn.com/v4/api/selection
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://asgsmsproxyapi.azurewebsites.net/
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://augloop.office.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://augloop.office.com/v2
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://autodiscover-s.outlook.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://cdn.entity.
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/stat/images/OneDriveUpsell.png
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSignUpUpsell
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSyncClientUpsell
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://client-office365-tas.msedge.net/ab
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://clients.config.office.net/
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/android/policies
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/ios
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/mac
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/tenantassociationkey
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://cloudfiles.onenote.com/upload.aspx
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://config.edge.skype.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://config.edge.skype.com/config/v1/Office
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://config.edge.skype.com/config/v2/Office
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://cortana.ai
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://cr.office.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://dataservice.o365filtering.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://dataservice.o365filtering.com/
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://dev0-api.acompli.net/autodetect
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://devnull.onenote.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://directory.services.
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://ecs.office.com/config/v2/Office
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://entitlement.diagnostics.office.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://entitlement.diagnosticssdf.office.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://excel.uservoice.com/forums/304936-excel-for-mobile-devices-tablets-phones-android
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://globaldisco.crm.dynamics.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://graph.ppe.windows.net
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://graph.ppe.windows.net/
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://graph.windows.net
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://graph.windows.net/
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/telemetry
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3d
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=icons&premium=1
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockimages&premium=1
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockvideos&premium=1
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsofticon?
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://incidents.diagnostics.office.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://incidents.diagnosticssdf.office.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=ClipArt
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebook
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://insertmedia.bing.office.net/odc/insertmedia
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/GetFreeformSpeech
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://lifecycle.office.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://login.microsoftonline.com/
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://login.windows-ppe.net/common/oauth2/authorize
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://login.windows.local
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://login.windows.net/common/oauth2/authorize
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://loki.delve.office.com/api/v1/configuration/officewin32/
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://lookup.onenote.com/lookup/geolocation/v1
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://management.azure.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://management.azure.com/
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://messaging.office.com/
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://ncus-000.contentsync.
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://ncus-000.pagecontentsync.
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com/api/userauditrecord
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://o365diagnosticsppe-web.cloudapp.net
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://ocos-office365-s2s.msedge.net/ab
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://ofcrecsvcapi-int.azurewebsites.net/
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://officeapps.live.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://officeci.azurewebsites.net/api/
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://officesetup.getmicrosoftkey.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://ogma.osi.office.net/TradukoApi/api/v1.0/
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://onedrive.live.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://onedrive.live.com/embed?
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://outlook.office.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://outlook.office.com/autosuggest/api/v1/init?cvid=
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://outlook.office365.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://outlook.office365.com/api/v1.0/me/Activities
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://outlook.office365.com/autodiscover/autodiscover.json
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://ovisualuiapp.azurewebsites.net/pbiagave/
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://partnerservices.getmicrosoftkey.com/PartnerProvisioning.svc/v1/subscriptions
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://portal.office.com/account/?ref=ClientMeControl
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://posarprodcssservice.accesscontrol.windows.net/v2/OAuth2-13
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://powerlift-frontdesk.acompli.net
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://powerlift.acompli.net
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://prod-global-autodetect.acompli.net/autodetect
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://res.getmicrosoftkey.com/api/redemptionevents
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://rpsticket.partnerservices.getmicrosoftkey.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://settings.outlook.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://shell.suite.office.com:1443
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://skyapi.live.net/Activity/
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://sr.outlook.office.net/ws/speech/recognize/assistant/work
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://storage.live.com/clientlogs/uploadlocation
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://store.office.cn/addinstemplate
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://store.office.com/?productgroup=Outlook
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://store.office.com/addinstemplate
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://store.office.de/addinstemplate
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://store.officeppe.com/addinstemplate
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://tasks.office.com
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://templatelogging.office.com/client/log
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.desktop.html
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.immersive.html
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://visio.uservoice.com/forums/368202-visio-on-devices
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://web.microsoftstream.com/video/
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://wus2-000.contentsync.
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://wus2-000.pagecontentsync.
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2
Source: E686101D-62B1-4FED-AC7A-87B20396F87E.0.drString found in binary or memory: https://www.odwebp.svc.ms

System Summary:

barindex
Found malicious Excel 4.0 MacroShow sources
Source: Document3327.xlsbInitial sample: urlmon
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
Source: Screenshot number: 4Screenshot OCR: Enable editing" to unlock the editing document downloaded from the internet.y 0Protected View This
Source: Screenshot number: 4Screenshot OCR: Enable content" to perform Microsoft Word Decryption Core to start the decryption of the document.
Found Excel 4.0 Macro with suspicious formulasShow sources
Source: Document3327.xlsbInitial sample: CALL
Source: Document3327.xlsbInitial sample: CALL
Found abnormal large hidden Excel 4.0 Macro sheetShow sources
Source: Document3327.xlsbInitial sample: Sheet size: 564787
Found obfuscated Excel 4.0 MacroShow sources
Source: Document3327.xlsbInitial sample: High usage of CHAR() function: 129
Source: Document3327.xlsb, type: SAMPLEMatched rule: SUSP_MalDoc_ExcelMacro date = 2020-11-03, author = James Quinn, description = Detects malicious Excel macro Artifacts, reference = YARA Exchange - Undisclosed Macro Builder
Source: classification engineClassification label: mal72.expl.evad.winXLSB@1/6@1/1
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCacheJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{40CE8188-5CF8-4E8C-A47D-50739E9A5BA5} - OProcSessId.datJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Document3327.xlsbInitial sample: OLE zip file path = xl/media/image1.png
Source: Document3327.xlsbInitial sample: OLE zip file path = xl/media/image2.png
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguagesJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting4Path InterceptionExtra Window Memory Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution13Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySystem Information Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Scripting4Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Extra Window Memory Injection1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.