IOCReport

loading gif

Files

File Path
Type
Category
Malicious
Complaint-447781983-02182021.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Last Saved By: Friner, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Thu Feb 18 13:42:21 2021, Security: 0
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\30D802E0E248FEE17AAF4A62594CC75A
data
dropped
clean
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\30D802E0E248FEE17AAF4A62594CC75A
data
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\4C99B3FD-0FAA-455B-8960-C99FC42FE1C8
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
clean
C:\Users\user\AppData\Local\Temp\A8A40000
data
dropped
clean
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Complaint-447781983-02182021.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 30 06:35:50 2020, mtime=Tue Feb 23 12:25:52 2021, atime=Tue Feb 23 12:25:52 2021, length=60928, window=hide
dropped
clean
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Thu Jun 27 17:12:41 2019, mtime=Tue Feb 23 12:25:52 2021, atime=Tue Feb 23 12:25:52 2021, length=8192, window=hide
dropped
clean
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
clean
C:\Users\user\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC
Little-endian UTF-16 Unicode text, with CR line terminators
dropped
clean
C:\Users\user\Desktop\59A40000
Applesoft BASIC program data, first line number 16
dropped
clean
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 59134 bytes, 1 file
dropped
clean
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0968A1E3A40D2582E7FD463BAEB59CD
data
dropped
clean
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
clean
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0968A1E3A40D2582E7FD463BAEB59CD
data
dropped
clean
C:\Users\user\AppData\Local\Temp\CabDC6B.tmp
Microsoft Cabinet archive data, 59134 bytes, 1 file
dropped
clean
C:\Users\user\AppData\Local\Temp\F2CE0000
data
dropped
clean
C:\Users\user\AppData\Local\Temp\TarDC6C.tmp
data
dropped
clean
C:\Users\user\Desktop\A3CE0000
Applesoft BASIC program data, first line number 16
dropped
clean
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32 ..\JDFR.hdfgr,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32 ..\JDFR.hdfgr1,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32 ..\JDFR.hdfgr2,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32 ..\JDFR.hdfgr3,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32 ..\JDFR.hdfgr4,DllRegisterServer
malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
malicious
C:\Windows\System32\rundll32.exe
rundll32 ..\JDFR.hdfgr,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32 ..\JDFR.hdfgr1,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32 ..\JDFR.hdfgr2,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32 ..\JDFR.hdfgr3,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32 ..\JDFR.hdfgr4,DllRegisterServer
malicious
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pathinanchilearthmovers.com/eznwcdhx/44250601302777800000.dat
162.241.80.6
malicious
http://pathinanchilearthmovers.com/eznwcdhx/44250596245254600000.dat
162.241.80.6
malicious
https://api.diagnosticssdf.office.com
unknown
clean
https://login.microsoftonline.com/
unknown
clean
https://shell.suite.office.com:1443
unknown
clean
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
clean
https://autodiscover-s.outlook.com/
unknown
clean
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
clean
https://cdn.entity.
unknown
clean
https://api.addins.omex.office.net/appinfo/query
unknown
clean
https://wus2-000.contentsync.
unknown
clean
http://rzminc.com/fdzgprclatqo/44250601302777800000.dat
72.52.227.180
clean
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
clean
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
clean
https://powerlift.acompli.net
unknown
clean
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
clean
https://lookup.onenote.com/lookup/geolocation/v1
unknown
clean
https://cortana.ai
unknown
clean
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
clean
https://cloudfiles.onenote.com/upload.aspx
unknown
clean
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
clean
https://entitlement.diagnosticssdf.office.com
unknown
clean
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
clean
https://api.aadrm.com/
unknown
clean
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
clean
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
clean
https://api.microsoftstream.com/api/
unknown
clean
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
clean
https://cr.office.com
unknown
clean
https://portal.office.com/account/?ref=ClientMeControl
unknown
clean
https://ecs.office.com/config/v2/Office
unknown
clean
https://graph.ppe.windows.net
unknown
clean
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
clean