IOCReport

loading gif

Files

File Path
Type
Category
Malicious
Complaint_Letter_1186814227-02192021.xls
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Last Saved By: Friner, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Fri Feb 19 09:43:01 2021, Security: 0
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\AC73CBBE-DA25-4A70-8E2D-32FC9C1340A0
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\44250683266319400000[1].htm
HTML document, ASCII text, with CRLF line terminators
dropped
clean
C:\Users\user\AppData\Local\Temp\27B40000
data
dropped
clean
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Complaint_Letter_1186814227-02192021.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 30 06:35:54 2020, mtime=Tue Feb 23 14:23:54 2021, atime=Tue Feb 23 14:23:54 2021, length=61440, window=hide
dropped
clean
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Thu Jun 27 17:12:41 2019, mtime=Tue Feb 23 14:23:54 2021, atime=Tue Feb 23 14:23:53 2021, length=8192, window=hide
dropped
clean
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
dropped
clean
C:\Users\user\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC
Little-endian UTF-16 Unicode text, with CR line terminators
dropped
clean
C:\Users\user\Desktop\E7B40000
Applesoft BASIC program data, first line number 16
dropped
clean
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 59134 bytes, 1 file
dropped
clean
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
dropped
clean
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
clean
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\44250678185879600000[1].htm
HTML document, ASCII text, with CRLF line terminators
dropped
clean
C:\Users\user\AppData\Local\Temp\B1CE0000
data
dropped
clean
C:\Users\user\AppData\Local\Temp\CabD164.tmp
Microsoft Cabinet archive data, 59134 bytes, 1 file
dropped
clean
C:\Users\user\AppData\Local\Temp\TarD165.tmp
data
dropped
clean
C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\05Q27A4H.txt
ASCII text
downloaded
clean
C:\Users\user\Desktop\72CE0000
Applesoft BASIC program data, first line number 16
dropped
clean
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32 ..\KLSD.ggsso,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32 ..\KLSD.ggsso1,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32 ..\KLSD.ggsso2,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32 ..\KLSD.ggsso3,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32 ..\KLSD.ggsso4,DllRegisterServer
malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
malicious
C:\Windows\System32\rundll32.exe
rundll32 ..\KLSD.ggsso,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32 ..\KLSD.ggsso1,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32 ..\KLSD.ggsso2,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32 ..\KLSD.ggsso3,DllRegisterServer
malicious
C:\Windows\System32\rundll32.exe
rundll32 ..\KLSD.ggsso4,DllRegisterServer
malicious
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.diagnosticssdf.office.com
unknown
clean
https://login.microsoftonline.com/
unknown
clean
https://shell.suite.office.com:1443
unknown
clean
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
unknown
clean
https://autodiscover-s.outlook.com/
unknown
clean
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
unknown
clean
https://cdn.entity.
unknown
clean
https://api.addins.omex.office.net/appinfo/query
unknown
clean
https://wus2-000.contentsync.
unknown
clean
https://clients.config.office.net/user/v1.0/tenantassociationkey
unknown
clean
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
unknown
clean
https://powerlift.acompli.net
unknown
clean
https://rpsticket.partnerservices.getmicrosoftkey.com
unknown
clean
https://lookup.onenote.com/lookup/geolocation/v1
unknown
clean
https://cortana.ai
unknown
clean
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
unknown
clean
https://cloudfiles.onenote.com/upload.aspx
unknown
clean
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
unknown
clean
https://entitlement.diagnosticssdf.office.com
unknown
clean
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
unknown
clean
https://api.aadrm.com/
unknown
clean
https://ofcrecsvcapi-int.azurewebsites.net/
unknown
clean
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
unknown
clean
https://api.microsoftstream.com/api/
unknown
clean
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
unknown
clean
https://cr.office.com
unknown
clean
http://sportsmarquee.com/hmffuzbolyio/44250683266319400000.dat
70.32.104.19
clean
https://portal.office.com/account/?ref=ClientMeControl
unknown
clean
https://ecs.office.com/config/v2/Office
unknown
clean
https://graph.ppe.windows.net
unknown
clean
https://res.getmicrosoftkey.com/api/redemptionevents
unknown
clean