Loading ...

Play interactive tourEdit tour

Windows Analysis Report art-1881052385.xls

Overview

General Information

Sample Name:art-1881052385.xls
Analysis ID:501787
MD5:d8b24f156013e7722bfbba988da25e07
SHA1:bf3de63943d78a14a07604c90bb6e523c8bf717b
SHA256:0361b3ee64c579db66c932ff110836fd4ade16f68eb6a18cabc9c60c96d86b59
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Antivirus detection for URL or domain
Sigma detected: Regsvr32 Command Line Without DLL
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Yara detected hidden Macro 4.0 in Excel
Yara signature match
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Document contains embedded VBA macros
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
IP address seen in connection with other malware

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 1208 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • regsvr32.exe (PID: 292 cmdline: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2140 cmdline: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.test MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 1876 cmdline: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.test MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
art-1881052385.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
  • 0x0:$header_docf: D0 CF 11 E0
  • 0x3bf57:$s1: Excel
  • 0x34eb:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
art-1881052385.xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Regsvr32 Command Line Without DLLShow sources
    Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, CommandLine: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, CommandLine|base64offset|contains: , Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1208, ProcessCommandLine: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, ProcessId: 292
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, CommandLine: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, CommandLine|base64offset|contains: , Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1208, ProcessCommandLine: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, ProcessId: 292

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Antivirus detection for URL or domainShow sources
    Source: https://recapitol.com/pl92fIeHE11X/filht.htmlAvira URL Cloud: Label: malware
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: unknownHTTPS traffic detected: 101.0.113.93:443 -> 192.168.2.22:49167 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.179.232.85:443 -> 192.168.2.22:49168 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 103.28.121.60:443 -> 192.168.2.22:49169 version: TLS 1.2

    Software Vulnerabilities:

    barindex
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 101.0.113.93:443
    Source: global trafficDNS query: name: boogieproductions.com.au
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 101.0.113.93:443
    Source: global trafficHTTP traffic detected: GET /jJNW2LDF/filkfht.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: boogieproductions.com.auConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /pl92fIeHE11X/filht.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: recapitol.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /QpPq5lm6Xy/fikfh.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: iu.ac.bdConnection: Keep-Alive
    Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
    Source: Joe Sandbox ViewIP Address: 103.28.121.60 103.28.121.60
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49169
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
    Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49169 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
    Source: regsvr32.exe, 00000004.00000002.475725799.0000000004880000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.468810119.0000000004840000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.457781066.00000000049E0000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
    Source: regsvr32.exe, 00000004.00000002.475725799.0000000004880000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.468810119.0000000004840000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.457781066.00000000049E0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
    Source: regsvr32.exe, 00000004.00000002.475725799.0000000004880000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.468810119.0000000004840000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.457781066.00000000049E0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
    Source: regsvr32.exe, 00000004.00000002.475915213.0000000004A67000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.469059710.0000000004A27000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.457975521.0000000004BC7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
    Source: regsvr32.exe, 00000004.00000002.475915213.0000000004A67000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.469059710.0000000004A27000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.457975521.0000000004BC7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
    Source: regsvr32.exe, 00000004.00000002.475166896.0000000003A80000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.468111615.0000000003A70000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
    Source: regsvr32.exe, 00000004.00000002.474684792.0000000001C80000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.467583178.0000000001DA0000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
    Source: regsvr32.exe, 00000004.00000002.475915213.0000000004A67000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.469059710.0000000004A27000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.457975521.0000000004BC7000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
    Source: regsvr32.exe, 00000004.00000002.475915213.0000000004A67000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.469059710.0000000004A27000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.457975521.0000000004BC7000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
    Source: regsvr32.exe, 00000004.00000002.475166896.0000000003A80000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.468111615.0000000003A70000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
    Source: regsvr32.exe, 00000004.00000002.475725799.0000000004880000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.468810119.0000000004840000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.457781066.00000000049E0000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
    Source: regsvr32.exe, 00000004.00000002.475915213.0000000004A67000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.469059710.0000000004A27000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.457975521.0000000004BC7000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
    Source: regsvr32.exe, 00000004.00000002.475725799.0000000004880000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.468810119.0000000004840000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.457781066.00000000049E0000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
    Source: regsvr32.exe, 00000006.00000002.457781066.00000000049E0000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\filkfht[1].htmJump to behavior
    Source: unknownDNS traffic detected: queries for: boogieproductions.com.au
    Source: global trafficHTTP traffic detected: GET /jJNW2LDF/filkfht.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: boogieproductions.com.auConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /pl92fIeHE11X/filht.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: recapitol.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /QpPq5lm6Xy/fikfh.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: iu.ac.bdConnection: Keep-Alive
    Source: unknownHTTPS traffic detected: 101.0.113.93:443 -> 192.168.2.22:49167 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 108.179.232.85:443 -> 192.168.2.22:49168 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 103.28.121.60:443 -> 192.168.2.22:49169 version: TLS 1.2

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable Editing 18 19 OK 20 (D PROTECTED VIEW Be careful- files from the 1nterne -cted View. Ena
    Source: Screenshot number: 4Screenshot OCR: Enable Content 25 26 (i) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 3
    Source: Screenshot number: 8Screenshot OCR: Enable Editing 18 '9 41' I 20 (D PROTECTED VIEW Be careful- files from the 1nterne :cted View.
    Source: Screenshot number: 8Screenshot OCR: Enable Content 25 26 (i) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 3
    Source: Document image extraction number: 0Screenshot OCR: Enable Editing 0 PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless yo
    Source: Document image extraction number: 0Screenshot OCR: Enable Content OSECURITY WARNING Macros have been disabled. Enable Content om If you are using a m
    Source: Document image extraction number: 1Screenshot OCR: Enable Editing (D PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless y
    Source: Document image extraction number: 1Screenshot OCR: Enable Content OSECURITY WARNING Macros have been disabled. Enable Content om If you are using a m
    Source: Screenshot number: 12Screenshot OCR: Enable Editing 19 20 (D PROTECTED VIEW Be careful - files from the Internet can contain viruses. U
    Source: Screenshot number: 12Screenshot OCR: Enable Content 25 26 (i) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 3
    Source: art-1881052385.xls, type: SAMPLEMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
    Source: art-1881052385.xlsOLE indicator, VBA macros: true
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
    Source: art-1881052385.xlsOLE indicator, Workbook stream: true
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.test
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.test
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.test
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.test
    Source: regsvr32.exe, 00000004.00000002.475725799.0000000004880000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.468810119.0000000004840000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.457781066.00000000049E0000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVREFE9.tmpJump to behavior
    Source: classification engineClassification label: mal76.expl.winXLS@7/0@3/3
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\regsvr32.exe TID: 2080Thread sleep time: -60000s >= -30000s
    Source: C:\Windows\System32\regsvr32.exe TID: 2084Thread sleep time: -60000s >= -30000s
    Source: C:\Windows\System32\regsvr32.exe TID: 2728Thread sleep count: 43 > 30
    Source: C:\Windows\System32\regsvr32.exe TID: 2144Thread sleep time: -60000s >= -30000s

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    Yara detected hidden Macro 4.0 in ExcelShow sources
    Source: Yara matchFile source: art-1881052385.xls, type: SAMPLE

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting1Path InterceptionProcess Injection1Disable or Modify Tools1OS Credential DumpingVirtualization/Sandbox Evasion1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerSystem Information Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol13Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferIngress Tool Transfer2SIM Card SwapCarrier Billing Fraud

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    No Antivirus matches

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    https://recapitol.com/pl92fIeHE11X/filht.html100%Avira URL Cloudmalware
    https://iu.ac.bd/QpPq5lm6Xy/fikfh.html0%Avira URL Cloudsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://www.%s.comPA0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    https://boogieproductions.com.au/jJNW2LDF/filkfht.html0%Avira URL Cloudsafe
    http://servername/isapibackend.dll0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    iu.ac.bd
    103.28.121.60
    truefalse
      unknown
      boogieproductions.com.au
      101.0.113.93
      truefalse
        unknown
        recapitol.com
        108.179.232.85
        truefalse
          unknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          https://recapitol.com/pl92fIeHE11X/filht.htmltrue
          • Avira URL Cloud: malware
          unknown
          https://iu.ac.bd/QpPq5lm6Xy/fikfh.htmlfalse
          • Avira URL Cloud: safe
          unknown
          https://boogieproductions.com.au/jJNW2LDF/filkfht.htmlfalse
          • Avira URL Cloud: safe
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkregsvr32.exe, 00000004.00000002.475915213.0000000004A67000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.469059710.0000000004A27000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.457975521.0000000004BC7000.00000002.00020000.sdmpfalse
            high
            http://www.windows.com/pctv.regsvr32.exe, 00000006.00000002.457781066.00000000049E0000.00000002.00020000.sdmpfalse
              high
              http://investor.msn.comregsvr32.exe, 00000004.00000002.475725799.0000000004880000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.468810119.0000000004840000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.457781066.00000000049E0000.00000002.00020000.sdmpfalse
                high
                http://www.msnbc.com/news/ticker.txtregsvr32.exe, 00000004.00000002.475725799.0000000004880000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.468810119.0000000004840000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.457781066.00000000049E0000.00000002.00020000.sdmpfalse
                  high
                  http://www.icra.org/vocabulary/.regsvr32.exe, 00000004.00000002.475915213.0000000004A67000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.469059710.0000000004A27000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.457975521.0000000004BC7000.00000002.00020000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.regsvr32.exe, 00000004.00000002.475166896.0000000003A80000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.468111615.0000000003A70000.00000002.00020000.sdmpfalse
                    high
                    http://investor.msn.com/regsvr32.exe, 00000004.00000002.475725799.0000000004880000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.468810119.0000000004840000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.457781066.00000000049E0000.00000002.00020000.sdmpfalse
                      high
                      http://www.%s.comPAregsvr32.exe, 00000004.00000002.475166896.0000000003A80000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.468111615.0000000003A70000.00000002.00020000.sdmpfalse
                      • URL Reputation: safe
                      low
                      http://windowsmedia.com/redir/services.asp?WMPFriendly=trueregsvr32.exe, 00000004.00000002.475915213.0000000004A67000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.469059710.0000000004A27000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.457975521.0000000004BC7000.00000002.00020000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.hotmail.com/oeregsvr32.exe, 00000004.00000002.475725799.0000000004880000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.468810119.0000000004840000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.457781066.00000000049E0000.00000002.00020000.sdmpfalse
                        high
                        http://servername/isapibackend.dllregsvr32.exe, 00000004.00000002.474684792.0000000001C80000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.467583178.0000000001DA0000.00000002.00020000.sdmpfalse
                        • Avira URL Cloud: safe
                        low

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        101.0.113.93
                        boogieproductions.com.auAustralia
                        55803DIGITALPACIFIC-AUDigitalPacificPtyLtdAustraliaAUfalse
                        103.28.121.60
                        iu.ac.bdBangladesh
                        63961BDREN-UGC-AS-APBangladeshResearchandEducationNetworkBfalse
                        108.179.232.85
                        recapitol.comUnited States
                        46606UNIFIEDLAYER-AS-1USfalse

                        General Information

                        Joe Sandbox Version:33.0.0 White Diamond
                        Analysis ID:501787
                        Start date:13.10.2021
                        Start time:09:01:19
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 6m 17s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:art-1881052385.xls
                        Cookbook file name:defaultwindowsofficecookbook.jbs
                        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                        Number of analysed new started processes analysed:8
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal76.expl.winXLS@7/0@3/3
                        EGA Information:Failed
                        HDC Information:Failed
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Found application associated with file extension: .xls
                        • Found Word or Excel or PowerPoint or XPS Viewer
                        • Found warning dialog
                        • Click Ok
                        • Found warning dialog
                        • Click Ok
                        • Attach to Office via COM
                        • Scroll down
                        • Close Viewer
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, svchost.exe
                        • VT rate limit hit for: /opt/package/joesandbox/database/analysis/501787/sample/art-1881052385.xls

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        09:01:34API Interceptor312x Sleep call for process: regsvr32.exe modified

                        Joe Sandbox View / Context

                        IPs

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        103.28.121.60g7NoKI5667.dllGet hashmaliciousBrowse
                        • bengali.iu.ac.bd/xNM4FTUzqRRk/ICguHncbARsgBD8NCSA2Bx8nL0Z6c3lifn1yZX5heA==
                        qsdqqsd.dllGet hashmaliciousBrowse
                        • bengali.iu.ac.bd/xNM4FTUzqRRk/fXMKNg0nKzN/DA15DggBI0N6dX1le310YXlkfw==
                        090921.dllGet hashmaliciousBrowse
                        • bengali.iu.ac.bd/xNM4FTUzqRRk/fXMKNg0nKzN/DA15DggBI0N6dX1le310YXlkfg==
                        diagram-595.docGet hashmaliciousBrowse
                        • bengali.iu.ac.bd/xNM4FTUzqRRk/GAUAID5zCzE+BzoOJAtGenN5Yn59cmV+YXl4
                        diagram-378.docGet hashmaliciousBrowse
                        • bengali.iu.ac.bd/xNM4FTUzqRRk/cxMTCDUBQ3p1fWV7fXRheWR5fg==

                        Domains

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        iu.ac.bdg7NoKI5667.dllGet hashmaliciousBrowse
                        • 103.28.121.60
                        qsdqqsd.dllGet hashmaliciousBrowse
                        • 103.28.121.60
                        090921.dllGet hashmaliciousBrowse
                        • 103.28.121.60
                        diagram-595.docGet hashmaliciousBrowse
                        • 103.28.121.60
                        diagram-378.docGet hashmaliciousBrowse
                        • 103.28.121.60

                        ASN

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        DIGITALPACIFIC-AUDigitalPacificPtyLtdAustraliaAUdoc-379851424.xlsGet hashmaliciousBrowse
                        • 101.0.112.4
                        doc-379851424.xlsGet hashmaliciousBrowse
                        • 101.0.112.4
                        doc-220808714.xlsGet hashmaliciousBrowse
                        • 101.0.112.4
                        doc-220808714.xlsGet hashmaliciousBrowse
                        • 101.0.112.4
                        ITT - PPCL-2021-0515-PKG4 - pipping and drilling Services.docGet hashmaliciousBrowse
                        • 116.90.56.138
                        Inquiry-Doors.exeGet hashmaliciousBrowse
                        • 101.0.91.38
                        product specification.exeGet hashmaliciousBrowse
                        • 101.0.117.102
                        7PUgGUWM2lGet hashmaliciousBrowse
                        • 182.160.170.135
                        Attached Quotation.exeGet hashmaliciousBrowse
                        • 101.0.117.102
                        Cd9EA600XXdm0tl.exeGet hashmaliciousBrowse
                        • 101.0.117.102
                        E8ljMuBj9LGet hashmaliciousBrowse
                        • 111.67.13.18
                        QcXQmNSaSpGet hashmaliciousBrowse
                        • 49.156.27.62
                        arm7Get hashmaliciousBrowse
                        • 111.67.13.28
                        QYUNlRkkn1.exeGet hashmaliciousBrowse
                        • 203.16.60.34
                        6Y5P9BoimMLclbt.exeGet hashmaliciousBrowse
                        • 101.0.117.102
                        gunzipped.exeGet hashmaliciousBrowse
                        • 101.0.117.102
                        SecuriteInfo.com.Variant.Bulz.627351.21436.exeGet hashmaliciousBrowse
                        • 101.0.117.102
                        ENQUIRY.exeGet hashmaliciousBrowse
                        • 101.0.117.102
                        16wKmiVoPj05ynr.exeGet hashmaliciousBrowse
                        • 101.0.117.102
                        PURCHASE ORDER.exeGet hashmaliciousBrowse
                        • 101.0.117.102
                        BDREN-UGC-AS-APBangladeshResearchandEducationNetworkBg7NoKI5667.dllGet hashmaliciousBrowse
                        • 103.28.121.60
                        qsdqqsd.dllGet hashmaliciousBrowse
                        • 103.28.121.60
                        090921.dllGet hashmaliciousBrowse
                        • 103.28.121.60
                        diagram-595.docGet hashmaliciousBrowse
                        • 103.28.121.60
                        diagram-378.docGet hashmaliciousBrowse
                        • 103.28.121.60

                        JA3 Fingerprints

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        7dcce5b76c8b17472d024758970a406bJrZcKXgWcl.vbsGet hashmaliciousBrowse
                        • 101.0.113.93
                        • 103.28.121.60
                        • 108.179.232.85
                        doc-379851424.xlsGet hashmaliciousBrowse
                        • 101.0.113.93
                        • 103.28.121.60
                        • 108.179.232.85
                        doc-220808714.xlsGet hashmaliciousBrowse
                        • 101.0.113.93
                        • 103.28.121.60
                        • 108.179.232.85
                        INV.pptGet hashmaliciousBrowse
                        • 101.0.113.93
                        • 103.28.121.60
                        • 108.179.232.85
                        Purchase Order .xlsxGet hashmaliciousBrowse
                        • 101.0.113.93
                        • 103.28.121.60
                        • 108.179.232.85
                        MV JOLLY EXPRESS.docxGet hashmaliciousBrowse
                        • 101.0.113.93
                        • 103.28.121.60
                        • 108.179.232.85
                        DHL_Delivery_Notification.docGet hashmaliciousBrowse
                        • 101.0.113.93
                        • 103.28.121.60
                        • 108.179.232.85
                        FedEx AWB 884174658339.docGet hashmaliciousBrowse
                        • 101.0.113.93
                        • 103.28.121.60
                        • 108.179.232.85
                        UPDATE INVOICE FM K & S INDUSTRY.docxGet hashmaliciousBrowse
                        • 101.0.113.93
                        • 103.28.121.60
                        • 108.179.232.85
                        PO 347391.docxGet hashmaliciousBrowse
                        • 101.0.113.93
                        • 103.28.121.60
                        • 108.179.232.85
                        swift.Telex.xlsGet hashmaliciousBrowse
                        • 101.0.113.93
                        • 103.28.121.60
                        • 108.179.232.85
                        Invoice number 1257MAJAKFVII2021 incl. VAT.docGet hashmaliciousBrowse
                        • 101.0.113.93
                        • 103.28.121.60
                        • 108.179.232.85
                        Consignment Notification.docGet hashmaliciousBrowse
                        • 101.0.113.93
                        • 103.28.121.60
                        • 108.179.232.85
                        RFQ87976VF.docGet hashmaliciousBrowse
                        • 101.0.113.93
                        • 103.28.121.60
                        • 108.179.232.85
                        RFQPTD0075453423.docGet hashmaliciousBrowse
                        • 101.0.113.93
                        • 103.28.121.60
                        • 108.179.232.85
                        F#U0130YAT TEKL#U0130F#U0130 FORMU.docGet hashmaliciousBrowse
                        • 101.0.113.93
                        • 103.28.121.60
                        • 108.179.232.85
                        CONTRACT 0902021.docGet hashmaliciousBrowse
                        • 101.0.113.93
                        • 103.28.121.60
                        • 108.179.232.85
                        PO006237_2nd Shipment.docxGet hashmaliciousBrowse
                        • 101.0.113.93
                        • 103.28.121.60
                        • 108.179.232.85
                        sample.exeGet hashmaliciousBrowse
                        • 101.0.113.93
                        • 103.28.121.60
                        • 108.179.232.85
                        avec.xlsxGet hashmaliciousBrowse
                        • 101.0.113.93
                        • 103.28.121.60
                        • 108.179.232.85

                        Dropped Files

                        No context

                        Created / dropped Files

                        No created / dropped files found

                        Static File Info

                        General

                        File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Tue Oct 12 17:38:05 2021, Security: 0
                        Entropy (8bit):7.345299074583062
                        TrID:
                        • Microsoft Excel sheet (30009/1) 78.94%
                        • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                        File name:art-1881052385.xls
                        File size:251904
                        MD5:d8b24f156013e7722bfbba988da25e07
                        SHA1:bf3de63943d78a14a07604c90bb6e523c8bf717b
                        SHA256:0361b3ee64c579db66c932ff110836fd4ade16f68eb6a18cabc9c60c96d86b59
                        SHA512:6d68601bb032f0765c14cd1a7e55d5aad064b8567ee504307f72b03b87a8abdbd161a680b0931de5dfb7a4dac2d38080e23c41fd8c4c8bdb3e08ec073a5b2507
                        SSDEEP:6144:nKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgJ93WPcZZRRrq1RObTwvOkPDklgvS3+nQ7p:893tDrmcbTwvzD63fLvfP1GOn
                        File Content Preview:........................>......................................................................................................................................................................................................................................

                        File Icon

                        Icon Hash:e4eea286a4b4bcb4

                        Static OLE Info

                        General

                        Document Type:OLE
                        Number of OLE Files:1

                        OLE File "art-1881052385.xls"

                        Indicators

                        Has Summary Info:True
                        Application Name:unknown
                        Encrypted Document:False
                        Contains Word Document Stream:False
                        Contains Workbook/Book Stream:True
                        Contains PowerPoint Document Stream:False
                        Contains Visio Document Stream:False
                        Contains ObjectPool Stream:
                        Flash Objects Count:
                        Contains VBA Macros:True

                        Summary

                        Code Page:1251
                        Last Saved By:
                        Create Time:2015-06-05 18:19:34
                        Last Saved Time:2021-10-12 16:38:05
                        Security:0

                        Document Summary

                        Document Code Page:1251
                        Thumbnail Scaling Desired:False
                        Company:
                        Contains Dirty Links:False
                        Shared Document:False
                        Changed Hyperlinks:False
                        Application Version:1048576

                        Streams

                        Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                        General
                        Stream Path:\x5DocumentSummaryInformation
                        File Type:data
                        Stream Size:4096
                        Entropy:0.43766981378
                        Base64 Encoded:False
                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . < . . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t . . . . . S i m b b 1 . . . . . S i m b b 2 . . . . . S i m b b 3 . . . . . G G T . . . . . B r e r 1
                        Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 3c 01 00 00 09 00 00 00 01 00 00 00 50 00 00 00 0f 00 00 00 58 00 00 00 17 00 00 00 64 00 00 00 0b 00 00 00 6c 00 00 00 10 00 00 00 74 00 00 00 13 00 00 00 7c 00 00 00 16 00 00 00 84 00 00 00 0d 00 00 00 8c 00 00 00 0c 00 00 00 f9 00 00 00
                        Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                        General
                        Stream Path:\x5SummaryInformation
                        File Type:data
                        Stream Size:4096
                        Entropy:0.193503644117
                        Base64 Encoded:False
                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . h . . . . . . . . . . . 0 . . . . . . . 8 . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . @ . . . . ? R , . . . . @ . . . . T . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                        Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 68 00 00 00 05 00 00 00 01 00 00 00 30 00 00 00 08 00 00 00 38 00 00 00 0c 00 00 00 48 00 00 00 0d 00 00 00 54 00 00 00 13 00 00 00 60 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 08 00 00 00 c0 e4 ec e8 ed 00 00 00 40 00 00 00 00 3f 52 2c
                        Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 240418
                        General
                        Stream Path:Workbook
                        File Type:Applesoft BASIC program data, first line number 16
                        Stream Size:240418
                        Entropy:7.5270808237
                        Base64 Encoded:True
                        Data ASCII:. . . . . . . . Z O . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . . . 4 . < . 8 . = . B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . . . . V e 1 8 . . . . . . . X . @ . . . . .
                        Data Raw:09 08 10 00 00 06 05 00 5a 4f cd 07 c9 00 02 00 06 08 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 05 00 01 10 04 34 04 3c 04 38 04 3d 04 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                        Network Behavior

                        Network Port Distribution

                        TCP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Oct 13, 2021 09:02:15.580004930 CEST49167443192.168.2.22101.0.113.93
                        Oct 13, 2021 09:02:15.580066919 CEST44349167101.0.113.93192.168.2.22
                        Oct 13, 2021 09:02:15.581512928 CEST49167443192.168.2.22101.0.113.93
                        Oct 13, 2021 09:02:15.591133118 CEST49167443192.168.2.22101.0.113.93
                        Oct 13, 2021 09:02:15.591170073 CEST44349167101.0.113.93192.168.2.22
                        Oct 13, 2021 09:02:16.250127077 CEST44349167101.0.113.93192.168.2.22
                        Oct 13, 2021 09:02:16.250396967 CEST49167443192.168.2.22101.0.113.93
                        Oct 13, 2021 09:02:16.259537935 CEST49167443192.168.2.22101.0.113.93
                        Oct 13, 2021 09:02:16.259577036 CEST44349167101.0.113.93192.168.2.22
                        Oct 13, 2021 09:02:16.259885073 CEST44349167101.0.113.93192.168.2.22
                        Oct 13, 2021 09:02:16.259968042 CEST49167443192.168.2.22101.0.113.93
                        Oct 13, 2021 09:02:16.521409035 CEST49167443192.168.2.22101.0.113.93
                        Oct 13, 2021 09:02:16.563150883 CEST44349167101.0.113.93192.168.2.22
                        Oct 13, 2021 09:02:20.070127964 CEST44349167101.0.113.93192.168.2.22
                        Oct 13, 2021 09:02:20.070324898 CEST49167443192.168.2.22101.0.113.93
                        Oct 13, 2021 09:02:20.070569038 CEST49167443192.168.2.22101.0.113.93
                        Oct 13, 2021 09:02:20.070924044 CEST44349167101.0.113.93192.168.2.22
                        Oct 13, 2021 09:02:20.070971966 CEST44349167101.0.113.93192.168.2.22
                        Oct 13, 2021 09:02:20.071008921 CEST49167443192.168.2.22101.0.113.93
                        Oct 13, 2021 09:02:20.071027040 CEST49167443192.168.2.22101.0.113.93
                        Oct 13, 2021 09:02:20.247283936 CEST49168443192.168.2.22108.179.232.85
                        Oct 13, 2021 09:02:20.247317076 CEST44349168108.179.232.85192.168.2.22
                        Oct 13, 2021 09:02:20.247400999 CEST49168443192.168.2.22108.179.232.85
                        Oct 13, 2021 09:02:20.248315096 CEST49168443192.168.2.22108.179.232.85
                        Oct 13, 2021 09:02:20.248353004 CEST44349168108.179.232.85192.168.2.22
                        Oct 13, 2021 09:02:20.555445910 CEST44349168108.179.232.85192.168.2.22
                        Oct 13, 2021 09:02:20.555646896 CEST49168443192.168.2.22108.179.232.85
                        Oct 13, 2021 09:02:20.566611052 CEST49168443192.168.2.22108.179.232.85
                        Oct 13, 2021 09:02:20.566663980 CEST44349168108.179.232.85192.168.2.22
                        Oct 13, 2021 09:02:20.567126036 CEST44349168108.179.232.85192.168.2.22
                        Oct 13, 2021 09:02:20.567228079 CEST49168443192.168.2.22108.179.232.85
                        Oct 13, 2021 09:02:20.585155964 CEST49168443192.168.2.22108.179.232.85
                        Oct 13, 2021 09:02:20.627135038 CEST44349168108.179.232.85192.168.2.22
                        Oct 13, 2021 09:02:22.520348072 CEST44349168108.179.232.85192.168.2.22
                        Oct 13, 2021 09:02:22.520469904 CEST44349168108.179.232.85192.168.2.22
                        Oct 13, 2021 09:02:22.520525932 CEST49168443192.168.2.22108.179.232.85
                        Oct 13, 2021 09:02:22.520549059 CEST49168443192.168.2.22108.179.232.85
                        Oct 13, 2021 09:02:22.522505045 CEST49168443192.168.2.22108.179.232.85
                        Oct 13, 2021 09:02:22.522538900 CEST44349168108.179.232.85192.168.2.22
                        Oct 13, 2021 09:02:22.522547960 CEST49168443192.168.2.22108.179.232.85
                        Oct 13, 2021 09:02:22.522599936 CEST49168443192.168.2.22108.179.232.85
                        Oct 13, 2021 09:02:22.924413919 CEST49169443192.168.2.22103.28.121.60
                        Oct 13, 2021 09:02:22.924463987 CEST44349169103.28.121.60192.168.2.22
                        Oct 13, 2021 09:02:22.924607992 CEST49169443192.168.2.22103.28.121.60
                        Oct 13, 2021 09:02:22.925649881 CEST49169443192.168.2.22103.28.121.60
                        Oct 13, 2021 09:02:22.925666094 CEST44349169103.28.121.60192.168.2.22
                        Oct 13, 2021 09:02:23.503318071 CEST44349169103.28.121.60192.168.2.22
                        Oct 13, 2021 09:02:23.503467083 CEST49169443192.168.2.22103.28.121.60
                        Oct 13, 2021 09:02:23.522170067 CEST49169443192.168.2.22103.28.121.60
                        Oct 13, 2021 09:02:23.522190094 CEST44349169103.28.121.60192.168.2.22
                        Oct 13, 2021 09:02:23.522542000 CEST44349169103.28.121.60192.168.2.22
                        Oct 13, 2021 09:02:23.522620916 CEST49169443192.168.2.22103.28.121.60
                        Oct 13, 2021 09:02:23.527468920 CEST49169443192.168.2.22103.28.121.60
                        Oct 13, 2021 09:02:23.571135044 CEST44349169103.28.121.60192.168.2.22
                        Oct 13, 2021 09:02:26.049088001 CEST44349169103.28.121.60192.168.2.22
                        Oct 13, 2021 09:02:26.049292088 CEST44349169103.28.121.60192.168.2.22
                        Oct 13, 2021 09:02:26.049349070 CEST49169443192.168.2.22103.28.121.60
                        Oct 13, 2021 09:02:26.049371958 CEST49169443192.168.2.22103.28.121.60
                        Oct 13, 2021 09:02:26.050398111 CEST49169443192.168.2.22103.28.121.60
                        Oct 13, 2021 09:02:26.050422907 CEST44349169103.28.121.60192.168.2.22
                        Oct 13, 2021 09:02:26.050472021 CEST49169443192.168.2.22103.28.121.60
                        Oct 13, 2021 09:02:26.050503969 CEST49169443192.168.2.22103.28.121.60

                        UDP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Oct 13, 2021 09:02:15.234417915 CEST5216753192.168.2.228.8.8.8
                        Oct 13, 2021 09:02:15.569689989 CEST53521678.8.8.8192.168.2.22
                        Oct 13, 2021 09:02:20.100203991 CEST5059153192.168.2.228.8.8.8
                        Oct 13, 2021 09:02:20.242722988 CEST53505918.8.8.8192.168.2.22
                        Oct 13, 2021 09:02:22.541899920 CEST5780553192.168.2.228.8.8.8
                        Oct 13, 2021 09:02:22.919787884 CEST53578058.8.8.8192.168.2.22

                        DNS Queries

                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        Oct 13, 2021 09:02:15.234417915 CEST192.168.2.228.8.8.80x2484Standard query (0)boogieproductions.com.auA (IP address)IN (0x0001)
                        Oct 13, 2021 09:02:20.100203991 CEST192.168.2.228.8.8.80xf4d3Standard query (0)recapitol.comA (IP address)IN (0x0001)
                        Oct 13, 2021 09:02:22.541899920 CEST192.168.2.228.8.8.80x8d81Standard query (0)iu.ac.bdA (IP address)IN (0x0001)

                        DNS Answers

                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        Oct 13, 2021 09:02:15.569689989 CEST8.8.8.8192.168.2.220x2484No error (0)boogieproductions.com.au101.0.113.93A (IP address)IN (0x0001)
                        Oct 13, 2021 09:02:20.242722988 CEST8.8.8.8192.168.2.220xf4d3No error (0)recapitol.com108.179.232.85A (IP address)IN (0x0001)
                        Oct 13, 2021 09:02:22.919787884 CEST8.8.8.8192.168.2.220x8d81No error (0)iu.ac.bd103.28.121.60A (IP address)IN (0x0001)

                        HTTP Request Dependency Graph

                        • boogieproductions.com.au
                        • recapitol.com
                        • iu.ac.bd

                        HTTPS Proxied Packets

                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.2249167101.0.113.93443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        TimestampkBytes transferredDirectionData
                        2021-10-13 07:02:16 UTC0OUTGET /jJNW2LDF/filkfht.html HTTP/1.1
                        Accept: */*
                        UA-CPU: AMD64
                        Accept-Encoding: gzip, deflate
                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                        Host: boogieproductions.com.au
                        Connection: Keep-Alive
                        2021-10-13 07:02:20 UTC0INHTTP/1.1 200 OK
                        Connection: close
                        x-powered-by: PHP/5.6.40
                        content-type: text/html; charset=UTF-8
                        cache-control: public, max-age=604800
                        expires: Wed, 20 Oct 2021 07:02:19 GMT
                        content-length: 0
                        date: Wed, 13 Oct 2021 07:02:19 GMT
                        server: LiteSpeed
                        vary: User-Agent
                        alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        1192.168.2.2249168108.179.232.85443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        TimestampkBytes transferredDirectionData
                        2021-10-13 07:02:20 UTC0OUTGET /pl92fIeHE11X/filht.html HTTP/1.1
                        Accept: */*
                        UA-CPU: AMD64
                        Accept-Encoding: gzip, deflate
                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                        Host: recapitol.com
                        Connection: Keep-Alive
                        2021-10-13 07:02:22 UTC1INHTTP/1.1 200 OK
                        Date: Wed, 13 Oct 2021 07:02:20 GMT
                        Server: Apache
                        Upgrade: h2,h2c
                        Connection: Upgrade, close
                        Content-Length: 0
                        Content-Type: text/html; charset=UTF-8


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        2192.168.2.2249169103.28.121.60443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        TimestampkBytes transferredDirectionData
                        2021-10-13 07:02:23 UTC1OUTGET /QpPq5lm6Xy/fikfh.html HTTP/1.1
                        Accept: */*
                        UA-CPU: AMD64
                        Accept-Encoding: gzip, deflate
                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                        Host: iu.ac.bd
                        Connection: Keep-Alive
                        2021-10-13 07:02:26 UTC1INHTTP/1.1 200 OK
                        Date: Wed, 13 Oct 2021 07:02:22 GMT
                        Server: Apache
                        Upgrade: h2,h2c
                        Connection: Upgrade, close
                        Content-Length: 0
                        Content-Type: text/html; charset=UTF-8


                        Code Manipulations

                        Statistics

                        Behavior

                        Click to jump to process

                        System Behavior

                        General

                        Start time:09:01:22
                        Start date:13/10/2021
                        Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        Wow64 process (32bit):false
                        Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                        Imagebase:0x13f800000
                        File size:28253536 bytes
                        MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        General

                        Start time:09:01:34
                        Start date:13/10/2021
                        Path:C:\Windows\System32\regsvr32.exe
                        Wow64 process (32bit):false
                        Commandline:'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test
                        Imagebase:0xffa60000
                        File size:19456 bytes
                        MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:09:01:34
                        Start date:13/10/2021
                        Path:C:\Windows\System32\regsvr32.exe
                        Wow64 process (32bit):false
                        Commandline:'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.test
                        Imagebase:0xffa60000
                        File size:19456 bytes
                        MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:09:01:35
                        Start date:13/10/2021
                        Path:C:\Windows\System32\regsvr32.exe
                        Wow64 process (32bit):false
                        Commandline:'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.test
                        Imagebase:0xffa60000
                        File size:19456 bytes
                        MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        Disassembly

                        Code Analysis

                        Reset < >