Source: atochagaleria.com.ar |
Virustotal: Detection: 5% |
Perma Link |
Source: https://atochagaleria.com.ar/CnijALAyxR/l.html |
Virustotal: Detection: 8% |
Perma Link |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll |
Jump to behavior |
Source: unknown |
HTTPS traffic detected: 199.79.62.121:443 -> 192.168.2.22:49165 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 162.241.2.103:443 -> 192.168.2.22:49166 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 192.99.46.215:443 -> 192.168.2.22:49167 version: TLS 1.2 |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process created: C:\Windows\System32\regsvr32.exe |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Section loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA |
Jump to behavior |
Source: global traffic |
TCP traffic: 192.168.2.22:49165 -> 199.79.62.121:443 |
Source: global traffic |
DNS query: name: maberic.com |
Source: global traffic |
TCP traffic: 192.168.2.22:49165 -> 199.79.62.121:443 |
Source: global traffic |
HTTP traffic detected: GET /3XRJdBEjFc/l.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: maberic.comConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /toXuNS00/l.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: ost.net.brConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /CnijALAyxR/l.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: atochagaleria.com.arConnection: Keep-Alive |
Source: Joe Sandbox View |
JA3 fingerprint: 7dcce5b76c8b17472d024758970a406b |
Source: Joe Sandbox View |
IP Address: 162.241.2.103 162.241.2.103 |
Source: Joe Sandbox View |
IP Address: 199.79.62.121 199.79.62.121 |
Source: Joe Sandbox View |
IP Address: 192.99.46.215 192.99.46.215 |
Source: Joe Sandbox View |
IP Address: 192.99.46.215 192.99.46.215 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49167 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49166 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49165 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49165 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49167 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 49166 -> 443 |
Source: regsvr32.exe, 00000003.00000002.479605737.0000000004930000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418341066.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437751043.0000000004A00000.00000002.00020000.sdmp |
String found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail) |
Source: regsvr32.exe, 00000003.00000002.479605737.0000000004930000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418341066.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437751043.0000000004A00000.00000002.00020000.sdmp |
String found in binary or memory: http://investor.msn.com |
Source: regsvr32.exe, 00000003.00000002.479605737.0000000004930000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418341066.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437751043.0000000004A00000.00000002.00020000.sdmp |
String found in binary or memory: http://investor.msn.com/ |
Source: regsvr32.exe, 00000003.00000002.479805319.0000000004B17000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418553608.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437972841.0000000004BE7000.00000002.00020000.sdmp |
String found in binary or memory: http://localizability/practices/XML.asp |
Source: regsvr32.exe, 00000003.00000002.479805319.0000000004B17000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418553608.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437972841.0000000004BE7000.00000002.00020000.sdmp |
String found in binary or memory: http://localizability/practices/XMLConfiguration.asp |
Source: regsvr32.exe, 00000003.00000002.478982163.0000000003A50000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.417826349.0000000003A90000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437307506.0000000003B50000.00000002.00020000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous. |
Source: regsvr32.exe, 00000003.00000002.478519739.0000000001CF0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.417140557.0000000001CC0000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.436860950.0000000001E20000.00000002.00020000.sdmp |
String found in binary or memory: http://servername/isapibackend.dll |
Source: regsvr32.exe, 00000003.00000002.479805319.0000000004B17000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418553608.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437972841.0000000004BE7000.00000002.00020000.sdmp |
String found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check |
Source: regsvr32.exe, 00000003.00000002.479805319.0000000004B17000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418553608.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437972841.0000000004BE7000.00000002.00020000.sdmp |
String found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true |
Source: regsvr32.exe, 00000003.00000002.478982163.0000000003A50000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.417826349.0000000003A90000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437307506.0000000003B50000.00000002.00020000.sdmp |
String found in binary or memory: http://www.%s.comPA |
Source: regsvr32.exe, 00000003.00000002.479605737.0000000004930000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418341066.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437751043.0000000004A00000.00000002.00020000.sdmp |
String found in binary or memory: http://www.hotmail.com/oe |
Source: regsvr32.exe, 00000003.00000002.479805319.0000000004B17000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418553608.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437972841.0000000004BE7000.00000002.00020000.sdmp |
String found in binary or memory: http://www.icra.org/vocabulary/. |
Source: regsvr32.exe, 00000003.00000002.479605737.0000000004930000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418341066.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437751043.0000000004A00000.00000002.00020000.sdmp |
String found in binary or memory: http://www.msnbc.com/news/ticker.txt |
Source: regsvr32.exe, 00000005.00000002.437751043.0000000004A00000.00000002.00020000.sdmp |
String found in binary or memory: http://www.windows.com/pctv. |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\l[1].htm |
Jump to behavior |
Source: unknown |
DNS traffic detected: queries for: maberic.com |
Source: global traffic |
HTTP traffic detected: GET /3XRJdBEjFc/l.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: maberic.comConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /toXuNS00/l.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: ost.net.brConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /CnijALAyxR/l.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: atochagaleria.com.arConnection: Keep-Alive |
Source: unknown |
HTTPS traffic detected: 199.79.62.121:443 -> 192.168.2.22:49165 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 162.241.2.103:443 -> 192.168.2.22:49166 version: TLS 1.2 |
Source: unknown |
HTTPS traffic detected: 192.99.46.215:443 -> 192.168.2.22:49167 version: TLS 1.2 |
Source: Screenshot number: 4 |
Screenshot OCR: Enable Editing 18 '9 41' I 20 (D PROTECTED VIEW Be careful- files from the 1nterne ,cted View. |
Source: Screenshot number: 4 |
Screenshot OCR: Enable Content 25 26 Q) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 30 |
Source: Screenshot number: 8 |
Screenshot OCR: Enable Editing 18 '9 41' I 20 (D PROTECTED VIEW Be careful- files from the 1nterne ,cted View. |
Source: Screenshot number: 8 |
Screenshot OCR: Enable Content 25 26 Q) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 30 |
Source: Screenshot number: 12 |
Screenshot OCR: Enable Editing 18 '9 41' I 20 (D PROTECTED VIEW Be careful- files from the 1nterne ,cted View. |
Source: Screenshot number: 12 |
Screenshot OCR: Enable Content 25 26 Q) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 30 |
Source: Document image extraction number: 0 |
Screenshot OCR: Enable Editing CD PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless y |
Source: Document image extraction number: 0 |
Screenshot OCR: Enable Content Q) SECURITY WARNING Macros have been disabled. Enable Content om If you are using a |
Source: Document image extraction number: 1 |
Screenshot OCR: Enable Editing (D PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unk$$ yo |
Source: Document image extraction number: 1 |
Screenshot OCR: Enable Content )SECURITY WARNING Macros have been disabled. Enable Content om If you are using a |
Source: Screenshot number: 16 |
Screenshot OCR: Enable Editing 18 19 20 (D PROTECTED VIEW Be careful - files from the Internet can contain viruse |
Source: Screenshot number: 16 |
Screenshot OCR: Enable Content 25 26 Q) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 30 |
Source: Screenshot number: 20 |
Screenshot OCR: Enable Editing 19 20 (D PROTECTED VIEW Be careful - files from the Internet can contain viruses. U |
Source: Screenshot number: 20 |
Screenshot OCR: Enable Content 25 26 Q) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 30 |
Source: protocol.xls, type: SAMPLE |
Matched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f |
Source: C:\Users\user\Desktop\protocol.xls, type: DROPPED |
Matched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f |
Source: protocol.xls |
OLE indicator, VBA macros: true |
Source: protocol.xls.0.dr |
OLE indicator, VBA macros: true |
Source: CD1E.tmp.0.dr |
OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA |
Jump to behavior |
Source: protocol.xls |
OLE indicator, Workbook stream: true |
Source: protocol.xls.0.dr |
OLE indicator, Workbook stream: true |
Source: unknown |
Process created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding |
|
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test |
|
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.test |
|
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.test |
|
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.test |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.test |
Jump to behavior |
Source: protocol.xls |
Joe Sandbox Cloud Basic: Detection: clean Score: 0 |
Perma Link |
Source: regsvr32.exe, 00000003.00000002.479605737.0000000004930000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418341066.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437751043.0000000004A00000.00000002.00020000.sdmp |
Binary or memory string: .VBPud<_ |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File created: C:\Users\user\AppData\Local\Temp\CVRD190.tmp |
Jump to behavior |
Source: classification engine |
Classification label: mal76.expl.winXLS@7/4@3/3 |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File read: C:\Users\desktop.ini |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Automated click: OK |
Source: C:\Windows\System32\regsvr32.exe |
Automated click: OK |
Source: C:\Windows\System32\regsvr32.exe |
Automated click: OK |
Source: C:\Windows\System32\regsvr32.exe |
Automated click: OK |
Source: Window Recorder |
Window detected: More than 3 window changes detected |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll |
Jump to behavior |
Source: CD1E.tmp.0.dr |
Initial sample: OLE indicators vbamacros = False |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe TID: 2856 |
Thread sleep count: 65 > 30 |
Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe TID: 2928 |
Thread sleep time: -60000s >= -30000s |
Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe TID: 2576 |
Thread sleep time: -60000s >= -30000s |
Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe TID: 2116 |
Thread sleep count: 57 > 30 |
Jump to behavior |
Source: C:\Windows\System32\regsvr32.exe TID: 292 |
Thread sleep time: -60000s >= -30000s |
Jump to behavior |
Source: Yara match |
File source: protocol.xls, type: SAMPLE |
Source: Yara match |
File source: C:\Users\user\Desktop\protocol.xls, type: DROPPED |