Loading ...

Play interactive tourEdit tour

Windows Analysis Report sample2.xls.vir

Overview

General Information

Sample Name:sample2.xls.vir (renamed file extension from vir to xls)
Analysis ID:528761
MD5:75c10281f9cae799f72d6b949199fd91
SHA1:7bd8c6de6d714ff5e0b8f450203d24c8dd30495d
SHA256:53a57594efe3312565fd5415ad3d7066799f831bb6854737ffaf87fe0119af01
Tags:virxlsx
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Multi AV Scanner detection for submitted file
Sigma detected: Regsvr32 Command Line Without DLL
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Yara detected hidden Macro 4.0 in Excel
Performs DNS queries to domains with low reputation
Office document connecting to suspicious TLD
Potential document exploit detected (performs DNS queries with low reputation score)
Yara signature match
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
May sleep (evasive loops) to hinder dynamic analysis
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Yara detected Xls With Macro 4.0
Internet Provider seen in connection with other malware
Document contains embedded VBA macros
Potential document exploit detected (performs DNS queries)
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2644 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • regsvr32.exe (PID: 2256 cmdline: "C:\Windows\System32\regsvr32.exe" C:\Datop\test.test MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2568 cmdline: "C:\Windows\System32\regsvr32.exe" C:\Datop\test1.test MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 3000 cmdline: "C:\Windows\System32\regsvr32.exe" C:\Datop\test2.test MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
sample2.xls.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
  • 0x0:$header_docf: D0 CF 11 E0
  • 0x124c8:$s1: Excel
  • 0x1358c:$s1: Excel
  • 0x34b5:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
sample2.xls.xlsJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security
    sample2.xls.xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

      Dropped Files

      SourceRuleDescriptionAuthorStrings
      C:\Users\user\Desktop\sample2.xls.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
      • 0x0:$header_docf: D0 CF 11 E0
      • 0x124c8:$s1: Excel
      • 0x1358c:$s1: Excel
      • 0x34b5:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
      C:\Users\user\Desktop\sample2.xls.xlsJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security
        C:\Users\user\Desktop\sample2.xls.xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

          Sigma Overview

          System Summary:

          barindex
          Sigma detected: Regsvr32 Command Line Without DLLShow sources
          Source: Process startedAuthor: Florian Roth: Data: Command: "C:\Windows\System32\regsvr32.exe" C:\Datop\test.test, CommandLine: "C:\Windows\System32\regsvr32.exe" C:\Datop\test.test, CommandLine|base64offset|contains: , Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2644, ProcessCommandLine: "C:\Windows\System32\regsvr32.exe" C:\Datop\test.test, ProcessId: 2256
          Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
          Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: "C:\Windows\System32\regsvr32.exe" C:\Datop\test.test, CommandLine: "C:\Windows\System32\regsvr32.exe" C:\Datop\test.test, CommandLine|base64offset|contains: , Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2644, ProcessCommandLine: "C:\Windows\System32\regsvr32.exe" C:\Datop\test.test, ProcessId: 2256

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Multi AV Scanner detection for submitted fileShow sources
          Source: sample2.xls.xlsVirustotal: Detection: 37%Perma Link
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

          Software Vulnerabilities:

          barindex
          Document exploit detected (process start blacklist hit)Show sources
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
          Document exploit detected (UrlDownloadToFile)Show sources
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
          Potential document exploit detected (performs DNS queries with low reputation score)Show sources
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDNS query: name: gupta-foods.xyz
          Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.15.56.22:80
          Source: global trafficDNS query: name: gupta-foods.xyz

          Networking:

          barindex
          Performs DNS queries to domains with low reputationShow sources
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDNS query: gupta-foods.xyz
          Office document connecting to suspicious TLDShow sources
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDNS traffic detected: gupta-foods.xyz
          Source: global trafficTCP traffic: 192.168.2.22:49165 -> 51.15.56.22:80
          Source: Joe Sandbox ViewASN Name: OnlineSASFR OnlineSASFR
          Source: regsvr32.exe, 00000005.00000002.577525725.0000000004A00000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556615262.0000000004A90000.00000002.00020000.sdmp, regsvr32.exe, 00000007.00000002.573740679.0000000004800000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
          Source: regsvr32.exe, 00000005.00000002.577525725.0000000004A00000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556615262.0000000004A90000.00000002.00020000.sdmp, regsvr32.exe, 00000007.00000002.573740679.0000000004800000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
          Source: regsvr32.exe, 00000005.00000002.577525725.0000000004A00000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556615262.0000000004A90000.00000002.00020000.sdmp, regsvr32.exe, 00000007.00000002.573740679.0000000004800000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
          Source: regsvr32.exe, 00000005.00000002.577764523.0000000004BE7000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556792501.0000000004C77000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
          Source: regsvr32.exe, 00000005.00000002.577764523.0000000004BE7000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556792501.0000000004C77000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
          Source: regsvr32.exe, 00000005.00000002.576925311.0000000003AA0000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556186811.0000000003B00000.00000002.00020000.sdmp, regsvr32.exe, 00000007.00000002.573207626.0000000003A00000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
          Source: regsvr32.exe, 00000005.00000002.576341085.0000000001CC0000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.555674088.0000000001CF0000.00000002.00020000.sdmp, regsvr32.exe, 00000007.00000002.572632835.0000000001CB0000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
          Source: regsvr32.exe, 00000005.00000002.577764523.0000000004BE7000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556792501.0000000004C77000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
          Source: regsvr32.exe, 00000005.00000002.577764523.0000000004BE7000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556792501.0000000004C77000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
          Source: regsvr32.exe, 00000005.00000002.576925311.0000000003AA0000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556186811.0000000003B00000.00000002.00020000.sdmp, regsvr32.exe, 00000007.00000002.573207626.0000000003A00000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
          Source: regsvr32.exe, 00000005.00000002.577525725.0000000004A00000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556615262.0000000004A90000.00000002.00020000.sdmp, regsvr32.exe, 00000007.00000002.573740679.0000000004800000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
          Source: regsvr32.exe, 00000005.00000002.577764523.0000000004BE7000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556792501.0000000004C77000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
          Source: regsvr32.exe, 00000005.00000002.577525725.0000000004A00000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556615262.0000000004A90000.00000002.00020000.sdmp, regsvr32.exe, 00000007.00000002.573740679.0000000004800000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
          Source: regsvr32.exe, 00000007.00000002.573740679.0000000004800000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
          Source: unknownDNS traffic detected: queries for: gupta-foods.xyz

          System Summary:

          barindex
          Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
          Source: Screenshot number: 8Screenshot OCR: Enable Editing 18 19 20 (D PROTECTED VIEW Be careful - files from the Internet can contF viruses.
          Source: Screenshot number: 8Screenshot OCR: Enable Content 25 26 CD SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 30
          Source: Document image extraction number: 0Screenshot OCR: Enable Editing CD PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless y
          Source: Document image extraction number: 0Screenshot OCR: Enable Content CD SECURITY WARNING Macros have been disabled. Enable Content cm If you are using
          Source: Document image extraction number: 1Screenshot OCR: Enable Editing CD PROTECTE D VIEW Be careful - files from the Internet mn contain viruses. UrUe$$ y
          Source: Document image extraction number: 1Screenshot OCR: Enable Content (D SECURITY WARNING Macros have been disabled. Enable Content 0">Gj If you are usin
          Source: Screenshot number: 12Screenshot OCR: Enable Editing (D PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless y
          Source: Screenshot number: 12Screenshot OCR: Enable Content CD SECURITY WARNING Macros have been disabled. Enable Content cm If you are using
          Source: sample2.xls.xls, type: SAMPLEMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
          Source: C:\Users\user\Desktop\sample2.xls.xls, type: DROPPEDMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
          Source: sample2.xls.xlsMacro extractor: Sheet name: Beff2
          Source: sample2.xls.xlsMacro extractor: Sheet name: Beff4
          Source: sample2.xls.xlsMacro extractor: Sheet name: Beff7
          Source: sample2.xls.xlsMacro extractor: Sheet name: Beff5
          Source: sample2.xls.xlsMacro extractor: Sheet name: Beff1
          Source: sample2.xls.xlsMacro extractor: Sheet name: Beff8
          Source: sample2.xls.xlsMacro extractor: Sheet name: Beff3
          Source: sample2.xls.xlsMacro extractor: Sheet name: Beff6
          Source: sample2.xls.xlsOLE indicator, VBA macros: true
          Source: sample2.xls.xls.0.drOLE indicator, VBA macros: true
          Source: 7D1C.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
          Source: sample2.xls.xlsVirustotal: Detection: 37%
          Source: C:\Windows\System32\regsvr32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: sample2.xls.xlsOLE indicator, Workbook stream: true
          Source: sample2.xls.xls.0.drOLE indicator, Workbook stream: true
          Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\System32\regsvr32.exe" C:\Datop\test.test
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\System32\regsvr32.exe" C:\Datop\test1.test
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\System32\regsvr32.exe" C:\Datop\test2.test
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\System32\regsvr32.exe" C:\Datop\test.test
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\System32\regsvr32.exe" C:\Datop\test1.test
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\System32\regsvr32.exe" C:\Datop\test2.test
          Source: regsvr32.exe, 00000005.00000002.577525725.0000000004A00000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556615262.0000000004A90000.00000002.00020000.sdmp, regsvr32.exe, 00000007.00000002.573740679.0000000004800000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRDD72.tmpJump to behavior
          Source: classification engineClassification label: mal88.troj.expl.winXLS@7/4@3/1
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEAutomated click: OK
          Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
          Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
          Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: sample2.xls.xlsInitial sample: OLE indicator appname = Microsoft Macintosh Excel
          Source: sample2.xls.xlsInitial sample: OLE summary creatingapplication = Microsoft Macintosh Excel
          Source: sample2.xls.xls.0.drInitial sample: OLE indicator appname = Microsoft Macintosh Excel
          Source: sample2.xls.xls.0.drInitial sample: OLE summary creatingapplication = Microsoft Macintosh Excel
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
          Source: 7D1C.tmp.0.drInitial sample: OLE indicators vbamacros = False
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\regsvr32.exe TID: 200Thread sleep time: -60000s >= -30000s
          Source: C:\Windows\System32\regsvr32.exe TID: 2532Thread sleep time: -60000s >= -30000s
          Source: C:\Windows\System32\regsvr32.exe TID: 2944Thread sleep time: -60000s >= -30000s

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          Yara detected hidden Macro 4.0 in ExcelShow sources
          Source: Yara matchFile source: sample2.xls.xls, type: SAMPLE
          Source: Yara matchFile source: C:\Users\user\Desktop\sample2.xls.xls, type: DROPPED
          Source: Yara matchFile source: sample2.xls.xls, type: SAMPLE
          Source: Yara matchFile source: C:\Users\user\Desktop\sample2.xls.xls, type: DROPPED

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsScripting1Path InterceptionProcess Injection1Disable or Modify Tools1OS Credential DumpingVirtualization/Sandbox Evasion1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsExploitation for Client Execution32Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerSystem Information Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          sample2.xls.xls37%VirustotalBrowse

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          No Antivirus matches

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://www.%s.comPA0%URL Reputationsafe
          http://www.icra.org/vocabulary/.0%URL Reputationsafe
          http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
          http://servername/isapibackend.dll0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          gupta-foods.xyz
          51.15.56.22
          truetrue
            unknown
            gupta-airways.icu
            51.15.56.22
            truefalse
              unknown
              gupta-technologies.sbs
              51.15.56.22
              truefalse
                unknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkregsvr32.exe, 00000005.00000002.577764523.0000000004BE7000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556792501.0000000004C77000.00000002.00020000.sdmpfalse
                  high
                  http://www.windows.com/pctv.regsvr32.exe, 00000007.00000002.573740679.0000000004800000.00000002.00020000.sdmpfalse
                    high
                    http://investor.msn.comregsvr32.exe, 00000005.00000002.577525725.0000000004A00000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556615262.0000000004A90000.00000002.00020000.sdmp, regsvr32.exe, 00000007.00000002.573740679.0000000004800000.00000002.00020000.sdmpfalse
                      high
                      http://www.msnbc.com/news/ticker.txtregsvr32.exe, 00000005.00000002.577525725.0000000004A00000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556615262.0000000004A90000.00000002.00020000.sdmp, regsvr32.exe, 00000007.00000002.573740679.0000000004800000.00000002.00020000.sdmpfalse
                        high
                        http://www.%s.comPAregsvr32.exe, 00000005.00000002.576925311.0000000003AA0000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556186811.0000000003B00000.00000002.00020000.sdmp, regsvr32.exe, 00000007.00000002.573207626.0000000003A00000.00000002.00020000.sdmpfalse
                        • URL Reputation: safe
                        low
                        http://www.icra.org/vocabulary/.regsvr32.exe, 00000005.00000002.577764523.0000000004BE7000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556792501.0000000004C77000.00000002.00020000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.regsvr32.exe, 00000005.00000002.576925311.0000000003AA0000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556186811.0000000003B00000.00000002.00020000.sdmp, regsvr32.exe, 00000007.00000002.573207626.0000000003A00000.00000002.00020000.sdmpfalse
                          high
                          http://windowsmedia.com/redir/services.asp?WMPFriendly=trueregsvr32.exe, 00000005.00000002.577764523.0000000004BE7000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556792501.0000000004C77000.00000002.00020000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.hotmail.com/oeregsvr32.exe, 00000005.00000002.577525725.0000000004A00000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556615262.0000000004A90000.00000002.00020000.sdmp, regsvr32.exe, 00000007.00000002.573740679.0000000004800000.00000002.00020000.sdmpfalse
                            high
                            http://servername/isapibackend.dllregsvr32.exe, 00000005.00000002.576341085.0000000001CC0000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.555674088.0000000001CF0000.00000002.00020000.sdmp, regsvr32.exe, 00000007.00000002.572632835.0000000001CB0000.00000002.00020000.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://investor.msn.com/regsvr32.exe, 00000005.00000002.577525725.0000000004A00000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.556615262.0000000004A90000.00000002.00020000.sdmp, regsvr32.exe, 00000007.00000002.573740679.0000000004800000.00000002.00020000.sdmpfalse
                              high

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              51.15.56.22
                              gupta-foods.xyzFrance
                              12876OnlineSASFRtrue

                              General Information

                              Joe Sandbox Version:34.0.0 Boulder Opal
                              Analysis ID:528761
                              Start date:25.11.2021
                              Start time:18:41:48
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 7m 20s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:sample2.xls.vir (renamed file extension from vir to xls)
                              Cookbook file name:defaultwindowsofficecookbook.jbs
                              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                              Number of analysed new started processes analysed:8
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal88.troj.expl.winXLS@7/4@3/1
                              EGA Information:Failed
                              HDC Information:Failed
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found Word or Excel or PowerPoint or XPS Viewer
                              • Attach to Office via COM
                              • Scroll down
                              • Close Viewer
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, svchost.exe

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              18:43:26API Interceptor199x Sleep call for process: regsvr32.exe modified

                              Joe Sandbox View / Context

                              IPs

                              No context

                              Domains

                              No context

                              ASN

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              OnlineSASFREzCOXP6oxy.dllGet hashmaliciousBrowse
                              • 195.154.146.35
                              IkroV40UrZ.dllGet hashmaliciousBrowse
                              • 195.154.146.35
                              C1Q17Dg4RT.dllGet hashmaliciousBrowse
                              • 195.154.146.35
                              MakbLShaqA.dllGet hashmaliciousBrowse
                              • 195.154.146.35
                              MakbLShaqA.dllGet hashmaliciousBrowse
                              • 195.154.146.35
                              tUJXpPwU27.dllGet hashmaliciousBrowse
                              • 195.154.146.35
                              pYebrdRKvR.dllGet hashmaliciousBrowse
                              • 195.154.146.35
                              pPX9DaPVYj.dllGet hashmaliciousBrowse
                              • 195.154.146.35
                              wUKXjICs5f.dllGet hashmaliciousBrowse
                              • 195.154.146.35
                              cRC6TZG6Wx.dllGet hashmaliciousBrowse
                              • 195.154.146.35
                              qrb6jVwzoe.dllGet hashmaliciousBrowse
                              • 195.154.146.35
                              1711.docGet hashmaliciousBrowse
                              • 195.154.146.35
                              j9ZfvcmyKNGet hashmaliciousBrowse
                              • 51.158.220.39
                              GQwxmGZFvtg.dllGet hashmaliciousBrowse
                              • 195.154.146.35
                              wNjqkrm8pH.dllGet hashmaliciousBrowse
                              • 195.154.146.35
                              5YO8hZg21O.dllGet hashmaliciousBrowse
                              • 195.154.146.35
                              dUGnMYeP1C.dllGet hashmaliciousBrowse
                              • 195.154.146.35
                              yFAXc9z51V.dllGet hashmaliciousBrowse
                              • 195.154.146.35
                              9fC0as7YLE.dllGet hashmaliciousBrowse
                              • 195.154.146.35
                              FIyE6huzxV.dllGet hashmaliciousBrowse
                              • 195.154.146.35

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              No context

                              Created / dropped Files

                              C:\Users\user\AppData\Local\Temp\7D1C.tmp
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:Composite Document File V2 Document, Cannot read section info
                              Category:dropped
                              Size (bytes):1536
                              Entropy (8bit):1.1464700112623651
                              Encrypted:false
                              SSDEEP:3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X
                              MD5:72F5C05B7EA8DD6059BF59F50B22DF33
                              SHA1:D5AF52E129E15E3A34772806F6C5FBF132E7408E
                              SHA-256:1DC0C8D7304C177AD0E74D3D2F1002EB773F4B180685A7DF6BBE75CCC24B0164
                              SHA-512:6FF1E2E6B99BD0A4ED7CA8A9E943551BCD73A0BEFCACE6F1B1106E88595C0846C9BB76CA99A33266FFEC2440CF6A440090F803ABBF28B208A6C7BC6310BEB39E
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview: ......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Temp\~DF30EC3661E732423E.TMP
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):28672
                              Entropy (8bit):3.273337417227373
                              Encrypted:false
                              SSDEEP:768:DPdjpk3hOdsylKlgxopeiBNhZFGzE+cL2kdAJJ6Q470:5Nk3hOdsylKlgxopeiBNhZFGzE+cL2ko
                              MD5:D5179EC42D940F87860096C6723AB54D
                              SHA1:B382B6F7D9FAE38B8A0D1C13B790B216B85A92C0
                              SHA-256:11BD2AD09C3D35E05FE908B1CF17ABC875E95DEBCCCC821204BFDDE8AE2A411D
                              SHA-512:92559C475C1818BEF833FEE331ED65D0D2A9EB40732BF5B97E5F97DF85DF71F045CCC4E4539765A4DEEC4CB1BDCCBA06BB41158F42D7D0BDABDED66AD5BCA174
                              Malicious:false
                              Reputation:low
                              Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Temp\~DF6FA4235239FD3AE0.TMP
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):512
                              Entropy (8bit):0.0
                              Encrypted:false
                              SSDEEP:3::
                              MD5:BF619EAC0CDF3F68D496EA9344137E8B
                              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\Desktop\sample2.xls.xls
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:Composite Document File V2 Document, Little Endian, Os: MacOS, Version 6.11, Code page: -535, Last Saved By: Microsoft Office User, Name of Creating Application: Microsoft Macintosh Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Sun Nov 21 19:57:52 2021, Security: 0
                              Category:dropped
                              Size (bytes):84480
                              Entropy (8bit):6.340445126312824
                              Encrypted:false
                              SSDEEP:1536:NNk3hOdsylKlgxopeiBNhZFGzE+cL2kdAy91vrVmxJiME2GhdD52lZPFu1AOg0+Q:Tk3hOdsylKlgxopeiBNhZFGzE+cL2kdj
                              MD5:F5DF0164EDB6DDBA1741BE8E96278AE7
                              SHA1:98D665DD496C78B7D1490F190196FB92118833E0
                              SHA-256:91B81F22FEB1C6C4BBA109BB19C2D9A6948096D46D5A41B40A40858828AA5CCB
                              SHA-512:28F497C9EDFF05E5E696CDB05AF1084ADB41756B113694FDCEA4C493D5C9856C185AD9D7FD9626A0613EC9E22D96D11DDA087AAB7100F5DFF008131745A444E0
                              Malicious:true
                              Yara Hits:
                              • Rule: SUSP_Excel4Macro_AutoOpen, Description: Detects Excel4 macro use with auto open / close, Source: C:\Users\user\Desktop\sample2.xls.xls, Author: John Lambert @JohnLaTwC
                              • Rule: JoeSecurity_XlsWithMacro4, Description: Yara detected Xls With Macro 4.0, Source: C:\Users\user\Desktop\sample2.xls.xls, Author: Joe Security
                              • Rule: JoeSecurity_HiddenMacro, Description: Yara detected hidden Macro 4.0 in Excel, Source: C:\Users\user\Desktop\sample2.xls.xls, Author: Joe Security
                              Reputation:low
                              Preview: ......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................ZO..........................\.p....usersoft Office User B.....a.........=. .....................................................................=........p\D8.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................

                              Static File Info

                              General

                              File type:Composite Document File V2 Document, Little Endian, Os: MacOS, Version 6.11, Code page: -535, Last Saved By: Microsoft Office User, Name of Creating Application: Microsoft Macintosh Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Sun Nov 21 19:57:52 2021, Security: 0
                              Entropy (8bit):6.340423482922574
                              TrID:
                              • Microsoft Excel sheet (30009/1) 78.94%
                              • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                              File name:sample2.xls.xls
                              File size:84481
                              MD5:75c10281f9cae799f72d6b949199fd91
                              SHA1:7bd8c6de6d714ff5e0b8f450203d24c8dd30495d
                              SHA256:53a57594efe3312565fd5415ad3d7066799f831bb6854737ffaf87fe0119af01
                              SHA512:f038bd4f0d0d6108502a761de35d10cb53b7351c18b744b4c9b247bbf10fdc8962fe516f90c1a05a7583731711dcd98b46a3667a3e9d9f79a48d035fc0e1ba49
                              SSDEEP:1536:oNk3hOdsylKlgxopeiBNhZFGzE+cL2kdAy91vrVmxJiME2GhdD52lZPFu1AOg0+d:wk3hOdsylKlgxopeiBNhZFGzE+cL2kd0
                              File Content Preview:........................>......................................................................................................................................................................................................................................

                              File Icon

                              Icon Hash:e4eea286a4b4bcb4

                              Static OLE Info

                              General

                              Document Type:OLE
                              Number of OLE Files:1

                              OLE File "sample2.xls.xls"

                              Indicators

                              Has Summary Info:True
                              Application Name:Microsoft Macintosh Excel
                              Encrypted Document:False
                              Contains Word Document Stream:False
                              Contains Workbook/Book Stream:True
                              Contains PowerPoint Document Stream:False
                              Contains Visio Document Stream:False
                              Contains ObjectPool Stream:
                              Flash Objects Count:
                              Contains VBA Macros:True

                              Summary

                              Code Page:-535
                              Author:
                              Last Saved By:Microsoft Office User
                              Create Time:2015-06-05 18:19:34
                              Last Saved Time:2021-11-21 19:57:52
                              Creating Application:Microsoft Macintosh Excel
                              Security:0

                              Document Summary

                              Document Code Page:10000
                              Thumbnail Scaling Desired:False
                              Company:
                              Contains Dirty Links:False
                              Shared Document:False
                              Changed Hyperlinks:False
                              Application Version:1048576

                              Streams

                              Stream Path: \x5DocumentSummaryInformation, File Type: DOS 2.0 backup id file, sequence 255, Stream Size: 4096
                              General
                              Stream Path:\x5DocumentSummaryInformation
                              File Type:DOS 2.0 backup id file, sequence 255
                              Stream Size:4096
                              Entropy:0.524075872596
                              Base64 Encoded:True
                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . x . . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . 1 . . . . . . . . ' . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t . . . . . S b u r 1 . . . . . S b u r 2 . . . . . S b u r 3 . . . . . K o n . . . . . D E F W 3 . . .
                              Data Raw:fe ff 00 00 0b 06 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 78 01 00 00 09 00 00 00 01 00 00 00 50 00 00 00 0f 00 00 00 58 00 00 00 17 00 00 00 64 00 00 00 0b 00 00 00 6c 00 00 00 10 00 00 00 74 00 00 00 13 00 00 00 7c 00 00 00 16 00 00 00 84 00 00 00 0d 00 00 00 8c 00 00 00 0c 00 00 00 31 01 00 00
                              Stream Path: \x5SummaryInformation, File Type: DOS 2.0 backup id file, sequence 255, Stream Size: 4096
                              General
                              Stream Path:\x5SummaryInformation
                              File Type:DOS 2.0 backup id file, sequence 255
                              Stream Size:4096
                              Entropy:0.362230044265
                              Base64 Encoded:False
                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . \\ . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t O f f i c e U s e r . . . . . . . . . . . M i c r o s o f t M a c i n t o s h E x c e l . . . @ . . . . ? R , . . . . @ . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                              Data Raw:fe ff 00 00 0b 06 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 c0 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 5c 00 00 00 12 00 00 00 7c 00 00 00 0c 00 00 00 a0 00 00 00 0d 00 00 00 ac 00 00 00 13 00 00 00 b8 00 00 00 02 00 00 00 e9 fd 00 00 1e 00 00 00 0c 00 00 00
                              Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 74205
                              General
                              Stream Path:Workbook
                              File Type:Applesoft BASIC program data, first line number 16
                              Stream Size:74205
                              Entropy:6.85065334264
                              Base64 Encoded:True
                              Data ASCII:. . . . . . . . Z O . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . M i c r o s o f t O f f i c e U s e r B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . . . . p \\ D 8 . . .
                              Data Raw:09 08 10 00 00 06 05 00 5a 4f cd 07 c9 00 02 00 06 08 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 15 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 55 73 65 72 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                              Macro 4.0 Code

                              1,8,o
                              9,3,=CHAR(Sbur1!E59)
                              
                              0,7,L
                              7,2,=CHAR(Sbur1!S55)
                              
                              11,3,=CHAR(Sbur1!G54)
                              
                              3,8,C
                              9,2,=CHAR(Sbur1!O57)
                              
                              7,9,r
                              10,2,=CHAR(Sbur1!D53)
                              
                              1,6,A
                              
                              1,0,=
                              8,4,=CHAR(Sbur1!J53)
                              
                              2,1,e
                              9,3,=CHAR(Sbur1!T60)
                              

                              Network Behavior

                              Network Port Distribution

                              TCP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Nov 25, 2021 18:42:42.533238888 CET4916580192.168.2.2251.15.56.22
                              Nov 25, 2021 18:42:45.538197041 CET4916580192.168.2.2251.15.56.22
                              Nov 25, 2021 18:42:51.544683933 CET4916580192.168.2.2251.15.56.22
                              Nov 25, 2021 18:43:03.655179024 CET4916680192.168.2.2251.15.56.22
                              Nov 25, 2021 18:43:06.662525892 CET4916680192.168.2.2251.15.56.22
                              Nov 25, 2021 18:43:12.669038057 CET4916680192.168.2.2251.15.56.22
                              Nov 25, 2021 18:43:24.763565063 CET4916780192.168.2.2251.15.56.22
                              Nov 25, 2021 18:43:27.771202087 CET4916780192.168.2.2251.15.56.22
                              Nov 25, 2021 18:43:33.793390036 CET4916780192.168.2.2251.15.56.22

                              UDP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Nov 25, 2021 18:42:42.486798048 CET5216753192.168.2.228.8.8.8
                              Nov 25, 2021 18:42:42.525017023 CET53521678.8.8.8192.168.2.22
                              Nov 25, 2021 18:43:03.592708111 CET5059153192.168.2.228.8.8.8
                              Nov 25, 2021 18:43:03.651011944 CET53505918.8.8.8192.168.2.22
                              Nov 25, 2021 18:43:24.698291063 CET5780553192.168.2.228.8.8.8
                              Nov 25, 2021 18:43:24.758454084 CET53578058.8.8.8192.168.2.22

                              DNS Queries

                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Nov 25, 2021 18:42:42.486798048 CET192.168.2.228.8.8.80x5ee5Standard query (0)gupta-foods.xyzA (IP address)IN (0x0001)
                              Nov 25, 2021 18:43:03.592708111 CET192.168.2.228.8.8.80x9dfaStandard query (0)gupta-technologies.sbsA (IP address)IN (0x0001)
                              Nov 25, 2021 18:43:24.698291063 CET192.168.2.228.8.8.80x88dfStandard query (0)gupta-airways.icuA (IP address)IN (0x0001)

                              DNS Answers

                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Nov 25, 2021 18:42:42.525017023 CET8.8.8.8192.168.2.220x5ee5No error (0)gupta-foods.xyz51.15.56.22A (IP address)IN (0x0001)
                              Nov 25, 2021 18:43:03.651011944 CET8.8.8.8192.168.2.220x9dfaNo error (0)gupta-technologies.sbs51.15.56.22A (IP address)IN (0x0001)
                              Nov 25, 2021 18:43:24.758454084 CET8.8.8.8192.168.2.220x88dfNo error (0)gupta-airways.icu51.15.56.22A (IP address)IN (0x0001)

                              Code Manipulations

                              Statistics

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:18:42:17
                              Start date:25/11/2021
                              Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              Wow64 process (32bit):false
                              Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                              Imagebase:0x13ff90000
                              File size:28253536 bytes
                              MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:18:43:25
                              Start date:25/11/2021
                              Path:C:\Windows\System32\regsvr32.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Windows\System32\regsvr32.exe" C:\Datop\test.test
                              Imagebase:0xff590000
                              File size:19456 bytes
                              MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:18:43:26
                              Start date:25/11/2021
                              Path:C:\Windows\System32\regsvr32.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Windows\System32\regsvr32.exe" C:\Datop\test1.test
                              Imagebase:0xff590000
                              File size:19456 bytes
                              MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:18:43:26
                              Start date:25/11/2021
                              Path:C:\Windows\System32\regsvr32.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Windows\System32\regsvr32.exe" C:\Datop\test2.test
                              Imagebase:0xff590000
                              File size:19456 bytes
                              MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Disassembly

                              Code Analysis

                              Reset < >