Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
#U8d26#U53f7#U5bc6#U7801#U8868.xls.exe

Overview

General Information

Sample Name:#U8d26#U53f7#U5bc6#U7801#U8868.xls.exe
Analysis ID:679121
MD5:2d2e2831ae6351fbee7810bfc0d10955
SHA1:52a95894b8551743058a1bfe56e38919f43819c4
SHA256:ffeb7d694c82c2dfa5344d082b61386561202ccde69fc11257916b0da515c922
Tags:exe
Infos:

Detection

CobaltStrike
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected CobaltStrike
C2 URLs / IPs found in malware configuration
Uses an obfuscated file name to hide its real file extension (double extension)
Yara signature match
PE file contains strange resources
Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe (PID: 5940 cmdline: "C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exe" MD5: 2D2E2831AE6351FBEE7810BFC0D10955)
    • cmd.exe (PID: 5828 cmdline: c:\windows\system32\cmd.exe /C start ???????.xls MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • conhost.exe (PID: 4540 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • EXCEL.EXE (PID: 5232 cmdline: "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /dde MD5: 5D6638F2C8F8571C593999C58866007E)
  • cleanup
{"C2Server": "http://jquery-min.us:8443/jquery-3.3.2.slim.min.js", "User Agent": "User-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko\r\n"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.449971931.000000C0001CE000.00000004.00001000.00020000.00000000.sdmpCobaltbaltstrike_RAW_Payload_https_stager_x64Detects CobaltStrike payloadsAvast Threat Intel Team
  • 0x4000:$h01: FC 48 83 E4 F0 E8 C8 00 00 00 41 51 41 50 52 51 56 48 31 D2 65 48 8B 52
00000000.00000002.449971931.000000C0001CE000.00000004.00001000.00020000.00000000.sdmpCobaltbaltstrike_Payload_EncodedDetects CobaltStrike payloadsAvast Threat Intel Team
  • 0x3400:$s10: /EiD5PDoyAAAAEFRQVBSUVZIMdJlSItSYEiLUhhIi1IgSItyUEgPt0pKTTHJSDHA
  • 0x3900:$s10: /EiD5PDoyAAAAEFRQVBSUVZIMdJlSItSYEiLUhhIi1IgSItyUEgPt0pKTTHJSDHA
00000000.00000002.449971931.000000C0001CE000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
    00000000.00000002.449971931.000000C0001CE000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
      00000000.00000002.449971931.000000C0001CE000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
      • 0x4011:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
      Click to see the 9 entries
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exeAvira: detected
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exeVirustotal: Detection: 60%Perma Link
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exeMetadefender: Detection: 25%Perma Link
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exeReversingLabs: Detection: 69%
      Source: 00000000.00000002.449971931.000000C0001CE000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"C2Server": "http://jquery-min.us:8443/jquery-3.3.2.slim.min.js", "User Agent": "User-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko\r\n"}

      Networking

      barindex
      Source: Malware configuration extractorURLs: http://jquery-min.us:8443/jquery-3.3.2.slim.min.js
      Source: unknownDNS traffic detected: query: jquery-min.us replaycode: Server failure (2)
      Source: unknownTCP traffic detected without corresponding DNS query: 27.0.135.13
      Source: unknownTCP traffic detected without corresponding DNS query: 27.0.135.13
      Source: unknownTCP traffic detected without corresponding DNS query: 27.0.135.13
      Source: unknownTCP traffic detected without corresponding DNS query: 27.0.135.13
      Source: unknownTCP traffic detected without corresponding DNS query: 27.0.135.13
      Source: unknownTCP traffic detected without corresponding DNS query: 27.0.135.13
      Source: unknownTCP traffic detected without corresponding DNS query: 27.0.135.13
      Source: unknownTCP traffic detected without corresponding DNS query: 27.0.135.13
      Source: unknownTCP traffic detected without corresponding DNS query: 27.0.135.13
      Source: unknownTCP traffic detected without corresponding DNS query: 27.0.135.13
      Source: unknownTCP traffic detected without corresponding DNS query: 27.0.135.13
      Source: unknownTCP traffic detected without corresponding DNS query: 27.0.135.13
      Source: unknownTCP traffic detected without corresponding DNS query: 27.0.135.13
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exeString found in binary or memory: http://27.0.135.13/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: http://b.c2r.ts.cdn.office.net/pr
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe, 00000000.00000002.444448493.0000000000131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.jquery.com/
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe, 00000000.00000002.444448493.0000000000131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.jquery.com/o
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe, 00000000.00000002.444448493.0000000000131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.jquery.com/u
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe, 00000000.00000002.444303139.00000000000AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.jquery.com/x
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe, 00000000.00000002.444303139.00000000000AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.jquery.com/~
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: http://olkflt.edog.officeapps.live.com/olkflt/outlookflighting.svc/api/glides
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: http://weather.service.msn.com/data.aspx
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://addinsinstallation.store.office.com/app/acquisitionlogging
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://addinsinstallation.store.office.com/app/download
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/authenticated
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/preinstalled
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/unauthenticated
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://addinsinstallation.store.office.com/orgid/appinstall/authenticated
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://addinslicensing.store.office.com/apps/remove
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://addinslicensing.store.office.com/commerce/query
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://addinslicensing.store.office.com/entitlement/query
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://addinslicensing.store.office.com/orgid/apps/remove
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://addinslicensing.store.office.com/orgid/entitlement/query
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://analysis.windows.net/powerbi/api
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://api.aadrm.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://api.aadrm.com/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://api.addins.omex.office.net/appinfo/query
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://api.addins.omex.office.net/appstate/query
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://api.addins.store.office.com/addinstemplate
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://api.addins.store.office.com/app/query
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://api.addins.store.officeppe.com/addinstemplate
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://api.cortana.ai
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://api.diagnostics.office.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://api.diagnosticssdf.office.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://api.diagnosticssdf.office.com/v2/feedback
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://api.diagnosticssdf.office.com/v2/file
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://api.microsoftstream.com/api/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://api.office.net
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://api.onedrive.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://api.powerbi.com/beta/myorg/imports
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/datasets
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/groups
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://apis.live.net/v5.0/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://arc.msn.com/v4/api/selection
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://asgsmsproxyapi.azurewebsites.net/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://augloop.office.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://augloop.office.com/v2
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://autodiscover-s.outlook.com/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://cdn.entity.
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/stat/images/OneDriveUpsell.png
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSignUpUpsell
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSyncClientUpsell
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://client-office365-tas.msedge.net/ab
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://clients.config.office.net/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://clients.config.office.net/user/v1.0/android/policies
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://clients.config.office.net/user/v1.0/ios
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://clients.config.office.net/user/v1.0/mac
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://clients.config.office.net/user/v1.0/tenantassociationkey
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://cloudfiles.onenote.com/upload.aspx
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://config.edge.skype.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://config.edge.skype.com/config/v1/Office
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://config.edge.skype.com/config/v2/Office
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://cortana.ai
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://cortana.ai/api
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://cr.office.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://dataservice.o365filtering.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://dataservice.o365filtering.com/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://dev.cortana.ai
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://dev0-api.acompli.net/autodetect
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://devnull.onenote.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://directory.services.
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://ecs.office.com/config/v2/Office
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://enrichment.osi.office.net/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Refresh/v1
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Resolve/v1
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Search/v1
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/StockHistory/v1
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/ipcheck/v1
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/metadata.json
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/desktop/main.cshtml
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/web/main.cshtml
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://entitlement.diagnostics.office.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://entitlement.diagnosticssdf.office.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://excel.uservoice.com/forums/304936-excel-for-mobile-devices-tablets-phones-android
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://globaldisco.crm.dynamics.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://graph.ppe.windows.net
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://graph.ppe.windows.net/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://graph.windows.net
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://graph.windows.net/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/telemetry
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3d
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?secureurl=1
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=icons&premium=1
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockimages&premium=1
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockvideos&premium=1
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsofticon?
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://incidents.diagnostics.office.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://incidents.diagnosticssdf.office.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://inclient.store.office.com/gyro/client
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://inclient.store.office.com/gyro/clientstore
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=ClipArt
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebook
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://insertmedia.bing.office.net/odc/insertmedia
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://invites.office.com/
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe, 00000000.00000002.444303139.00000000000AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jquery-min.us/
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe, 00000000.00000002.444391043.0000000000105000.00000004.00000020.00020000.00000000.sdmp, #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe, 00000000.00000002.444431501.0000000000121000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jquery-min.us:8443/
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe, 00000000.00000002.444303139.00000000000AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jquery-min.us:8443/jquery-3.3.2.slim.min.js
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe, 00000000.00000002.444303139.00000000000AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jquery-min.us:8443/jquery-3.3.2.slim.min.jsL
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe, 00000000.00000002.444431501.0000000000121000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jquery-min.us:8443/s
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/GetFreeformSpeech
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://lifecycle.office.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://login.microsoftonline.com/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://login.windows-ppe.net/common/oauth2/authorize
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://login.windows.local
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://login.windows.net/common/oauth2/authorize
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://loki.delve.office.com/api/v1/configuration/officewin32/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://lookup.onenote.com/lookup/geolocation/v1
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://management.azure.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://management.azure.com/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://messaging.action.office.com/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://messaging.action.office.com/setcampaignaction
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://messaging.action.office.com/setuseraction16
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://messaging.engagement.office.com/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://messaging.engagement.office.com/campaignmetadataaggregator
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://messaging.lifecycle.office.com/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://messaging.lifecycle.office.com/getcustommessage16
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://messaging.office.com/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://metadata.templates.cdn.office.net/client/log
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://my.microsoftpersonalcontent.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://ncus.contentsync.
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://ncus.pagecontentsync.
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com/api/userauditrecord
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://o365diagnosticsppe-web.cloudapp.net
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://ocos-office365-s2s.msedge.net/ab
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://ofcrecsvcapi-int.azurewebsites.net/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://officeapps.live.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://officeci.azurewebsites.net/api/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://officesetup.getmicrosoftkey.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://ogma.osi.office.net/TradukoApi/api/v1.0/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentities
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentitiesupdated
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentities
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentitiesupdated
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://onedrive.live.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://onedrive.live.com/embed?
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://osi.office.net
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://otelrules.azureedge.net
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://outlook.office.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://outlook.office.com/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://outlook.office.com/autosuggest/api/v1/init?cvid=
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://outlook.office365.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://outlook.office365.com/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://outlook.office365.com/api/v1.0/me/Activities
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://outlook.office365.com/autodiscover/autodiscover.json
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://ovisualuiapp.azurewebsites.net/pbiagave/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://pages.store.office.com/appshome.aspx?productgroup=Outlook
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://pages.store.office.com/review/query
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://pages.store.office.com/webapplandingpage.aspx
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://partnerservices.getmicrosoftkey.com/PartnerProvisioning.svc/v1/subscriptions
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://portal.office.com/account/?ref=ClientMeControl
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://posarprodcssservice.accesscontrol.windows.net/v2/OAuth2-13
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://powerlift-frontdesk.acompli.net
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://powerlift.acompli.net
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://prod-global-autodetect.acompli.net/autodetect
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://prod.mds.office.com/mds/api/v1.0/clientmodeldirectory
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://res.getmicrosoftkey.com/api/redemptionevents
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://roaming.edog.
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://rpsticket.partnerservices.getmicrosoftkey.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://settings.outlook.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://shell.suite.office.com:1443
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://skyapi.live.net/Activity/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://sr.outlook.office.net/ws/speech/recognize/assistant/work
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://staging.cortana.ai
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://storage.live.com/clientlogs/uploadlocation
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://store.office.cn/addinstemplate
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://store.office.de/addinstemplate
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://substrate.office.com/search/api/v1/SearchHistory
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://substrate.office.com/search/api/v2/init
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://tasks.office.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://uci.cdn.office.net/mirrored/smartlookup/current/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.desktop.html
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.immersive.html
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://visio.uservoice.com/forums/368202-visio-on-devices
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://web.microsoftstream.com/video/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://webshell.suite.office.com
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://wus2.contentsync.
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://wus2.pagecontentsync.
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2
      Source: B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drString found in binary or memory: https://www.odwebp.svc.ms
      Source: unknownDNS traffic detected: queries for: jquery-min.us
      Source: global trafficHTTP traffic detected: GET /%E6%B6%89%E7%96%AB%E8%BD%A8%E8%BF%B9%E6%A3%80%E6%9F%A5%E8%A1%A8.xls HTTP/1.1Host: 27.0.135.13User-Agent: Go-http-client/1.1Accept-Encoding: gzip

      System Summary

      barindex
      Source: 00000000.00000002.449971931.000000C0001CE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: 00000000.00000002.449971931.000000C0001CE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: 00000000.00000002.447338281.0000000026E30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: 00000000.00000002.447338281.0000000026E30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: 00000000.00000002.449971931.000000C0001CE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_RAW_Payload_https_stager_x64 author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
      Source: 00000000.00000002.449971931.000000C0001CE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
      Source: 00000000.00000002.449971931.000000C0001CE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: 00000000.00000002.449971931.000000C0001CE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: 00000000.00000002.450050616.000000C0001D4000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
      Source: 00000000.00000002.447338281.0000000026E30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_RAW_Payload_https_stager_x64 author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
      Source: 00000000.00000002.447338281.0000000026E30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: 00000000.00000002.447338281.0000000026E30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: Process Memory Space: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe PID: 5940, type: MEMORYSTRMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: C:\Windows\System32\cmd.exeSection loaded: sfc.dll
      Source: C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exeCode function: 0_2_26E3010C
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exeStatic PE information: Section: UPX1 ZLIB complexity 0.9995077597128378
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exeVirustotal: Detection: 60%
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exeMetadefender: Detection: 25%
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exeReversingLabs: Detection: 69%
      Source: C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exe "C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exe"
      Source: C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /C start ???????.xls
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /dde
      Source: C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /C start ???????.xls
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /dde
      Source: C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
      Source: ???????.LNK.3.drLNK file: ..\..\..\..\..\Desktop\.xls
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4540:120:WilError_01
      Source: C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exeFile created: C:\Users\user\Desktop\???????.xlsJump to behavior
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{2D790E46-2036-426D-8900-E2C1DA7A8819} - OProcSessId.datJump to behavior
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exeString found in binary or memory: D:/a/shellcode-launch/shellcode-launch/main.go
      Source: classification engineClassification label: mal88.troj.evad.winEXE@7/4@10/1
      Source: C:\Windows\System32\cmd.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exeStatic file information: File size 1553920 > 1048576
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exeStatic PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x172000
      Source: C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exeCode function: 0_2_26E3012B push eax; ret
      Source: C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exeCode function: 0_2_26E3010C push eax; ret
      Source: initial sampleStatic PE information: section name: UPX0
      Source: initial sampleStatic PE information: section name: UPX1

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: Possible double extension: xls.exeStatic PE information: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe
      Source: C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
      Source: C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe, 00000000.00000002.444609671.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: lmPVmnet/url.Parse
      Source: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe, 00000000.00000002.444303139.00000000000AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlliiJ
      Source: C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /C start ???????.xls
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /dde

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000002.449971931.000000C0001CE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.450050616.000000C0001D4000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe PID: 5940, type: MEMORYSTR
      Source: Yara matchFile source: 00000000.00000002.447338281.0000000026E30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts2
      Command and Scripting Interpreter
      1
      DLL Side-Loading
      11
      Process Injection
      11
      Masquerading
      OS Credential Dumping1
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      Exfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      11
      Process Injection
      LSASS Memory1
      Remote System Discovery
      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
      Ingress Tool Transfer
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)111
      Obfuscated Files or Information
      Security Account Manager1
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
      Non-Application Layer Protocol
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
      Software Packing
      NTDS2
      System Information Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer12
      Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe61%VirustotalBrowse
      #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe26%MetadefenderBrowse
      #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe69%ReversingLabsWin64.Backdoor.CobaltStrikeBeacon
      #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe100%AviraTR/Rozena.eozmy
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      jquery-min.us4%VirustotalBrowse
      SourceDetectionScannerLabelLink
      https://roaming.edog.0%URL Reputationsafe
      https://cdn.entity.0%URL Reputationsafe
      https://powerlift.acompli.net0%URL Reputationsafe
      https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
      https://cortana.ai0%URL Reputationsafe
      http://27.0.135.13/0%Avira URL Cloudsafe
      https://api.aadrm.com/0%URL Reputationsafe
      https://ofcrecsvcapi-int.azurewebsites.net/0%URL Reputationsafe
      https://jquery-min.us:8443/jquery-3.3.2.slim.min.jsL0%Avira URL Cloudsafe
      https://jquery-min.us:8443/5%VirustotalBrowse
      https://jquery-min.us:8443/0%Avira URL Cloudsafe
      https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h0%Avira URL Cloudsafe
      https://jquery-min.us:8443/jquery-3.3.2.slim.min.js0%Avira URL Cloudsafe
      https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
      https://powerlift-frontdesk.acompli.net0%URL Reputationsafe
      https://officeci.azurewebsites.net/api/0%URL Reputationsafe
      https://my.microsoftpersonalcontent.com0%Avira URL Cloudsafe
      https://store.office.cn/addinstemplate0%URL Reputationsafe
      https://api.aadrm.com0%URL Reputationsafe
      https://dev0-api.acompli.net/autodetect0%URL Reputationsafe
      https://www.odwebp.svc.ms0%URL Reputationsafe
      https://api.addins.store.officeppe.com/addinstemplate0%URL Reputationsafe
      https://dataservice.o365filtering.com/0%URL Reputationsafe
      https://officesetup.getmicrosoftkey.com0%URL Reputationsafe
      https://prod-global-autodetect.acompli.net/autodetect0%URL Reputationsafe
      https://jquery-min.us:8443/s0%Avira URL Cloudsafe
      http://27.0.135.13/%E6%B6%89%E7%96%AB%E8%BD%A8%E8%BF%B9%E6%A3%80%E6%9F%A5%E8%A1%A8.xls0%Avira URL Cloudsafe
      https://ncus.contentsync.0%URL Reputationsafe
      https://apis.live.net/v5.0/0%URL Reputationsafe
      https://wus2.contentsync.0%URL Reputationsafe
      http://jquery-min.us:8443/jquery-3.3.2.slim.min.js0%Avira URL Cloudsafe
      https://asgsmsproxyapi.azurewebsites.net/0%URL Reputationsafe
      https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile0%URL Reputationsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      jquery-min.us
      unknown
      unknowntrueunknown
      NameMaliciousAntivirus DetectionReputation
      http://27.0.135.13/%E6%B6%89%E7%96%AB%E8%BD%A8%E8%BF%B9%E6%A3%80%E6%9F%A5%E8%A1%A8.xlsfalse
      • Avira URL Cloud: safe
      unknown
      http://jquery-min.us:8443/jquery-3.3.2.slim.min.jstrue
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://api.diagnosticssdf.office.comB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
        high
        https://login.microsoftonline.com/B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
          high
          https://shell.suite.office.com:1443B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
            high
            https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorizeB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
              high
              https://autodiscover-s.outlook.com/B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                high
                https://roaming.edog.B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                • URL Reputation: safe
                unknown
                https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=FlickrB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                  high
                  https://cdn.entity.B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                  • URL Reputation: safe
                  unknown
                  https://api.addins.omex.office.net/appinfo/queryB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                    high
                    https://clients.config.office.net/user/v1.0/tenantassociationkeyB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                      high
                      https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                        high
                        https://powerlift.acompli.netB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://rpsticket.partnerservices.getmicrosoftkey.comB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://lookup.onenote.com/lookup/geolocation/v1B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                          high
                          https://cortana.aiB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                          • URL Reputation: safe
                          unknown
                          https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeechB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                            high
                            https://cloudfiles.onenote.com/upload.aspxB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                              high
                              https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFileB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                high
                                https://entitlement.diagnosticssdf.office.comB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                  high
                                  https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicyB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                    high
                                    http://27.0.135.13/#U8d26#U53f7#U5bc6#U7801#U8868.xls.exefalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://api.aadrm.com/B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://ofcrecsvcapi-int.azurewebsites.net/B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://jquery-min.us:8443/jquery-3.3.2.slim.min.jsL#U8d26#U53f7#U5bc6#U7801#U8868.xls.exe, 00000000.00000002.444303139.00000000000AC000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://jquery-min.us:8443/#U8d26#U53f7#U5bc6#U7801#U8868.xls.exe, 00000000.00000002.444391043.0000000000105000.00000004.00000020.00020000.00000000.sdmp, #U8d26#U53f7#U5bc6#U7801#U8868.xls.exe, 00000000.00000002.444431501.0000000000121000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • 5%, Virustotal, Browse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPoliciesB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                      high
                                      https://api.microsoftstream.com/api/B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                        high
                                        https://insertmedia.bing.office.net/images/hosted?host=office&amp;adlt=strict&amp;hostType=ImmersiveB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                          high
                                          https://cr.office.comB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                            high
                                            https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;hB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                            • Avira URL Cloud: safe
                                            low
                                            https://portal.office.com/account/?ref=ClientMeControlB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                              high
                                              https://jquery-min.us:8443/jquery-3.3.2.slim.min.js#U8d26#U53f7#U5bc6#U7801#U8868.xls.exe, 00000000.00000002.444303139.00000000000AC000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://graph.ppe.windows.netB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                high
                                                https://res.getmicrosoftkey.com/api/redemptioneventsB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://powerlift-frontdesk.acompli.netB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://tasks.office.comB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                  high
                                                  https://officeci.azurewebsites.net/api/B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://sr.outlook.office.net/ws/speech/recognize/assistant/workB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                    high
                                                    https://my.microsoftpersonalcontent.comB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://store.office.cn/addinstemplateB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://api.aadrm.comB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://outlook.office.com/autosuggest/api/v1/init?cvid=B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                      high
                                                      https://globaldisco.crm.dynamics.comB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                        high
                                                        https://messaging.engagement.office.com/B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                          high
                                                          https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeechB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                            high
                                                            https://dev0-api.acompli.net/autodetectB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://www.odwebp.svc.msB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://api.diagnosticssdf.office.com/v2/feedbackB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                              high
                                                              https://api.powerbi.com/v1.0/myorg/groupsB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                high
                                                                https://web.microsoftstream.com/video/B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                  high
                                                                  https://api.addins.store.officeppe.com/addinstemplateB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://graph.windows.netB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                    high
                                                                    https://dataservice.o365filtering.com/B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://officesetup.getmicrosoftkey.comB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://analysis.windows.net/powerbi/apiB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                      high
                                                                      https://prod-global-autodetect.acompli.net/autodetectB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://jquery-min.us:8443/s#U8d26#U53f7#U5bc6#U7801#U8868.xls.exe, 00000000.00000002.444431501.0000000000121000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      https://outlook.office365.com/autodiscover/autodiscover.jsonB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                        high
                                                                        https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-iosB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                          high
                                                                          https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeechB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                            high
                                                                            https://learningtools.onenote.com/learningtoolsapi/v2.0/GetvoicesB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                              high
                                                                              https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.jsonB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                high
                                                                                https://ncus.contentsync.B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://onedrive.live.com/about/download/?windows10SyncClientInstalled=falseB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                  high
                                                                                  https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                    high
                                                                                    http://weather.service.msn.com/data.aspxB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                      high
                                                                                      https://apis.live.net/v5.0/B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asksB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                        high
                                                                                        https://word.uservoice.com/forums/304948-word-for-ipad-iphone-iosB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                          high
                                                                                          https://messaging.lifecycle.office.com/B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                            high
                                                                                            https://autodiscover-s.outlook.com/autodiscover/autodiscover.xmlB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                              high
                                                                                              https://management.azure.comB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                high
                                                                                                https://outlook.office365.comB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                  high
                                                                                                  http://code.jquery.com/#U8d26#U53f7#U5bc6#U7801#U8868.xls.exe, 00000000.00000002.444448493.0000000000131000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    https://wus2.contentsync.B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://incidents.diagnostics.office.comB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                      high
                                                                                                      https://clients.config.office.net/user/v1.0/iosB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                        high
                                                                                                        https://insertmedia.bing.office.net/odc/insertmediaB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                          high
                                                                                                          https://o365auditrealtimeingestion.manage.office.comB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                            high
                                                                                                            https://outlook.office365.com/api/v1.0/me/ActivitiesB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                              high
                                                                                                              https://api.office.netB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                                high
                                                                                                                https://incidents.diagnosticssdf.office.comB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                                  high
                                                                                                                  https://asgsmsproxyapi.azurewebsites.net/B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                                  • URL Reputation: safe
                                                                                                                  unknown
                                                                                                                  https://clients.config.office.net/user/v1.0/android/policiesB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                                    high
                                                                                                                    https://entitlement.diagnostics.office.comB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                                      high
                                                                                                                      https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.jsonB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                                        high
                                                                                                                        https://substrate.office.com/search/api/v2/initB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                                          high
                                                                                                                          https://outlook.office.com/B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                                            high
                                                                                                                            https://storage.live.com/clientlogs/uploadlocationB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                                              high
                                                                                                                              https://outlook.office365.com/B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                                                high
                                                                                                                                https://webshell.suite.office.comB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                                                  high
                                                                                                                                  https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDriveB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                                                    high
                                                                                                                                    https://substrate.office.com/search/api/v1/SearchHistoryB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                                                      high
                                                                                                                                      https://management.azure.com/B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                                                        high
                                                                                                                                        https://messaging.lifecycle.office.com/getcustommessage16B0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                                                          high
                                                                                                                                          https://clients.config.office.net/c2r/v1.0/InteractiveInstallationB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                                                            high
                                                                                                                                            https://login.windows.net/common/oauth2/authorizeB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                                                              high
                                                                                                                                              https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFileB0F622F0-4ECB-4A62-9DE8-0BE100D4B6DD.3.drfalse
                                                                                                                                              • URL Reputation: safe
                                                                                                                                              unknown
                                                                                                                                              • No. of IPs < 25%
                                                                                                                                              • 25% < No. of IPs < 50%
                                                                                                                                              • 50% < No. of IPs < 75%
                                                                                                                                              • 75% < No. of IPs
                                                                                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                              27.0.135.13
                                                                                                                                              unknownChina
                                                                                                                                              4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
                                                                                                                                              Joe Sandbox Version:35.0.0 Citrine
                                                                                                                                              Analysis ID:679121
                                                                                                                                              Start date and time: 05/08/202209:51:092022-08-05 09:51:09 +02:00
                                                                                                                                              Joe Sandbox Product:CloudBasic
                                                                                                                                              Overall analysis duration:0h 8m 43s
                                                                                                                                              Hypervisor based Inspection enabled:false
                                                                                                                                              Report type:light
                                                                                                                                              Sample file name:#U8d26#U53f7#U5bc6#U7801#U8868.xls.exe
                                                                                                                                              Cookbook file name:default.jbs
                                                                                                                                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                                                              Number of analysed new started processes analysed:17
                                                                                                                                              Number of new started drivers analysed:0
                                                                                                                                              Number of existing processes analysed:0
                                                                                                                                              Number of existing drivers analysed:0
                                                                                                                                              Number of injected processes analysed:0
                                                                                                                                              Technologies:
                                                                                                                                              • HCA enabled
                                                                                                                                              • EGA enabled
                                                                                                                                              • HDC enabled
                                                                                                                                              • AMSI enabled
                                                                                                                                              Analysis Mode:default
                                                                                                                                              Analysis stop reason:Timeout
                                                                                                                                              Detection:MAL
                                                                                                                                              Classification:mal88.troj.evad.winEXE@7/4@10/1
                                                                                                                                              EGA Information:
                                                                                                                                              • Successful, ratio: 100%
                                                                                                                                              HDC Information:
                                                                                                                                              • Successful, ratio: 85.7% (good quality ratio 74.3%)
                                                                                                                                              • Quality average: 53.9%
                                                                                                                                              • Quality standard deviation: 34.8%
                                                                                                                                              HCA Information:
                                                                                                                                              • Successful, ratio: 57%
                                                                                                                                              • Number of executed functions: 0
                                                                                                                                              • Number of non-executed functions: 0
                                                                                                                                              Cookbook Comments:
                                                                                                                                              • Found application associated with file extension: .exe
                                                                                                                                              • Adjust boot time
                                                                                                                                              • Enable AMSI
                                                                                                                                              • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, svchost.exe
                                                                                                                                              • Excluded IPs from analysis (whitelisted): 52.109.32.24, 52.109.76.36, 52.109.88.37, 52.242.101.226, 52.152.110.14, 40.125.122.176
                                                                                                                                              • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, prod-w.nexus.live.com.akadns.net, prod.configsvc1.live.com.akadns.net, ctldl.windowsupdate.com, arc.msn.com, licensing.mp.microsoft.com, store-images.s-microsoft.com, login.live.com, config.officeapps.live.com, sls.update.microsoft.com, nexus.officeapps.live.com, officeclient.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, europe.configsvc1.live.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                                                                                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                              No simulations
                                                                                                                                              No context
                                                                                                                                              No context
                                                                                                                                              No context
                                                                                                                                              No context
                                                                                                                                              No context
                                                                                                                                              Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                              File Type:XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):148061
                                                                                                                                              Entropy (8bit):5.358147023528658
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:1536:PcQW/gxgB5BQguwN/Q9DQe+zQTk4F77nXmvid3XxVETLKz61:O1Q9DQe+zuXYr
                                                                                                                                              MD5:FC031BF22CE6E9FCF3BBCD4645CC9CAA
                                                                                                                                              SHA1:3ECABDA5BEB7E8F758F225F03AF3E2FE32FADAD6
                                                                                                                                              SHA-256:542DAFFD4B4486F72BA534DA409FC90F7696E509FB24A87801778D045C792E4D
                                                                                                                                              SHA-512:AAE4BCF5B25CF638EE21FFCD481003D5157297DE8CFE7A81EA0FB20ADE9CC81FF296E8A63119FA9C4B12B959AB9D9E0E5B7B291DA18EFDDD4BE2AD40E31AC557
                                                                                                                                              Malicious:false
                                                                                                                                              Reputation:low
                                                                                                                                              Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2022-08-05T07:52:31">.. Build: 16.0.15601.30525-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://rr.office.microsoft.com/research/query.asmx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientHome">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientTemplate">.. <o:url>https://ocsa.office.microsoft.com/client/15/help/template</o:url>.. </o:service>.. <o:
                                                                                                                                              Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 5 15:52:21 2022, mtime=Fri Aug 5 15:52:32 2022, atime=Fri Aug 5 15:52:32 2022, length=23552, window=hide
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):1127
                                                                                                                                              Entropy (8bit):4.789260694079556
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:12:8DsbhU9i6CHiLPNGX1Dwq+WAiucUy+o/ypa0Fb5b5Dyb0W4t2Y+xIBjKZm:8Dzopw0Oy+oKxJ5DyZ7aB6m
                                                                                                                                              MD5:3392F754CE250939539B340C618EE80F
                                                                                                                                              SHA1:96A237267FBD787C190689590FBD96EE1CAB8D3A
                                                                                                                                              SHA-256:0CB29152EEE395876B8ADB547B63CB737568A6F4471C9E8DFE25A8A55708FADA
                                                                                                                                              SHA-512:958ADCD9B0A49310864197CA38CE0D6E154A4B8E6CE4CD8DAFCB133DD815F82867B7CB2DA4ECF59B6677B89F9673C6091934D61B19E0C0303B1967BDDF04CE47
                                                                                                                                              Malicious:false
                                                                                                                                              Reputation:low
                                                                                                                                              Preview:L..................F.... ...w.....].~....p.|.....\...........................P.O. .:i.....+00.../C:\...................x.1......Ng...Users.d......L...U......................:......B..U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....T.1.....hT....user..>.......NM..U.......S.......................a.l.f.o.n.s.....~.1......U....Desktop.h.......NM..U.......Y..............>.......U.D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....b.2..\...U.. .839F~1.XLS..H.......U...U....../..........................m.uh....h.gh...x.l.s...........$.......$...5...........Z...............>.S......C:\Users\user\Desktop\???????.xls..C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.D.e.s.k.t.o.p.\..m.uh....h.gh...x.l.s.......".....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\..m.uh....h.gh...x.l.s.........:..,.LB.)...Aw...`.......X.......445817...........!a..%.H.VZAj.....s.........W...!a..%.H.VZAj.....s.........W..............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.
                                                                                                                                              Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                                                                              Category:modified
                                                                                                                                              Size (bytes):65
                                                                                                                                              Entropy (8bit):4.125194930303051
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:3:bDuMJlWb6lmMCLb6lv:bCNsW0
                                                                                                                                              MD5:C542BE0A3F696F4BD179F109E96EA1EF
                                                                                                                                              SHA1:429D43CAA9F2FAB8F03016524B779816F71696B1
                                                                                                                                              SHA-256:F0B490700453792AB1B1C015A8CD5A55E0ED0B310DB560C8BCE2E7A0BEEF62B6
                                                                                                                                              SHA-512:2734D51FBDDB322C8FB605054AC112C4079A3998ADDCC3723C65B4BD7C5D4A4A6EF4497376BBBF70DD5009B0A8EAF8D811A3D1114E3DD6823DF134DF38E417A1
                                                                                                                                              Malicious:false
                                                                                                                                              Reputation:low
                                                                                                                                              Preview:[folders]..Templates.LNK=0..???????.LNK=0..[xls]..???????.LNK=0..
                                                                                                                                              Process:C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exe
                                                                                                                                              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1200, Locale ID: 2052, Author: ma, Last Saved By: Adminis, Create Time/Date: Sun Jul 25 22:22:00 2021, Last Saved Time/Date: Mon Jul 18 16:11:36 2022, Name of Creating Application: WPS Of, Security: 0
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):23552
                                                                                                                                              Entropy (8bit):4.7469238649865835
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:384:dCCCDQS4zTbleoPE8KI0fXb6HTsRQSO0JXGzfW6JjLuJj1zusAp7xOGz4uv8YXFh:dCCCDQS4zTbleoPE8KI0fXb0sGz4ud1G
                                                                                                                                              MD5:F5A8F916C2B8117DBF1CC1EA3319C8DA
                                                                                                                                              SHA1:B8E4B9E1247C54ED45BBA90CD2F1AAEDC0713372
                                                                                                                                              SHA-256:11E29E4983EAB5BBC95B11B06C8AD11A7375017B99B10FDE72F2669E5288E6BE
                                                                                                                                              SHA-512:05F5189A4F09A442D07D9440156B4F18C67284130D545C79CD701C72AF6A5B030DF1FD7C83F46D934749EB28AEF32936216AE4EB96D19129A5B3743B562F3DD8
                                                                                                                                              Malicious:false
                                                                                                                                              Reputation:low
                                                                                                                                              Preview:......................>...................................(.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................+....................................................................................................................... ...!..."...#...$...%...&...'...........*...,...............................................................................................................................................................................................................................................................................................................................
                                                                                                                                              File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                                                                              Entropy (8bit):7.991293672325191
                                                                                                                                              TrID:
                                                                                                                                              • Win64 Executable (generic) (12005/4) 74.95%
                                                                                                                                              • Generic Win/DOS Executable (2004/3) 12.51%
                                                                                                                                              • DOS Executable Generic (2002/1) 12.50%
                                                                                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                                                                                                                                              File name:#U8d26#U53f7#U5bc6#U7801#U8868.xls.exe
                                                                                                                                              File size:1553920
                                                                                                                                              MD5:2d2e2831ae6351fbee7810bfc0d10955
                                                                                                                                              SHA1:52a95894b8551743058a1bfe56e38919f43819c4
                                                                                                                                              SHA256:ffeb7d694c82c2dfa5344d082b61386561202ccde69fc11257916b0da515c922
                                                                                                                                              SHA512:239d6ad7b0654146b8c5c08a9b2f07a770cfb0ddabbbcad03109f82b0e78494f80097a98de7d55487f90f41ac25e09f028b12f60c5fc30863d1c871dfbff8eb5
                                                                                                                                              SSDEEP:24576:GW4sP/ippqFg0wSEn/v3KY1EoylYBAOL3jiVFToMK/GoFabCWx5h/xz1iWnmTlT:7xIqFPEH6YWooYBAOL3GVFTs/DFiCMNq
                                                                                                                                              TLSH:CB7533D17703E012D5B611702AA38B36556FFC2BEE38574AAF11BF2F1D317A68858A42
                                                                                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........DL.......#...... .......09. TP..@9...@...............................Q............... ............................
                                                                                                                                              Icon Hash:74e4c4e4c4d4c4c4
                                                                                                                                              Entrypoint:0x905420
                                                                                                                                              Entrypoint Section:UPX1
                                                                                                                                              Digitally signed:false
                                                                                                                                              Imagebase:0x400000
                                                                                                                                              Subsystem:windows gui
                                                                                                                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                                                                                                                              DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                                                                              Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                                                                                                                              TLS Callbacks:
                                                                                                                                              CLR (.Net) Version:
                                                                                                                                              OS Version Major:6
                                                                                                                                              OS Version Minor:1
                                                                                                                                              File Version Major:6
                                                                                                                                              File Version Minor:1
                                                                                                                                              Subsystem Version Major:6
                                                                                                                                              Subsystem Version Minor:1
                                                                                                                                              Import Hash:6ed4f5f04d62b18d96b26d6db7c18840
                                                                                                                                              Instruction
                                                                                                                                              push ebx
                                                                                                                                              push esi
                                                                                                                                              push edi
                                                                                                                                              push ebp
                                                                                                                                              dec eax
                                                                                                                                              lea esi, dword ptr [FFE8EBFAh]
                                                                                                                                              dec eax
                                                                                                                                              lea edi, dword ptr [esi-00393025h]
                                                                                                                                              push edi
                                                                                                                                              mov eax, 005034F4h
                                                                                                                                              push eax
                                                                                                                                              dec eax
                                                                                                                                              mov ecx, esp
                                                                                                                                              dec eax
                                                                                                                                              mov edx, edi
                                                                                                                                              dec eax
                                                                                                                                              mov edi, esi
                                                                                                                                              mov esi, 001713F4h
                                                                                                                                              push ebp
                                                                                                                                              dec eax
                                                                                                                                              mov ebp, esp
                                                                                                                                              inc esp
                                                                                                                                              mov ecx, dword ptr [ecx]
                                                                                                                                              dec ecx
                                                                                                                                              mov eax, edx
                                                                                                                                              dec eax
                                                                                                                                              mov edx, esi
                                                                                                                                              dec eax
                                                                                                                                              lea esi, dword ptr [edi+02h]
                                                                                                                                              push esi
                                                                                                                                              mov al, byte ptr [edi]
                                                                                                                                              dec edx
                                                                                                                                              mov cl, al
                                                                                                                                              and al, 07h
                                                                                                                                              shr cl, 00000003h
                                                                                                                                              dec eax
                                                                                                                                              mov ebx, FFFFFD00h
                                                                                                                                              dec eax
                                                                                                                                              shl ebx, cl
                                                                                                                                              mov cl, al
                                                                                                                                              dec eax
                                                                                                                                              lea ebx, dword ptr [esp+ebx*2-00000E78h]
                                                                                                                                              dec eax
                                                                                                                                              and ebx, FFFFFFC0h
                                                                                                                                              push 00000000h
                                                                                                                                              dec eax
                                                                                                                                              cmp esp, ebx
                                                                                                                                              jne 00007F1D1076980Bh
                                                                                                                                              push ebx
                                                                                                                                              dec eax
                                                                                                                                              lea edi, dword ptr [ebx+08h]
                                                                                                                                              mov cl, byte ptr [esi-01h]
                                                                                                                                              dec edx
                                                                                                                                              mov byte ptr [edi+02h], al
                                                                                                                                              mov al, cl
                                                                                                                                              shr cl, 00000004h
                                                                                                                                              mov byte ptr [edi+01h], cl
                                                                                                                                              and al, 0Fh
                                                                                                                                              mov byte ptr [edi], al
                                                                                                                                              dec eax
                                                                                                                                              lea ecx, dword ptr [edi-04h]
                                                                                                                                              push eax
                                                                                                                                              inc ecx
                                                                                                                                              push edi
                                                                                                                                              dec eax
                                                                                                                                              lea eax, dword ptr [edi+04h]
                                                                                                                                              inc ebp
                                                                                                                                              xor edi, edi
                                                                                                                                              inc ecx
                                                                                                                                              push esi
                                                                                                                                              inc ecx
                                                                                                                                              mov esi, 00000001h
                                                                                                                                              inc ecx
                                                                                                                                              push ebp
                                                                                                                                              inc ebp
                                                                                                                                              xor ebp, ebp
                                                                                                                                              inc ecx
                                                                                                                                              push esp
                                                                                                                                              push ebp
                                                                                                                                              push ebx
                                                                                                                                              dec eax
                                                                                                                                              mov dword ptr [esp-10h], ecx
                                                                                                                                              dec eax
                                                                                                                                              mov dword ptr [esp-28h], eax
                                                                                                                                              mov eax, 00000001h
                                                                                                                                              dec eax
                                                                                                                                              mov dword ptr [esp-08h], esi
                                                                                                                                              dec esp
                                                                                                                                              mov dword ptr [esp-18h], eax
                                                                                                                                              mov ebx, eax
                                                                                                                                              inc esp
                                                                                                                                              mov dword ptr [esp-1Ch], ecx
                                                                                                                                              movzx ecx, byte ptr [edi+02h]
                                                                                                                                              shl ebx, cl
                                                                                                                                              mov ecx, ebx
                                                                                                                                              dec eax
                                                                                                                                              mov ebx, dword ptr [esp+38h]
                                                                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x50f3200x9c.rsrc
                                                                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x5060000x9320.rsrc
                                                                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                              UPX00x10000x3930000x0unknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                              UPX10x3940000x1720000x172000False0.9995077597128378data7.99986627038318IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                              .rsrc0x5060000xa0000x9400False0.43911000844594594data5.674111167289192IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                              NameRVASizeTypeLanguageCountry
                                                                                                                                              RT_ICON0x5062e40x128GLS_BINARY_LSB_FIRSTEnglishUnited States
                                                                                                                                              RT_ICON0x5064100x2e8dataEnglishUnited States
                                                                                                                                              RT_ICON0x5066fc0x668dBase IV DBT of `.DBF, block length 1536, next free block index 40, next free block 248, next used block 65280EnglishUnited States
                                                                                                                                              RT_ICON0x506d680x568GLS_BINARY_LSB_FIRSTEnglishUnited States
                                                                                                                                              RT_ICON0x5072d40x8a8dataEnglishUnited States
                                                                                                                                              RT_ICON0x507b800xea8dataEnglishUnited States
                                                                                                                                              RT_ICON0x508a2c0x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                                                                                                                                              RT_ICON0x508e980x10a8dataEnglishUnited States
                                                                                                                                              RT_ICON0x509f440x25a8dataEnglishUnited States
                                                                                                                                              RT_ICON0x50c4f00x2885PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                                                                                                                              RT_GROUP_ICON0x50ed7c0x92dataEnglishUnited States
                                                                                                                                              RT_VERSION0x50ee140x300dataEnglishUnited States
                                                                                                                                              RT_MANIFEST0x50f1180x207XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
                                                                                                                                              DLLImport
                                                                                                                                              KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
                                                                                                                                              Language of compilation systemCountry where language is spokenMap
                                                                                                                                              EnglishUnited States
                                                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                                                              Aug 5, 2022 09:52:21.419822931 CEST4973780192.168.2.527.0.135.13
                                                                                                                                              Aug 5, 2022 09:52:24.538278103 CEST4973780192.168.2.527.0.135.13
                                                                                                                                              Aug 5, 2022 09:52:24.785228968 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:24.785429955 CEST4973780192.168.2.527.0.135.13
                                                                                                                                              Aug 5, 2022 09:52:24.789292097 CEST4973780192.168.2.527.0.135.13
                                                                                                                                              Aug 5, 2022 09:52:25.036046982 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:25.036730051 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:25.036756992 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:25.036781073 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:25.036819935 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:25.036844969 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:25.036866903 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:25.036870003 CEST4973780192.168.2.527.0.135.13
                                                                                                                                              Aug 5, 2022 09:52:25.036890030 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:25.036912918 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:25.036921978 CEST4973780192.168.2.527.0.135.13
                                                                                                                                              Aug 5, 2022 09:52:25.036936998 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:25.036961079 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:25.036973953 CEST4973780192.168.2.527.0.135.13
                                                                                                                                              Aug 5, 2022 09:52:25.037055969 CEST4973780192.168.2.527.0.135.13
                                                                                                                                              Aug 5, 2022 09:52:25.283895969 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:25.283956051 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:25.283998013 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:25.284045935 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:25.284099102 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:25.284156084 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:25.284203053 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:25.284224033 CEST4973780192.168.2.527.0.135.13
                                                                                                                                              Aug 5, 2022 09:52:25.284257889 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:25.284290075 CEST4973780192.168.2.527.0.135.13
                                                                                                                                              Aug 5, 2022 09:52:25.284334898 CEST4973780192.168.2.527.0.135.13
                                                                                                                                              Aug 5, 2022 09:52:30.042006969 CEST804973727.0.135.13192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:30.042123079 CEST4973780192.168.2.527.0.135.13
                                                                                                                                              Aug 5, 2022 09:52:31.032546043 CEST4973780192.168.2.527.0.135.13
                                                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                                                              Aug 5, 2022 09:52:27.284778118 CEST5382153192.168.2.58.8.8.8
                                                                                                                                              Aug 5, 2022 09:52:27.340873003 CEST53538218.8.8.8192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:27.376110077 CEST6135653192.168.2.58.8.8.8
                                                                                                                                              Aug 5, 2022 09:52:27.434125900 CEST53613568.8.8.8192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:27.453694105 CEST5966153192.168.2.58.8.8.8
                                                                                                                                              Aug 5, 2022 09:52:27.511209011 CEST53596618.8.8.8192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:27.543205976 CEST5727853192.168.2.58.8.8.8
                                                                                                                                              Aug 5, 2022 09:52:27.595329046 CEST53572788.8.8.8192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:27.624944925 CEST5375753192.168.2.58.8.8.8
                                                                                                                                              Aug 5, 2022 09:52:27.682616949 CEST53537578.8.8.8192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:27.720825911 CEST5432253192.168.2.58.8.8.8
                                                                                                                                              Aug 5, 2022 09:52:27.782706022 CEST53543228.8.8.8192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:27.831644058 CEST6270453192.168.2.58.8.8.8
                                                                                                                                              Aug 5, 2022 09:52:27.885870934 CEST53627048.8.8.8192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:27.958754063 CEST5393453192.168.2.58.8.8.8
                                                                                                                                              Aug 5, 2022 09:52:28.013510942 CEST53539348.8.8.8192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:28.044615984 CEST6371253192.168.2.58.8.8.8
                                                                                                                                              Aug 5, 2022 09:52:28.100229979 CEST53637128.8.8.8192.168.2.5
                                                                                                                                              Aug 5, 2022 09:52:28.113236904 CEST6318753192.168.2.58.8.8.8
                                                                                                                                              Aug 5, 2022 09:52:28.165755033 CEST53631878.8.8.8192.168.2.5
                                                                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                                                              Aug 5, 2022 09:52:27.284778118 CEST192.168.2.58.8.8.80xbe52Standard query (0)jquery-min.usA (IP address)IN (0x0001)
                                                                                                                                              Aug 5, 2022 09:52:27.376110077 CEST192.168.2.58.8.8.80x6f97Standard query (0)jquery-min.usA (IP address)IN (0x0001)
                                                                                                                                              Aug 5, 2022 09:52:27.453694105 CEST192.168.2.58.8.8.80xe9b3Standard query (0)jquery-min.usA (IP address)IN (0x0001)
                                                                                                                                              Aug 5, 2022 09:52:27.543205976 CEST192.168.2.58.8.8.80xae71Standard query (0)jquery-min.usA (IP address)IN (0x0001)
                                                                                                                                              Aug 5, 2022 09:52:27.624944925 CEST192.168.2.58.8.8.80xbbaaStandard query (0)jquery-min.usA (IP address)IN (0x0001)
                                                                                                                                              Aug 5, 2022 09:52:27.720825911 CEST192.168.2.58.8.8.80x4118Standard query (0)jquery-min.usA (IP address)IN (0x0001)
                                                                                                                                              Aug 5, 2022 09:52:27.831644058 CEST192.168.2.58.8.8.80x8553Standard query (0)jquery-min.usA (IP address)IN (0x0001)
                                                                                                                                              Aug 5, 2022 09:52:27.958754063 CEST192.168.2.58.8.8.80x9791Standard query (0)jquery-min.usA (IP address)IN (0x0001)
                                                                                                                                              Aug 5, 2022 09:52:28.044615984 CEST192.168.2.58.8.8.80x8928Standard query (0)jquery-min.usA (IP address)IN (0x0001)
                                                                                                                                              Aug 5, 2022 09:52:28.113236904 CEST192.168.2.58.8.8.80x7bd3Standard query (0)jquery-min.usA (IP address)IN (0x0001)
                                                                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                                                              Aug 5, 2022 09:52:27.340873003 CEST8.8.8.8192.168.2.50xbe52Server failure (2)jquery-min.usnonenoneA (IP address)IN (0x0001)
                                                                                                                                              Aug 5, 2022 09:52:27.434125900 CEST8.8.8.8192.168.2.50x6f97Server failure (2)jquery-min.usnonenoneA (IP address)IN (0x0001)
                                                                                                                                              Aug 5, 2022 09:52:27.511209011 CEST8.8.8.8192.168.2.50xe9b3Server failure (2)jquery-min.usnonenoneA (IP address)IN (0x0001)
                                                                                                                                              Aug 5, 2022 09:52:27.595329046 CEST8.8.8.8192.168.2.50xae71Server failure (2)jquery-min.usnonenoneA (IP address)IN (0x0001)
                                                                                                                                              Aug 5, 2022 09:52:27.682616949 CEST8.8.8.8192.168.2.50xbbaaServer failure (2)jquery-min.usnonenoneA (IP address)IN (0x0001)
                                                                                                                                              Aug 5, 2022 09:52:27.782706022 CEST8.8.8.8192.168.2.50x4118Server failure (2)jquery-min.usnonenoneA (IP address)IN (0x0001)
                                                                                                                                              Aug 5, 2022 09:52:27.885870934 CEST8.8.8.8192.168.2.50x8553Server failure (2)jquery-min.usnonenoneA (IP address)IN (0x0001)
                                                                                                                                              Aug 5, 2022 09:52:28.013510942 CEST8.8.8.8192.168.2.50x9791Server failure (2)jquery-min.usnonenoneA (IP address)IN (0x0001)
                                                                                                                                              Aug 5, 2022 09:52:28.100229979 CEST8.8.8.8192.168.2.50x8928Server failure (2)jquery-min.usnonenoneA (IP address)IN (0x0001)
                                                                                                                                              Aug 5, 2022 09:52:28.165755033 CEST8.8.8.8192.168.2.50x7bd3Server failure (2)jquery-min.usnonenoneA (IP address)IN (0x0001)
                                                                                                                                              • 27.0.135.13
                                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                              0192.168.2.54973727.0.135.1380C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exe
                                                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                                                              Aug 5, 2022 09:52:24.789292097 CEST456OUTGET /%E6%B6%89%E7%96%AB%E8%BD%A8%E8%BF%B9%E6%A3%80%E6%9F%A5%E8%A1%A8.xls HTTP/1.1
                                                                                                                                              Host: 27.0.135.13
                                                                                                                                              User-Agent: Go-http-client/1.1
                                                                                                                                              Accept-Encoding: gzip
                                                                                                                                              Aug 5, 2022 09:52:25.036730051 CEST458INHTTP/1.1 200 OK
                                                                                                                                              Date: Fri, 05 Aug 2022 07:52:24 GMT
                                                                                                                                              Server: Apache/2.4.6 (CentOS)
                                                                                                                                              Last-Modified: Mon, 18 Jul 2022 15:13:28 GMT
                                                                                                                                              ETag: "5c00-5e415cf643743"
                                                                                                                                              Accept-Ranges: bytes
                                                                                                                                              Content-Length: 23552
                                                                                                                                              Content-Type: application/vnd.ms-excel
                                                                                                                                              Data Raw: d0 cf 11 e0 a1 b1 1a e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3e 00 03 00 fe ff 09 00 06 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 01 00 00 00 00 00 00 00 00 10 00 00 28 00 00 00 01 00 00 00 fe ff ff ff 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd ff ff ff 2b 00 00 00 03 00 00 00 04 00 00 00 05 00 00 00 06 00 00 00 07 00 00 00 08 00 00 00 09 00 00 00 0a 00 00 00 0b 00 00 00 0c 00 00 00 0d 00 00 00 0e 00 00 00 0f 00 00 00 10 00 00 00 11 00 00 00 12 00 00 00 13 00 00 00 14 00 00 00 15 00 00 00 16 00 00 00 17 00 00 00 18 00 00 00 19 00 00 00 1a 00 00 00 1b 00 00 00 1c 00 00 00 1d 00 00 00 1e 00 00 00 1f 00 00 00 20 00 00 00 21 00 00 00 22 00 00 00 23 00 00 00 24 00 00 00 25 00 00 00 26 00 00 00 27 00 00 00 fe ff ff ff fe ff ff ff 2a 00 00 00 2c 00 00 00 fe ff ff ff fe ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 52 00 6f 00 6f 00 74 00 20 00 45 00 6e 00 74 00 72 00 79 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 00 05 00
                                                                                                                                              Data Ascii: >(+ !"#$%&'*,Root Entry


                                                                                                                                              Click to jump to process

                                                                                                                                              Target ID:0
                                                                                                                                              Start time:09:52:20
                                                                                                                                              Start date:05/08/2022
                                                                                                                                              Path:C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exe
                                                                                                                                              Wow64 process (32bit):false
                                                                                                                                              Commandline:"C:\Users\user\Desktop\#U8d26#U53f7#U5bc6#U7801#U8868.xls.exe"
                                                                                                                                              Imagebase:0x400000
                                                                                                                                              File size:1553920 bytes
                                                                                                                                              MD5 hash:2D2E2831AE6351FBEE7810BFC0D10955
                                                                                                                                              Has elevated privileges:true
                                                                                                                                              Has administrator privileges:true
                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                              Yara matches:
                                                                                                                                              • Rule: Cobaltbaltstrike_RAW_Payload_https_stager_x64, Description: Detects CobaltStrike payloads, Source: 00000000.00000002.449971931.000000C0001CE000.00000004.00001000.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000000.00000002.449971931.000000C0001CE000.00000004.00001000.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.449971931.000000C0001CE000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.449971931.000000C0001CE000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                              • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.449971931.000000C0001CE000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                                              • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.449971931.000000C0001CE000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000000.00000002.450050616.000000C0001D4000.00000004.00001000.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.450050616.000000C0001D4000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                              • Rule: Cobaltbaltstrike_RAW_Payload_https_stager_x64, Description: Detects CobaltStrike payloads, Source: 00000000.00000002.447338281.0000000026E30000.00000040.00001000.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.447338281.0000000026E30000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                              • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.447338281.0000000026E30000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                                              • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.447338281.0000000026E30000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                                              Reputation:low

                                                                                                                                              Target ID:1
                                                                                                                                              Start time:09:52:25
                                                                                                                                              Start date:05/08/2022
                                                                                                                                              Path:C:\Windows\System32\cmd.exe
                                                                                                                                              Wow64 process (32bit):false
                                                                                                                                              Commandline:c:\windows\system32\cmd.exe /C start ???????.xls
                                                                                                                                              Imagebase:0x7ff602050000
                                                                                                                                              File size:273920 bytes
                                                                                                                                              MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                                                                                                                              Has elevated privileges:true
                                                                                                                                              Has administrator privileges:true
                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                              Reputation:high

                                                                                                                                              Target ID:2
                                                                                                                                              Start time:09:52:25
                                                                                                                                              Start date:05/08/2022
                                                                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                                                                              Wow64 process (32bit):false
                                                                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                              Imagebase:0x7ff77f440000
                                                                                                                                              File size:625664 bytes
                                                                                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                                              Has elevated privileges:true
                                                                                                                                              Has administrator privileges:true
                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                              Reputation:high

                                                                                                                                              Target ID:3
                                                                                                                                              Start time:09:52:29
                                                                                                                                              Start date:05/08/2022
                                                                                                                                              Path:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                              Commandline:"C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /dde
                                                                                                                                              Imagebase:0xfc0000
                                                                                                                                              File size:27110184 bytes
                                                                                                                                              MD5 hash:5D6638F2C8F8571C593999C58866007E
                                                                                                                                              Has elevated privileges:true
                                                                                                                                              Has administrator privileges:true
                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                              Reputation:high

                                                                                                                                              No disassembly