Windows Analysis Report doc-220808714.xls
Overview
General Information
Detection
Score: | 76 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_Excel4Macro_AutoOpen | Detects Excel4 macro use with auto open / close | John Lambert @JohnLaTwC |
| |
JoeSecurity_HiddenMacro | Yara detected hidden Macro 4.0 in Excel | Joe Security |
Sigma Overview |
---|
System Summary: |
---|
Sigma detected: Regsvr32 Command Line Without DLL |
Source: | Author: Florian Roth: |
Sigma detected: Microsoft Office Product Spawning Windows Shell |
Source: | Author: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: |
Jbx Signature Overview |
---|
- • AV Detection
- • Compliance
- • Software Vulnerabilities
- • Networking
- • System Summary
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • HIPS / PFW / Operating System Protection Evasion
Click to jump to signature section
AV Detection: |
---|
Multi AV Scanner detection for submitted file |
Source: | Virustotal: | Perma Link |
Source: | File opened: | Jump to behavior |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Software Vulnerabilities: |
---|
Document exploit detected (process start blacklist hit) |
Source: | Process created: |
Document exploit detected (UrlDownloadToFile) |
Source: | Section loaded: | Jump to behavior |
Source: | TCP traffic: |
Source: | DNS query: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | JA3 fingerprint: |
Source: | IP Address: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | String found in binary or memory: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File created: | Jump to behavior |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary: |
---|
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros) |
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: |
Source: | Matched rule: |
Source: | OLE indicator, VBA macros: |
Source: | Virustotal: |
Source: | Key opened: | Jump to behavior |
Source: | OLE indicator, Workbook stream: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | File read: | Jump to behavior |
Source: | Window detected: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion: |
---|
Yara detected hidden Macro 4.0 in Excel |
Source: | File source: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Scripting1 | Path Interception | Process Injection1 | Disable or Modify Tools1 | OS Credential Dumping | Virtualization/Sandbox Evasion1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Encrypted Channel1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Exploitation for Client Execution23 | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Virtualization/Sandbox Evasion1 | LSASS Memory | File and Directory Discovery1 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Non-Application Layer Protocol2 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Process Injection1 | Security Account Manager | System Information Discovery2 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Application Layer Protocol13 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Scripting1 | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Ingress Tool Transfer2 | SIM Card Swap | Carrier Billing Fraud |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
13% | Virustotal | Browse |
No Antivirus matches |
---|
No Antivirus matches |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
ohemaa.org | 172.93.99.178 | true | false |
| unknown |
amerident.com.do | 108.179.242.179 | true | false | unknown | |
madieandme.com.au | 101.0.112.4 | true | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false |
| unknown | |
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| low | ||
false |
| unknown | ||
false | high | |||
false |
| low |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
101.0.112.4 | madieandme.com.au | Australia | 55803 | DIGITALPACIFIC-AUDigitalPacificPtyLtdAustraliaAU | false | |
108.179.242.179 | amerident.com.do | United States | 46606 | UNIFIEDLAYER-AS-1US | false | |
172.93.99.178 | ohemaa.org | United States | 23470 | RELIABLESITEUS | false |
General Information |
---|
Joe Sandbox Version: | 33.0.0 White Diamond |
Analysis ID: | 501226 |
Start date: | 12.10.2021 |
Start time: | 17:12:45 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 46s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | doc-220808714.xls |
Cookbook file name: | defaultwindowsofficecookbook.jbs |
Analysis system description: | Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2) |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal76.expl.winXLS@7/0@3/3 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
Time | Type | Description |
---|---|---|
17:13:29 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
108.179.242.179 | Get hash | malicious | Browse | ||
Get hash | malicious | Browse | |||
172.93.99.178 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
amerident.com.do | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
DIGITALPACIFIC-AUDigitalPacificPtyLtdAustraliaAU | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
UNIFIEDLAYER-AS-1US | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
7dcce5b76c8b17472d024758970a406b | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
No context |
---|
No created / dropped files found |
---|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 7.531872402672375 |
TrID: |
|
File name: | doc-220808714.xls |
File size: | 241152 |
MD5: | 2654fdca7197f542cbd0be823a2a2a9f |
SHA1: | 149b43a5f8f4d9bd63720b408f6c4e2a86401c6a |
SHA256: | f5a313c5353ae0d1cede7bd5e234bfd3a4d7abb5e877bd2903d8d7572e9ee4d6 |
SHA512: | 1534994b08b95c1a9879afba6a857817146b3aaa06484a65ff89f418b5ca31fa7ffbc2076efdface8f0036f5e3a7f98e95fe0120df3bfe2c2b06ea8e3b96bcaf |
SSDEEP: | 6144:cKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgq9jWXcZZRBTq1BOzTwvOsPDslAvS32vI7p:09jVzTmszTwvTDy33LvfP1OWr |
File Content Preview: | ........................>...................................................................................................................................................................................................................................... |
File Icon |
---|
Icon Hash: | e4eea286a4b4bcb4 |
General | ||
---|---|---|
Document Type: | OLE | |
Number of OLE Files: | 1 |
Indicators | |
---|---|
Has Summary Info: | True |
Application Name: | Microsoft Excel |
Encrypted Document: | False |
Contains Word Document Stream: | False |
Contains Workbook/Book Stream: | True |
Contains PowerPoint Document Stream: | False |
Contains Visio Document Stream: | False |
Contains ObjectPool Stream: | |
Flash Objects Count: | |
Contains VBA Macros: | True |
Summary | |
---|---|
Code Page: | 1251 |
Author: | |
Last Saved By: | |
Create Time: | 2015-06-05 18:19:34 |
Last Saved Time: | 2021-10-12 07:22:59 |
Creating Application: | |
Security: | 0 |
Document Summary | |
---|---|
Document Code Page: | 1251 |
Thumbnail Scaling Desired: | False |
Company: | |
Contains Dirty Links: | False |
Shared Document: | False |
Changed Hyperlinks: | False |
Application Version: | 1048576 |
General | |
---|---|
Stream Path: | \x5DocumentSummaryInformation |
File Type: | data |
Stream Size: | 4096 |
Entropy: | 0.43766981378 |
Base64 Encoded: | False |
Data ASCII: | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . < . . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t . . . . . S i m b b 1 . . . . . S i m b b 2 . . . . . S i m b b 3 . . . . . G G T . . . . . B r e r 1 |
Data Raw: | fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 3c 01 00 00 09 00 00 00 01 00 00 00 50 00 00 00 0f 00 00 00 58 00 00 00 17 00 00 00 64 00 00 00 0b 00 00 00 6c 00 00 00 10 00 00 00 74 00 00 00 13 00 00 00 7c 00 00 00 16 00 00 00 84 00 00 00 0d 00 00 00 8c 00 00 00 0c 00 00 00 f9 00 00 00 |
General | |
---|---|
Stream Path: | \x5SummaryInformation |
File Type: | data |
Stream Size: | 4096 |
Entropy: | 0.279171118094 |
Base64 Encoded: | False |
Data ASCII: | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . X . . . . . . . h . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . ? R , . . . . @ . . . . . . . 9 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
Data Raw: | fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 a0 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 58 00 00 00 12 00 00 00 68 00 00 00 0c 00 00 00 80 00 00 00 0d 00 00 00 8c 00 00 00 13 00 00 00 98 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 08 00 00 00 |
General | |
---|---|
Stream Path: | Workbook |
File Type: | Applesoft BASIC program data, first line number 16 |
Stream Size: | 229526 |
Entropy: | 7.71393359025 |
Base64 Encoded: | True |
Data ASCII: | . . . . . . . . Z O . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . . . 4 . < . 8 . = . B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . . . . V e 1 8 . . . . . . . X . @ . . . . . |
Data Raw: | 09 08 10 00 00 06 05 00 5a 4f cd 07 c9 00 02 00 06 08 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 05 00 01 10 04 34 04 3c 04 38 04 3d 04 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 |
Network Behavior |
---|
Network Port Distribution |
---|
- Total Packets: 38
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 12, 2021 17:13:40.015114069 CEST | 49165 | 443 | 192.168.2.22 | 172.93.99.178 |
Oct 12, 2021 17:13:40.015177011 CEST | 443 | 49165 | 172.93.99.178 | 192.168.2.22 |
Oct 12, 2021 17:13:40.015268087 CEST | 49165 | 443 | 192.168.2.22 | 172.93.99.178 |
Oct 12, 2021 17:13:40.023870945 CEST | 49165 | 443 | 192.168.2.22 | 172.93.99.178 |
Oct 12, 2021 17:13:40.023914099 CEST | 443 | 49165 | 172.93.99.178 | 192.168.2.22 |
Oct 12, 2021 17:13:40.250966072 CEST | 443 | 49165 | 172.93.99.178 | 192.168.2.22 |
Oct 12, 2021 17:13:40.251070976 CEST | 49165 | 443 | 192.168.2.22 | 172.93.99.178 |
Oct 12, 2021 17:13:40.265047073 CEST | 49165 | 443 | 192.168.2.22 | 172.93.99.178 |
Oct 12, 2021 17:13:40.265084982 CEST | 443 | 49165 | 172.93.99.178 | 192.168.2.22 |
Oct 12, 2021 17:13:40.265454054 CEST | 443 | 49165 | 172.93.99.178 | 192.168.2.22 |
Oct 12, 2021 17:13:40.265526056 CEST | 49165 | 443 | 192.168.2.22 | 172.93.99.178 |
Oct 12, 2021 17:13:40.503371000 CEST | 49165 | 443 | 192.168.2.22 | 172.93.99.178 |
Oct 12, 2021 17:13:40.551132917 CEST | 443 | 49165 | 172.93.99.178 | 192.168.2.22 |
Oct 12, 2021 17:13:41.840105057 CEST | 443 | 49165 | 172.93.99.178 | 192.168.2.22 |
Oct 12, 2021 17:13:41.840183973 CEST | 443 | 49165 | 172.93.99.178 | 192.168.2.22 |
Oct 12, 2021 17:13:41.840198994 CEST | 49165 | 443 | 192.168.2.22 | 172.93.99.178 |
Oct 12, 2021 17:13:41.840249062 CEST | 49165 | 443 | 192.168.2.22 | 172.93.99.178 |
Oct 12, 2021 17:13:41.840543985 CEST | 49165 | 443 | 192.168.2.22 | 172.93.99.178 |
Oct 12, 2021 17:13:41.840567112 CEST | 443 | 49165 | 172.93.99.178 | 192.168.2.22 |
Oct 12, 2021 17:13:41.840590954 CEST | 49165 | 443 | 192.168.2.22 | 172.93.99.178 |
Oct 12, 2021 17:13:41.840611935 CEST | 49165 | 443 | 192.168.2.22 | 172.93.99.178 |
Oct 12, 2021 17:13:42.191519022 CEST | 49166 | 443 | 192.168.2.22 | 101.0.112.4 |
Oct 12, 2021 17:13:42.191562891 CEST | 443 | 49166 | 101.0.112.4 | 192.168.2.22 |
Oct 12, 2021 17:13:42.191625118 CEST | 49166 | 443 | 192.168.2.22 | 101.0.112.4 |
Oct 12, 2021 17:13:42.192444086 CEST | 49166 | 443 | 192.168.2.22 | 101.0.112.4 |
Oct 12, 2021 17:13:42.192461014 CEST | 443 | 49166 | 101.0.112.4 | 192.168.2.22 |
Oct 12, 2021 17:13:42.823854923 CEST | 443 | 49166 | 101.0.112.4 | 192.168.2.22 |
Oct 12, 2021 17:13:42.824115038 CEST | 49166 | 443 | 192.168.2.22 | 101.0.112.4 |
Oct 12, 2021 17:13:42.839334011 CEST | 49166 | 443 | 192.168.2.22 | 101.0.112.4 |
Oct 12, 2021 17:13:42.839382887 CEST | 443 | 49166 | 101.0.112.4 | 192.168.2.22 |
Oct 12, 2021 17:13:42.839660883 CEST | 443 | 49166 | 101.0.112.4 | 192.168.2.22 |
Oct 12, 2021 17:13:42.839787960 CEST | 49166 | 443 | 192.168.2.22 | 101.0.112.4 |
Oct 12, 2021 17:13:42.858344078 CEST | 49166 | 443 | 192.168.2.22 | 101.0.112.4 |
Oct 12, 2021 17:13:42.899148941 CEST | 443 | 49166 | 101.0.112.4 | 192.168.2.22 |
Oct 12, 2021 17:13:45.537420034 CEST | 443 | 49166 | 101.0.112.4 | 192.168.2.22 |
Oct 12, 2021 17:13:45.537553072 CEST | 443 | 49166 | 101.0.112.4 | 192.168.2.22 |
Oct 12, 2021 17:13:45.537647009 CEST | 49166 | 443 | 192.168.2.22 | 101.0.112.4 |
Oct 12, 2021 17:13:45.538012028 CEST | 49166 | 443 | 192.168.2.22 | 101.0.112.4 |
Oct 12, 2021 17:13:45.538038969 CEST | 49166 | 443 | 192.168.2.22 | 101.0.112.4 |
Oct 12, 2021 17:13:45.538069010 CEST | 443 | 49166 | 101.0.112.4 | 192.168.2.22 |
Oct 12, 2021 17:13:45.538081884 CEST | 49166 | 443 | 192.168.2.22 | 101.0.112.4 |
Oct 12, 2021 17:13:45.538150072 CEST | 49166 | 443 | 192.168.2.22 | 101.0.112.4 |
Oct 12, 2021 17:13:45.719580889 CEST | 49167 | 443 | 192.168.2.22 | 108.179.242.179 |
Oct 12, 2021 17:13:45.719633102 CEST | 443 | 49167 | 108.179.242.179 | 192.168.2.22 |
Oct 12, 2021 17:13:45.719705105 CEST | 49167 | 443 | 192.168.2.22 | 108.179.242.179 |
Oct 12, 2021 17:13:45.720257044 CEST | 49167 | 443 | 192.168.2.22 | 108.179.242.179 |
Oct 12, 2021 17:13:45.720288992 CEST | 443 | 49167 | 108.179.242.179 | 192.168.2.22 |
Oct 12, 2021 17:13:46.048093081 CEST | 443 | 49167 | 108.179.242.179 | 192.168.2.22 |
Oct 12, 2021 17:13:46.048398018 CEST | 49167 | 443 | 192.168.2.22 | 108.179.242.179 |
Oct 12, 2021 17:13:46.063859940 CEST | 49167 | 443 | 192.168.2.22 | 108.179.242.179 |
Oct 12, 2021 17:13:46.063909054 CEST | 443 | 49167 | 108.179.242.179 | 192.168.2.22 |
Oct 12, 2021 17:13:46.064196110 CEST | 443 | 49167 | 108.179.242.179 | 192.168.2.22 |
Oct 12, 2021 17:13:46.064332008 CEST | 49167 | 443 | 192.168.2.22 | 108.179.242.179 |
Oct 12, 2021 17:13:46.068979979 CEST | 49167 | 443 | 192.168.2.22 | 108.179.242.179 |
Oct 12, 2021 17:13:46.111146927 CEST | 443 | 49167 | 108.179.242.179 | 192.168.2.22 |
Oct 12, 2021 17:13:46.304980040 CEST | 443 | 49167 | 108.179.242.179 | 192.168.2.22 |
Oct 12, 2021 17:13:46.305239916 CEST | 49167 | 443 | 192.168.2.22 | 108.179.242.179 |
Oct 12, 2021 17:13:46.305263996 CEST | 443 | 49167 | 108.179.242.179 | 192.168.2.22 |
Oct 12, 2021 17:13:46.305320024 CEST | 49167 | 443 | 192.168.2.22 | 108.179.242.179 |
Oct 12, 2021 17:13:46.305584908 CEST | 49167 | 443 | 192.168.2.22 | 108.179.242.179 |
Oct 12, 2021 17:13:46.305655003 CEST | 49167 | 443 | 192.168.2.22 | 108.179.242.179 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 12, 2021 17:13:39.986201048 CEST | 52167 | 53 | 192.168.2.22 | 8.8.8.8 |
Oct 12, 2021 17:13:40.005583048 CEST | 53 | 52167 | 8.8.8.8 | 192.168.2.22 |
Oct 12, 2021 17:13:41.872337103 CEST | 50591 | 53 | 192.168.2.22 | 8.8.8.8 |
Oct 12, 2021 17:13:42.188901901 CEST | 53 | 50591 | 8.8.8.8 | 192.168.2.22 |
Oct 12, 2021 17:13:45.575872898 CEST | 57805 | 53 | 192.168.2.22 | 8.8.8.8 |
Oct 12, 2021 17:13:45.717439890 CEST | 53 | 57805 | 8.8.8.8 | 192.168.2.22 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Oct 12, 2021 17:13:39.986201048 CEST | 192.168.2.22 | 8.8.8.8 | 0xe415 | Standard query (0) | A (IP address) | IN (0x0001) | |
Oct 12, 2021 17:13:41.872337103 CEST | 192.168.2.22 | 8.8.8.8 | 0xd9e3 | Standard query (0) | A (IP address) | IN (0x0001) | |
Oct 12, 2021 17:13:45.575872898 CEST | 192.168.2.22 | 8.8.8.8 | 0x4c3b | Standard query (0) | A (IP address) | IN (0x0001) |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Oct 12, 2021 17:13:40.005583048 CEST | 8.8.8.8 | 192.168.2.22 | 0xe415 | No error (0) | 172.93.99.178 | A (IP address) | IN (0x0001) | ||
Oct 12, 2021 17:13:42.188901901 CEST | 8.8.8.8 | 192.168.2.22 | 0xd9e3 | No error (0) | 101.0.112.4 | A (IP address) | IN (0x0001) | ||
Oct 12, 2021 17:13:45.717439890 CEST | 8.8.8.8 | 192.168.2.22 | 0x4c3b | No error (0) | 108.179.242.179 | A (IP address) | IN (0x0001) |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.22 | 49165 | 172.93.99.178 | 443 | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2021-10-12 15:13:40 UTC | 0 | OUT | |
2021-10-12 15:13:41 UTC | 0 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
1 | 192.168.2.22 | 49166 | 101.0.112.4 | 443 | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2021-10-12 15:13:42 UTC | 0 | OUT | |
2021-10-12 15:13:45 UTC | 1 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
2 | 192.168.2.22 | 49167 | 108.179.242.179 | 443 | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2021-10-12 15:13:46 UTC | 1 | OUT | |
2021-10-12 15:13:46 UTC | 1 | IN |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
Behavior |
---|
Click to jump to process
System Behavior |
---|
Start time: | 17:13:20 |
Start date: | 12/10/2021 |
Path: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13fa70000 |
File size: | 28253536 bytes |
MD5 hash: | D53B85E21886D2AF9815C377537BCAC3 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
Network Activities
Object Security Activities
LPC Port Activities
Start time: | 17:13:29 |
Start date: | 12/10/2021 |
Path: | C:\Windows\System32\regsvr32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xff1e0000 |
File size: | 19456 bytes |
MD5 hash: | 59BCE9F07985F8A4204F4D6554CFF708 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
LPC Port Activities
Start time: | 17:13:29 |
Start date: | 12/10/2021 |
Path: | C:\Windows\System32\regsvr32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xff1e0000 |
File size: | 19456 bytes |
MD5 hash: | 59BCE9F07985F8A4204F4D6554CFF708 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
LPC Port Activities
Start time: | 17:13:29 |
Start date: | 12/10/2021 |
Path: | C:\Windows\System32\regsvr32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xff1e0000 |
File size: | 19456 bytes |
MD5 hash: | 59BCE9F07985F8A4204F4D6554CFF708 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Section Activities
Registry Activities
Mutex Activities
Process Activities
Thread Activities
Memory Activities
System Activities
Timing Activities
Windows UI Activities
LPC Port Activities
Disassembly |
---|
Code Analysis |
---|