Threat Analysis Report: Hash Values File Details Environment
Threat Analysis Report: Hash Values File Details Environment
SHA-256 Hash
5DE6C7BA93850C642099DB3239AAE491BD93BC2DBDFD4FECFDD64E5D9A9D4685
Identifier
Screenshots 2
Microsoft Windows 7 Professional Service Pack 1 (build 7601, version 6.1.7601), 64-bit
Hide environment
Behavior Classification
Behavior Severity
⬤ 1-
Offile file contains VBA code
Informational
⬤ 1-
Spawned Rundll32 Process
Informational
⬤ 1-
Retrieves a NetBIOS or DNS name associated with the local computer
Informational
⬤ 1-
Offile file contains VBA code
Informational
⬤ 1-
Changed the protection attribute of the process
Informational
Networking ⬤ 2 - Low
⬤ 1-
Retrieved the name of the network resource associated with a local device
Informational
⬤ 1-
Offile file contains VBA code
Informational
⬤ 1-
Offile file contains VBA code
Informational
⬤ 1-
Contained long sleep
Informational
⬤ 1-
Offile file contains VBA code
Informational
Security Solution / Mechanism bypass, termination and removal, Anti Debugging, VM Detection ⬤ 1 - Informational
⬤ 1-
Offile file contains VBA code
Informational
⬤ 1-
Obtained user's logon name
Informational
⬤ 1-
Contained long sleep
Informational
Spreading ⬤ 1 - Informational
⬤ 1-
Offile file contains VBA code
Informational
Connected Sites: 2
Processes Analyzed
Name Reason Severity
Timeline Activity
62665.xls
287.dll
certutil.exe
rundll32.exe
0 3 6 9 12 15 18 21
Offset in seconds
Technique Tactics
An adversary may rely upon specific actions by a user in order to gain execution.
This may be direct code execution, such as when a user opens a malicious executable
delivered via Spearphishing Attachment with the icon and apparent extension of a
document file. It also may lead to other execution techniques, such as when a user
clicks on a link delivered via Spearphishing Link that leads to exploitation of a
browser or application vulnerability via Exploitation for Client Execution. While
User Execution frequently occurs shortly after Initial Access it may occur at other
phases of an intrusion, such as when an adversary places a file in a shared directory
or on a user's desktop hoping that a user will click on it.
Adversaries may execute a binary, command, or script via a method that interacts with
Windows services, such as the Service Control Manager. This can be done by either
creating a new service or modifying an existing service. This technique is the
execution used in conjunction with New Service and Modify Existing Service during
service persistence or privilege escalation.
Adversaries may use scripts to aid in operations and perform multiple actions that
would otherwise be manual. Scripting is useful for speeding up operational tasks and
reducing the time required to gain access to critical resources. Some scripting
languages may be used to bypass process monitoring mechanisms by directly interacting
with the operating system at an API level instead of calling other programs. Common
scripting languages for Windows include VBScript and PowerShell but could also be in
the form of command-line batch scripts.
Networks often contain shared network drives and folders that enable users to access
file directories on various systems across a network.
An adversary may attempt to get detailed information about the operating system and
hardware, including version, patches, hotfixes, service packs, and architecture.
Adversaries will likely look for details about the network configuration and settings
of systems they access or through information discovery of remote systems. Several
operating system administration utilities exist that can be used to gather this
information. Examples include Arp, ipconfig/ifconfig, nbtstat, and route.
Files may be copied from one system to another to stage adversary tools or other
files over the course of an operation. Files may be copied from an external
adversary-controlled system through the Command and Control channel to bring tools
into the victim network or through alternate protocols with another tool such as FTP.
Files can also be copied over on Mac and Linux with native tools like scp, rsync, and
sftp.
Adversaries may communicate over a commonly used port to bypass firewalls or network
detection systems and to blend with normal network activity to avoid more detailed
inspection.
Process Operations,
00:00:000 )"54515
miscellaneous
Process Operations, Obtained the contents of the specified variable from the environment block of the
00:00:485
miscellaneous calling process
File Operations,
00:00:500 Obtained the path of the Windows system directory
miscellaneous
File Operations,
00:00:500 Retrieved the full path for the module
miscellaneous
Process Operations, Changed the protection attribute of process address: 0x2f8630dc, new attribute:
00:00:500
miscellaneous Execute_ReadWrite
Process Operations, Changed the protection attribute of process address: 0x2f8630dc, new attribute:
00:00:500
miscellaneous Execute_Read
HKLM\Software\Microsoft\Windows\CurrentVersion
00:00:500 Registry Read
CommonFilesDir
Process Operations, Retrieved information on a specific string in the current activation context
00:00:500
miscellaneous
00:00:500 Others Initialized a critical section object and set the spin count for the critical section
Process Operations, Deactivated the activation context corresponding to the specified cookie
00:00:578
miscellaneous
2f7e368f
00:00:641 Thread Created
HKCU\Software\Microsoft\Office\12.0\Excel
00:00:641 Registry Read
DisableThreadAffinity
{C1EE01F2-B3B6-4A6A-9DDD-E988C088EC82}
00:00:656 Process Created
Process Operations,
00:00:672 Obtained the identifier of the thread or process that created the specified window
miscellaneous
HKLM\Software\Microsoft\.NETFramework
00:00:766 Registry Read
UseLegacyV2RuntimeActivationPolicyDefaultValue
HKLM\Software\Microsoft\.NETFramework
00:00:766 Registry Read
OnlyUseLatestCLR
HKLM\Software\Microsoft\.NETFramework
00:00:766 Registry Read
InstallRoot
File Operations,
00:00:766 Searched a directory for the name: C:\Windows\Microsoft.NET\Framework\\*
miscellaneous
File Operations,
00:00:766 Obtained a set of FAT file system attributes for a file or directory
miscellaneous
C:\Windows\Microsoft.NET\Framework\\v1.1.4322\clr.dll
20000
00:00:766 Files Opened
10000000
C:\Windows\Microsoft.NET\Framework\\v1.1.4322\mscorwks.dll
20000
00:00:766 Files Opened
10000000
C:\Windows\Microsoft.NET\Framework\\v2.0.50727\clr.dll
20000
00:00:766 Files Opened
10000000
C:\Windows\Microsoft.NET\Framework\\v2.0.50727\mscorwks.dll
20000
00:00:766 Files Opened
10000000
C:\Windows\Microsoft.NET\Framework\\v4.0.30319\clr.dll
20000
00:00:766 Files Opened
10000000
C:\Windows\Microsoft.NET\Framework\\v1.0.3705\mscorwks.dll
20000
00:00:766 Files Opened
10000000
C:\Windows\Microsoft.NET\Framework\\v1.0.3705\clr.dll
20000
00:00:766 Files Opened
10000000
HKLM\SOFTWARE\Microsoft\Fusion
00:00:781 Registry Read
NoClientChecks
Process Operations,
00:01:093 Install a new hook procedure (type: WH_MSGFILTER)
miscellaneous
Process Operations,
00:01:093 Install a new hook procedure (type: WH_KEYBOARD)
miscellaneous
Process Operations,
00:01:110 Initialized COM library for the current thread and set it in the concurrency mode
miscellaneous
{FA445657-9379-11D6-B41A-00065B83EE53}
00:01:125 Process Created
File Operations,
00:01:172 Obtained the current directory for the current process
miscellaneous
File Operations, Searched a directory for the name: C:\Program Files (x86)\Microsoft
00:01:187
miscellaneous Office\Office12\xlstart\*.*
{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}
00:01:406 Process Created
00:01:500 Socket Activities Retrieved the name of the network resource associated with a local device
Obtained the current system date and time in in Coordinated Universal Time (UTC)
00:01:516 Others
format
File Operations, Determined whether a disk drive C:\ is a removable, fixed, CD-ROM, RAM disk, or
00:01:547
miscellaneous network drive
{88D969EC-8B8B-4C3D-859E-AF6CD158BE0F}
00:01:672 Process Created
{88D969EF-F192-11D4-A65F-0040963251E5}
00:01:687 Process Created
HKLM\Software\Microsoft\VBA
00:01:797 Registry Read
Vbe6DllPath
HKCU\Software\Microsoft\VBA\6.0\Common
00:01:844 Registry Read
RequireDeclaration
HKCU\Software\Microsoft\VBA\6.0\Common
00:01:844 Registry Read
NotifyUserBeforeStateLoss
HKCU\Software\Microsoft\VBA\6.0\Common
00:01:844 Registry Read
CompileOnDemand
HKCU\Software\Microsoft\VBA\6.0\Common
00:01:844 Registry Read
BreakOnServerErrors
HKCU\Software\Microsoft\VBA\6.0\Common
00:01:844 Registry Read
BreakOnAllErrors
HKCU\Software\Microsoft\VBA\6.0\Common
00:01:844 Registry Read
BackGroundCompile
{DFFACDC5-679F-4156-8947-C5C76BC0B67F}
00:02:280 Process Created
{0E5AAE11-A475-4C5B-AB00-C66DE400274E}
00:02:280 Process Created
C:\Users\Administrator\AppData\Roaming\Microsoft\Office\Recent\e76f95de-9a60-
00:02:391 Files Deleted
474e-bc19-d357098c474a.LNK
65001f64
00:02:421 Thread Created
File Operations,
00:02:766 Retrieved the path of the directory designated for temporary files
miscellaneous
{88D969E5-F192-11D4-A65F-0040963251E5}
00:03:296 Process Created
{871C5380-42A0-1069-A2EA-08002B30309D}
00:03:546
Process Created
{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}
00:03:578 Process Created
c:\windows\system32\certutil.exe
"c:\windows\system32\certutil.exe" -decode c:\users\public\287.txt
00:03:609 Process Created
c:\users\public\287a.txt
Process Operations,
00:03:766 Enabled an application to supersede the top-level exception handler
miscellaneous
File Operations,
00:03:766 Retrieved the full path for the module
miscellaneous
Obtained the current system date and time in in Coordinated Universal Time (UTC)
00:03:812 Others
format
C:\Users\Public\287a.txt
Write
00:03:828 Files Created
Normal
c:\windows\system32\certutil.exe
"c:\windows\system32\certutil.exe" -decodehex c:\users\public\287a.txt
00:06:625 Process Created
c:\users\public\287.dll
C:\Users\Public\287.dll
Write
00:06:781 Files Created Normal
c:\windows\system32\rundll32.exe
00:09:656 Process Created "c:\windows\system32\rundll32.exe" c:\users\public\287.dll,d
File Operations,
00:09:671 Retrieved the full path for the module
miscellaneous
File Operations,
00:09:671 Obtained a set of FAT file system attributes for a file or directory
miscellaneous
Process Operations,
00:09:671 ffffffff
miscellaneous
Process Operations,
00:09:671 Enabled an application to supersede the top-level exception handler
miscellaneous
Network Operations,
00:09:812 Set an Internet option: 6
miscellaneous
Network Operations,
00:09:812 Set an Internet option: 5
miscellaneous
Network Operations,
00:09:812 Set an Internet option: 2
miscellaneous
Process Operations, Established a connection to the service control manager and open the service control
00:09:843 miscellaneous manager database
Process Operations,
00:09:843 Obtained the current status of a service
miscellaneous
HKU\S-1-5-21-2969830022-2362906686-2146684197-
00:09:875 Registry Read 500\Software\Microsoft\windows\CurrentVersion\Internet Settings
ProxyEnable
HKU\S-1-5-21-2969830022-2362906686-2146684197-
00:09:875 Registry Read 500\Software\Microsoft\windows\CurrentVersion\Internet Settings
ProxyOverride
HKU\S-1-5-21-2969830022-2362906686-2146684197-
00:09:875 Registry Read 500\Software\Microsoft\windows\CurrentVersion\Internet Settings
AutoConfigURL
HKLM\System\Setup
00:09:875 Registry Read
SystemSetupInProgress
HKU\S-1-5-21-2969830022-2362906686-2146684197-
00:09:875 Registry Opened
500\Software\Microsoft\windows\CurrentVersion\Internet Settings
HKU\S-1-5-21-2969830022-2362906686-2146684197-
00:09:875 Registry Read 500\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKU\S-1-5-21-2969830022-2362906686-2146684197-
00:09:875 Registry Read 500\Software\Microsoft\windows\CurrentVersion\Internet Settings
ProxyServer
HKU\S-1-5-21-2969830022-2362906686-2146684197-
00:09:875 Registry Read 500\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections
DefaultConnectionSettings
Process Operations,
00:09:875 Opened the access token associated with a process
miscellaneous
Process Operations,
00:09:875 Opened the access token associated with a thread
miscellaneous
Process Operations, Set a waiting mode until a specified object is in the signaled state or the time-out
00:09:875
miscellaneous interval elapses
HKU\S-1-5-21-2969830022-2362906686-2146684197-
00:09:875 Registry Created
500\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections
HKCR\AutoProxyTypes\Application/x-ns-proxy-autoconfig
00:09:890 Registry Read
Flags
HKCR\AutoProxyTypes\Application/x-ns-proxy-autoconfig
00:09:890 Registry Read
FileExtensions
HKCR\AutoProxyTypes\Application/x-ns-proxy-autoconfig
00:09:890 Registry Read
DllFile
HKCR\AutoProxyTypes\Application/x-ns-proxy-autoconfig
00:09:890 Registry Read
Default
HKCR\AutoProxyTypes\Application/x-internet-signup
00:09:890 Registry Read
Flags
HKCR\AutoProxyTypes\Application/x-internet-signup
00:09:890 Registry Read
FileExtensions
HKCR\AutoProxyTypes\Application/x-internet-signup
00:09:890 Registry Read
DllFile
HKCR\AutoProxyTypes\Application/x-internet-signup
00:09:890 Registry Read
Default
HKU\S-1-5-21-2969830022-2362906686-2146684197-
500\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable
00:09:890 Registry Modified
0
REG_DWORD
HKU\S-1-5-21-2969830022-2362906686-2146684197-
00:09:890 Registry Created
500\Software\Microsoft\windows\CurrentVersion\Internet Settings
Expanded environment-variable strings and replace them with the values defined for
00:09:890 Others
the current use
HKU\S-1-5-21-2969830022-2362906686-2146684197-
00:09:890 Registry Deleted 500\Software\Microsoft\windows\CurrentVersion\Internet Settings
AutoConfigURL
00:09:890 Others Initialized a critical section object and set the spin count for the critical section
HKU\S-1-5-21-2969830022-2362906686-2146684197-
00:09:890 Registry Deleted 500\Software\Microsoft\windows\CurrentVersion\Internet Settings
ProxyServer
HKU\S-1-5-21-2969830022-2362906686-2146684197-
00:09:890 Registry Deleted 500\Software\Microsoft\windows\CurrentVersion\Internet Settings
ProxyOverride
75ef97be
00:09:906 Thread Created
Network Operations,
00:09:906 Retrieved the Internet connected state of the local system
miscellaneous
HKU\S-1-5-21-2969830022-2362906686-2146684197-
500\Software\Microsoft\windows\CurrentVersion\Internet
00:09:906 Registry Modified Settings\Connections\SavedLegacySettings
46
REG_BINARY
Network Operations,
00:09:906 Set an Internet option: 4a
miscellaneous
Network Operations,
00:09:906 Set an Internet option: 49
miscellaneous
Initialized the WinINet functions, Agent name: mozilla/4.0 (compatible; msie 7.0;
Network Operations, windows nt 6.1; wow64; trident/4.0; slcc2; .net clr 2.0.50727; .net clr 3.5.30729; .net clr
00:09:953
miscellaneous 3.0.30729; media center pc 6.0; infopath.2; .net4.0c; .net4.0e), Access type: PRECONFIG
Flags: PORT_NUMBER
00:09:953 Socket Activities Obtained the local name (address) for a socket
Network Operations,
00:09:953 Set an Internet option: 2d
miscellaneous
Network Operations,
00:09:953 Set an Internet option: 6c
miscellaneous
HKCU\Software\Microsoft\Internet
00:09:968 Registry Opened
Explorer\Main\FeatureControl\FEATURE_INCLUDE_PORT_IN_SPN_KB908209
00:09:968 Registry Opened HKCU\Software\Microsoft\Internet Explorer\Main\FeatureControl
HKCU\Software\Microsoft\Internet
00:09:968 Registry Opened
Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING
HKLM\Software\Microsoft\Internet
00:09:968 Registry Opened
Explorer\Main\FeatureControl\FEATURE_INCLUDE_PORT_IN_SPN_KB908209
HKLM\Software\Microsoft\Internet
00:09:968 Registry Opened
Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING
Network Operations,
00:09:968 Opened a HTTP or FTP session for a given site: 207.154.235.218
miscellaneous
Network Operations,
00:09:968 miscellaneous Verb: get, ObjectName: /campo/z/z, Version: , Referer: , Flags: 400010, Context: 610f40
HKCU\Software\Microsoft\Internet
00:10:000 Registry Opened
Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE
HKLM\Software\Microsoft\Internet
00:10:000 Registry Opened
Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE
00:10:000 Socket Activities Obtained information about next service in order of networking providers
Obtained the current system date and time in in Coordinated Universal Time (UTC)
00:10:000 Others
format
Process Operations,
00:10:000 Initialized COM library for the current thread and set it in the concurrency mode
miscellaneous
75efe44f
00:10:000 Thread Created
Network Operations,
00:10:015 Set an Internet option: 3e
miscellaneous
Network Operations,
00:10:015 Set an Internet option: 66
miscellaneous
Network Operations,
00:10:015 Set an Internet option: 44
miscellaneous
Network Operations,
00:10:015 Set an Internet option: 65
miscellaneous
Network Operations,
00:10:015 Set an Internet option: 3a
miscellaneous
Network Operations,
00:10:015 Set an Internet option: 64
miscellaneous
Network Operations,
00:10:015 Set an Internet option: 56
miscellaneous
Network Operations,
00:10:015 Set an Internet option: 58
miscellaneous
Network Operations,
00:10:015 Set an Internet option: 41
miscellaneous
Network Operations,
00:10:031 Headers: , HeaderLength: 0, Optional: , OptionalLength: 0
miscellaneous
{DCB00C01-570F-4A9B-8D69-199FDBA5723B}
00:10:062 Process Created
{00000323-0000-0000-C000-000000000046}
00:10:062 Process Created
{A47979D2-C419-11D9-A5B4-001185AD2B89}
00:10:078 Process Created
{0000032A-0000-0000-C000-000000000046}
00:10:078 Process Created
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad\
00:10:093 Registry Opened
{CC771B05-B3AC-42A3-AA57-C69F699B075A}
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad
00:10:093 Registry Read
WpadLastNetwork
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad\
00:21:125 Registry Created
{CC771B05-B3AC-42A3-AA57-C69F699B075A}\52-54-00-bc-78-23
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad\
{CC771B05-B3AC-42A3-AA57-C69F699B075A}\WpadDecision
00:21:125 Registry Modified
3
REG_DWORD
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad\
{CC771B05-B3AC-42A3-AA57-C69F699B075A}\WpadDecisionReason
00:21:125 Registry Modified
1
REG_DWORD
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad\
{CC771B05-B3AC-42A3-AA57-C69F699B075A}\WpadDecisionTime
00:21:125 Registry Modified
938F7A40
REG_BINARY
HKCU\Software\Microsoft\windows\CurrentVersion\Internet
Settings\Wpad\WpadLastNetwork
00:21:125 Registry Modified
{CC771B05-B3AC-42A3-AA57-C69F699B075A}
REG_SZ
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad\
{CC771B05-B3AC-42A3-AA57-C69F699B075A}\WpadNetworkName
00:21:125 Registry Modified
Network 2
REG_SZ
HKU\S-1-5-21-2969830022-2362906686-2146684197-
500\Software\Microsoft\windows\CurrentVersion\Internet
00:21:125 Registry Modified Settings\Connections\DefaultConnectionSettings
46
REG_BINARY
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad\52-54-
00-bc-78-23\WpadDecisionTime
00:21:125 Registry Modified
938F7A40
REG_BINARY
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad\52-54-
00-bc-78-23\WpadDecisionReason
00:21:125 Registry Modified
1
REG_DWORD
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad\52-54-
00-bc-78-23\WpadDecision
00:21:125 Registry Modified
3
REG_DWORD
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad\52-54-
00:21:125 Registry Opened
00-bc-78-23
00:21:156 Socket Activities Controlled the I/O mode of the newly created socket
00:21:156 Socket Activities Converted a short value from TCP/IP network byte order to host byte order
00:21:156 Socket Activities Converted a short value from host to TCP/IP network byte order
Process Operations, Set a waiting mode until a specified object is in the signaled state or the time-out
00:21:218
miscellaneous interval elapses
C:\Users\Administrator\AppData\Roaming\Microsoft\Office\Excel12.pip
Write
00:21:266 Files Created
8100000
00:21:860 Others Initialized a critical section object and set the spin count for the critical section
Process Operations,
00:21:860 Enabled an application to supersede the top-level exception handler
miscellaneous
19890709
Read
00:21:860 Files Opened
Normal
C:\Users\Public\287.dll
Read
00:21:860 Files Created
Normal
File Operations,
00:21:860 Retrieved the full path for the module
miscellaneous
c:\programdata\ui1\ui1.exe
00:23:702 Process Created
Process Operations, Deactivated the activation context corresponding to the specified cookie
00:23:702
miscellaneous
Engine Analysis
YARA
Custom Rules
Embedded/Dropped content
* Attachments were extracted from the sample file and stored in the dropfiles.zip
Screenshots
Note: a pop-up window was detected during dynamic analysis so user interaction may be required in order to fully analyze this sample
Images: 2
10a7a.jpg
105c7.jpg
62665.xls
Run-Time Dlls: 8
api-ms-win-appmodel-runtime-l1-1-0.dll
mso.dll
vbe6intl.dll
vbe6.dll
comctl32.dll
oleaut32.dll
shlwapi.dll
version.dll
File Operations: 35
Files Created
Files Opened
Files Deleted
C:\Users\ADMINI~1\AppData\Local\Temp\55031.od
C:\Users\ADMINI~1\AppData\Local\Temp\CVRD6F7.tmp.cvr
C:\Users\ADMINI~1\AppData\Local\Temp\DFC2.tmp
C:\Users\ADMINI~1\AppData\Local\Temp\~DF4FBD1279679237E9.TMP
C:\Users\Administrator\AppData\Local\Microsoft\Schemas\MS Excel_restart.xml
C:\Users\Administrator\AppData\Roaming\Microsoft\Office\Recent\287.LNK
C:\Users\Administrator\AppData\Roaming\Microsoft\Office\Recent\Public.LNK
C:\Users\Administrator\AppData\Roaming\Microsoft\Office\Recent\e76f95de-9a60-474e-bc19-d357098c474a.LNK
C:\Users\Administrator\AppData\Roaming\Microsoft\Office\Recent\hjnmlsfmmz.LNK
Files Read
C:\Users\ADMINI~1\AppData\Local\Temp\DFC2.tmp
C:\Users\Public\287.txt
C:\Users\Public\287.xls
C:\Windows\Microsoft.NET\Framework\
C:\Windows\Microsoft.NET\Framework\v2.0.50727
C:\hjnmlsfmmz\e76f95de-9a60-474e-bc19-d357098c474a.xls
Other
Determined whether a disk drive C:\ is a removable, fixed, CD-ROM, RAM disk, or network drive
Registry Operations: 41
Registry Created
HKCU\Software\Microsoft\VBA\6.0\Common
Registry Opened
HKCR\Licenses
HKCR\TypeLib
HKCR\TypeLib\{00020430-0000-0000-C000-000000000046}
HKCR\TypeLib\{00020430-0000-0000-C000-000000000046}\2.0
HKCR\TypeLib\{00020430-0000-0000-C000-000000000046}\2.0\0
HKCR\TypeLib\{00020430-0000-0000-C000-000000000046}\2.0\0\win32
HKCR\TypeLib\{00020813-0000-0000-C000-000000000046}
HKCR\TypeLib\{00020813-0000-0000-C000-000000000046}\1.6
HKCR\TypeLib\{00020813-0000-0000-C000-000000000046}\1.6\0
HKCR\TypeLib\{00020813-0000-0000-C000-000000000046}\1.6\0\win32
HKCR\TypeLib\{00020813-0000-0000-C000-000000000046}\1.6\409
HKCR\TypeLib\{00020813-0000-0000-C000-000000000046}\1.6\9
HKCR\TypeLib\{2DF8D04C-5BFA-101B-BDE5-00AA0044DE52}
HKCR\TypeLib\{2DF8D04C-5BFA-101B-BDE5-00AA0044DE52}\2.4
HKCR\TypeLib\{2DF8D04C-5BFA-101B-BDE5-00AA0044DE52}\2.4\0
HKCR\TypeLib\{2DF8D04C-5BFA-101B-BDE5-00AA0044DE52}\2.4\0\win32
HKCU\SOFTWARE\Microsoft\Office Test\Special\Perf
HKCU\Software\Microsoft\.NETFramework
HKCU\Software\Microsoft\Office\12.0\Excel
HKLM\SOFTWARE\Microsoft\Fusion
HKLM\SOFTWARE\Microsoft\VBA\Monitors
HKLM\Software\Microsoft\.NETFramework
HKLM\Software\Microsoft\.NETFramework\Policy\Upgrades
HKLM\Software\Microsoft\VBA
HKLM\Software\Microsoft\Windows\CurrentVersion
Registry Read
HKCU\Software\Microsoft\Office\12.0\Excel DisableThreadAffinity
HKCU\Software\Microsoft\VBA\6.0\Common BackGroundCompile
HKCU\Software\Microsoft\VBA\6.0\Common BreakOnAllErrors
HKCU\Software\Microsoft\VBA\6.0\Common BreakOnServerErrors
HKCU\Software\Microsoft\VBA\6.0\Common CompileOnDemand
HKCU\Software\Microsoft\VBA\6.0\Common NotifyUserBeforeStateLoss
HKCU\Software\Microsoft\VBA\6.0\Common RequireDeclaration
HKLM\SOFTWARE\Microsoft\Fusion NoClientChecks
HKLM\Software\Microsoft\.NETFramework InstallRoot
HKLM\Software\Microsoft\.NETFramework OnlyUseLatestCLR
HKLM\Software\Microsoft\.NETFramework UseLegacyV2RuntimeActivationPolicyDefaultValue
HKLM\Software\Microsoft\VBA Vbe6DllPath
HKLM\Software\Microsoft\Windows\CurrentVersion CommonFilesDir
Other
Process Created
{0E5AAE11-A475-4C5B-AB00-
C66DE400274E}
{1F486A52-3CB1-48FD-8F50-
B8DC300D9F9D}
{7B8A2D94-0AC9-11D1-896C-
00C04FB6BFC4}
{871C5380-42A0-1069-A2EA-
08002B30309D}
{88D969E5-F192-11D4-A65F-
0040963251E5}
{88D969EC-8B8B-4C3D-859E-
AF6CD158BE0F}
{88D969EF-F192-11D4-A65F-
0040963251E5}
{C1EE01F2-B3B6-4A6A-9DDD-
E988C088EC82}
{DFFACDC5-679F-4156-8947-
C5C76BC0B67F}
{FA445657-9379-11D6-B41A-
00065B83EE53}
Process killed
Thread Created
2f7e368f
65001f64
Other
Changed the protection attribute of process address: 0x2f8630dc, new attribute: Execute_Read
Changed the protection attribute of process address: 0x2f8630dc, new attribute: Execute_ReadWrite
Initialized COM library for the current thread and set it in the concurrency mode
Obtained the contents of the specified variable from the environment block of the calling process
Obtained the identifier of the thread or process that created the specified window
Network Operations: 1
Socket Activities
Retrieved the name of the network resource associated with a local device
Other Operations: 6
Others
Initialized a critical section object and set the spin count for the critical section
Obtained the current system date and time in in Coordinated Universal Time (UTC) format
certutil.exe
File Operations: 7
Files Created
Files Deleted
C:\Windows\cerE3B8.tmp
C:\Windows\cerEF51.tmp
Files Read
C:\Windows
Other
Process Operations: 2
Process killed
Other
Other Operations: 3
Others
Obtained the current system date and time in in Coordinated Universal Time (UTC) format
Run-Time Dlls: 11
287.dll
dfdts.dll
dhcpcsvc.dll
iphlpapi.dll
kernel32.dll
normaliz.dll
ole32.dll
oleaut32.dll
rasapi32.dll
sensapi.dll
urlmon.dll
File Operations: 2
Other
Registry Operations: 50
Registry Created
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad\{CC771B05-B3AC-42A3-AA57-C69F699B075A}\52-54-00-bc-78-23
HKU\S-1-5-21-2969830022-2362906686-2146684197-500\Software\Microsoft\windows\CurrentVersion\Internet Settings
HKU\S-1-5-21-2969830022-2362906686-2146684197-500\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections
Registry Opened
HKCR\AutoProxyTypes
HKCR\AutoProxyTypes\Application/x-internet-signup
HKCR\AutoProxyTypes\Application/x-ns-proxy-autoconfig
HKCU\Software\Microsoft\Internet Explorer\Main\FeatureControl
HKCU\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE
HKCU\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_INCLUDE_PORT_IN_SPN_KB908209
HKCU\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad\52-54-00-bc-78-23
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad\{CC771B05-B3AC-42A3-AA57-C69F699B075A}
HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl
HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE
HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_INCLUDE_PORT_IN_SPN_KB908209
HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MIME_HANDLING
HKLM\System\Setup
HKU\S-1-5-21-2969830022-2362906686-2146684197-500
HKU\S-1-5-21-2969830022-2362906686-2146684197-500\Software\Microsoft\windows\CurrentVersion\Internet Settings
Registry Deleted
Key Value
Registry Modified
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad\52-54-00-bc-
3 REG_DWORD
78-23\WpadDecision
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad\52-54-00-bc-
1 REG_DWORD
78-23\WpadDecisionReason
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad\52-54-00-bc-
938F7A40 REG_BINARY
78-23\WpadDecisionTime
{CC771B05-B3AC-
HKCU\Software\Microsoft\windows\CurrentVersion\Internet
42A3-AA57- REG_SZ
Settings\Wpad\WpadLastNetwork
C69F699B075A}
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad\{CC771B05-
3 REG_DWORD
B3AC-42A3-AA57-C69F699B075A}\WpadDecision
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad\{CC771B05-
1 REG_DWORD
B3AC-42A3-AA57-C69F699B075A}\WpadDecisionReason
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad\{CC771B05-
938F7A40 REG_BINARY
B3AC-42A3-AA57-C69F699B075A}\WpadDecisionTime
HKCU\Software\Microsoft\windows\CurrentVersion\Internet Settings\Wpad\{CC771B05-
Network 2 REG_SZ
B3AC-42A3-AA57-C69F699B075A}\WpadNetworkName
HKU\S-1-5-21-2969830022-2362906686-2146684197-
500\Software\Microsoft\windows\CurrentVersion\Internet 46 REG_BINARY
Settings\Connections\DefaultConnectionSettings
HKU\S-1-5-21-2969830022-2362906686-2146684197-
500\Software\Microsoft\windows\CurrentVersion\Internet 46 REG_BINARY
Settings\Connections\SavedLegacySettings
HKU\S-1-5-21-2969830022-2362906686-2146684197-
0 REG_DWORD
500\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable
Registry Read
HKCR\AutoProxyTypes\Application/x-internet-signup Default
HKCR\AutoProxyTypes\Application/x-internet-signup DllFile
HKCR\AutoProxyTypes\Application/x-internet-signup FileExtensions
HKCR\AutoProxyTypes\Application/x-internet-signup Flags
HKCR\AutoProxyTypes\Application/x-ns-proxy-autoconfig Default
HKCR\AutoProxyTypes\Application/x-ns-proxy-autoconfig DllFile
HKCR\AutoProxyTypes\Application/x-ns-proxy-autoconfig FileExtensions
HKCR\AutoProxyTypes\Application/x-ns-proxy-autoconfig Flags
HKLM\System\Setup SystemSetupInProgress
HKU\S-1-5-21-2969830022-2362906686-2146684197-500\Software\Microsoft\windows\CurrentVersion\Internet
AutoConfigURL
Settings
HKU\S-1-5-21-2969830022-2362906686-2146684197-500\Software\Microsoft\windows\CurrentVersion\Internet
ProxyEnable
Settings
HKU\S-1-5-21-2969830022-2362906686-2146684197-500\Software\Microsoft\windows\CurrentVersion\Internet
ProxyOverride
Settings
HKU\S-1-5-21-2969830022-2362906686-2146684197-500\Software\Microsoft\windows\CurrentVersion\Internet
ProxyServer
Settings
HKU\S-1-5-21-2969830022-2362906686-2146684197-500\Software\Microsoft\windows\CurrentVersion\Internet
DefaultConnectionSettings
Settings\Connections
HKU\S-1-5-21-2969830022-2362906686-2146684197-500\Software\Microsoft\windows\CurrentVersion\Internet
SavedLegacySettings
Settings\Connections
Process Operations: 21
Process Created
c:\programdata\ui1\ui1.exe
{00000323-0000-0000-C000-000000000046}
{0000032A-0000-0000-C000-000000000046}
{A47979D2-C419-11D9-A5B4-001185AD2B89}
{DCB00C01-570F-4A9B-8D69-199FDBA5723B}
Process Opened
Process killed
Thread Created
75ef97be
75efe44f
Other
)"54515
Established a connection to the service control manager and open the service control manager database
Initialized COM library for the current thread and set it in the concurrency mode
Set a waiting mode until a specified object is in the signaled state or the time-out interval elapses
ffffffff
Network Operations: 39
DNS Queries
Socket Activities
Converted a short value from TCP/IP network byte order to host byte order
Created a socket
IP:0.0.0.0, Port:0
IP:127.0.0.1, Port:0
IP:127.0.0.1, Port:46292
IP:207.154.235.218, Port:20480
Other
Initialized the WinINet functions, Agent name: mozilla/4.0 (compatible; msie 7.0; windows nt 6.1; wow64; trident/4.0; slcc2; .net clr 2.0.50727;
.net clr 3.5.30729; .net clr 3.0.30729; media center pc 6.0; infopath.2; .net4.0c; .net4.0e), Access type: PRECONFIG Flags: PORT_NUMBER
Verb: get, ObjectName: /campo/z/z, Version: , Referer: , Flags: 400010, Context: 610f40
Other Operations: 5
Others
Expanded environment-variable strings and replace them with the values defined for the current use
Initialized a critical section object and set the spin count for the critical section
Obtained the current system date and time in in Coordinated Universal Time (UTC) format