Loading ...

Play interactive tourEdit tour

Analysis Report TRA-St-0015-O01.xlsx

Overview

General Information

Sample Name:TRA-St-0015-O01.xlsx
Analysis ID:345208
MD5:63c2af36e2ec6b0c464889473ba19048
SHA1:d1d834ca00c0538a448e64e10231a5c78c09838d
SHA256:129cd5a1fca6d3febd900de6cbecb9e30e22a19d7b2aeda41ee3c1eac54981ba
Tags:VelvetSweatshopxlsx

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM_3
Yara detected FormBook
Drops PE files to the user root directory
Machine Learning detection for dropped file
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Executables Started in Suspicious Folder
Sigma detected: Execution in Non-Executable Folder
Sigma detected: Suspicious Program Location Process Starts
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Contains functionality to detect virtual machines (SLDT)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Drops PE files
Drops PE files to the user directory
Drops certificate files (DER)
Enables debug privileges
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 1100 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • EQNEDT32.EXE (PID: 2556 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2720 cmdline: 'C:\Users\Public\vbc.exe' MD5: C7B2B0FA4A71FE33536148C2584DA7DB)
      • schtasks.exe (PID: 2920 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XaHKwnPuj' /XML 'C:\Users\user\AppData\Local\Temp\tmp2222.tmp' MD5: 97E0EC3D6D99E8CC2B17EF2D3760E8FC)
      • vbc.exe (PID: 2928 cmdline: C:\Users\Public\vbc.exe MD5: C7B2B0FA4A71FE33536148C2584DA7DB)
      • vbc.exe (PID: 2476 cmdline: C:\Users\Public\vbc.exe MD5: C7B2B0FA4A71FE33536148C2584DA7DB)
      • vbc.exe (PID: 2472 cmdline: C:\Users\Public\vbc.exe MD5: C7B2B0FA4A71FE33536148C2584DA7DB)
      • vbc.exe (PID: 2456 cmdline: C:\Users\Public\vbc.exe MD5: C7B2B0FA4A71FE33536148C2584DA7DB)
      • vbc.exe (PID: 2884 cmdline: C:\Users\Public\vbc.exe MD5: C7B2B0FA4A71FE33536148C2584DA7DB)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x2c6660:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x2c68da:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x2d23fd:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x2d1ee9:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x2d24ff:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x2d2677:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x2c72f2:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x2d1164:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0x2c7feb:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x2d809f:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x2d90a2:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x2d5181:$sqlite3step: 68 34 1C 7B E1
    • 0x2d5294:$sqlite3step: 68 34 1C 7B E1
    • 0x2d51b0:$sqlite3text: 68 38 2A 90 C5
    • 0x2d52d5:$sqlite3text: 68 38 2A 90 C5
    • 0x2d51c3:$sqlite3blob: 68 53 D8 7F 8C
    • 0x2d52eb:$sqlite3blob: 68 53 D8 7F 8C
    00000004.00000002.2169219241.00000000023DE000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      Process Memory Space: vbc.exe PID: 2720JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
        Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2556, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2720
        Sigma detected: File Dropped By EQNEDT32EXEShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2556, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\kinsvc[1].exe
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XaHKwnPuj' /XML 'C:\Users\user\AppData\Local\Temp\tmp2222.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XaHKwnPuj' /XML 'C:\Users\user\AppData\Local\Temp\tmp2222.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: 'C:\Users\Public\vbc.exe' , ParentImage: C:\Users\Public\vbc.exe, ParentProcessId: 2720, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XaHKwnPuj' /XML 'C:\Users\user\AppData\Local\Temp\tmp2222.tmp', ProcessId: 2920
        Sigma detected: Executables Started in Suspicious FolderShow sources
        Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2556, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2720
        Sigma detected: Execution in Non-Executable FolderShow sources
        Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2556, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2720
        Sigma detected: Suspicious Program Location Process StartsShow sources
        Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2556, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2720

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Multi AV Scanner detection for submitted fileShow sources
        Source: TRA-St-0015-O01.xlsxVirustotal: Detection: 31%Perma Link
        Source: TRA-St-0015-O01.xlsxReversingLabs: Detection: 22%
        Yara detected FormBookShow sources
        Source: Yara matchFile source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, type: MEMORY
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\Public\vbc.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\kinsvc[1].exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Roaming\XaHKwnPuj.exeJoe Sandbox ML: detected

        Exploits:

        barindex
        Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
        Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding

        Compliance:

        barindex
        Uses new MSVCR DllsShow sources
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
        Uses secure TLS version for HTTPS connectionsShow sources
        Source: unknownHTTPS traffic detected: 162.241.148.128:443 -> 192.168.2.22:49165 version: TLS 1.2
        Source: global trafficDNS query: name: spicesherbs.in
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 162.241.148.128:443
        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 162.241.148.128:443
        Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BADF7393.emfJump to behavior
        Source: unknownDNS traffic detected: queries for: spicesherbs.in
        Source: E0F5C59F9FA661F6F4C50B87FEF3A15A.2.drString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
        Source: 77EC63BDA74BD0D0E0426DC8F8008506.2.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
        Source: vbc.exe, 00000004.00000002.2170919142.000000001BA40000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
        Source: vbc.exe, 00000004.00000002.2169176262.0000000002371000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: vbc.exe, 00000004.00000002.2170919142.000000001BA40000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
        Source: BADF7393.emf.0.drString found in binary or memory: http://www.day.com/dam/1.0
        Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
        Source: unknownHTTPS traffic detected: 162.241.148.128:443 -> 192.168.2.22:49165 version: TLS 1.2

        E-Banking Fraud:

        barindex
        Yara detected FormBookShow sources
        Source: Yara matchFile source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, type: MEMORY
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15AJump to dropped file

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Office equation editor drops PE fileShow sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\kinsvc[1].exeJump to dropped file
        Source: C:\Users\Public\vbc.exeCode function: 7_2_00BF3F76
        Source: C:\Users\Public\vbc.exeCode function: 7_2_00BF9369
        Source: C:\Users\Public\vbc.exeCode function: 7_2_00BFDB4B
        Source: C:\Users\Public\vbc.exeCode function: 7_2_00BFD8C7
        Source: C:\Users\Public\vbc.exeCode function: 7_2_00BFDB41
        Source: TRA-St-0015-O01.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
        Source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: XaHKwnPuj.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@16/14@2/1
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$TRA-St-0015-O01.xlsxJump to behavior
        Source: C:\Users\Public\vbc.exeMutant created: \Sessions\1\BaseNamedObjects\XbELoWjomkFJpgsBcjJbdEN
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRF0C4.tmpJump to behavior
        Source: C:\Windows\System32\schtasks.exeConsole Write: ................................................................................@...............p...............................................
        Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\f89061884b75dab0e3967d7221e5290d\mscorlib.ni.dll
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: TRA-St-0015-O01.xlsxVirustotal: Detection: 31%
        Source: TRA-St-0015-O01.xlsxReversingLabs: Detection: 22%
        Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
        Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
        Source: unknownProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: unknownProcess created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XaHKwnPuj' /XML 'C:\Users\user\AppData\Local\Temp\tmp2222.tmp'
        Source: unknownProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: unknownProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: unknownProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: unknownProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: unknownProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XaHKwnPuj' /XML 'C:\Users\user\AppData\Local\Temp\tmp2222.tmp'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\InProcServer32
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\Public\vbc.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
        Source: TRA-St-0015-O01.xlsxInitial sample: OLE indicators vbamacros = False
        Source: TRA-St-0015-O01.xlsxInitial sample: OLE indicators encrypted = True
        Source: initial sampleStatic PE information: section name: .text entropy: 7.78051129047
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Roaming\XaHKwnPuj.exeJump to dropped file
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\kinsvc[1].exeJump to dropped file
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

        Boot Survival:

        barindex
        Drops PE files to the user root directoryShow sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: unknownProcess created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XaHKwnPuj' /XML 'C:\Users\user\AppData\Local\Temp\tmp2222.tmp'
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: TRA-St-0015-O01.xlsxStream path 'EncryptedPackage' entropy: 7.99976973003 (max. 8.0)

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM_3Show sources
        Source: Yara matchFile source: 00000004.00000002.2169219241.00000000023DE000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2720, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: vbc.exe, 00000004.00000002.2169219241.00000000023DE000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: vbc.exe, 00000004.00000002.2169219241.00000000023DE000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Users\Public\vbc.exeCode function: 7_2_00BF471C sldt word ptr [edx]
        Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2560Thread sleep time: -360000s >= -30000s
        Source: C:\Users\Public\vbc.exe TID: 824Thread sleep time: -54277s >= -30000s
        Source: C:\Users\Public\vbc.exe TID: 2916Thread sleep time: -60000s >= -30000s
        Source: C:\Users\Public\vbc.exe TID: 2900Thread sleep time: -922337203685477s >= -30000s
        Source: vbc.exe, 00000004.00000002.2169219241.00000000023DE000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: vbc.exe, 00000004.00000002.2169219241.00000000023DE000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: vbc.exe, 00000004.00000002.2170020694.000000001A782000.00000004.00000001.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
        Source: vbc.exe, 00000004.00000002.2169219241.00000000023DE000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: vbc.exe, 00000004.00000002.2169219241.00000000023DE000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: C:\Users\Public\vbc.exeProcess information queried: ProcessInformation
        Source: C:\Users\Public\vbc.exeProcess token adjusted: Debug
        Source: C:\Users\Public\vbc.exeMemory allocated: page read and write | page guard
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XaHKwnPuj' /XML 'C:\Users\user\AppData\Local\Temp\tmp2222.tmp'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
        Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\Public\vbc.exe VolumeInformation

        Stealing of Sensitive Information:

        barindex
        Yara detected FormBookShow sources
        Source: Yara matchFile source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, type: MEMORY

        Remote Access Functionality:

        barindex
        Yara detected FormBookShow sources
        Source: Yara matchFile source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, type: MEMORY

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsCommand and Scripting Interpreter1Scheduled Task/Job1Process Injection11Masquerading111OS Credential DumpingQuery Registry1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Virtualization/Sandbox Evasion3LSASS MemorySecurity Software Discovery11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsExploitation for Client Execution13Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion3SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection11NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol2SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information11LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing2Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery12Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        TRA-St-0015-O01.xlsx32%VirustotalBrowse
        TRA-St-0015-O01.xlsx23%ReversingLabsDocument-Office.Trojan.Heuristic

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\Public\vbc.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\kinsvc[1].exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\XaHKwnPuj.exe100%Joe Sandbox ML

        Unpacked PE Files

        No Antivirus matches

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        http://www.%s.comPA0%URL Reputationsafe
        http://www.%s.comPA0%URL Reputationsafe
        http://www.%s.comPA0%URL Reputationsafe
        http://www.%s.comPA0%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        spicesherbs.in
        162.241.148.128
        truefalse
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://www.%s.comPAvbc.exe, 00000004.00000002.2170919142.000000001BA40000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          low
          http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.vbc.exe, 00000004.00000002.2170919142.000000001BA40000.00000002.00000001.sdmpfalse
            high
            http://www.day.com/dam/1.0BADF7393.emf.0.drfalse
              high
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namevbc.exe, 00000004.00000002.2169176262.0000000002371000.00000004.00000001.sdmpfalse
                high

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                162.241.148.128
                unknownUnited States
                46606UNIFIEDLAYER-AS-1USfalse

                General Information

                Joe Sandbox Version:31.0.0 Emerald
                Analysis ID:345208
                Start date:27.01.2021
                Start time:20:33:47
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 8m 25s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:TRA-St-0015-O01.xlsx
                Cookbook file name:defaultwindowsofficecookbook.jbs
                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                Number of analysed new started processes analysed:12
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.expl.evad.winXLSX@16/14@2/1
                EGA Information:Failed
                HDC Information:
                • Successful, ratio: 5.7% (good quality ratio 3.3%)
                • Quality average: 34.8%
                • Quality standard deviation: 33.3%
                HCA Information:
                • Successful, ratio: 97%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .xlsx
                • Found Word or Excel or PowerPoint or XPS Viewer
                • Attach to Office via COM
                • Scroll down
                • Close Viewer
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe
                • TCP Packets have been reduced to 100
                • Excluded IPs from analysis (whitelisted): 192.35.177.64, 72.247.178.11, 72.247.178.49
                • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, audownload.windowsupdate.nsatc.net, apps.digsigtrust.com, ctldl.windowsupdate.com, a767.dscg3.akamai.net, apps.identrust.com, au-bg-shim.trafficmanager.net
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                20:35:06API Interceptor60x Sleep call for process: EQNEDT32.EXE modified
                20:35:11API Interceptor48x Sleep call for process: vbc.exe modified
                20:35:13API Interceptor1x Sleep call for process: schtasks.exe modified

                Joe Sandbox View / Context

                IPs

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                162.241.148.128SWIFT (MTC 103) 89.xlsxGet hashmaliciousBrowse
                • cassiagumrefined.com/js/file/TH98/86HTe.exe

                Domains

                No context

                ASN

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                UNIFIEDLAYER-AS-1USOrder confirmation 64236000000025 26.01.2021.exeGet hashmaliciousBrowse
                • 192.254.186.135
                printouts of outstanding as of Jan-27-2021.xlsmGet hashmaliciousBrowse
                • 192.185.131.49
                98.docGet hashmaliciousBrowse
                • 192.185.52.115
                0113 INV_PAK.xlsxGet hashmaliciousBrowse
                • 192.185.35.76
                Purchase Order.xlsxGet hashmaliciousBrowse
                • 50.87.169.249
                quote20210126.exe.exeGet hashmaliciousBrowse
                • 70.40.220.182
                Informacion.docGet hashmaliciousBrowse
                • 162.241.224.176
                xl2Ml2iNJe.exeGet hashmaliciousBrowse
                • 162.241.217.108
                file.docGet hashmaliciousBrowse
                • 192.185.52.115
                Remittance Advice 117301.xlsxGet hashmaliciousBrowse
                • 162.214.76.195
                vA0mtZ7JzJ.exeGet hashmaliciousBrowse
                • 162.241.60.214
                INGNhYonmgtGZ9Updf.exeGet hashmaliciousBrowse
                • 74.220.199.9
                Dridex-01-a99e.xlsmGet hashmaliciousBrowse
                • 198.57.200.100
                Inv_1480.xlsGet hashmaliciousBrowse
                • 192.185.217.211
                Mensaje-22-012021.docGet hashmaliciousBrowse
                • 162.241.253.129
                INV5949.xlsGet hashmaliciousBrowse
                • 192.232.216.109
                DOCUMENTS_RECEIVED.htmlGet hashmaliciousBrowse
                • 192.185.112.211
                INV 5047.xlsGet hashmaliciousBrowse
                • 192.185.217.211
                FP4554867134UQ.docGet hashmaliciousBrowse
                • 192.232.250.227
                MENSAJE.docGet hashmaliciousBrowse
                • 192.185.52.115

                JA3 Fingerprints

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                7dcce5b76c8b17472d024758970a406bFinal_Notification.docxGet hashmaliciousBrowse
                • 162.241.148.128
                documenting.docGet hashmaliciousBrowse
                • 162.241.148.128
                SecuriteInfo.com.Heur.3279.xlsmGet hashmaliciousBrowse
                • 162.241.148.128
                Rolled Alloys Possible Infection.docxGet hashmaliciousBrowse
                • 162.241.148.128
                Statement of Account as of Jan_27 2021.xlsmGet hashmaliciousBrowse
                • 162.241.148.128
                printouts of outstanding as of Jan-27-2021.xlsmGet hashmaliciousBrowse
                • 162.241.148.128
                printouts of outstanding as of Jan_27_2021.xlsmGet hashmaliciousBrowse
                • 162.241.148.128
                FACTUUR-INV00012.xlsxGet hashmaliciousBrowse
                • 162.241.148.128
                0007334.xlsxGet hashmaliciousBrowse
                • 162.241.148.128
                Purchase Order.xlsxGet hashmaliciousBrowse
                • 162.241.148.128
                SecuriteInfo.com.Heur.30497.xlsGet hashmaliciousBrowse
                • 162.241.148.128
                case (2553).xlsGet hashmaliciousBrowse
                • 162.241.148.128
                case (1057).xlsGet hashmaliciousBrowse
                • 162.241.148.128
                case (4335).xlsGet hashmaliciousBrowse
                • 162.241.148.128
                case (1522).xlsGet hashmaliciousBrowse
                • 162.241.148.128
                case (4374).xlsGet hashmaliciousBrowse
                • 162.241.148.128
                case (166).xlsGet hashmaliciousBrowse
                • 162.241.148.128
                PAYMENT.xlsxGet hashmaliciousBrowse
                • 162.241.148.128
                case (547).xlsGet hashmaliciousBrowse
                • 162.241.148.128
                Dridex-06-bc1b.xlsmGet hashmaliciousBrowse
                • 162.241.148.128

                Dropped Files

                No context

                Created / dropped Files

                C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                File Type:Microsoft Cabinet archive data, 59134 bytes, 1 file
                Category:dropped
                Size (bytes):59134
                Entropy (8bit):7.995450161616763
                Encrypted:true
                SSDEEP:1536:R695NkJMM0/7laXXHAQHQaYfwlmz8efIqigYDff:RN7MlanAQwEIztTk
                MD5:E92176B0889CC1BB97114BEB2F3C1728
                SHA1:AD1459D390EC23AB1C3DA73FF2FBEC7FA3A7F443
                SHA-256:58A4F38BA43F115BA3F465C311EAAF67F43D92E580F7F153DE3AB605FC9900F3
                SHA-512:CD2267BA2F08D2F87538F5B4F8D3032638542AC3476863A35F0DF491EB3A84458CE36C06E8C1BD84219F5297B6F386748E817945A406082FA8E77244EC229D8F
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: MSCF............,...................I........T.........R.. .authroot.stl.ym&7.5..CK..8T....c_.d...:.(.....].M$[v.4.).E.$7*I.....e..Y..Rq...3.n..u..............|..=H....&..1.1..f.L..>e.6....F8.X.b.1$,.a...n-......D..a....[.....i,+.+..<.b._#...G..U.....n..21*pa..>.32..Y..j...;Ay........n/R... ._.+..<...Am.t.<. ..V..y`.yO..e@../...<#..#......dju*..B......8..H'..lr.....l.I6/..d.].xIX<...&U...GD..Mn.y&.[<(tk.....%B.b;./..`.#h....C.P...B..8d.F...D.k........... 0..w...@(.. @K....?.)ce........\.\......l......Q.Qd..+...@.X..##3..M.d..n6.....p1..)...x0V...ZK.{...{.=#h.v.).....b...*..[...L..*c..a..,...E5X..i.d..w.....#o*+.........X.P...k...V.$...X.r.e....9E.x..=\...Km.......B...Ep...xl@@c1.....p?...d.{EYN.K.X>D3..Z..q.] .Mq.........L.n}........+/l\.cDB0.'.Y...r.[.........vM...o.=....zK..r..l..>B....U..3....Z...ZjS...wZ.M...IW;..e.L...zC.wBtQ..&.Z.Fv+..G9.8..!..\T:K`......m.........9T.u..3h.....{...d[...@...Q.?..p.e.t[.%7..........^.....s.
                C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                File Type:data
                Category:dropped
                Size (bytes):893
                Entropy (8bit):7.366016576663508
                Encrypted:false
                SSDEEP:24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
                MD5:D4AE187B4574036C2D76B6DF8A8C1A30
                SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
                SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
                SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
                Malicious:false
                Reputation:high, very likely benign file
                Preview: 0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.
                C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                File Type:data
                Category:dropped
                Size (bytes):328
                Entropy (8bit):3.0765536003145497
                Encrypted:false
                SSDEEP:6:kKekHbqoN+SkQlPlEGYRMY9z+4KlDA3RUeKlF+adAlf:mku3kPlE99SNxAhUeo+aKt
                MD5:DA24412AA96F1A51D7A1C7F0E63901F0
                SHA1:13B1483CE43D630CCA5F460AB270DA7F764512D9
                SHA-256:613A697AB25376DAA6A23A4F82928456CF95820090B32CB17BAA6C98179DEC8E
                SHA-512:8F8F20E9A916384433A6A439A08286AA0F09D0EDF3542CC56DD0B27D75358EA45D43EC7E213588DEB5760F8CFAFCBFD93C62988096C5A25DCAE73D849DB1E3EA
                Malicious:false
                Reputation:low
                Preview: p...... ........_!O./...(....................................................... ..................&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.e.b.b.a.e.1.d.7.e.a.d.6.1.:.0."...
                C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                File Type:data
                Category:dropped
                Size (bytes):252
                Entropy (8bit):3.0042074090694686
                Encrypted:false
                SSDEEP:3:kkFklNoKmEvfllXlE/QhzllPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB1UAYpFit:kKsmERliBAIdQZV7eAYLit
                MD5:DDA8BE33A50FC45ACBADDE1E16982CF8
                SHA1:BD92A8AEDC28D46640624F4410CDCE3872D4277A
                SHA-256:B4E9CBCAA6B854ADD8D0A0038237F380E2419948DD0C4BF8C4E5F9376AEF6F17
                SHA-512:C71DBD91B99A57B771DF7387961752CC8CCC267AF405FE6B295B8834D54DC6A53D6344DD472D56736E152F0634C66F01EF33FA848867D79D62694207EE8035D4
                Malicious:false
                Reputation:low
                Preview: p...... ....`....a../...(....................................................... ........u.........(...........}...h.t.t.p.:././.a.p.p.s...i.d.e.n.t.r.u.s.t...c.o.m./.r.o.o.t.s./.d.s.t.r.o.o.t.c.a.x.3...p.7.c...".3.7.d.-.5.9.e.7.6.b.3.c.6.4.b.c.0."...
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\kinsvc[1].exe
                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:downloaded
                Size (bytes):508928
                Entropy (8bit):7.7654598154070165
                Encrypted:false
                SSDEEP:12288:S1LhRC+HyykFZ/6/dn3Vsy167F8E6tLvM89GrxD4G:S1/3SXFZ/ad3VRQ8Ltr9Gdp
                MD5:C7B2B0FA4A71FE33536148C2584DA7DB
                SHA1:D449E0DC0D24447634C61987CF0907FB72CF93A4
                SHA-256:DB8923F36B12AC2D21DE6B241E3AC228170456F7DB87DC38552E89F9A4E8903A
                SHA-512:EA5BC49B81DC9FC57A47BC4384C1A56C6157D02AC9F53655DA65A96138D5CFA1244B82562D4B7844E89762154CC1C14896CDEB945F832A9436516F96DFC56393
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                Reputation:low
                IE Cache URL:https://spicesherbs.in/herbs/kinsvc/kinsvc.exe
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=.`.........."...P.................. ........@.. ....................... ............@.................................P...O.......`............................................................................ ............... ..H............text........ ...................... ..`.rsrc...`...........................@..@.reloc..............................@..B........................H.......|...............@....7...........................................0............(....(..........(.....o.....*.....................( ......(!......("......(#......($....*N..(....o....(%....*&..(&....*.s'........s(........s)........s*........s+........*....0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*&..(1....*...0..<........~.....(2.....,!r...p.....(3...o4...s5............~.....
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\284D8619.jpeg
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
                Category:dropped
                Size (bytes):48770
                Entropy (8bit):7.801842363879827
                Encrypted:false
                SSDEEP:768:uLgWImQ6AMqTeyjskbJeYnriZvApugsiKi7iszQ2rvBZzmFz3/soBqZhsglgDQPT:uLgY4MqTeywVYr+0ugbDTzQ27A3UXsgf
                MD5:AA7A56E6A97FFA9390DA10A2EC0C5805
                SHA1:200A6D7ED9F485DD5A7B9D79B596DE3ECEBD834A
                SHA-256:56B1EDECC9A282A9FAAFD95D4D9844608B1AE5CCC8731F34F8B30B3825734974
                SHA-512:A532FE4C52FED46919003A96B882AE6F7C70A3197AA57BD1E6E917F766729F7C9C1261C36F082FBE891852D083EDB2B5A34B0A325B7C1D96D6E58B0BED6C5782
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: ......JFIF.............;CREATOR: gd-jpeg v1.0 (using IJG JPEG v80), quality = 90....C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..R..(...(...(......3Fh.....(....P.E.P.Gj(...(....Q@.%-...(.......P.QKE.%.........;.R.@.E-...(.......P.QKE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'j^.....(...(...(....w...3Fh....E......4w...h.%...................E./J)(......Z)(......Z)(....
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BADF7393.emf
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                Category:dropped
                Size (bytes):653280
                Entropy (8bit):2.898645806967479
                Encrypted:false
                SSDEEP:3072:S34UL0tS6WB0JOqFVY5QcARI/McGdAT9kRLFdtSyUu50yknG/qc+x:84UcLe0JOqQQZR8MDdATCR3tS+jqcC
                MD5:02BE9DEC93BBAE0645D69572E9563911
                SHA1:DDBA1220AA092E00FFAB90155D796D735E93E627
                SHA-256:A9955A402E6FC0BBE4CA2D34DA0BADA39DC9239F3F9FE6F4A71BA6A9EC230B40
                SHA-512:A9963FAD341517EE356156EFAEEC4C3100A3682E8D293A530BB0EF1601D5FB5500593BA9EA29898B72B04B565F3A6EC7FFAD973DBBD070B60239859D2E15C9D9
                Malicious:false
                Reputation:low
                Preview: ....l...........S................@...#.. EMF........(...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..............................................I...c...%...........%...................................R...p................................@."C.a.l.i.b.r.i........................................................................N.T............t........N.T........ ....yQQ........ ............zQQ............O...............................X...%...7...................{ .@................C.a.l.i.b.r.................X.......8....2JQ........t...t....{HQ............dv......%...........%...........%...........!.......................I...c..."...........%...........%...........%...........T...T..........................@.E.@T...........L...............I...c...P... ...6...F...$.......EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CEC07078.jpeg
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
                Category:dropped
                Size (bytes):48770
                Entropy (8bit):7.801842363879827
                Encrypted:false
                SSDEEP:768:uLgWImQ6AMqTeyjskbJeYnriZvApugsiKi7iszQ2rvBZzmFz3/soBqZhsglgDQPT:uLgY4MqTeywVYr+0ugbDTzQ27A3UXsgf
                MD5:AA7A56E6A97FFA9390DA10A2EC0C5805
                SHA1:200A6D7ED9F485DD5A7B9D79B596DE3ECEBD834A
                SHA-256:56B1EDECC9A282A9FAAFD95D4D9844608B1AE5CCC8731F34F8B30B3825734974
                SHA-512:A532FE4C52FED46919003A96B882AE6F7C70A3197AA57BD1E6E917F766729F7C9C1261C36F082FBE891852D083EDB2B5A34B0A325B7C1D96D6E58B0BED6C5782
                Malicious:false
                Preview: ......JFIF.............;CREATOR: gd-jpeg v1.0 (using IJG JPEG v80), quality = 90....C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..R..(...(...(......3Fh.....(....P.E.P.Gj(...(....Q@.%-...(.......P.QKE.%.........;.R.@.E-...(.......P.QKE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'j^.....(...(...(....w...3Fh....E......4w...h.%...................E./J)(......Z)(......Z)(....
                C:\Users\user\AppData\Local\Temp\CabA5C2.tmp
                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                File Type:Microsoft Cabinet archive data, 59134 bytes, 1 file
                Category:dropped
                Size (bytes):59134
                Entropy (8bit):7.995450161616763
                Encrypted:true
                SSDEEP:1536:R695NkJMM0/7laXXHAQHQaYfwlmz8efIqigYDff:RN7MlanAQwEIztTk
                MD5:E92176B0889CC1BB97114BEB2F3C1728
                SHA1:AD1459D390EC23AB1C3DA73FF2FBEC7FA3A7F443
                SHA-256:58A4F38BA43F115BA3F465C311EAAF67F43D92E580F7F153DE3AB605FC9900F3
                SHA-512:CD2267BA2F08D2F87538F5B4F8D3032638542AC3476863A35F0DF491EB3A84458CE36C06E8C1BD84219F5297B6F386748E817945A406082FA8E77244EC229D8F
                Malicious:false
                Preview: MSCF............,...................I........T.........R.. .authroot.stl.ym&7.5..CK..8T....c_.d...:.(.....].M$[v.4.).E.$7*I.....e..Y..Rq...3.n..u..............|..=H....&..1.1..f.L..>e.6....F8.X.b.1$,.a...n-......D..a....[.....i,+.+..<.b._#...G..U.....n..21*pa..>.32..Y..j...;Ay........n/R... ._.+..<...Am.t.<. ..V..y`.yO..e@../...<#..#......dju*..B......8..H'..lr.....l.I6/..d.].xIX<...&U...GD..Mn.y&.[<(tk.....%B.b;./..`.#h....C.P...B..8d.F...D.k........... 0..w...@(.. @K....?.)ce........\.\......l......Q.Qd..+...@.X..##3..M.d..n6.....p1..)...x0V...ZK.{...{.=#h.v.).....b...*..[...L..*c..a..,...E5X..i.d..w.....#o*+.........X.P...k...V.$...X.r.e....9E.x..=\...Km.......B...Ep...xl@@c1.....p?...d.{EYN.K.X>D3..Z..q.] .Mq.........L.n}........+/l\.cDB0.'.Y...r.[.........vM...o.=....zK..r..l..>B....U..3....Z...ZjS...wZ.M...IW;..e.L...zC.wBtQ..&.Z.Fv+..G9.8..!..\T:K`......m.........9T.u..3h.....{...d[...@...Q.?..p.e.t[.%7..........^.....s.
                C:\Users\user\AppData\Local\Temp\TarA5C3.tmp
                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                File Type:data
                Category:dropped
                Size (bytes):152788
                Entropy (8bit):6.316654432555028
                Encrypted:false
                SSDEEP:1536:WIA6c7RbAh/E9nF2hspNuc8odv+1//FnzAYtYyjCQxSMnl3xlUwg:WAmfF3pNuc7v+ltjCQSMnnSx
                MD5:64FEDADE4387A8B92C120B21EC61E394
                SHA1:15A2673209A41CCA2BC3ADE90537FE676010A962
                SHA-256:BB899286BE1709A14630DC5ED80B588FDD872DB361678D3105B0ACE0D1EA6745
                SHA-512:655458CB108034E46BCE5C4A68977DCBF77E20F4985DC46F127ECBDE09D6364FE308F3D70295BA305667A027AD12C952B7A32391EFE4BD5400AF2F4D0D830875
                Malicious:false
                Preview: 0..T...*.H.........T.0..T....1.0...`.H.e......0..D...+.....7.....D.0..D.0...+.....7..........R19%..210115004237Z0...+......0..D.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                C:\Users\user\AppData\Local\Temp\tmp2222.tmp
                Process:C:\Users\Public\vbc.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1621
                Entropy (8bit):5.1546643449463865
                Encrypted:false
                SSDEEP:24:2dH4+SEqCZ7ClNMFi/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBxtn:cbhZ7ClNQi/rydbz9I3YODOLNdq3R
                MD5:2F157857CAC56F3C7E44E7262FD6EAAD
                SHA1:022DCAA46EEEFD345D9BD8DF1870FD0C916E828B
                SHA-256:92991267A638A487B7117A3EBC7F732AD8C253A77149680D45E1289C5144AAD0
                SHA-512:C603FF5AA514DD00881C8CEE9AA8A7A369342844638138F9338900192E9D3ABBA2958E478E95BA7CD21E70F6F7223E4F128629F5212FFE1A43D35171F39E8784
                Malicious:true
                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>user-PC\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>user-PC\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>user-PC\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true</StartWhenAvailable>
                C:\Users\user\AppData\Roaming\XaHKwnPuj.exe
                Process:C:\Users\Public\vbc.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):508928
                Entropy (8bit):7.7654598154070165
                Encrypted:false
                SSDEEP:12288:S1LhRC+HyykFZ/6/dn3Vsy167F8E6tLvM89GrxD4G:S1/3SXFZ/ad3VRQ8Ltr9Gdp
                MD5:C7B2B0FA4A71FE33536148C2584DA7DB
                SHA1:D449E0DC0D24447634C61987CF0907FB72CF93A4
                SHA-256:DB8923F36B12AC2D21DE6B241E3AC228170456F7DB87DC38552E89F9A4E8903A
                SHA-512:EA5BC49B81DC9FC57A47BC4384C1A56C6157D02AC9F53655DA65A96138D5CFA1244B82562D4B7844E89762154CC1C14896CDEB945F832A9436516F96DFC56393
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=.`.........."...P.................. ........@.. ....................... ............@.................................P...O.......`............................................................................ ............... ..H............text........ ...................... ..`.rsrc...`...........................@..@.reloc..............................@..B........................H.......|...............@....7...........................................0............(....(..........(.....o.....*.....................( ......(!......("......(#......($....*N..(....o....(%....*&..(&....*.s'........s(........s)........s*........s+........*....0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*&..(1....*...0..<........~.....(2.....,!r...p.....(3...o4...s5............~.....
                C:\Users\user\Desktop\~$TRA-St-0015-O01.xlsx
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):330
                Entropy (8bit):1.4377382811115937
                Encrypted:false
                SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                MD5:96114D75E30EBD26B572C1FC83D1D02E
                SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                Malicious:true
                Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                C:\Users\Public\vbc.exe
                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:modified
                Size (bytes):508928
                Entropy (8bit):7.7654598154070165
                Encrypted:false
                SSDEEP:12288:S1LhRC+HyykFZ/6/dn3Vsy167F8E6tLvM89GrxD4G:S1/3SXFZ/ad3VRQ8Ltr9Gdp
                MD5:C7B2B0FA4A71FE33536148C2584DA7DB
                SHA1:D449E0DC0D24447634C61987CF0907FB72CF93A4
                SHA-256:DB8923F36B12AC2D21DE6B241E3AC228170456F7DB87DC38552E89F9A4E8903A
                SHA-512:EA5BC49B81DC9FC57A47BC4384C1A56C6157D02AC9F53655DA65A96138D5CFA1244B82562D4B7844E89762154CC1C14896CDEB945F832A9436516F96DFC56393
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=.`.........."...P.................. ........@.. ....................... ............@.................................P...O.......`............................................................................ ............... ..H............text........ ...................... ..`.rsrc...`...........................@..@.reloc..............................@..B........................H.......|...............@....7...........................................0............(....(..........(.....o.....*.....................( ......(!......("......(#......($....*N..(....o....(%....*&..(&....*.s'........s(........s)........s*........s+........*....0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*&..(1....*...0..<........~.....(2.....,!r...p.....(3...o4...s5............~.....

                Static File Info

                General

                File type:CDFV2 Encrypted
                Entropy (8bit):7.9944183504926105
                TrID:
                • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                File name:TRA-St-0015-O01.xlsx
                File size:907776
                MD5:63c2af36e2ec6b0c464889473ba19048
                SHA1:d1d834ca00c0538a448e64e10231a5c78c09838d
                SHA256:129cd5a1fca6d3febd900de6cbecb9e30e22a19d7b2aeda41ee3c1eac54981ba
                SHA512:557108c60fedb061cded9fb1b1c82bc4e5ef6dd338476d90e134d52a6c05832b03028e537139b61f371a8b4ae05d47d3f09ac23a213b9cb3e19e826a6b3fc38e
                SSDEEP:24576:yG4DPNX84Ad4lsmboKda75Cy6pRxLUpvEFwn:yG8PZ84pyZh0yiCsFA
                File Content Preview:........................>...............................................................................~...............z.......|..............................................................................................................................

                File Icon

                Icon Hash:e4e2aa8aa4b4bcb4

                Static OLE Info

                General

                Document Type:OLE
                Number of OLE Files:1

                OLE File "TRA-St-0015-O01.xlsx"

                Indicators

                Has Summary Info:False
                Application Name:unknown
                Encrypted Document:True
                Contains Word Document Stream:False
                Contains Workbook/Book Stream:False
                Contains PowerPoint Document Stream:False
                Contains Visio Document Stream:False
                Contains ObjectPool Stream:
                Flash Objects Count:
                Contains VBA Macros:False

                Streams

                Stream Path: \x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace, File Type: data, Stream Size: 64
                General
                Stream Path:\x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace
                File Type:data
                Stream Size:64
                Entropy:2.73637206947
                Base64 Encoded:False
                Data ASCII:. . . . . . . . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . .
                Data Raw:08 00 00 00 01 00 00 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 54 00 72 00 61 00 6e 00 73 00 66 00 6f 00 72 00 6d 00 00 00
                Stream Path: \x6DataSpaces/DataSpaceMap, File Type: data, Stream Size: 112
                General
                Stream Path:\x6DataSpaces/DataSpaceMap
                File Type:data
                Stream Size:112
                Entropy:2.7597816111
                Base64 Encoded:False
                Data ASCII:. . . . . . . . h . . . . . . . . . . . . . . E . n . c . r . y . p . t . e . d . P . a . c . k . a . g . e . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . D . a . t . a . S . p . a . c . e . . .
                Data Raw:08 00 00 00 01 00 00 00 68 00 00 00 01 00 00 00 00 00 00 00 20 00 00 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 65 00 64 00 50 00 61 00 63 00 6b 00 61 00 67 00 65 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 00 00
                Stream Path: \x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary, File Type: data, Stream Size: 200
                General
                Stream Path:\x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary
                File Type:data
                Stream Size:200
                Entropy:3.13335930328
                Base64 Encoded:False
                Data ASCII:X . . . . . . . L . . . { . F . F . 9 . A . 3 . F . 0 . 3 . - . 5 . 6 . E . F . - . 4 . 6 . 1 . 3 . - . B . D . D . 5 . - . 5 . A . 4 . 1 . C . 1 . D . 0 . 7 . 2 . 4 . 6 . } . N . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:58 00 00 00 01 00 00 00 4c 00 00 00 7b 00 46 00 46 00 39 00 41 00 33 00 46 00 30 00 33 00 2d 00 35 00 36 00 45 00 46 00 2d 00 34 00 36 00 31 00 33 00 2d 00 42 00 44 00 44 00 35 00 2d 00 35 00 41 00 34 00 31 00 43 00 31 00 44 00 30 00 37 00 32 00 34 00 36 00 7d 00 4e 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00
                Stream Path: \x6DataSpaces/Version, File Type: data, Stream Size: 76
                General
                Stream Path:\x6DataSpaces/Version
                File Type:data
                Stream Size:76
                Entropy:2.79079600998
                Base64 Encoded:False
                Data ASCII:< . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . D . a . t . a . S . p . a . c . e . s . . . . . . . . . . . . .
                Data Raw:3c 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00 72 00 2e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 73 00 01 00 00 00 01 00 00 00 01 00 00 00
                Stream Path: EncryptedPackage, File Type: data, Stream Size: 896520
                General
                Stream Path:EncryptedPackage
                File Type:data
                Stream Size:896520
                Entropy:7.99976973003
                Base64 Encoded:True
                Data ASCII:. . . . . . . . . . + o . ] . . . @ . . . . g s J . . j . . . . ^ 6 . . . . . . . . . . A > . ' . . . w . p . V = , ; J . _ B e F . . . . . . . . . . . . . . . . . . F . . Z . . . . . . . . . . . . F . . Z . . . . . . . . . . . . F . . Z . . . . . . . . . . . . F . . Z . . . . . . . . . . . . F . . Z . . . . . . . . . . . . F . . Z . . . . . . . . . . . . F . . Z . . . . . . . . . . . . F . . Z . . . . . . . . . . . . F . . Z . . . . . . . . . . . . F . . Z . . . . . . . . . . . . F . . Z . . . . . . . .
                Data Raw:f3 ad 0d 00 00 00 00 00 f0 1d 2b 6f d0 5d d0 0d f9 40 84 af d3 80 20 67 73 4a f2 ad 6a c5 a0 cd c9 5e 36 8d f6 be c0 bc 03 f0 e8 18 05 41 3e bb 27 da f3 eb 77 bc 70 ca 56 3d 2c 3b 4a dc 5f 42 65 46 b4 a2 0f 92 ba d3 05 04 0b 18 88 d8 80 e1 02 d5 af 0b 46 07 ec 5a 05 04 0b 18 88 d8 80 e1 02 d5 af 0b 46 07 ec 5a 05 04 0b 18 88 d8 80 e1 02 d5 af 0b 46 07 ec 5a 05 04 0b 18 88 d8 80 e1
                Stream Path: EncryptionInfo, File Type: data, Stream Size: 224
                General
                Stream Path:EncryptionInfo
                File Type:data
                Stream Size:224
                Entropy:4.55845197116
                Base64 Encoded:False
                Data ASCII:. . . . $ . . . . . . . $ . . . . . . . . f . . . . . . . . . . . . . . . . . . . . . . M . i . c . r . o . s . o . f . t . . E . n . h . a . n . c . e . d . . R . S . A . . a . n . d . . A . E . S . . C . r . y . p . t . o . g . r . a . p . h . i . c . . P . r . o . v . i . d . e . r . . . . . . . . [ q . n $ . . . > . . o . . . . . G . . [ . . , n % C . . h & . . . . . . . . . . > . I l { S J . ' . . . . . . K / . . # M . . . . .
                Data Raw:04 00 02 00 24 00 00 00 8c 00 00 00 24 00 00 00 00 00 00 00 0e 66 00 00 04 80 00 00 80 00 00 00 18 00 00 00 00 00 00 00 00 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 45 00 6e 00 68 00 61 00 6e 00 63 00 65 00 64 00 20 00 52 00 53 00 41 00 20 00 61 00 6e 00 64 00 20 00 41 00 45 00 53 00 20 00 43 00 72 00 79 00 70 00 74 00 6f 00 67 00 72 00 61 00 70 00 68 00

                Network Behavior

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Jan 27, 2021 20:35:07.590151072 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:07.748012066 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:07.748229027 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:07.757462025 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:07.915226936 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:07.921597958 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:07.921638966 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:07.921669960 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:07.921843052 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:07.967900038 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:08.129703045 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:08.129851103 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.671431065 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.834105968 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.834187984 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.834243059 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.834299088 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.834338903 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.834352970 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.834389925 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.834424019 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.834462881 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.834484100 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.834501028 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.834537983 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.834567070 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.834592104 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.834647894 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.834705114 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.834719896 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.834908962 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.836659908 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.994482040 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994538069 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994570971 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994600058 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994640112 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994677067 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994714975 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994751930 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994790077 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994796991 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.994831085 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.994837046 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994867086 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.994879961 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994899035 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.994913101 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.994927883 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.994945049 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.994977951 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.994988918 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.995068073 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.995132923 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.995172977 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.995274067 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.995351076 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.995373011 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.995441914 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.995445967 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.995482922 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.995507956 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.995521069 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:09.995533943 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:09.995563984 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.001457930 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153412104 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153491020 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153531075 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153568029 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153606892 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153614044 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153634071 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153656960 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153666019 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153709888 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153717041 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153757095 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153793097 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153795004 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153820992 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153834105 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153846025 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153871059 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153908968 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153934002 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153949022 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.153960943 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153990030 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.153995991 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154040098 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154056072 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154078007 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154088974 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154115915 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154134035 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154155016 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154192924 CET44349165162.241.148.128192.168.2.22
                Jan 27, 2021 20:35:10.154217005 CET49165443192.168.2.22162.241.148.128
                Jan 27, 2021 20:35:10.154231071 CET44349165162.241.148.128192.168.2.22

                UDP Packets

                TimestampSource PortDest PortSource IPDest IP
                Jan 27, 2021 20:35:07.327306032 CET5219753192.168.2.228.8.8.8
                Jan 27, 2021 20:35:07.516894102 CET53521978.8.8.8192.168.2.22
                Jan 27, 2021 20:35:07.517139912 CET5219753192.168.2.228.8.8.8
                Jan 27, 2021 20:35:07.573364019 CET53521978.8.8.8192.168.2.22
                Jan 27, 2021 20:35:08.400657892 CET5309953192.168.2.228.8.8.8
                Jan 27, 2021 20:35:08.448559046 CET53530998.8.8.8192.168.2.22
                Jan 27, 2021 20:35:08.454209089 CET5283853192.168.2.228.8.8.8
                Jan 27, 2021 20:35:08.502331018 CET53528388.8.8.8192.168.2.22
                Jan 27, 2021 20:35:08.989140034 CET6120053192.168.2.228.8.8.8
                Jan 27, 2021 20:35:09.045689106 CET53612008.8.8.8192.168.2.22
                Jan 27, 2021 20:35:09.051862001 CET4954853192.168.2.228.8.8.8
                Jan 27, 2021 20:35:09.110131025 CET53495488.8.8.8192.168.2.22

                DNS Queries

                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Jan 27, 2021 20:35:07.327306032 CET192.168.2.228.8.8.80x1168Standard query (0)spicesherbs.inA (IP address)IN (0x0001)
                Jan 27, 2021 20:35:07.517139912 CET192.168.2.228.8.8.80x1168Standard query (0)spicesherbs.inA (IP address)IN (0x0001)

                DNS Answers

                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Jan 27, 2021 20:35:07.516894102 CET8.8.8.8192.168.2.220x1168No error (0)spicesherbs.in162.241.148.128A (IP address)IN (0x0001)
                Jan 27, 2021 20:35:07.573364019 CET8.8.8.8192.168.2.220x1168No error (0)spicesherbs.in162.241.148.128A (IP address)IN (0x0001)

                HTTPS Packets

                TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                Jan 27, 2021 20:35:07.921669960 CET162.241.148.128443192.168.2.2249165CN=webmail.spicesherbs.in CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Sun Dec 20 14:59:03 CET 2020 Wed Oct 07 21:21:40 CEST 2020Sat Mar 20 14:59:03 CET 2021 Wed Sep 29 21:21:40 CEST 2021771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021

                Code Manipulations

                Statistics

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:20:34:46
                Start date:27/01/2021
                Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                Wow64 process (32bit):false
                Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                Imagebase:0x13fba0000
                File size:27641504 bytes
                MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:20:35:06
                Start date:27/01/2021
                Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                Wow64 process (32bit):true
                Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                Imagebase:0x400000
                File size:543304 bytes
                MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:20:35:10
                Start date:27/01/2021
                Path:C:\Users\Public\vbc.exe
                Wow64 process (32bit):false
                Commandline:'C:\Users\Public\vbc.exe'
                Imagebase:0xbf0000
                File size:508928 bytes
                MD5 hash:C7B2B0FA4A71FE33536148C2584DA7DB
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, Author: Joe Security
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.2169610523.0000000012381000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.2169219241.00000000023DE000.00000004.00000001.sdmp, Author: Joe Security
                Antivirus matches:
                • Detection: 100%, Joe Sandbox ML
                Reputation:low

                General

                Start time:20:35:13
                Start date:27/01/2021
                Path:C:\Windows\System32\schtasks.exe
                Wow64 process (32bit):false
                Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\XaHKwnPuj' /XML 'C:\Users\user\AppData\Local\Temp\tmp2222.tmp'
                Imagebase:0xffa90000
                File size:285696 bytes
                MD5 hash:97E0EC3D6D99E8CC2B17EF2D3760E8FC
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate

                General

                Start time:20:35:13
                Start date:27/01/2021
                Path:C:\Users\Public\vbc.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\Public\vbc.exe
                Imagebase:0xbf0000
                File size:508928 bytes
                MD5 hash:C7B2B0FA4A71FE33536148C2584DA7DB
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                General

                Start time:20:35:14
                Start date:27/01/2021
                Path:C:\Users\Public\vbc.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\Public\vbc.exe
                Imagebase:0xbf0000
                File size:508928 bytes
                MD5 hash:C7B2B0FA4A71FE33536148C2584DA7DB
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                General

                Start time:20:35:14
                Start date:27/01/2021
                Path:C:\Users\Public\vbc.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\Public\vbc.exe
                Imagebase:0xbf0000
                File size:508928 bytes
                MD5 hash:C7B2B0FA4A71FE33536148C2584DA7DB
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                General

                Start time:20:35:15
                Start date:27/01/2021
                Path:C:\Users\Public\vbc.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\Public\vbc.exe
                Imagebase:0xbf0000
                File size:508928 bytes
                MD5 hash:C7B2B0FA4A71FE33536148C2584DA7DB
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                General

                Start time:20:35:15
                Start date:27/01/2021
                Path:C:\Users\Public\vbc.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\Public\vbc.exe
                Imagebase:0xbf0000
                File size:508928 bytes
                MD5 hash:C7B2B0FA4A71FE33536148C2584DA7DB
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                Disassembly

                Code Analysis

                Reset < >